Unnamed: 0 int64 0 350k | level_0 int64 0 351k | ApplicationNumber int64 9.75M 96.1M | ArtUnit int64 1.6k 3.99k | Abstract stringlengths 1 8.37k | Claims stringlengths 3 292k | abstract-claims stringlengths 68 293k | TechCenter int64 1.6k 3.9k |
|---|---|---|---|---|---|---|---|
8,900 | 8,900 | 13,630,210 | 2,447 | A content network is presented where at least one of non-personalized data commonly applicable to a user base and personalized data is maintained. In an aspect, each element of the personalized data may be applicable to at least one, but less than all, of users within the user base. The non-personalized data may be stored across a plurality of servers included in a group, and the personalized data is stored across at least one, but less than all, of the plurality of computing devices included in the group. An update to data stored may be received and a determination made as to whether the update to data is to the non-personalized data or the personalized data. Then, one of the non-personalized data or the personalized data set stored in the server may be updated. | 1. A method comprising:
maintaining in-memory at least one of non-personalized data commonly applicable to a user base and a personalized data set, where each element of the personalized data set is applicable to at least one, but less than all, of users within the user base, wherein the non-personalized data is stored across a plurality of computing devices included in a group, and wherein the personalized data is stored across at least one, but less than all, of the plurality of computing devices included in the group. 2. The method claim 1, further comprising maintaining in an external datastore the other of the at least one of non-personalized data commonly applicable to the user base and the personalized data set. 3. The method of claim 1, further comprising receiving a specific user request to access the personalized data and the non-personalized data stored in-memory. 4. The method of claim 3, further comprising identifying the specific user and combining the non-personalized data and the personalized data into combined data, wherein the personalized data is personalized data of the specific user. 5. The method of claim 4, further comprising designating a server of the plurality of servers as a primary server for storing the personalized data of the specific user. 6. The method of claim 5, further comprising designating at least one second server of the plurality of servers as at least one secondary server for storing the personalized data of the specific user. 7. The method of claim 6, further comprising:
receiving an update to data stored in the primary server; identifying the update as an update to the non-personalized data; and updating the non-personalized data in the primary server. 8. The method of claim 6, further comprising:
receiving an update to data stored in the primary server; identifying the update as an update to the personalized data; updating the personalized data in the primary server; and coordinating with the at least one secondary server to update the personalized data in the at least one secondary server. 9. A method comprising:
receiving, at a computing device, an update to data stored in the computing device, the computing device being configured to maintain in-memory non-personalized data commonly applicable to a user base and a personalized data, where each element of the personalized data is applicable to at least one, but less than all, of users within the user base; determining whether the update is an update to the non-personalized data or an update to the personalized data; and based upon the determining, updating the non-personalized data or the personalized data set stored in the computing device, wherein the non-personalized data is stored across a plurality of computing devices included in a group; and wherein the personalized data is stored across at least one, but less than all, of the plurality of servers included in the group. 10. The method of claim 9, further comprising based upon determining that the update is an update to the non-personalized data, determining a position of the update in an order of updates to the server and distributing the update to the non-personalized data to all other servers of the plurality of servers. 11. The method of claim 10, further comprising updating an in-memory model of the server with the updated non-personalized data. 12. The method of claim 9, further comprising performing a hash function to locate the server maintaining the personalized data of a specific user. 13. The method of claim 12, further comprising determining at least one second server as at least one secondary server for maintaining the personalized data of the specific user. 14. The method of claim 9, further comprising coordinating an update of personalized data set stored in the at least one second server. 15. The method of claim 9, further comprising designating the server of a plurality of servers as a primary server for storing personalized data of a specific user within the user base. 16. The method of claim 15, further comprising designating at least one second server of the plurality of servers as at least one secondary server for storing the personalized data of the specific user. 17. A method comprising:
receiving, at an application computing device, a specific user request to access content; determining personalized data of the specific user and non-personalized data associated with the content maintained in-memory at the application computing device; and sending the content to the specific user, wherein the non-personalized data is stored across a plurality of application computing devices included in a group, and wherein the personalized data is stored across at least one, but less than all, of a plurality of application computing devices included in the group. 18. The method of claim 17, further comprising designating the application computing device as a primary application computing device for storing the personalized data of the specific user. 19. The method of claim 17, further comprising identifying the specific user and combining the non-personalized data and the personalized data into combined data. 20. The method of claim 17, further comprising:
receiving an update to data stored in the application computing device; identifying the update as an update to the personalized data; updating the personalized data in the application computing device; and coordinating with at least one second application computing device, of the at least one, but less than all, of the plurality of application computing devices to update the personalized data in the at least one second application computing device. | A content network is presented where at least one of non-personalized data commonly applicable to a user base and personalized data is maintained. In an aspect, each element of the personalized data may be applicable to at least one, but less than all, of users within the user base. The non-personalized data may be stored across a plurality of servers included in a group, and the personalized data is stored across at least one, but less than all, of the plurality of computing devices included in the group. An update to data stored may be received and a determination made as to whether the update to data is to the non-personalized data or the personalized data. Then, one of the non-personalized data or the personalized data set stored in the server may be updated.1. A method comprising:
maintaining in-memory at least one of non-personalized data commonly applicable to a user base and a personalized data set, where each element of the personalized data set is applicable to at least one, but less than all, of users within the user base, wherein the non-personalized data is stored across a plurality of computing devices included in a group, and wherein the personalized data is stored across at least one, but less than all, of the plurality of computing devices included in the group. 2. The method claim 1, further comprising maintaining in an external datastore the other of the at least one of non-personalized data commonly applicable to the user base and the personalized data set. 3. The method of claim 1, further comprising receiving a specific user request to access the personalized data and the non-personalized data stored in-memory. 4. The method of claim 3, further comprising identifying the specific user and combining the non-personalized data and the personalized data into combined data, wherein the personalized data is personalized data of the specific user. 5. The method of claim 4, further comprising designating a server of the plurality of servers as a primary server for storing the personalized data of the specific user. 6. The method of claim 5, further comprising designating at least one second server of the plurality of servers as at least one secondary server for storing the personalized data of the specific user. 7. The method of claim 6, further comprising:
receiving an update to data stored in the primary server; identifying the update as an update to the non-personalized data; and updating the non-personalized data in the primary server. 8. The method of claim 6, further comprising:
receiving an update to data stored in the primary server; identifying the update as an update to the personalized data; updating the personalized data in the primary server; and coordinating with the at least one secondary server to update the personalized data in the at least one secondary server. 9. A method comprising:
receiving, at a computing device, an update to data stored in the computing device, the computing device being configured to maintain in-memory non-personalized data commonly applicable to a user base and a personalized data, where each element of the personalized data is applicable to at least one, but less than all, of users within the user base; determining whether the update is an update to the non-personalized data or an update to the personalized data; and based upon the determining, updating the non-personalized data or the personalized data set stored in the computing device, wherein the non-personalized data is stored across a plurality of computing devices included in a group; and wherein the personalized data is stored across at least one, but less than all, of the plurality of servers included in the group. 10. The method of claim 9, further comprising based upon determining that the update is an update to the non-personalized data, determining a position of the update in an order of updates to the server and distributing the update to the non-personalized data to all other servers of the plurality of servers. 11. The method of claim 10, further comprising updating an in-memory model of the server with the updated non-personalized data. 12. The method of claim 9, further comprising performing a hash function to locate the server maintaining the personalized data of a specific user. 13. The method of claim 12, further comprising determining at least one second server as at least one secondary server for maintaining the personalized data of the specific user. 14. The method of claim 9, further comprising coordinating an update of personalized data set stored in the at least one second server. 15. The method of claim 9, further comprising designating the server of a plurality of servers as a primary server for storing personalized data of a specific user within the user base. 16. The method of claim 15, further comprising designating at least one second server of the plurality of servers as at least one secondary server for storing the personalized data of the specific user. 17. A method comprising:
receiving, at an application computing device, a specific user request to access content; determining personalized data of the specific user and non-personalized data associated with the content maintained in-memory at the application computing device; and sending the content to the specific user, wherein the non-personalized data is stored across a plurality of application computing devices included in a group, and wherein the personalized data is stored across at least one, but less than all, of a plurality of application computing devices included in the group. 18. The method of claim 17, further comprising designating the application computing device as a primary application computing device for storing the personalized data of the specific user. 19. The method of claim 17, further comprising identifying the specific user and combining the non-personalized data and the personalized data into combined data. 20. The method of claim 17, further comprising:
receiving an update to data stored in the application computing device; identifying the update as an update to the personalized data; updating the personalized data in the application computing device; and coordinating with at least one second application computing device, of the at least one, but less than all, of the plurality of application computing devices to update the personalized data in the at least one second application computing device. | 2,400 |
8,901 | 8,901 | 15,804,774 | 2,485 | According to an embodiment, an encoder is configured to ensure that for each long-term picture of a RPS of a picture i the value of a flag referred to as delta_poc_msb_present_flag[i] is equal to 1 when there are at least two reference pictures in a decoded picture buffer with lsb's of the POC referred to as pic_order_cnt_lsb equal to the lsb's of the respective long-term picture i denoted POC lsbLt[i]. When the delta_poc_msb_present_flag is equal to 1, the long-term picture is indicated by the full POC. | 1. A method performed by an encoder for encoding a current picture of a video stream, according to a scheme in which one or more previously decoded pictures are used as reference pictures for decoding and according to a scheme in which the encoder indicates to a decoder, in a reference picture set (RPS), which of the one or more previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, wherein the RPS indicates each of the reference pictures by a respective picture order count (POC) value, said method comprising:
determining, for each long-term picture indication i of the RPS of the current picture, whether there are at least two reference pictures in the DPB with a least significant bit (lsb) of the POC, denoted as “POC lsb,” equal to POC lsb indicated for said long-term picture indication i; and responsive to determining that there are at least two reference pictures in the DPB with POC lsb equal to the POC lsb indicated for the long-term picture indication i, setting a parameter indicating that the long-term picture indication i should be indicated by the full POC; and sending the current picture and the RPS with said parameter to the decoder. 2. The method of claim 1, wherein said parameter is a flag. 3. The method of claim 1, wherein said parameter is a parameter delta_poc_msb_present_flag[i]. 4. The method of claim 1, further comprising imposing a restriction such that a long-term picture indication i that has been signaled with the parameter indicating that the long-term picture indication i should be indicated by the full POC will never be signaled in the future with an indication that the long-term picture indication i should be indicated by its POC lsb. 5. The method of claim 1, wherein the encoder is a High Efficiency Video Coding (HEVC) encoder. 6. A method performed by a decoder for decoding a current picture of a video stream, wherein one or more previously decoded pictures are used as reference pictures for decoding and the decoder receives an indication from an encoder, in a reference picture set (RPS), as to which previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, wherein the RPS indicates each of the reference pictures by a picture order count (POC) value, wherein said method comprises:
receiving the current picture and the RPS for the current picture; receiving, for each long-term picture indication i in the RPS, a parameter that indicates whether the long-term picture should be indicated by the full POC or by the least significant-bit (lsb) of the POC, denoted as “POC lsb”; determining that the video stream is erroneous in response to determining that both the received parameter indicates that the long-term picture indication i should be indicated by the POC lsb and that there is more than one reference picture in the DPB with POC lsb equal to the POC lsb indicated for the long-term picture indication i. 7. The method of claim 6, comprising the further step of discarding at least the current picture when it is determined that the video stream is erroneous. 8. The method of claim 6, comprising the further step of indicating to a user that the video stream is erroneous. 9. The method of claim 6, wherein the parameter indicating whether the long-term picture indication i should be indicated by the full POC or by the POC lsb is a flag. 10. The method of claim 6, wherein the parameter indicating whether the long-term picture indication i should be indicated by the full POC or by the POC lsb is a parameter delta_poc_msb_present_flag[i]. 11. The method of claim 6, wherein the decoder is a High Efficiency Video Coding (HEVC) decoder. 12. An encoder for encoding a current picture of a video stream, wherein the encoder is adapted to use one or more previously decoded pictures as reference pictures for encoding and the encoder is adapted to indicate to a decoder, in a reference picture set (RPS), which previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, wherein the encoder is configured to indicate each of the reference pictures in the RPS by a picture order count (POC) value, and wherein the encoder comprises a processor configured to:
determine, for each long-term picture indication i of the RPS of the current picture, whether or not there are at least two reference pictures in the DPB with a least significant bit (lsb) of the POC, denoted as “POC lsb,” equal to POC lsb indicated for the long-term picture indication i; set a parameter indicating that the long-term picture indication i should use the full POC, in response to determining that there are at least two reference pictures in the DPB with POC lsb equal to the POC lsb indicated for the long-term picture indication i; and send the current picture and the RPS with said parameter to the decoder. 13. The encoder of claim 12, wherein the parameter indicating that the long-term picture indication i should be indicated by the full POC is a flag. 14. The encoder of claim 12, wherein the parameter indicating that the long-term picture indication i should be indicated by the full POC is a parameter delta_poc_msb_present_flag[i]. 15. The encoder of claim 12, wherein the processor is further configured to impose a restriction such that a long-term picture indication i that has been signaled with the parameter indicating that the long-term picture indication i should be indicated by the full POC will not in the future be signaled with a parameter indicating that the long-term picture indication i should be indicated by the POC lsb. 16. The encoder of claim 12, wherein the encoder is a High Efficiency Video Coding (HEVC) encoder. 17. A decoder for decoding a current picture of a video stream, wherein the decoder is configured to use one or more previously decoded pictures as reference pictures for decoding and wherein the decoder comprises a processor that is configured to:
receive one or more indications, in a reference picture set (RPS) from an encoder, as to which previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, wherein the RPS indicates each reference picture by a picture order count (POC) value; receive the current picture and the RPS for the current picture; receive a parameter indicating, for each long-term picture indication i in the RPS, whether the long-term picture should be indicated by the full POC or by the least significant bit (lsb) of the POC, denoted as the “POC lsb”; and determine that the video stream is erroneous in response to determining that both the received parameter indicates that the long-term picture indication i should be indicated by POC lsb and that there are at least two reference pictures in the (DPB) with POC lsb equal to POC lsb of the long-term picture indication i. 18. The decoder if claim 17, wherein the processor is further configured to discard at least the current picture in response to determining that the video stream is erroneous. 19. The decoder of claim 17, wherein the processor is configured to indicate to a user that the video stream is erroneous. 20. The decoder of claim 17, wherein the parameter indicating whether the long-term picture indication i should be indicated by the full POC or by the POC lsb is a flag. 21. The decoder of claim 17, wherein the parameter indicating whether the long-term picture indication i should be indicated by the full POC or by the POC lsb is a parameter delta_poc_msb_present_flag[i]. 22. The decoder of claim 17, wherein the decoder is a High Efficiency Video Coding (HEVC) decoder. 23. A non-transitory computer-readable medium storing a computer program comprising computer program instructions for encoding a current picture of a video stream by an encoder, according to a scheme in which one or more previously decoded pictures are used as reference pictures for decoding and the encoder indicates, in a reference picture set (RPS) to a decoder, as to which previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, wherein the RPS indicates each of the reference pictures by a respective picture order count (POC) value, and wherein said computer program comprises computer program instructions that, when run on a processor, cause the processor to:
determine, for each long-term picture indication i of the RPS of the current picture, whether there are at least two reference pictures in the DPB with a least significant bit (lsb) of the POC, denoted as “POC lsb,” equal to POC lsb of the long-term picture indication i; and in response to determining that there are at least two reference pictures in the DPB with POC lsb equal to the POC lsb indicated for the long-term picture indication i:
set a parameter indicating that the long-term picture indication i should use the full POC; and
send the current picture and the RPS with said parameter to the decoder. 24. A non-transitory computer-readable medium storing a computer program comprising computer program instructions for decoding a current picture of a video stream by a decoder, wherein one or more previously decoded pictures are used as reference pictures for decoding and the decoder receives an indication, in a reference picture set (RPS) from an encoder, as to which previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, and wherein the RPS indicates each of the reference pictures by a picture order count (POC) value, said computer program including computer program instructions that, when run on a processor, causes said processor to:
receive the current picture and the RPS for the current picture; receive a parameter indicating, for each long-term picture indication i, whether the long-term picture should be indicated by the full POC or by the least significant bit (lsb) of the POC, denoted as “POC lsb”; and determine that the video stream is erroneous in response to determining that both the received parameter indicates that the long-term picture indication i should be indicated by POC lsb and that there are at least two reference pictures in the DPB with POC lsb equal to POC lsb of the long-term picture indication i. | According to an embodiment, an encoder is configured to ensure that for each long-term picture of a RPS of a picture i the value of a flag referred to as delta_poc_msb_present_flag[i] is equal to 1 when there are at least two reference pictures in a decoded picture buffer with lsb's of the POC referred to as pic_order_cnt_lsb equal to the lsb's of the respective long-term picture i denoted POC lsbLt[i]. When the delta_poc_msb_present_flag is equal to 1, the long-term picture is indicated by the full POC.1. A method performed by an encoder for encoding a current picture of a video stream, according to a scheme in which one or more previously decoded pictures are used as reference pictures for decoding and according to a scheme in which the encoder indicates to a decoder, in a reference picture set (RPS), which of the one or more previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, wherein the RPS indicates each of the reference pictures by a respective picture order count (POC) value, said method comprising:
determining, for each long-term picture indication i of the RPS of the current picture, whether there are at least two reference pictures in the DPB with a least significant bit (lsb) of the POC, denoted as “POC lsb,” equal to POC lsb indicated for said long-term picture indication i; and responsive to determining that there are at least two reference pictures in the DPB with POC lsb equal to the POC lsb indicated for the long-term picture indication i, setting a parameter indicating that the long-term picture indication i should be indicated by the full POC; and sending the current picture and the RPS with said parameter to the decoder. 2. The method of claim 1, wherein said parameter is a flag. 3. The method of claim 1, wherein said parameter is a parameter delta_poc_msb_present_flag[i]. 4. The method of claim 1, further comprising imposing a restriction such that a long-term picture indication i that has been signaled with the parameter indicating that the long-term picture indication i should be indicated by the full POC will never be signaled in the future with an indication that the long-term picture indication i should be indicated by its POC lsb. 5. The method of claim 1, wherein the encoder is a High Efficiency Video Coding (HEVC) encoder. 6. A method performed by a decoder for decoding a current picture of a video stream, wherein one or more previously decoded pictures are used as reference pictures for decoding and the decoder receives an indication from an encoder, in a reference picture set (RPS), as to which previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, wherein the RPS indicates each of the reference pictures by a picture order count (POC) value, wherein said method comprises:
receiving the current picture and the RPS for the current picture; receiving, for each long-term picture indication i in the RPS, a parameter that indicates whether the long-term picture should be indicated by the full POC or by the least significant-bit (lsb) of the POC, denoted as “POC lsb”; determining that the video stream is erroneous in response to determining that both the received parameter indicates that the long-term picture indication i should be indicated by the POC lsb and that there is more than one reference picture in the DPB with POC lsb equal to the POC lsb indicated for the long-term picture indication i. 7. The method of claim 6, comprising the further step of discarding at least the current picture when it is determined that the video stream is erroneous. 8. The method of claim 6, comprising the further step of indicating to a user that the video stream is erroneous. 9. The method of claim 6, wherein the parameter indicating whether the long-term picture indication i should be indicated by the full POC or by the POC lsb is a flag. 10. The method of claim 6, wherein the parameter indicating whether the long-term picture indication i should be indicated by the full POC or by the POC lsb is a parameter delta_poc_msb_present_flag[i]. 11. The method of claim 6, wherein the decoder is a High Efficiency Video Coding (HEVC) decoder. 12. An encoder for encoding a current picture of a video stream, wherein the encoder is adapted to use one or more previously decoded pictures as reference pictures for encoding and the encoder is adapted to indicate to a decoder, in a reference picture set (RPS), which previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, wherein the encoder is configured to indicate each of the reference pictures in the RPS by a picture order count (POC) value, and wherein the encoder comprises a processor configured to:
determine, for each long-term picture indication i of the RPS of the current picture, whether or not there are at least two reference pictures in the DPB with a least significant bit (lsb) of the POC, denoted as “POC lsb,” equal to POC lsb indicated for the long-term picture indication i; set a parameter indicating that the long-term picture indication i should use the full POC, in response to determining that there are at least two reference pictures in the DPB with POC lsb equal to the POC lsb indicated for the long-term picture indication i; and send the current picture and the RPS with said parameter to the decoder. 13. The encoder of claim 12, wherein the parameter indicating that the long-term picture indication i should be indicated by the full POC is a flag. 14. The encoder of claim 12, wherein the parameter indicating that the long-term picture indication i should be indicated by the full POC is a parameter delta_poc_msb_present_flag[i]. 15. The encoder of claim 12, wherein the processor is further configured to impose a restriction such that a long-term picture indication i that has been signaled with the parameter indicating that the long-term picture indication i should be indicated by the full POC will not in the future be signaled with a parameter indicating that the long-term picture indication i should be indicated by the POC lsb. 16. The encoder of claim 12, wherein the encoder is a High Efficiency Video Coding (HEVC) encoder. 17. A decoder for decoding a current picture of a video stream, wherein the decoder is configured to use one or more previously decoded pictures as reference pictures for decoding and wherein the decoder comprises a processor that is configured to:
receive one or more indications, in a reference picture set (RPS) from an encoder, as to which previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, wherein the RPS indicates each reference picture by a picture order count (POC) value; receive the current picture and the RPS for the current picture; receive a parameter indicating, for each long-term picture indication i in the RPS, whether the long-term picture should be indicated by the full POC or by the least significant bit (lsb) of the POC, denoted as the “POC lsb”; and determine that the video stream is erroneous in response to determining that both the received parameter indicates that the long-term picture indication i should be indicated by POC lsb and that there are at least two reference pictures in the (DPB) with POC lsb equal to POC lsb of the long-term picture indication i. 18. The decoder if claim 17, wherein the processor is further configured to discard at least the current picture in response to determining that the video stream is erroneous. 19. The decoder of claim 17, wherein the processor is configured to indicate to a user that the video stream is erroneous. 20. The decoder of claim 17, wherein the parameter indicating whether the long-term picture indication i should be indicated by the full POC or by the POC lsb is a flag. 21. The decoder of claim 17, wherein the parameter indicating whether the long-term picture indication i should be indicated by the full POC or by the POC lsb is a parameter delta_poc_msb_present_flag[i]. 22. The decoder of claim 17, wherein the decoder is a High Efficiency Video Coding (HEVC) decoder. 23. A non-transitory computer-readable medium storing a computer program comprising computer program instructions for encoding a current picture of a video stream by an encoder, according to a scheme in which one or more previously decoded pictures are used as reference pictures for decoding and the encoder indicates, in a reference picture set (RPS) to a decoder, as to which previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, wherein the RPS indicates each of the reference pictures by a respective picture order count (POC) value, and wherein said computer program comprises computer program instructions that, when run on a processor, cause the processor to:
determine, for each long-term picture indication i of the RPS of the current picture, whether there are at least two reference pictures in the DPB with a least significant bit (lsb) of the POC, denoted as “POC lsb,” equal to POC lsb of the long-term picture indication i; and in response to determining that there are at least two reference pictures in the DPB with POC lsb equal to the POC lsb indicated for the long-term picture indication i:
set a parameter indicating that the long-term picture indication i should use the full POC; and
send the current picture and the RPS with said parameter to the decoder. 24. A non-transitory computer-readable medium storing a computer program comprising computer program instructions for decoding a current picture of a video stream by a decoder, wherein one or more previously decoded pictures are used as reference pictures for decoding and the decoder receives an indication, in a reference picture set (RPS) from an encoder, as to which previously decoded pictures in a decoded picture buffer (DPB) are reference pictures, and wherein the RPS indicates each of the reference pictures by a picture order count (POC) value, said computer program including computer program instructions that, when run on a processor, causes said processor to:
receive the current picture and the RPS for the current picture; receive a parameter indicating, for each long-term picture indication i, whether the long-term picture should be indicated by the full POC or by the least significant bit (lsb) of the POC, denoted as “POC lsb”; and determine that the video stream is erroneous in response to determining that both the received parameter indicates that the long-term picture indication i should be indicated by POC lsb and that there are at least two reference pictures in the DPB with POC lsb equal to POC lsb of the long-term picture indication i. | 2,400 |
8,902 | 8,902 | 15,704,050 | 2,484 | A portable device controlling playback of video data on a first device external to the portable device and including a browser module operative to present a display of a plurality of images, each image corresponding to a section of the video data, and to highlight an image corresponding to the section of the video data currently played back by the first device, a communication module coupled to the browser module and operative, in response to a selection of an image among the plurality of images by a user, to transmit a first command to the first device to play back the video data corresponding to the image selected by the user, wherein the browser module is further operative to adapt highlighting of the plurality of images in response to a second command received from said first device upon a change of the section of video data currently played back on the first device. | 1. A portable device for controlling playback of video data on a first device external to said portable device, comprising:
a browser module operative to present a display of a plurality of images, each image corresponding to a section of the video data, and to highlight an image corresponding to the section of the video data currently played back by the first device; a communication module coupled to the browser module and operative, in response to a selection of an image among the plurality of images by a user, to transmit a first command to the first device to play back the video data corresponding to the image selected by the user; and wherein the browser module is further operative to adapt highlighting of the plurality of images in response to a second command received from said first device upon a change of the section of video data currently played back on the first device. 2. The portable device of claim 1, wherein the plurality of images differs from the video data. 3. The portable device of claim 1, wherein the plurality of images comprises a summary of a story in the video data. 4. The portable device of claim 1, wherein each section of the video data comprises a scene of the video data. 5. The portable device of claim 1, wherein the communication module being further operative to receive the plurality of images from the second device. 6. The portable device of claim 1, wherein the communication module being further operative to send to a head-end a report on an interaction of the user with the plurality of images, wherein the report includes a click-through rate of video data sections used to compose the plurality of images to provide a summary of the video data sections. | A portable device controlling playback of video data on a first device external to the portable device and including a browser module operative to present a display of a plurality of images, each image corresponding to a section of the video data, and to highlight an image corresponding to the section of the video data currently played back by the first device, a communication module coupled to the browser module and operative, in response to a selection of an image among the plurality of images by a user, to transmit a first command to the first device to play back the video data corresponding to the image selected by the user, wherein the browser module is further operative to adapt highlighting of the plurality of images in response to a second command received from said first device upon a change of the section of video data currently played back on the first device.1. A portable device for controlling playback of video data on a first device external to said portable device, comprising:
a browser module operative to present a display of a plurality of images, each image corresponding to a section of the video data, and to highlight an image corresponding to the section of the video data currently played back by the first device; a communication module coupled to the browser module and operative, in response to a selection of an image among the plurality of images by a user, to transmit a first command to the first device to play back the video data corresponding to the image selected by the user; and wherein the browser module is further operative to adapt highlighting of the plurality of images in response to a second command received from said first device upon a change of the section of video data currently played back on the first device. 2. The portable device of claim 1, wherein the plurality of images differs from the video data. 3. The portable device of claim 1, wherein the plurality of images comprises a summary of a story in the video data. 4. The portable device of claim 1, wherein each section of the video data comprises a scene of the video data. 5. The portable device of claim 1, wherein the communication module being further operative to receive the plurality of images from the second device. 6. The portable device of claim 1, wherein the communication module being further operative to send to a head-end a report on an interaction of the user with the plurality of images, wherein the report includes a click-through rate of video data sections used to compose the plurality of images to provide a summary of the video data sections. | 2,400 |
8,903 | 8,903 | 15,281,684 | 2,453 | Described herein are systems, methods, and software to handle requests to an application file shared by a plurality of applications on a computing system. In one implementation, a method of handling request for an application file shared by a plurality of applications on a computing system includes identifying a request for the application file on the computing system, wherein each application in the plurality of applications is associated with an individualized version of the application file, and wherein the plurality of applications is stored on separate application storage volumes attached to the computing system. The method further provides identifying an application associated with the request, and identifying an application storage volume in the application storage volumes that stores the application. Once identified, the method also includes retrieving the application file from the identified storage volume to support the request. | 1. A method of handling requests for an application file shared by a plurality of applications on a computing system, wherein each application of the plurality of applications is associated with an individualized version of the application file, and wherein the plurality of applications is stored on separate application storage volumes attached to the computing system, the method comprising:
identifying a request for the application file on the computing system; identifying an application associated with the request; identifying an application storage volume in the application storage volumes that stores the application; and retrieving the application file from the identified storage volume to support the request. 2. The method of claim 1 wherein the application file comprises a registry file or a dynamic link library (DLL) file. 3. The method of claim 1 wherein the computing system comprises a virtual computing system or a physical computing system. 4. The method of claim 1 wherein the application storage volumes attached to the computing system are mounted to the computing system with registry information modified to make applications stored on the application storage volumes executable from the application storage volumes. 5. The method of claim 5 wherein files stored on the application storage volumes are overlaid in at least a file system view for an end user of the computing system, wherein a single version of the application file is viewable by the end user in the file system view, and wherein each of the plurality of applications request the application file using the single version. 6. The method of claim 5 wherein files stored on the application storage volumes are overlaid in at least a file system view and a registry view for an end user of the computing system, wherein a single version of the application file is viewable in the registry view, and wherein each of the plurality of applications request the application file using the single version. 7. The method of claim 1 further comprising:
identifying a second request for the application file;
identifying a second application associated with the second request;
identifying a second application storage volume in the application storage volumes associated with the application; and
retrieving the application file from the second application storage volume to support the second request. 8. The method of claim 1 wherein the application storage volumes are attached to the computing system based on credentials associated with an end user of the computing system. 9. A computing apparatus comprising:
one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media to handle requests for an application file shared by a plurality of applications on a computing system that, when read and executed by the processing system, direct the processing system to at least:
identify a request for the application file on the computing system, wherein each application in the plurality of applications is associated with an individualized version of the application file, and wherein the plurality of applications is stored on separate application storage volumes attached to the computing system;
identify an application associated with the request;
identify an application storage volume in the application storage volumes that stores the application; and
retrieve the application file from the identified storage volume to support the request. 10. The computing apparatus of claim 9 wherein the application file comprises a registry file or a dynamic link library (DLL) file. 11. The computing apparatus of claim 9 wherein the computing system comprises a virtual computing system or a physical computing system. 12. The computing apparatus of claim 9 wherein the application storage volumes attached to the computing system are mounted to the computing system with registry information modified to make applications stored on the application storage volumes executable from the application storage volumes. 13. The computing apparatus of claim 12 wherein files stored on the application storage volumes are overlaid in at least a file system view for an end user of the computing system, wherein a single version of the application file is viewable by the end user in the file system view, and wherein each of the plurality of applications request the application file using the single version. 14. The computing apparatus of claim 12 wherein files stored on the application storage volumes are overlaid in at least a file system view and a registry view for an end user of the computing system, wherein a single version of the application file is viewable in the registry view, and wherein each of the plurality of applications request the application file using the single version. 15. The computing apparatus of claim 9 wherein the program instructions further direct the processing system to:
identify a second request for the application file;
identify a second application associated with the second request;
identify a second application storage volume in the application storage volumes associated with the application; and
retrieve the application file from the second application storage volume to support the second request. 16. The computing apparatus of claim 9 wherein the application storage volumes are attached to the computing system based on credentials associated with an end user of the computing system. 17. An apparatus comprising
one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media to handle requests for an application file shared by a plurality of applications on a computing system that, when read and executed by a processing system, direct the processing system to at least:
identify a request for the application file on the computing system, wherein each application in the plurality of applications is associated with an individualized version of the application file, and wherein the plurality of applications is stored on separate application storage volumes attached to the computing system;
identify an application associated with the request;
identify an application storage volume in the application storage volumes that stores the application; and
retrieve the application file from the identified storage volume to support the request. 18. The apparatus of claim 17 wherein the application file comprises a registry file or a dynamic link library (DLL) file. 19. The apparatus of claim 17 wherein the computing system comprises a virtual computing system or a physical computing system. 20. The apparatus of claim 17 wherein the application storage volumes attached to the computing system are mounted to the computing system with registry information modified to make applications stored on the application storage volumes executable from the application storage volumes, wherein files stored on the application storage volumes are overlaid in at least a file system view for an end user of the computing system, wherein a single version of the application file is viewable by the end user in the file system view, and wherein each of the plurality of applications request the application file using the single version. | Described herein are systems, methods, and software to handle requests to an application file shared by a plurality of applications on a computing system. In one implementation, a method of handling request for an application file shared by a plurality of applications on a computing system includes identifying a request for the application file on the computing system, wherein each application in the plurality of applications is associated with an individualized version of the application file, and wherein the plurality of applications is stored on separate application storage volumes attached to the computing system. The method further provides identifying an application associated with the request, and identifying an application storage volume in the application storage volumes that stores the application. Once identified, the method also includes retrieving the application file from the identified storage volume to support the request.1. A method of handling requests for an application file shared by a plurality of applications on a computing system, wherein each application of the plurality of applications is associated with an individualized version of the application file, and wherein the plurality of applications is stored on separate application storage volumes attached to the computing system, the method comprising:
identifying a request for the application file on the computing system; identifying an application associated with the request; identifying an application storage volume in the application storage volumes that stores the application; and retrieving the application file from the identified storage volume to support the request. 2. The method of claim 1 wherein the application file comprises a registry file or a dynamic link library (DLL) file. 3. The method of claim 1 wherein the computing system comprises a virtual computing system or a physical computing system. 4. The method of claim 1 wherein the application storage volumes attached to the computing system are mounted to the computing system with registry information modified to make applications stored on the application storage volumes executable from the application storage volumes. 5. The method of claim 5 wherein files stored on the application storage volumes are overlaid in at least a file system view for an end user of the computing system, wherein a single version of the application file is viewable by the end user in the file system view, and wherein each of the plurality of applications request the application file using the single version. 6. The method of claim 5 wherein files stored on the application storage volumes are overlaid in at least a file system view and a registry view for an end user of the computing system, wherein a single version of the application file is viewable in the registry view, and wherein each of the plurality of applications request the application file using the single version. 7. The method of claim 1 further comprising:
identifying a second request for the application file;
identifying a second application associated with the second request;
identifying a second application storage volume in the application storage volumes associated with the application; and
retrieving the application file from the second application storage volume to support the second request. 8. The method of claim 1 wherein the application storage volumes are attached to the computing system based on credentials associated with an end user of the computing system. 9. A computing apparatus comprising:
one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media to handle requests for an application file shared by a plurality of applications on a computing system that, when read and executed by the processing system, direct the processing system to at least:
identify a request for the application file on the computing system, wherein each application in the plurality of applications is associated with an individualized version of the application file, and wherein the plurality of applications is stored on separate application storage volumes attached to the computing system;
identify an application associated with the request;
identify an application storage volume in the application storage volumes that stores the application; and
retrieve the application file from the identified storage volume to support the request. 10. The computing apparatus of claim 9 wherein the application file comprises a registry file or a dynamic link library (DLL) file. 11. The computing apparatus of claim 9 wherein the computing system comprises a virtual computing system or a physical computing system. 12. The computing apparatus of claim 9 wherein the application storage volumes attached to the computing system are mounted to the computing system with registry information modified to make applications stored on the application storage volumes executable from the application storage volumes. 13. The computing apparatus of claim 12 wherein files stored on the application storage volumes are overlaid in at least a file system view for an end user of the computing system, wherein a single version of the application file is viewable by the end user in the file system view, and wherein each of the plurality of applications request the application file using the single version. 14. The computing apparatus of claim 12 wherein files stored on the application storage volumes are overlaid in at least a file system view and a registry view for an end user of the computing system, wherein a single version of the application file is viewable in the registry view, and wherein each of the plurality of applications request the application file using the single version. 15. The computing apparatus of claim 9 wherein the program instructions further direct the processing system to:
identify a second request for the application file;
identify a second application associated with the second request;
identify a second application storage volume in the application storage volumes associated with the application; and
retrieve the application file from the second application storage volume to support the second request. 16. The computing apparatus of claim 9 wherein the application storage volumes are attached to the computing system based on credentials associated with an end user of the computing system. 17. An apparatus comprising
one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media to handle requests for an application file shared by a plurality of applications on a computing system that, when read and executed by a processing system, direct the processing system to at least:
identify a request for the application file on the computing system, wherein each application in the plurality of applications is associated with an individualized version of the application file, and wherein the plurality of applications is stored on separate application storage volumes attached to the computing system;
identify an application associated with the request;
identify an application storage volume in the application storage volumes that stores the application; and
retrieve the application file from the identified storage volume to support the request. 18. The apparatus of claim 17 wherein the application file comprises a registry file or a dynamic link library (DLL) file. 19. The apparatus of claim 17 wherein the computing system comprises a virtual computing system or a physical computing system. 20. The apparatus of claim 17 wherein the application storage volumes attached to the computing system are mounted to the computing system with registry information modified to make applications stored on the application storage volumes executable from the application storage volumes, wherein files stored on the application storage volumes are overlaid in at least a file system view for an end user of the computing system, wherein a single version of the application file is viewable by the end user in the file system view, and wherein each of the plurality of applications request the application file using the single version. | 2,400 |
8,904 | 8,904 | 15,864,797 | 2,449 | A networkable device is coupled to a wireless IP gateway or paired to a personal area network (PAN) via the use of a sonic tone, which may be a human-sonic sonic tone, which encodes a symbol sequence representing a binary message useful for implementing connection to a wireless IP gateway or pairing with a PAN. In one embodiment the sonic tone conveys a media access controller (MAC) address, to facilitate connection and/or pairing. Alternatively, or in addition, the sonic tone may encode a Service Set Identifier (SSID) and password for connection to a wireless network (Wi-Fi), or a Bluetooth identifier and/or PIN for connection to a Bluetooth PAN. In particular implementation of this embodiment the tone is produced by the IP gateway and used to initiate Wi-Fi connection, and/or the tone is produced by the master device of a PAN to initiate Bluetooth connection. | 1. A method of coupling a networkable device to a wireless network, comprising
a. broadcasting a sonic tone which encodes a symbol sequence representing a binary message, the binary message including digitized information useful for implementing connection to the wireless network; b. receiving the sonic tone and decoding the binary message; c. using the digitized information decoded from the binary message to implement a connection between the networkable device and the wireless network. 2. The method of claim 1 wherein the sonic tone is a human-audible sonic tone. 3. The method of claim 1 wherein the wireless network is a wireless IP network, and the networkable device connects to a wireless IP gateway. 4. The method of claim 2 wherein the wireless IP network is an 802.11 Wi-Fi compliant network and the digitized information comprises a Service Set Identifier (SSID) or Media Access Control address (MAC) for connection to the wireless IP network, and the networkable device performs the steps of receiving the sonic tone and decoding the SSID or MAC from the sonic tone, and then uses the SSID or MAC to connect to the Wi-Fi compliant network. 5. The method of claim 4 wherein the sonic tone further embeds a password, and the networkable device performs the steps of receiving the sonic tone and decoding the SSID or MAC and password, and then uses the SSID or MAC and password to connect to the Wi-Fi compliant network. 6. The method of claim 3 wherein the networkable device implements an operating system including a Wi-Fi network search routine, and the networkable device connects to the wireless IP gateway identified using the sonic tone without using the Wi-Fi network search routine of the networkable device operating system. 7. The method of claim 3 wherein the sonic tone is produced by the wireless IP gateway and received and used by the networkable device. 8. The method of claim 1 wherein the wireless network is a personal area network (PAN) and the networkable device pairs to a master device of the PAN. 9. The method of claim 8 wherein the personal area network is a Bluetooth compliant PAN and the digitized information comprises a Bluetooth network identifier, and the networkable device performs the steps of receiving the sonic tone and decoding the Bluetooth network identifier from the sonic tone, and then uses the Bluetooth network identifier to connect to the Bluetooth compliant PAN. 10. The method of claim 9 wherein the Bluetooth network identifier is a media access controller (MAC) address of a master device of the Bluetooth compliant PAN. 11. The method of claim 9 wherein the sonic tone further embeds a PIN, and the networkable device performs the steps of receiving the sonic tone and decoding the Bluetooth network identifier and PIN, and then uses the Bluetooth network identifier and PIN to connect to the Bluetooth compliant PAN. 12. The method of claim 9 wherein the networkable device implements an operating system including a Bluetooth pairing routine, and the networkable device pairs to the PAN identified using the sonic tone without the use of the pairing routine of the networkable device operating system. 13. The method of claim 8 wherein the sonic tone is produced by a master device of the PAN and received and used by the networkable device. 14. A wireless network host providing an expedited interface for coupling to a wireless network, comprising
a. a processor for encoding a symbol sequence representing a binary message into a sonic tone, the binary message including digitized information useful for implementing connection to the wireless network; b. an audio circuit for driving an audio system to broadcast the sonic tone; c. a wireless networking circuit for receiving connection requests from wireless devices, the networking circuit permitting connection to the wireless network by devices providing the digitized information encoded into the binary message. 15. The method of claim 14 wherein the sonic tone is a human-audible sonic tone. 16. The method of claim 14 wherein the wireless network is a wireless IP network, and the networkable device connects to a wireless IP gateway. 17. The method of claim 14 wherein the wireless IP network is an 802.11 Wi-Fi compliant network and the digitized information comprises a Service Set Identifier (SSID) or Media Access Control address (MAC) for connection to the wireless IP network, and the networkable device performs the steps of receiving the sonic tone and decoding the SSID or MAC from the sonic tone, and then uses the SSID or MAC to connect to the Wi-Fi compliant network. 18. The method of claim 17 wherein the sonic tone further embeds a password, and the networkable device performs the steps of receiving the sonic tone and decoding the SSID or MAC and password, and then uses the SSID or MAC and password to connect to the Wi-Fi compliant network. 19. The method of claim 14 wherein the networkable device implements an operating system including a Wi-Fi network search routine, and the networkable device connects to the wireless IP gateway identified using the sonic tone without using the Wi-Fi network search routine of the networkable device operating system. 20. The method of claim 14 wherein the sonic tone is produced by the wireless IP gateway and received and used by the networkable device. 21. The method of claim 14 wherein the wireless network is a personal area network (PAN) and the networkable device pairs to a master device of the PAN. 22. The method of claim 21 wherein the personal area network is a Bluetooth compliant PAN and the digitized information comprises a Bluetooth network identifier, and the networkable device performs the steps of receiving the sonic tone and decoding the Bluetooth network identifier from the sonic tone, and then uses the Bluetooth network identifier to connect to the Bluetooth compliant PAN. 23. The method of claim 22 wherein the Bluetooth network identifier is a media access controller (MAC) address of a master device of the Bluetooth compliant PAN. 24. The method of claim 22 wherein the sonic tone further embeds a PIN, and the networkable device performs the steps of receiving the sonic tone and decoding the Bluetooth network identifier and PIN, and then uses the Bluetooth network identifier and PIN to connect to the Bluetooth compliant PAN. 25. The method of claim 22 wherein the networkable device implements an operating system including a Bluetooth pairing routine, and the networkable device pairs to the PAN identified using the sonic tone without the use of the pairing routine of the networkable device operating system. 26. The method of claim 21 wherein the sonic tone is produced by a master device of the PAN and received and used by the networkable device. | A networkable device is coupled to a wireless IP gateway or paired to a personal area network (PAN) via the use of a sonic tone, which may be a human-sonic sonic tone, which encodes a symbol sequence representing a binary message useful for implementing connection to a wireless IP gateway or pairing with a PAN. In one embodiment the sonic tone conveys a media access controller (MAC) address, to facilitate connection and/or pairing. Alternatively, or in addition, the sonic tone may encode a Service Set Identifier (SSID) and password for connection to a wireless network (Wi-Fi), or a Bluetooth identifier and/or PIN for connection to a Bluetooth PAN. In particular implementation of this embodiment the tone is produced by the IP gateway and used to initiate Wi-Fi connection, and/or the tone is produced by the master device of a PAN to initiate Bluetooth connection.1. A method of coupling a networkable device to a wireless network, comprising
a. broadcasting a sonic tone which encodes a symbol sequence representing a binary message, the binary message including digitized information useful for implementing connection to the wireless network; b. receiving the sonic tone and decoding the binary message; c. using the digitized information decoded from the binary message to implement a connection between the networkable device and the wireless network. 2. The method of claim 1 wherein the sonic tone is a human-audible sonic tone. 3. The method of claim 1 wherein the wireless network is a wireless IP network, and the networkable device connects to a wireless IP gateway. 4. The method of claim 2 wherein the wireless IP network is an 802.11 Wi-Fi compliant network and the digitized information comprises a Service Set Identifier (SSID) or Media Access Control address (MAC) for connection to the wireless IP network, and the networkable device performs the steps of receiving the sonic tone and decoding the SSID or MAC from the sonic tone, and then uses the SSID or MAC to connect to the Wi-Fi compliant network. 5. The method of claim 4 wherein the sonic tone further embeds a password, and the networkable device performs the steps of receiving the sonic tone and decoding the SSID or MAC and password, and then uses the SSID or MAC and password to connect to the Wi-Fi compliant network. 6. The method of claim 3 wherein the networkable device implements an operating system including a Wi-Fi network search routine, and the networkable device connects to the wireless IP gateway identified using the sonic tone without using the Wi-Fi network search routine of the networkable device operating system. 7. The method of claim 3 wherein the sonic tone is produced by the wireless IP gateway and received and used by the networkable device. 8. The method of claim 1 wherein the wireless network is a personal area network (PAN) and the networkable device pairs to a master device of the PAN. 9. The method of claim 8 wherein the personal area network is a Bluetooth compliant PAN and the digitized information comprises a Bluetooth network identifier, and the networkable device performs the steps of receiving the sonic tone and decoding the Bluetooth network identifier from the sonic tone, and then uses the Bluetooth network identifier to connect to the Bluetooth compliant PAN. 10. The method of claim 9 wherein the Bluetooth network identifier is a media access controller (MAC) address of a master device of the Bluetooth compliant PAN. 11. The method of claim 9 wherein the sonic tone further embeds a PIN, and the networkable device performs the steps of receiving the sonic tone and decoding the Bluetooth network identifier and PIN, and then uses the Bluetooth network identifier and PIN to connect to the Bluetooth compliant PAN. 12. The method of claim 9 wherein the networkable device implements an operating system including a Bluetooth pairing routine, and the networkable device pairs to the PAN identified using the sonic tone without the use of the pairing routine of the networkable device operating system. 13. The method of claim 8 wherein the sonic tone is produced by a master device of the PAN and received and used by the networkable device. 14. A wireless network host providing an expedited interface for coupling to a wireless network, comprising
a. a processor for encoding a symbol sequence representing a binary message into a sonic tone, the binary message including digitized information useful for implementing connection to the wireless network; b. an audio circuit for driving an audio system to broadcast the sonic tone; c. a wireless networking circuit for receiving connection requests from wireless devices, the networking circuit permitting connection to the wireless network by devices providing the digitized information encoded into the binary message. 15. The method of claim 14 wherein the sonic tone is a human-audible sonic tone. 16. The method of claim 14 wherein the wireless network is a wireless IP network, and the networkable device connects to a wireless IP gateway. 17. The method of claim 14 wherein the wireless IP network is an 802.11 Wi-Fi compliant network and the digitized information comprises a Service Set Identifier (SSID) or Media Access Control address (MAC) for connection to the wireless IP network, and the networkable device performs the steps of receiving the sonic tone and decoding the SSID or MAC from the sonic tone, and then uses the SSID or MAC to connect to the Wi-Fi compliant network. 18. The method of claim 17 wherein the sonic tone further embeds a password, and the networkable device performs the steps of receiving the sonic tone and decoding the SSID or MAC and password, and then uses the SSID or MAC and password to connect to the Wi-Fi compliant network. 19. The method of claim 14 wherein the networkable device implements an operating system including a Wi-Fi network search routine, and the networkable device connects to the wireless IP gateway identified using the sonic tone without using the Wi-Fi network search routine of the networkable device operating system. 20. The method of claim 14 wherein the sonic tone is produced by the wireless IP gateway and received and used by the networkable device. 21. The method of claim 14 wherein the wireless network is a personal area network (PAN) and the networkable device pairs to a master device of the PAN. 22. The method of claim 21 wherein the personal area network is a Bluetooth compliant PAN and the digitized information comprises a Bluetooth network identifier, and the networkable device performs the steps of receiving the sonic tone and decoding the Bluetooth network identifier from the sonic tone, and then uses the Bluetooth network identifier to connect to the Bluetooth compliant PAN. 23. The method of claim 22 wherein the Bluetooth network identifier is a media access controller (MAC) address of a master device of the Bluetooth compliant PAN. 24. The method of claim 22 wherein the sonic tone further embeds a PIN, and the networkable device performs the steps of receiving the sonic tone and decoding the Bluetooth network identifier and PIN, and then uses the Bluetooth network identifier and PIN to connect to the Bluetooth compliant PAN. 25. The method of claim 22 wherein the networkable device implements an operating system including a Bluetooth pairing routine, and the networkable device pairs to the PAN identified using the sonic tone without the use of the pairing routine of the networkable device operating system. 26. The method of claim 21 wherein the sonic tone is produced by a master device of the PAN and received and used by the networkable device. | 2,400 |
8,905 | 8,905 | 15,562,426 | 2,453 | There is described a method of monitoring a peer-to-peer network. The method comprises: (i) monitoring network traffic between a first peer and the peer-to-peer network so as to identify a first subset of peers in the peer-to-peer network; and (ii) preventing the first peer from communicating with at least one peer in the first subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable identification of the at least one further peer. In addition, there is described a peer-to-peer network monitor for monitoring a peer-to-peer network, wherein the monitor is operable to monitor network traffic between a first peer and the peer-to-peer network so as to identify a subset of peers in the peer-to-peer network in communication with the first peer, and wherein the monitor is operable to prevent the first peer from communicating with at least one peer in the subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable the monitor to identify the at least one further peer. Corresponding computer programs and computer-readable media are also described. | 1. A method, implemented by one or more processors, of monitoring a peer-to-peer network, the method comprising:
monitoring network traffic between a first peer and the peer-to-peer network so as to identify a first subset of peers in the peer-to-peer network; and preventing the first peer from communicating with at least one peer in the first subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable identification of the at least one further peer. 2. The method of claim 1 wherein said monitoring comprises monitoring one or more communication parameters associated with the network traffic, the one or more communication parameters being selected from the group consisting of: IP addresses; port numbers, communication protocols, data rate, and latency. 3. The method of claim 1 wherein said monitoring comprises monitoring content associated with the network traffic. 4. The method of claim 1 wherein said preventing comprises configuring a firewall associated with the first peer to block communications between the first peer and the at least one peer. 5. The method of claim 1 further comprising configuring the first peer to access particular content via the peer-to-peer network. 6. The method of claim 1 further comprising monitoring network traffic between a second peer and the peer-to-peer network so as to identify a second subset of peers in the peer-to-peer network. 7. The method of claim 1 wherein said preventing comprises randomly selecting the at least one peer from the subset of peers. 8. The method of claim 6 wherein said preventing comprises selecting a duplicate peer as said at least one peer, the duplicate peer being a peer which forms part of both the first and second subsets of peers. 9. The method of claim 8 further comprising retaining said duplicate peer in the second subset of peers. 10. The method of claim 6 further comprising preventing the second peer from communicating with at least one peer in the second subset of peers to thereby cause the second peer to communicate with at least one additional peer in the peer-to-peer network so as to enable identification of the at least one additional peer. 11. One or more tangible computer readable media comprising computer program code which, when executed by one or more processors, causes the one or more processors to carry out a method of monitoring a peer-to-peer network by:
monitoring network traffic between a first peer and the peer-to-peer network so as to identify a first subset of peers in the peer-to-peer network; and preventing the first peer from communicating with at least one peer in the first subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable identification of the at least one further peer. 12. (canceled) 13. A peer-to-peer network monitor for monitoring a peer-to-peer network, wherein the monitor is operable to monitor network traffic between a first peer and the peer-to-peer network so as to identify a subset of peers in the peer-to-peer network in communication with the first peer, and wherein the monitor is operable to prevent the first peer from communicating with at least one peer in the subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable the monitor to identify the at least one further peer. | There is described a method of monitoring a peer-to-peer network. The method comprises: (i) monitoring network traffic between a first peer and the peer-to-peer network so as to identify a first subset of peers in the peer-to-peer network; and (ii) preventing the first peer from communicating with at least one peer in the first subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable identification of the at least one further peer. In addition, there is described a peer-to-peer network monitor for monitoring a peer-to-peer network, wherein the monitor is operable to monitor network traffic between a first peer and the peer-to-peer network so as to identify a subset of peers in the peer-to-peer network in communication with the first peer, and wherein the monitor is operable to prevent the first peer from communicating with at least one peer in the subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable the monitor to identify the at least one further peer. Corresponding computer programs and computer-readable media are also described.1. A method, implemented by one or more processors, of monitoring a peer-to-peer network, the method comprising:
monitoring network traffic between a first peer and the peer-to-peer network so as to identify a first subset of peers in the peer-to-peer network; and preventing the first peer from communicating with at least one peer in the first subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable identification of the at least one further peer. 2. The method of claim 1 wherein said monitoring comprises monitoring one or more communication parameters associated with the network traffic, the one or more communication parameters being selected from the group consisting of: IP addresses; port numbers, communication protocols, data rate, and latency. 3. The method of claim 1 wherein said monitoring comprises monitoring content associated with the network traffic. 4. The method of claim 1 wherein said preventing comprises configuring a firewall associated with the first peer to block communications between the first peer and the at least one peer. 5. The method of claim 1 further comprising configuring the first peer to access particular content via the peer-to-peer network. 6. The method of claim 1 further comprising monitoring network traffic between a second peer and the peer-to-peer network so as to identify a second subset of peers in the peer-to-peer network. 7. The method of claim 1 wherein said preventing comprises randomly selecting the at least one peer from the subset of peers. 8. The method of claim 6 wherein said preventing comprises selecting a duplicate peer as said at least one peer, the duplicate peer being a peer which forms part of both the first and second subsets of peers. 9. The method of claim 8 further comprising retaining said duplicate peer in the second subset of peers. 10. The method of claim 6 further comprising preventing the second peer from communicating with at least one peer in the second subset of peers to thereby cause the second peer to communicate with at least one additional peer in the peer-to-peer network so as to enable identification of the at least one additional peer. 11. One or more tangible computer readable media comprising computer program code which, when executed by one or more processors, causes the one or more processors to carry out a method of monitoring a peer-to-peer network by:
monitoring network traffic between a first peer and the peer-to-peer network so as to identify a first subset of peers in the peer-to-peer network; and preventing the first peer from communicating with at least one peer in the first subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable identification of the at least one further peer. 12. (canceled) 13. A peer-to-peer network monitor for monitoring a peer-to-peer network, wherein the monitor is operable to monitor network traffic between a first peer and the peer-to-peer network so as to identify a subset of peers in the peer-to-peer network in communication with the first peer, and wherein the monitor is operable to prevent the first peer from communicating with at least one peer in the subset of peers to thereby cause the first peer to communicate with at least one further peer in the peer-to-peer network so as to enable the monitor to identify the at least one further peer. | 2,400 |
8,906 | 8,906 | 15,403,231 | 2,476 | A method and a network node for enabling configuration of at least two patterns for a cell are provided. The patterns are transmission patterns or measurement patterns. The network node obtains the at least two patterns. Each of the at least two patterns is associated with information about a respective restricted area such that each pattern is used when a user equipment served by the cell is located in the respective restricted area. Each respective restricted area is smaller than an entire area of the cell. Moreover, a method and a user equipment for configuring measurements are provided. The user equipment is served by a cell of a radio base station. The user equipment receives at least two measurement patterns from the radio base station. Each measurement pattern is associated with a respective restricted area. Each respective restricted area is smaller than an entire area of the cell. The user equipment obtains information about the respective restricted area. | 1. A method performed by a user equipment configured for use in a wireless communication system, the method comprising:
configuring a radio measurement to be performed by the user equipment using one of multiple different measurement patterns that are to be used in different restricted areas of a cell, respectively, wherein the different measurement patterns comprise different patterns of resources in time which are usable for performing radio measurements, wherein the different restricted areas of the cell are each smaller than an entire area of the cell; and performing the configured radio measurement. 2. The method of claim 1, further comprising receiving information indicating the multiple different measurement patterns. 3. The method of claim 1, further comprising determining which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with, based on in which of the different restricted areas of the cell the user equipment is located. 4. The method of claim 1, further comprising transmitting a request for configuration of a measurement pattern to a base station, and, responsive to the request, receiving from the base station information indicating which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with. 5. The method of claim 4, wherein the request indicates in which of the restricted areas of the cell the user equipment is located. 6. The method of claim 1, wherein the different measurement patterns are different almost blank subframe patterns. 7. The method of claim 1, wherein the different measurement patterns are different patterns for radio resource management (RRM) or radio link monitoring (RLM). 8. The method of claim 1, wherein the different measurement patterns include:
a first pattern comprised of Multicast Broadcast Single Frequency Networks (MBSFN) subframes; and a second pattern comprised of non-MBSFN almost blank subframes or a mix of blank subframes with different properties. 9. A user equipment configured for use in a wireless communication system, the user equipment comprising:
a processing circuit and a memory, the memory containing instructions executable by the processing circuit whereby the user equipment is configured to:
configure a radio measurement to be performed by the user equipment using one of multiple different measurement patterns that are to be used in different restricted areas of a cell, respectively, wherein the different measurement patterns comprise different patterns of resources in time which are usable for performing radio measurements, wherein the different restricted areas of the cell are each smaller than an entire area of the cell; and
perform the configured radio measurement. 10. The user equipment of claim 9, wherein the memory contains instructions executable by the processing circuit whereby the user equipment is further configured to receive information indicating the multiple different measurement patterns. 11. The user equipment of claim 9, wherein the memory contains instructions executable by the processing circuit whereby the user equipment is further configured to determine which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with, based on in which of the different restricted areas of the cell the user equipment is located. 12. The user equipment of claim 9, wherein the memory contains instructions executable by the processing circuit whereby the user equipment is further configured to transmit a request for configuration of a measurement pattern to a base station, and, responsive to the request, receive from the base station information indicating which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with. 13. The user equipment of claim 12, wherein the request indicates in which of the restricted areas of the cell the user equipment is located. 14. The user equipment of claim 9, wherein the different measurement patterns are different almost blank subframe patterns. 15. The user equipment of claim 9, wherein the different measurement patterns are different patterns for radio resource management (RRM) or radio link monitoring (RLM). 16. A computer readable storage medium comprising instructions that, when executed by a processor of a user equipment, causes the user equipment to:
configure a radio measurement to be performed by the user equipment using one of multiple different measurement patterns that are to be used in different restricted areas of a cell, respectively, wherein the different measurement patterns comprise different patterns of resources in time which are usable for performing radio measurements, wherein the different restricted areas of the cell are each smaller than an entire area of the cell; and perform the configured radio measurement. 17. The computer readable storage medium of claim 16, comprising instructions that, when executed by the processor of the user equipment, causes the user equipment to receive information indicating the multiple different measurement patterns. 18. The computer readable storage medium of claim 16, comprising instructions that, when executed by the processor of the user equipment, causes the user equipment to determine which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with, based on in which of the different restricted areas of the cell the user equipment is located. 19. The computer readable storage medium of claim 16, comprising instructions that, when executed by the processor of the user equipment, causes the user equipment to transmit a request for configuration of a measurement pattern to a base station, and, responsive to the request, receive from the base station information indicating which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with. 20. The computer readable storage medium of claim 16, wherein the different measurement patterns are different almost blank subframe patterns. | A method and a network node for enabling configuration of at least two patterns for a cell are provided. The patterns are transmission patterns or measurement patterns. The network node obtains the at least two patterns. Each of the at least two patterns is associated with information about a respective restricted area such that each pattern is used when a user equipment served by the cell is located in the respective restricted area. Each respective restricted area is smaller than an entire area of the cell. Moreover, a method and a user equipment for configuring measurements are provided. The user equipment is served by a cell of a radio base station. The user equipment receives at least two measurement patterns from the radio base station. Each measurement pattern is associated with a respective restricted area. Each respective restricted area is smaller than an entire area of the cell. The user equipment obtains information about the respective restricted area.1. A method performed by a user equipment configured for use in a wireless communication system, the method comprising:
configuring a radio measurement to be performed by the user equipment using one of multiple different measurement patterns that are to be used in different restricted areas of a cell, respectively, wherein the different measurement patterns comprise different patterns of resources in time which are usable for performing radio measurements, wherein the different restricted areas of the cell are each smaller than an entire area of the cell; and performing the configured radio measurement. 2. The method of claim 1, further comprising receiving information indicating the multiple different measurement patterns. 3. The method of claim 1, further comprising determining which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with, based on in which of the different restricted areas of the cell the user equipment is located. 4. The method of claim 1, further comprising transmitting a request for configuration of a measurement pattern to a base station, and, responsive to the request, receiving from the base station information indicating which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with. 5. The method of claim 4, wherein the request indicates in which of the restricted areas of the cell the user equipment is located. 6. The method of claim 1, wherein the different measurement patterns are different almost blank subframe patterns. 7. The method of claim 1, wherein the different measurement patterns are different patterns for radio resource management (RRM) or radio link monitoring (RLM). 8. The method of claim 1, wherein the different measurement patterns include:
a first pattern comprised of Multicast Broadcast Single Frequency Networks (MBSFN) subframes; and a second pattern comprised of non-MBSFN almost blank subframes or a mix of blank subframes with different properties. 9. A user equipment configured for use in a wireless communication system, the user equipment comprising:
a processing circuit and a memory, the memory containing instructions executable by the processing circuit whereby the user equipment is configured to:
configure a radio measurement to be performed by the user equipment using one of multiple different measurement patterns that are to be used in different restricted areas of a cell, respectively, wherein the different measurement patterns comprise different patterns of resources in time which are usable for performing radio measurements, wherein the different restricted areas of the cell are each smaller than an entire area of the cell; and
perform the configured radio measurement. 10. The user equipment of claim 9, wherein the memory contains instructions executable by the processing circuit whereby the user equipment is further configured to receive information indicating the multiple different measurement patterns. 11. The user equipment of claim 9, wherein the memory contains instructions executable by the processing circuit whereby the user equipment is further configured to determine which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with, based on in which of the different restricted areas of the cell the user equipment is located. 12. The user equipment of claim 9, wherein the memory contains instructions executable by the processing circuit whereby the user equipment is further configured to transmit a request for configuration of a measurement pattern to a base station, and, responsive to the request, receive from the base station information indicating which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with. 13. The user equipment of claim 12, wherein the request indicates in which of the restricted areas of the cell the user equipment is located. 14. The user equipment of claim 9, wherein the different measurement patterns are different almost blank subframe patterns. 15. The user equipment of claim 9, wherein the different measurement patterns are different patterns for radio resource management (RRM) or radio link monitoring (RLM). 16. A computer readable storage medium comprising instructions that, when executed by a processor of a user equipment, causes the user equipment to:
configure a radio measurement to be performed by the user equipment using one of multiple different measurement patterns that are to be used in different restricted areas of a cell, respectively, wherein the different measurement patterns comprise different patterns of resources in time which are usable for performing radio measurements, wherein the different restricted areas of the cell are each smaller than an entire area of the cell; and perform the configured radio measurement. 17. The computer readable storage medium of claim 16, comprising instructions that, when executed by the processor of the user equipment, causes the user equipment to receive information indicating the multiple different measurement patterns. 18. The computer readable storage medium of claim 16, comprising instructions that, when executed by the processor of the user equipment, causes the user equipment to determine which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with, based on in which of the different restricted areas of the cell the user equipment is located. 19. The computer readable storage medium of claim 16, comprising instructions that, when executed by the processor of the user equipment, causes the user equipment to transmit a request for configuration of a measurement pattern to a base station, and, responsive to the request, receive from the base station information indicating which one of the multiple different measurement patterns the radio measurement is to be configured to be performed with. 20. The computer readable storage medium of claim 16, wherein the different measurement patterns are different almost blank subframe patterns. | 2,400 |
8,907 | 8,907 | 15,474,782 | 2,449 | A dynamic medical object information base (DMOIB) is used with a communication protocol. A medical object information base (MOIB) may generally define rules of creation and modification of data defined for use in medical products. A dynamic version of the MOIB adapts to changing data classifications. DMOIB is preferably compatible with non-dynamic MOIB systems. DMOIB preferably reduces code space and simplifies management of software projects. DMOIB may allow for an entirely dynamic system using a discovery/negotiation process for determining full features of a device. DMOIB may also allow for generation of a dynamic interface to handle data from devices. | 1. A method of communicating between devices with a communication protocol, the method comprising:
initiating a communication link with a network device; requesting a self-describing data dictionary from the network device; receiving the self-describing data dictionary; and caching the self-describing data dictionary, the self-describing data dictionary including a hierarchal classification scheme for physiological data, including: a first level defining a type of physiological data, the type of physiological data being one of two or more families of physiological information supported by the network device; a second level defining a type of an action related to the type of physiological data from the first level; and a third level defining an object of the action from the second level. 2. The method of claim 1, further comprising receiving a global unique identifier from the network device. 3. The method of claim 2, wherein receiving the self-describing data dictionary further includes:
matching the global unique identifier with a cached version of the self-describing data dictionary; and accessing the cached version of the self-describing data dictionary. 4. The method of claim 2, wherein receiving the self-describing data dictionary further includes:
matching the global unique identifier with a corresponding member of a self-describing data dictionary database on a storage device; and accessing the self-describing data dictionary. 5. The method of claim 1, further comprising using the self-describing data dictionary to further communicate with the network device and interpret data from the network device. 6. The method of claim 1, wherein the self-describing data dictionary contains information regarding processing of messages to and from the network device. 7. The method of claim 1, wherein the self-describing data dictionary further comprises a string table corresponding to one or more data definitions. 8. The method of claim 7, wherein the self-describing data dictionary further comprises a link table corresponding to the one or more data definitions and the string table. 9. The method of claim 1, wherein initiating the communication link further comprises initiating the communication link between a vital signs measuring device and the network device. 10. The method of claim 9, further comprising performing one or more vital sign physiological measurements to capture the physiological data using the vital signs measuring device. | A dynamic medical object information base (DMOIB) is used with a communication protocol. A medical object information base (MOIB) may generally define rules of creation and modification of data defined for use in medical products. A dynamic version of the MOIB adapts to changing data classifications. DMOIB is preferably compatible with non-dynamic MOIB systems. DMOIB preferably reduces code space and simplifies management of software projects. DMOIB may allow for an entirely dynamic system using a discovery/negotiation process for determining full features of a device. DMOIB may also allow for generation of a dynamic interface to handle data from devices.1. A method of communicating between devices with a communication protocol, the method comprising:
initiating a communication link with a network device; requesting a self-describing data dictionary from the network device; receiving the self-describing data dictionary; and caching the self-describing data dictionary, the self-describing data dictionary including a hierarchal classification scheme for physiological data, including: a first level defining a type of physiological data, the type of physiological data being one of two or more families of physiological information supported by the network device; a second level defining a type of an action related to the type of physiological data from the first level; and a third level defining an object of the action from the second level. 2. The method of claim 1, further comprising receiving a global unique identifier from the network device. 3. The method of claim 2, wherein receiving the self-describing data dictionary further includes:
matching the global unique identifier with a cached version of the self-describing data dictionary; and accessing the cached version of the self-describing data dictionary. 4. The method of claim 2, wherein receiving the self-describing data dictionary further includes:
matching the global unique identifier with a corresponding member of a self-describing data dictionary database on a storage device; and accessing the self-describing data dictionary. 5. The method of claim 1, further comprising using the self-describing data dictionary to further communicate with the network device and interpret data from the network device. 6. The method of claim 1, wherein the self-describing data dictionary contains information regarding processing of messages to and from the network device. 7. The method of claim 1, wherein the self-describing data dictionary further comprises a string table corresponding to one or more data definitions. 8. The method of claim 7, wherein the self-describing data dictionary further comprises a link table corresponding to the one or more data definitions and the string table. 9. The method of claim 1, wherein initiating the communication link further comprises initiating the communication link between a vital signs measuring device and the network device. 10. The method of claim 9, further comprising performing one or more vital sign physiological measurements to capture the physiological data using the vital signs measuring device. | 2,400 |
8,908 | 8,908 | 15,697,870 | 2,482 | A hitch assist system is provided herein. The system includes an imager for capturing images of a rear-vehicle scene containing a trailer and a controller for processing the captured images. A device is disposed at a trailer location and has a display configured to flash a shape at a predetermined frequency and alternating in color. The controller identifies the shape in the captured images to determine the trailer location. | 1. A hitch assist system comprising:
an imager for capturing images of a rear-vehicle scene containing a trailer; a controller for processing the captured images; a device disposed at a trailer location and having a display configured to flash a shape at a predetermined frequency and alternating in color, wherein the controller identifies the shape in the captured images to determine the trailer location. 2. The hitch assist system of claim 1, wherein the trailer location comprises a trailer tongue. 3. The hitch assist system of claim 1, wherein the shape comprises a circular shape. 4. The hitch assist system of claim 3, wherein the shape alternates between a first color and a second color. 5. The hitch assist system of claim 4, wherein the first color comprises green and the second color comprises red. 6. The hitch assist system of claim 4, wherein the controller applies a Hough circle transform to detect one or more circular shape candidates in the captured images. 7. The hitch assist system of claim 6, wherein the controller selects only the one or more circular shape candidates having one of the first color and the second color. 8. The hitch assist system of claim 7, wherein the controller applies a temporal Fourier transform to determine frequencies of the one or more circular shape candidates having one of the first color and the second color. 9. The hitch assist system of claim 8, wherein the controller identifies, as the shape, whichever of the one or more circular shape candidates has a frequency that best matches the predetermined frequency. 10. The hitch assist system of claim 1, wherein if the controller is unable to identify the shape, the controller generates at least one of an alert and troubleshooting instruction. 11. The hitch assist system of claim 1, further comprising a vehicle display for showing the shape identified in the captured images and a user-input device for enabling a user to confirm the identification of the shape. 12. A hitch assist system comprising:
an imager for capturing images of a rear-vehicle scene containing a trailer; a controller for processing the captured images; and a device disposed at a trailer location proximate a hitch coupler and having a display configured to flash a circular shape at a predetermined frequency and alternating between a first and second color, wherein the controller identifies the circular shape in the captured images to determine the trailer location. 13. The hitch assist system of claim 12, wherein the trailer location comprises a trailer tongue and the first color and second color comprise red and green, respectively. 14. The hitch assist system of claim 12, wherein the controller applies a Hough circle transform to detect one or more circular shape candidates in the captured images. 15. The hitch assist system of claim 14, wherein the controller selects only the one or more circular shape candidates having one of the first color and the second color. 16. The hitch assist system of claim 15, wherein the controller applies a temporal Fourier transform to determine frequencies of the one or more circular shape candidates having one of the first color and the second color. 17. The hitch assist system of claim 16, wherein the controller identifies, as the circular shape, whichever of the one or more circular shape candidates has a frequency that best matches the predetermined frequency. 18. The hitch assist system of claim 12, wherein if the controller is unable to identify the shape, the controller generates at least one of an alert and troubleshooting instruction. 19. The hitch assist system of claim 12, further comprising a vehicle display for showing the shape identified in the captured images and a user-input device for enabling a user to confirm the identification of the shape. 20. A method comprising the steps of:
capturing images of a rear-vehicle scene containing a trailer; processing the captured images; disposing a device at a trailer location proximate a hitch coupler and having a display configured to flash a circular shape at a predetermined frequency and alternating between a first and second color; and identifying the circular shape in the captured images to determine the trailer location. | A hitch assist system is provided herein. The system includes an imager for capturing images of a rear-vehicle scene containing a trailer and a controller for processing the captured images. A device is disposed at a trailer location and has a display configured to flash a shape at a predetermined frequency and alternating in color. The controller identifies the shape in the captured images to determine the trailer location.1. A hitch assist system comprising:
an imager for capturing images of a rear-vehicle scene containing a trailer; a controller for processing the captured images; a device disposed at a trailer location and having a display configured to flash a shape at a predetermined frequency and alternating in color, wherein the controller identifies the shape in the captured images to determine the trailer location. 2. The hitch assist system of claim 1, wherein the trailer location comprises a trailer tongue. 3. The hitch assist system of claim 1, wherein the shape comprises a circular shape. 4. The hitch assist system of claim 3, wherein the shape alternates between a first color and a second color. 5. The hitch assist system of claim 4, wherein the first color comprises green and the second color comprises red. 6. The hitch assist system of claim 4, wherein the controller applies a Hough circle transform to detect one or more circular shape candidates in the captured images. 7. The hitch assist system of claim 6, wherein the controller selects only the one or more circular shape candidates having one of the first color and the second color. 8. The hitch assist system of claim 7, wherein the controller applies a temporal Fourier transform to determine frequencies of the one or more circular shape candidates having one of the first color and the second color. 9. The hitch assist system of claim 8, wherein the controller identifies, as the shape, whichever of the one or more circular shape candidates has a frequency that best matches the predetermined frequency. 10. The hitch assist system of claim 1, wherein if the controller is unable to identify the shape, the controller generates at least one of an alert and troubleshooting instruction. 11. The hitch assist system of claim 1, further comprising a vehicle display for showing the shape identified in the captured images and a user-input device for enabling a user to confirm the identification of the shape. 12. A hitch assist system comprising:
an imager for capturing images of a rear-vehicle scene containing a trailer; a controller for processing the captured images; and a device disposed at a trailer location proximate a hitch coupler and having a display configured to flash a circular shape at a predetermined frequency and alternating between a first and second color, wherein the controller identifies the circular shape in the captured images to determine the trailer location. 13. The hitch assist system of claim 12, wherein the trailer location comprises a trailer tongue and the first color and second color comprise red and green, respectively. 14. The hitch assist system of claim 12, wherein the controller applies a Hough circle transform to detect one or more circular shape candidates in the captured images. 15. The hitch assist system of claim 14, wherein the controller selects only the one or more circular shape candidates having one of the first color and the second color. 16. The hitch assist system of claim 15, wherein the controller applies a temporal Fourier transform to determine frequencies of the one or more circular shape candidates having one of the first color and the second color. 17. The hitch assist system of claim 16, wherein the controller identifies, as the circular shape, whichever of the one or more circular shape candidates has a frequency that best matches the predetermined frequency. 18. The hitch assist system of claim 12, wherein if the controller is unable to identify the shape, the controller generates at least one of an alert and troubleshooting instruction. 19. The hitch assist system of claim 12, further comprising a vehicle display for showing the shape identified in the captured images and a user-input device for enabling a user to confirm the identification of the shape. 20. A method comprising the steps of:
capturing images of a rear-vehicle scene containing a trailer; processing the captured images; disposing a device at a trailer location proximate a hitch coupler and having a display configured to flash a circular shape at a predetermined frequency and alternating between a first and second color; and identifying the circular shape in the captured images to determine the trailer location. | 2,400 |
8,909 | 8,909 | 15,993,575 | 2,444 | This disclosure describes an application-level multi-path transport protocol (MPTP) mechanism for establishing a plurality of communication paths between a sender device and a receiver device to transmit and receive data packets. The mechanism at the sender end includes a plurality of send connectors each being a sender endpoint of a communication path, a path table that maintains characteristics of the bi-directional communication paths, a scheduler that determines a suitable send connector over which to transmit each data packet, and a send buffer that buffers the data packets prior to transmission. The mechanism at the receiver end includes a plurality of receive connectors each being a receiver endpoint of a communication path, a path table that maintains characteristics of the bi-directional communication paths, a receive buffer that buffers the data packets received by the receive connectors, and an assembler that reassembles the plurality of data packets in the receive buffer. | 1. A multi-path transport protocol (MPTP) API for establishing a plurality of bi-directional communication paths between a sender device and a receiver device to transmit and receive a plurality of data packets, comprising:
a send MPTP API for the sender device including:
a plurality of send connectors each being a sender endpoint of a communication path established between the sender device and the receiver device;
a path table configured to maintain characteristics of the plurality of communication paths;
a scheduler configured to determine a suitable send connector to transmit each data packet using one of the plurality of communication paths between the sender device and the receiver device; and
a send buffer configured to buffer the plurality of data packets prior to transmitting each data packet to the selected send connector; and
a receive MPTP API for the receiver device including:
a plurality of receive connectors each being a receiver endpoint of a communication path established between the sender device and the receiver device;
a path table configured to maintain characteristics of the plurality of bi-directional communication paths;
a receive buffer configured to buffer the plurality of data packets received by the receive connectors; and
an assembler configured to reassemble the plurality of data packets in the receive buffer. 2. The MPTP API as set forth in claim 1, wherein the path table stores characters of each communication path's throughput, latency, loss rate, and congestion window. 3. The MPTP API as set forth in claim 1, wherein the assembler further provides feedback on a communication path to the scheduler. 4. The MPTP API as set forth in claim 1, wherein the scheduler is configured to transmit each data packet over a plurality of communication paths each consisting of at least one intermediate node. 5. The MPTP API as set forth in claim 1, wherein the scheduler is configured to transmit each data packet over a plurality of communication paths each consisting of zero to a plurality of intermediate nodes. 6. The MPTP API as set forth in claim 1, wherein the plurality of send and receive connectors are configured to support establishing communication paths using Transport Control Protocol. 7. The MPTP API as set forth in claim 1, wherein the plurality of send and receive connectors are configured to support establishing communication paths using User Datagram Protocol. 8. A method for establishing a plurality of bi-directional communication paths between a sender device and a receiver device to transmit and receive a plurality of data packets, comprising:
providing a send MPTP API in the sender device having:
a plurality of send connectors each being a sender endpoint of a communication path established between the sender device and the receiver device;
a path table configured to maintain characteristics of the plurality of communication paths;
a scheduler configured to determine a suitable send connector to transmit each data packet using one of the plurality of communication paths between the sender device and the receiver device; and
a send buffer configured to buffer the plurality of data packets prior to transmitting each data packet to the selected send connector; and
providing a receive MPTP API in the receiver device having:
a plurality of receive connectors each being a receiver endpoint of a communication path established between the sender device and the receiver device;
a path table configured to maintain characteristics of the plurality of bi-directional communication paths;
a receive buffer configured to buffer the plurality of data packets received by the receive connectors; and
an assembler configured to reassemble the plurality of data packets in the receive buffer. 9. The method as set forth in claim 8, wherein the path table stores characters of each communication path's throughput, latency, loss rate, and congestion window. 10. The method as set forth in claim 8, wherein the assembler further provides feedback on a communication path to the scheduler. 11. The method as set forth in claim 8, wherein the scheduler transmits each data packet over a plurality of communication paths each consisting of at least one intermediate node. 12. The method as set forth in claim 8, wherein the scheduler transmits each data packet over a plurality of communication paths each consisting of zero to a plurality of intermediate nodes. 13. The method as set forth in claim 8, wherein the plurality of send and receive connectors establish communication paths using Transport Control Protocol. 14. The method as set forth in claim 8, wherein the plurality of send and receive connectors establish communication paths using User Datagram Protocol. 15. A multi-path transport protocol (MPTP) API for establishing a plurality of bi-directional communication paths between two end points to transmit and receive a plurality of data packets, comprising:
a plurality of connectors each being a network interface for a communication path established between the two end points; a path table configured to maintain characteristics of the plurality of communication paths; a scheduler configured to determine a suitable connector to transmit each data packet using one of the plurality of communication paths between the two end points; a buffer configured to buffer the plurality of data packets prior to transmission or receiving to or from the connectors; and an assembler configured to reassemble the plurality of data packets received from the connectors and stored in the buffer. 16. The MPTP API as set forth in claim 15, wherein the scheduler is configured to transmit each data packet over a plurality of communication paths each consisting of zero to a plurality of intermediate nodes. 17. The MPTP API as set forth in claim 15, wherein the plurality of send and receive connectors are configured to support establishing communication paths using Transport Control Protocol/User Datagram Protocol. | This disclosure describes an application-level multi-path transport protocol (MPTP) mechanism for establishing a plurality of communication paths between a sender device and a receiver device to transmit and receive data packets. The mechanism at the sender end includes a plurality of send connectors each being a sender endpoint of a communication path, a path table that maintains characteristics of the bi-directional communication paths, a scheduler that determines a suitable send connector over which to transmit each data packet, and a send buffer that buffers the data packets prior to transmission. The mechanism at the receiver end includes a plurality of receive connectors each being a receiver endpoint of a communication path, a path table that maintains characteristics of the bi-directional communication paths, a receive buffer that buffers the data packets received by the receive connectors, and an assembler that reassembles the plurality of data packets in the receive buffer.1. A multi-path transport protocol (MPTP) API for establishing a plurality of bi-directional communication paths between a sender device and a receiver device to transmit and receive a plurality of data packets, comprising:
a send MPTP API for the sender device including:
a plurality of send connectors each being a sender endpoint of a communication path established between the sender device and the receiver device;
a path table configured to maintain characteristics of the plurality of communication paths;
a scheduler configured to determine a suitable send connector to transmit each data packet using one of the plurality of communication paths between the sender device and the receiver device; and
a send buffer configured to buffer the plurality of data packets prior to transmitting each data packet to the selected send connector; and
a receive MPTP API for the receiver device including:
a plurality of receive connectors each being a receiver endpoint of a communication path established between the sender device and the receiver device;
a path table configured to maintain characteristics of the plurality of bi-directional communication paths;
a receive buffer configured to buffer the plurality of data packets received by the receive connectors; and
an assembler configured to reassemble the plurality of data packets in the receive buffer. 2. The MPTP API as set forth in claim 1, wherein the path table stores characters of each communication path's throughput, latency, loss rate, and congestion window. 3. The MPTP API as set forth in claim 1, wherein the assembler further provides feedback on a communication path to the scheduler. 4. The MPTP API as set forth in claim 1, wherein the scheduler is configured to transmit each data packet over a plurality of communication paths each consisting of at least one intermediate node. 5. The MPTP API as set forth in claim 1, wherein the scheduler is configured to transmit each data packet over a plurality of communication paths each consisting of zero to a plurality of intermediate nodes. 6. The MPTP API as set forth in claim 1, wherein the plurality of send and receive connectors are configured to support establishing communication paths using Transport Control Protocol. 7. The MPTP API as set forth in claim 1, wherein the plurality of send and receive connectors are configured to support establishing communication paths using User Datagram Protocol. 8. A method for establishing a plurality of bi-directional communication paths between a sender device and a receiver device to transmit and receive a plurality of data packets, comprising:
providing a send MPTP API in the sender device having:
a plurality of send connectors each being a sender endpoint of a communication path established between the sender device and the receiver device;
a path table configured to maintain characteristics of the plurality of communication paths;
a scheduler configured to determine a suitable send connector to transmit each data packet using one of the plurality of communication paths between the sender device and the receiver device; and
a send buffer configured to buffer the plurality of data packets prior to transmitting each data packet to the selected send connector; and
providing a receive MPTP API in the receiver device having:
a plurality of receive connectors each being a receiver endpoint of a communication path established between the sender device and the receiver device;
a path table configured to maintain characteristics of the plurality of bi-directional communication paths;
a receive buffer configured to buffer the plurality of data packets received by the receive connectors; and
an assembler configured to reassemble the plurality of data packets in the receive buffer. 9. The method as set forth in claim 8, wherein the path table stores characters of each communication path's throughput, latency, loss rate, and congestion window. 10. The method as set forth in claim 8, wherein the assembler further provides feedback on a communication path to the scheduler. 11. The method as set forth in claim 8, wherein the scheduler transmits each data packet over a plurality of communication paths each consisting of at least one intermediate node. 12. The method as set forth in claim 8, wherein the scheduler transmits each data packet over a plurality of communication paths each consisting of zero to a plurality of intermediate nodes. 13. The method as set forth in claim 8, wherein the plurality of send and receive connectors establish communication paths using Transport Control Protocol. 14. The method as set forth in claim 8, wherein the plurality of send and receive connectors establish communication paths using User Datagram Protocol. 15. A multi-path transport protocol (MPTP) API for establishing a plurality of bi-directional communication paths between two end points to transmit and receive a plurality of data packets, comprising:
a plurality of connectors each being a network interface for a communication path established between the two end points; a path table configured to maintain characteristics of the plurality of communication paths; a scheduler configured to determine a suitable connector to transmit each data packet using one of the plurality of communication paths between the two end points; a buffer configured to buffer the plurality of data packets prior to transmission or receiving to or from the connectors; and an assembler configured to reassemble the plurality of data packets received from the connectors and stored in the buffer. 16. The MPTP API as set forth in claim 15, wherein the scheduler is configured to transmit each data packet over a plurality of communication paths each consisting of zero to a plurality of intermediate nodes. 17. The MPTP API as set forth in claim 15, wherein the plurality of send and receive connectors are configured to support establishing communication paths using Transport Control Protocol/User Datagram Protocol. | 2,400 |
8,910 | 8,910 | 15,528,820 | 2,419 | An access control system includes a credential service operable to generate an encrypted programming credential. A mobile library on a mobile device operable to communicate with the credential service, the mobile library operable to receive the encrypted programming credential from the credential service and a credential module for an access control, the credential module operable to extract programming data from the encrypted programming credential, the programming data usable to program the access control. | 1. An access control system, comprising:
a credential service operable to generate an encrypted programming credential; an installer mobile application on a mobile device operable to communicate with the credential service, the installer mobile application operable to receive the encrypted programming credential from the credential service; and a credential module for an access control, the credential module operable to extract programming data from the encrypted programming credential, the programming data usable to program the access control. 2. The system as recited in claim 1, wherein the credential module is operable to decrypt and validate the encrypted programming credential. 3. The system as recited in claim 1, wherein the programming data is operable to set a lock encryption key. 4. The system as recited in claim 1, wherein the programming data is operable to roll a lock encryption key. 5. The system as recited in claim 1, further comprising decrypting and extracting the programming data. 6. The system as recited in claim 5, wherein the programming data is identical to a card meta-data physically encoded on a physical key card. 7. The system as recited in claim 1, wherein the mobile device includes a smartphone. 8. The system as recited in claim 7, wherein the access control is a lock. 9. The system as recited in claim 1, wherein the mobile device includes a mobile application used by hotel maintenance. 10. The system as recited in claim 9, wherein the access control is a lock. 11. The system as recited in claim 1, wherein the mobile device includes a key card. 12. The system as recited in claim 11, wherein the access control is a lock. 13. A method of managing encryption for a mobile device, the method comprising:
downloading an encrypted programming credential to a mobile device; communicating the encrypted programming credential to a credential module in an access control; decrypting and validating the encrypted programming credential; extracting the programming data from the encrypted programming credential; and communicating the programming data from the credential module to program the access control. 14. The method as recited in claim 13, further comprising setting a lock encryption key in response to the programming data. 15. The method as recited in claim 13, further comprising rolling a lock encryption key in response to the programming data. 16. The method as recited in claim 13, wherein downloading the encrypted programming credential to the mobile device includes downloading the encrypted programming credential to a smart phone. 17. The method as recited in claim 13, wherein downloading the encrypted programming credential to the mobile device includes downloading the encrypted programming credential to a key card. 18. A method of managing credentials for a mobile device, the method comprising:
downloading an encrypted programming credential and an encrypted mobile credential to a mobile device; communicating the encrypted programming credential to a credential module in an access control; decrypting and validating the encrypted programming credential; extracting the programming data from the encrypted programming credential; communicating the programming data from the credential module to program the access control; communicating the encrypted mobile credential to the credential module in an access control subsequent to communicating the programming data from the credential module to program the access control; decrypting and validating the encrypted mobile credential; extracting the virtual card data from the encrypted mobile credential; and communicating the virtual card data from the credential module to operate the access control as a “virtual card read.” 19. The method as recited in claim 18, further comprising setting a lock encryption key in response to the programming data. 20. The method as recited in claim 18, further comprising rolling a lock encryption key in response to the programming data. 21. The method as recited in claim 18, wherein the encrypted mobile credential includes an access category in addition to a mobile credential with the virtual card data for a specific access control. | An access control system includes a credential service operable to generate an encrypted programming credential. A mobile library on a mobile device operable to communicate with the credential service, the mobile library operable to receive the encrypted programming credential from the credential service and a credential module for an access control, the credential module operable to extract programming data from the encrypted programming credential, the programming data usable to program the access control.1. An access control system, comprising:
a credential service operable to generate an encrypted programming credential; an installer mobile application on a mobile device operable to communicate with the credential service, the installer mobile application operable to receive the encrypted programming credential from the credential service; and a credential module for an access control, the credential module operable to extract programming data from the encrypted programming credential, the programming data usable to program the access control. 2. The system as recited in claim 1, wherein the credential module is operable to decrypt and validate the encrypted programming credential. 3. The system as recited in claim 1, wherein the programming data is operable to set a lock encryption key. 4. The system as recited in claim 1, wherein the programming data is operable to roll a lock encryption key. 5. The system as recited in claim 1, further comprising decrypting and extracting the programming data. 6. The system as recited in claim 5, wherein the programming data is identical to a card meta-data physically encoded on a physical key card. 7. The system as recited in claim 1, wherein the mobile device includes a smartphone. 8. The system as recited in claim 7, wherein the access control is a lock. 9. The system as recited in claim 1, wherein the mobile device includes a mobile application used by hotel maintenance. 10. The system as recited in claim 9, wherein the access control is a lock. 11. The system as recited in claim 1, wherein the mobile device includes a key card. 12. The system as recited in claim 11, wherein the access control is a lock. 13. A method of managing encryption for a mobile device, the method comprising:
downloading an encrypted programming credential to a mobile device; communicating the encrypted programming credential to a credential module in an access control; decrypting and validating the encrypted programming credential; extracting the programming data from the encrypted programming credential; and communicating the programming data from the credential module to program the access control. 14. The method as recited in claim 13, further comprising setting a lock encryption key in response to the programming data. 15. The method as recited in claim 13, further comprising rolling a lock encryption key in response to the programming data. 16. The method as recited in claim 13, wherein downloading the encrypted programming credential to the mobile device includes downloading the encrypted programming credential to a smart phone. 17. The method as recited in claim 13, wherein downloading the encrypted programming credential to the mobile device includes downloading the encrypted programming credential to a key card. 18. A method of managing credentials for a mobile device, the method comprising:
downloading an encrypted programming credential and an encrypted mobile credential to a mobile device; communicating the encrypted programming credential to a credential module in an access control; decrypting and validating the encrypted programming credential; extracting the programming data from the encrypted programming credential; communicating the programming data from the credential module to program the access control; communicating the encrypted mobile credential to the credential module in an access control subsequent to communicating the programming data from the credential module to program the access control; decrypting and validating the encrypted mobile credential; extracting the virtual card data from the encrypted mobile credential; and communicating the virtual card data from the credential module to operate the access control as a “virtual card read.” 19. The method as recited in claim 18, further comprising setting a lock encryption key in response to the programming data. 20. The method as recited in claim 18, further comprising rolling a lock encryption key in response to the programming data. 21. The method as recited in claim 18, wherein the encrypted mobile credential includes an access category in addition to a mobile credential with the virtual card data for a specific access control. | 2,400 |
8,911 | 8,911 | 15,594,779 | 2,495 | The example embodiments are directed to a system and method for forecasting anomalies in feature detection. In one example, the method includes storing feature behavior information of at least one monitoring node of an asset, including a normalcy boundary identifying normal feature behavior and abnormal feature behavior for the at least one monitoring node in feature space, receiving input signals from the at least one monitoring node of the asset and transforming the input signals into feature values in the feature space, wherein the feature values are located within the normalcy boundary, forecasting that a future feature value corresponding to a future input signal from the at least one monitoring node is going to be positioned outside the normalcy boundary based on the feature values within the normalcy boundary, and outputting information concerning the forecasted future feature value being outside the normalcy boundary for display. | 1. A method comprising:
storing feature behavior information associated with data received from at least one monitoring node of an asset, the feature behavior information comprising a normalcy boundary identifying normal feature behavior and abnormal feature behavior for the at least one monitoring node in feature space; receiving input signals from the at least one monitoring node of the asset and transforming the input signals into feature values in the feature space; forecasting that a future value of a feature that is currently within the normalcy boundary is going to move outside the normalcy boundary based on the current values of the feature within the normalcy boundary; and outputting information concerning the forecasted future feature value moving outside the normalcy boundary for display. 2. The method of claim 1, wherein the monitoring node comprises one or more sensors, actuators or controller nodes attached to an asset within an Industrial Internet of Things (IIoT). 3. The method of claim 1, wherein the normalcy boundary in the feature space comprises at least one of a line, a curve, a surface, a hyperplane, a manifold, and a shape, identifying normal features values and abnormal feature values associated with the asset. 4. The method of claim 1, wherein the forecasting comprises processing at least one forecasting model based on the features values of the feature within the normalcy boundary to determine that the future feature value of the feature is going to move outside the normalcy boundary. 5. The method of claim 4, wherein the at least one forecasting model comprises at least one of a short-term forecasting model configured to predict locations of future feature values in features space up to a minute in advance, a mid-term forecasting model configured to predict locations of future feature values in feature space up to an hour in advance, and a long-term forecasting model configured to predict locations of future feature values in feature space up to a day in advance. 6. The method of claim 1, wherein the forecasting further comprises forecasting when the future feature value is going to move outside the normalcy boundary. 7. The method of claim 1, wherein the outputting comprises outputting an early warning about the future feature value to at least one of a control system of the asset and an operator of the asset. 8. The method of claim 1, wherein the stored feature behavior information is associated with signals received from a plurality of monitoring nodes of the asset and comprises a global normalcy boundary identifying normal global feature behavior for the plurality of monitoring nodes in combination. 9. The method of claim 8, wherein the receiving comprises receiving input signals from the plurality of monitoring nodes, and the forecasting comprises forecasting that a global future feature value corresponding to a combined future input signal from the plurality of monitoring nodes is going to move outside the global normalcy boundary. 10. A computing system comprising:
a storage configured to store feature behavior information associated with data received from at least one monitoring node of an asset, the feature behavior information comprising a normalcy boundary identifying normal feature behavior and abnormal feature behavior for the at least one monitoring node in feature space; a processor configured to receive input signals from the at least one monitoring node of the asset, and transform the input signals into feature values in the feature space, wherein the processor is further configured to forecast that a future feature value of a feature that is currently within the normalcy boundary is going to move outside the normalcy boundary based on the feature values of the feature within the normalcy boundary; and an output configured to output information concerning the forecasted future feature value moving outside the normalcy boundary for display. 11. The computing system of claim 10, wherein the monitoring node comprises one or more sensors attached to an asset within an Industrial Internet of Things (IIoT). 12. The computing system of claim 10, wherein the normalcy boundary in the feature space comprises at least one of a line, a curve, a surface, a hyperplane, a manifold, and a shape, identifying normal features values and abnormal feature values associated with the asset. 13. The computing system of claim 10, wherein the processor is configured to perform the forecasting by processing at least one forecasting model based on the feature values of the feature within the normalcy boundary to determine that the future feature value of the feature is going to move outside the normalcy boundary. 14. The computing system of claim 13, wherein the at least one forecasting model comprises at least one of a short-term forecasting model configured to predict locations of future feature values in features space up to a minute in advance, a mid-term forecasting model configured to predict locations of future feature values in feature space up to an hour in advance, and a long-term forecasting model configured to predict locations of future feature values in feature space up to a day in advance. 15. The computing system of claim 10, wherein the processor is further configured to forecast when the future feature value is going to move outside the normalcy boundary. 16. The computing system of claim 10, wherein the output is further configured to output an early warning about the future feature value to at least one of a control system of the asset and an operator of the asset. 17. The computing system of claim 10, wherein the stored feature behavior information is associated with signals received from a plurality of monitoring nodes of the asset and comprises a global normalcy boundary identifying normal global feature behavior for the plurality of monitoring nodes in combination. 18. The computing system of claim 17, wherein the processor is configured to receive input signals from the plurality of monitoring nodes, and forecast that a global future feature value corresponding to a combined future input signal from the plurality of monitoring nodes is going to move outside the global normalcy boundary. 19. A non-transitory computer readable storage medium having stored therein instructions that when executed cause a processor to perform a method comprising:
storing feature behavior information associated with data received from at least one monitoring node of an asset, the feature behavior information comprising a normalcy boundary identifying normal feature behavior and abnormal feature behavior for the at least one monitoring node in feature space; receiving input signals from the at least one monitoring node of the asset and transforming the input signals into feature values in the feature space; forecasting that a future feature value of a feature that is currently within the normalcy boundary is going to move outside the normalcy boundary based on the feature values of the feature within the normalcy boundary; and outputting information concerning the forecasted future feature value moving outside the normalcy boundary for display. 20. The non-transitory computer readable storage medium of claim 19, wherein the forecasting comprises performing at least one forecasting model based on the features values within the normalcy boundary to determine that the future feature value will be located outside the normalcy boundary. | The example embodiments are directed to a system and method for forecasting anomalies in feature detection. In one example, the method includes storing feature behavior information of at least one monitoring node of an asset, including a normalcy boundary identifying normal feature behavior and abnormal feature behavior for the at least one monitoring node in feature space, receiving input signals from the at least one monitoring node of the asset and transforming the input signals into feature values in the feature space, wherein the feature values are located within the normalcy boundary, forecasting that a future feature value corresponding to a future input signal from the at least one monitoring node is going to be positioned outside the normalcy boundary based on the feature values within the normalcy boundary, and outputting information concerning the forecasted future feature value being outside the normalcy boundary for display.1. A method comprising:
storing feature behavior information associated with data received from at least one monitoring node of an asset, the feature behavior information comprising a normalcy boundary identifying normal feature behavior and abnormal feature behavior for the at least one monitoring node in feature space; receiving input signals from the at least one monitoring node of the asset and transforming the input signals into feature values in the feature space; forecasting that a future value of a feature that is currently within the normalcy boundary is going to move outside the normalcy boundary based on the current values of the feature within the normalcy boundary; and outputting information concerning the forecasted future feature value moving outside the normalcy boundary for display. 2. The method of claim 1, wherein the monitoring node comprises one or more sensors, actuators or controller nodes attached to an asset within an Industrial Internet of Things (IIoT). 3. The method of claim 1, wherein the normalcy boundary in the feature space comprises at least one of a line, a curve, a surface, a hyperplane, a manifold, and a shape, identifying normal features values and abnormal feature values associated with the asset. 4. The method of claim 1, wherein the forecasting comprises processing at least one forecasting model based on the features values of the feature within the normalcy boundary to determine that the future feature value of the feature is going to move outside the normalcy boundary. 5. The method of claim 4, wherein the at least one forecasting model comprises at least one of a short-term forecasting model configured to predict locations of future feature values in features space up to a minute in advance, a mid-term forecasting model configured to predict locations of future feature values in feature space up to an hour in advance, and a long-term forecasting model configured to predict locations of future feature values in feature space up to a day in advance. 6. The method of claim 1, wherein the forecasting further comprises forecasting when the future feature value is going to move outside the normalcy boundary. 7. The method of claim 1, wherein the outputting comprises outputting an early warning about the future feature value to at least one of a control system of the asset and an operator of the asset. 8. The method of claim 1, wherein the stored feature behavior information is associated with signals received from a plurality of monitoring nodes of the asset and comprises a global normalcy boundary identifying normal global feature behavior for the plurality of monitoring nodes in combination. 9. The method of claim 8, wherein the receiving comprises receiving input signals from the plurality of monitoring nodes, and the forecasting comprises forecasting that a global future feature value corresponding to a combined future input signal from the plurality of monitoring nodes is going to move outside the global normalcy boundary. 10. A computing system comprising:
a storage configured to store feature behavior information associated with data received from at least one monitoring node of an asset, the feature behavior information comprising a normalcy boundary identifying normal feature behavior and abnormal feature behavior for the at least one monitoring node in feature space; a processor configured to receive input signals from the at least one monitoring node of the asset, and transform the input signals into feature values in the feature space, wherein the processor is further configured to forecast that a future feature value of a feature that is currently within the normalcy boundary is going to move outside the normalcy boundary based on the feature values of the feature within the normalcy boundary; and an output configured to output information concerning the forecasted future feature value moving outside the normalcy boundary for display. 11. The computing system of claim 10, wherein the monitoring node comprises one or more sensors attached to an asset within an Industrial Internet of Things (IIoT). 12. The computing system of claim 10, wherein the normalcy boundary in the feature space comprises at least one of a line, a curve, a surface, a hyperplane, a manifold, and a shape, identifying normal features values and abnormal feature values associated with the asset. 13. The computing system of claim 10, wherein the processor is configured to perform the forecasting by processing at least one forecasting model based on the feature values of the feature within the normalcy boundary to determine that the future feature value of the feature is going to move outside the normalcy boundary. 14. The computing system of claim 13, wherein the at least one forecasting model comprises at least one of a short-term forecasting model configured to predict locations of future feature values in features space up to a minute in advance, a mid-term forecasting model configured to predict locations of future feature values in feature space up to an hour in advance, and a long-term forecasting model configured to predict locations of future feature values in feature space up to a day in advance. 15. The computing system of claim 10, wherein the processor is further configured to forecast when the future feature value is going to move outside the normalcy boundary. 16. The computing system of claim 10, wherein the output is further configured to output an early warning about the future feature value to at least one of a control system of the asset and an operator of the asset. 17. The computing system of claim 10, wherein the stored feature behavior information is associated with signals received from a plurality of monitoring nodes of the asset and comprises a global normalcy boundary identifying normal global feature behavior for the plurality of monitoring nodes in combination. 18. The computing system of claim 17, wherein the processor is configured to receive input signals from the plurality of monitoring nodes, and forecast that a global future feature value corresponding to a combined future input signal from the plurality of monitoring nodes is going to move outside the global normalcy boundary. 19. A non-transitory computer readable storage medium having stored therein instructions that when executed cause a processor to perform a method comprising:
storing feature behavior information associated with data received from at least one monitoring node of an asset, the feature behavior information comprising a normalcy boundary identifying normal feature behavior and abnormal feature behavior for the at least one monitoring node in feature space; receiving input signals from the at least one monitoring node of the asset and transforming the input signals into feature values in the feature space; forecasting that a future feature value of a feature that is currently within the normalcy boundary is going to move outside the normalcy boundary based on the feature values of the feature within the normalcy boundary; and outputting information concerning the forecasted future feature value moving outside the normalcy boundary for display. 20. The non-transitory computer readable storage medium of claim 19, wherein the forecasting comprises performing at least one forecasting model based on the features values within the normalcy boundary to determine that the future feature value will be located outside the normalcy boundary. | 2,400 |
8,912 | 8,912 | 15,958,553 | 2,447 | Rules with user adaptable controls are created that are not automatically applied to a given email. Instead, satisfaction of the rule triggers a suggestion to the person viewing the mail to take a certain mailbox management action such as, for example, to forward the email to a particular person, tag with a particular category, flag for follow-up at a certain point in time, etc. The rule filters the email as always but the user is given control as to what to do when the rule is satisfied. The notification that is triggered by the rule can be preselected to provide available options to the user with a simple click or can simply provide comments that are cleared by selecting “OK.” Such rules with user adaptable controls may execute multiple mailbox management actions in one step, and also may be used to implement company email policies to help guide employees to follow the correct corporate email protocols. | 1. A method of filtering electronic messages, comprising:
receiving at least one criterion for filtering electronic messages, at least one mailbox management action to be executed upon satisfaction of the at least one criterion, and a notification to be presented prior to execution of the at least one mailbox management action upon satisfaction of the at least one criterion; receiving an electronic message; determining that the electronic message satisfies the at least one criterion; in response to determining that the electronic message satisfies the at least one criterion, issuing a notification corresponding to a satisfied criterion, the notification including at least one graphical user interface (GUI) input element prompting a user to provide an input via the at least one GUI input element to select a mailbox management action from at least one mailbox management action presented in the notification; receiving a user input via the at least one GUI input element selecting a mailbox management action from the at least one mailbox management action presented in the notification; and responsive to the user input, executing the selected mailbox management action on the electronic message. 2. A method as in claim 1, wherein the notification includes text providing context for the mailbox management action to be taken upon satisfaction of the at least one criterion. 3. A method as in claim 1, further comprising enabling the user to select whether a received electronic message is to be evaluated against the at least one criterion upon receipt or when the electronic message is opened by the user for viewing. 4. A method as in claim 1, wherein issuing the notification comprises issuing one of a popup window alert and a toolbar graphical control element that appears as a temporary extension of a toolbar, the popup window alert and the graphical control element containing alert text setting forth the at least one mailbox management action. 5. A method as in claim 4, wherein issuing the notification comprises issuing one of the popup window alert and the toolbar graphical control element alert each time the electronic message is viewed by the user. 6. A method as in claim 4, wherein issuing the notification comprises issuing one of the popup window alert and the toolbar graphical control element alert a first time the electronic message is viewed by the user and then dismissing the alert. 7. A method as in claim 1, wherein the at least one mailbox management action includes at least one of forwarding the electronic message to a particular person, tagging the electronic message with a particular category, storing the electronic message in a particular folder, and flagging the electronic message for follow-up at a certain point in time. 8. A method as in claim 1, wherein the at least one mailbox management action comprises at least two mailbox management action possibilities for user selection upon satisfaction of the at least one criterion and the notification prompts the user to select one of the at least two mailbox management action possibilities for execution. 9. A machine readable medium that stores instructions thereon that when executed by one or more processing devices cause the one or more processing devices to implement a method of filtering electronic messages, comprising:
setup instructions to generate a graphical user interface through which a user provides input to set at least one criterion for filtering electronic messages, at least one mailbox management action to be executed upon satisfaction of the at least one criterion, and a notification to be presented prior to execution of the at least one mailbox management action upon satisfaction of the at least one criterion; instructions to receive an electronic message; instructions to evaluate the electronic message against the at least one criterion to determine that the electronic message satisfies the at least one criterion; instructions to issue a notification corresponding to a satisfied criterion, the notification including at least one graphical user interface (GUI) input element prompting a user to provide an input via the at least one GUI input element to select a mailbox management action from at least one mailbox management action presented in the notification when the electronic message satisfies the at least one criterion, the at least one mailbox management action presented in the notification for selection corresponding to the at least one mailbox management action, specified by the user during execution of the setup instructions, that is to be executed when the electronic message satisfies the at least one criterion; instructions to receive a user input via the at least one GUI input element selecting a mailbox management action from the at least one mailbox management action presented in the notification; and instructions to execute the selected mailbox management action on the electronic message. 10. A medium as in claim 9, wherein the setup instructions include instructions to generate a GUI with an option to select at least one of an automatic rule and a user adaptable rule to be implemented upon satisfaction of the at least one criterion. 11. A medium as in claim 9, wherein the setup instructions include instructions to generate a GUI with an option to select at least one of automatically generated text and custom text created by the user for presentation upon satisfaction of the at least one criterion for a user adaptable rule. 12. A medium as in claim 9, wherein the instructions to issue the notification include instructions to issue one of a popup window alert and a toolbar graphical control element alert that appears as a temporary extension of a toolbar, the popup window alert and the graphical control element alert containing alert text setting forth the at least one mailbox management action. 13. A medium as in claim 12, wherein the instructions to issue the notification comprise instructions to issue one of the popup window alert and the toolbar graphical control element alert each time the electronic message is viewed by the user. 14. A medium as in claim 12, wherein the instructions to issue the notification comprise instructions to issue one of the popup window alert and the toolbar graphical control element alert a first time the electronic message is viewed by the user and then to dismiss the alert. 15. A medium as in claim 9, wherein the at least one mailbox management action includes at least one of forwarding the electronic message to a particular person, tagging the electronic message with a particular category, storing the electronic message in a particular folder, and flagging the electronic message for follow-up at a certain point in time. 16. A medium as in claim 9, wherein the at least one mailbox management action comprises at least two mailbox management action possibilities for user selection upon satisfaction of the at least one criterion and the notification prompts the user to select one of the at least two mailbox management action possibilities for execution. 17. An email system that filters electronic messages, comprising:
a processor; a mailbox; and a memory that stores instructions thereon that when executed by the processor cause the processor to implement a method of filtering electronic messages, comprising: instructions to set at least one criterion for filtering electronic messages, at least one mailbox management action to be executed upon satisfaction of the at least one criterion, and a notification to be presented prior to execution of the at least one mailbox management action upon satisfaction of the at least one criterion; instructions to receive an electronic message; instructions to evaluate the electronic message against the at least one criterion to determine that the electronic message satisfies the at least one criterion; instructions to issue a notification corresponding to a satisfied criterion, the notification including at least one graphical user interface (GUI) input element prompting a user to provide an input via the at least one GUI input element to select a mailbox management action from at least one mailbox management action presented in the notification when the electronic message satisfies the at least one criterion; instructions to receive a user input via the at least one GUI input element selecting a mailbox management action from the at least one mailbox management action presented in the notification; and instructions to execute the selected mailbox management action on the electronic message. 18. A system as in claim 17, wherein the memory further comprises instructions to enable the user to select whether a received electronic message is to be evaluated against the at least one criterion upon receipt or when the electronic message is opened by the user for viewing. 19. A system as in claim 17, wherein the at least one mailbox management action includes at least one of forwarding the electronic message to a particular person, tagging the electronic message with a particular category, storing the electronic message in a particular folder, and flagging the electronic message for follow-up at a certain point in time. 20. A medium as in claim 17, wherein the at least one mailbox management action comprises at least two mailbox management action possibilities for user selection upon satisfaction of the at least one criterion and the notification prompts the user to select one of the at least two mailbox management action possibilities for execution. | Rules with user adaptable controls are created that are not automatically applied to a given email. Instead, satisfaction of the rule triggers a suggestion to the person viewing the mail to take a certain mailbox management action such as, for example, to forward the email to a particular person, tag with a particular category, flag for follow-up at a certain point in time, etc. The rule filters the email as always but the user is given control as to what to do when the rule is satisfied. The notification that is triggered by the rule can be preselected to provide available options to the user with a simple click or can simply provide comments that are cleared by selecting “OK.” Such rules with user adaptable controls may execute multiple mailbox management actions in one step, and also may be used to implement company email policies to help guide employees to follow the correct corporate email protocols.1. A method of filtering electronic messages, comprising:
receiving at least one criterion for filtering electronic messages, at least one mailbox management action to be executed upon satisfaction of the at least one criterion, and a notification to be presented prior to execution of the at least one mailbox management action upon satisfaction of the at least one criterion; receiving an electronic message; determining that the electronic message satisfies the at least one criterion; in response to determining that the electronic message satisfies the at least one criterion, issuing a notification corresponding to a satisfied criterion, the notification including at least one graphical user interface (GUI) input element prompting a user to provide an input via the at least one GUI input element to select a mailbox management action from at least one mailbox management action presented in the notification; receiving a user input via the at least one GUI input element selecting a mailbox management action from the at least one mailbox management action presented in the notification; and responsive to the user input, executing the selected mailbox management action on the electronic message. 2. A method as in claim 1, wherein the notification includes text providing context for the mailbox management action to be taken upon satisfaction of the at least one criterion. 3. A method as in claim 1, further comprising enabling the user to select whether a received electronic message is to be evaluated against the at least one criterion upon receipt or when the electronic message is opened by the user for viewing. 4. A method as in claim 1, wherein issuing the notification comprises issuing one of a popup window alert and a toolbar graphical control element that appears as a temporary extension of a toolbar, the popup window alert and the graphical control element containing alert text setting forth the at least one mailbox management action. 5. A method as in claim 4, wherein issuing the notification comprises issuing one of the popup window alert and the toolbar graphical control element alert each time the electronic message is viewed by the user. 6. A method as in claim 4, wherein issuing the notification comprises issuing one of the popup window alert and the toolbar graphical control element alert a first time the electronic message is viewed by the user and then dismissing the alert. 7. A method as in claim 1, wherein the at least one mailbox management action includes at least one of forwarding the electronic message to a particular person, tagging the electronic message with a particular category, storing the electronic message in a particular folder, and flagging the electronic message for follow-up at a certain point in time. 8. A method as in claim 1, wherein the at least one mailbox management action comprises at least two mailbox management action possibilities for user selection upon satisfaction of the at least one criterion and the notification prompts the user to select one of the at least two mailbox management action possibilities for execution. 9. A machine readable medium that stores instructions thereon that when executed by one or more processing devices cause the one or more processing devices to implement a method of filtering electronic messages, comprising:
setup instructions to generate a graphical user interface through which a user provides input to set at least one criterion for filtering electronic messages, at least one mailbox management action to be executed upon satisfaction of the at least one criterion, and a notification to be presented prior to execution of the at least one mailbox management action upon satisfaction of the at least one criterion; instructions to receive an electronic message; instructions to evaluate the electronic message against the at least one criterion to determine that the electronic message satisfies the at least one criterion; instructions to issue a notification corresponding to a satisfied criterion, the notification including at least one graphical user interface (GUI) input element prompting a user to provide an input via the at least one GUI input element to select a mailbox management action from at least one mailbox management action presented in the notification when the electronic message satisfies the at least one criterion, the at least one mailbox management action presented in the notification for selection corresponding to the at least one mailbox management action, specified by the user during execution of the setup instructions, that is to be executed when the electronic message satisfies the at least one criterion; instructions to receive a user input via the at least one GUI input element selecting a mailbox management action from the at least one mailbox management action presented in the notification; and instructions to execute the selected mailbox management action on the electronic message. 10. A medium as in claim 9, wherein the setup instructions include instructions to generate a GUI with an option to select at least one of an automatic rule and a user adaptable rule to be implemented upon satisfaction of the at least one criterion. 11. A medium as in claim 9, wherein the setup instructions include instructions to generate a GUI with an option to select at least one of automatically generated text and custom text created by the user for presentation upon satisfaction of the at least one criterion for a user adaptable rule. 12. A medium as in claim 9, wherein the instructions to issue the notification include instructions to issue one of a popup window alert and a toolbar graphical control element alert that appears as a temporary extension of a toolbar, the popup window alert and the graphical control element alert containing alert text setting forth the at least one mailbox management action. 13. A medium as in claim 12, wherein the instructions to issue the notification comprise instructions to issue one of the popup window alert and the toolbar graphical control element alert each time the electronic message is viewed by the user. 14. A medium as in claim 12, wherein the instructions to issue the notification comprise instructions to issue one of the popup window alert and the toolbar graphical control element alert a first time the electronic message is viewed by the user and then to dismiss the alert. 15. A medium as in claim 9, wherein the at least one mailbox management action includes at least one of forwarding the electronic message to a particular person, tagging the electronic message with a particular category, storing the electronic message in a particular folder, and flagging the electronic message for follow-up at a certain point in time. 16. A medium as in claim 9, wherein the at least one mailbox management action comprises at least two mailbox management action possibilities for user selection upon satisfaction of the at least one criterion and the notification prompts the user to select one of the at least two mailbox management action possibilities for execution. 17. An email system that filters electronic messages, comprising:
a processor; a mailbox; and a memory that stores instructions thereon that when executed by the processor cause the processor to implement a method of filtering electronic messages, comprising: instructions to set at least one criterion for filtering electronic messages, at least one mailbox management action to be executed upon satisfaction of the at least one criterion, and a notification to be presented prior to execution of the at least one mailbox management action upon satisfaction of the at least one criterion; instructions to receive an electronic message; instructions to evaluate the electronic message against the at least one criterion to determine that the electronic message satisfies the at least one criterion; instructions to issue a notification corresponding to a satisfied criterion, the notification including at least one graphical user interface (GUI) input element prompting a user to provide an input via the at least one GUI input element to select a mailbox management action from at least one mailbox management action presented in the notification when the electronic message satisfies the at least one criterion; instructions to receive a user input via the at least one GUI input element selecting a mailbox management action from the at least one mailbox management action presented in the notification; and instructions to execute the selected mailbox management action on the electronic message. 18. A system as in claim 17, wherein the memory further comprises instructions to enable the user to select whether a received electronic message is to be evaluated against the at least one criterion upon receipt or when the electronic message is opened by the user for viewing. 19. A system as in claim 17, wherein the at least one mailbox management action includes at least one of forwarding the electronic message to a particular person, tagging the electronic message with a particular category, storing the electronic message in a particular folder, and flagging the electronic message for follow-up at a certain point in time. 20. A medium as in claim 17, wherein the at least one mailbox management action comprises at least two mailbox management action possibilities for user selection upon satisfaction of the at least one criterion and the notification prompts the user to select one of the at least two mailbox management action possibilities for execution. | 2,400 |
8,913 | 8,913 | 16,239,501 | 2,485 | A system and method for monitoring a person within a defined area by detecting breathing, or the lack thereof. Breathing is detected using radar signals, camera signals and/or microphone signals. The radar signals, camera signals and/or microphone signals are analyzed to determine if the subject person is moving, and if not moving if the person is breathing or not-breathing. An alarm is generated should the reflected radar signals, the camera signals and the microphone signals all simultaneously indicate no movement and no movement of the subject person in the defined area for a selected period of time. | 1. A method of monitoring a person within a defined area, said method comprising the steps of:
directing radar signals toward said defined area, wherein said radar signals reflect from said person within said defined area and create reflected radar signals; directing a camera toward said defined area, wherein said camera detects movement of said person in said defined area and produces camera signals indicative of said movement; monitoring said defined area with at least one microphone, wherein sounds made by said person in said defined area are detected by said at least one microphone and said at least one microphone produces audio signals indicative of said sound; analyzing said reflected radar signals, said camera signals and said audio signals to determine if said person is moving within said defined area; generating an alarm should said reflected radar signals, said camera signals and said audio signals all simultaneously indicate no movement of said person in said defined area for a selected period of time. 2. The method according to claim 1, wherein said movement is body movement selected from a group consisting of breathing and heartbeats. 3. The method according to claim 2, further including analyzing said reflected radar signals to extract signal data indicative of said body movement. 4. The method according to claim 2, further including analyzing said camera signals to extract signal data indicative of said body movement. 5. The method according to claim 2, further including analyzing said audio signals to extract signal data indicative of said body movement. 6. The method according to claim 1, wherein said radar signals are generated by a pulse Doppler radar transceiver. 7. The method according to claim 6, wherein said Doppler radar transceiver, said camera and said at least one microphone are contained in a single monitoring unit that is directed toward said defined area. 8. The method according to claim 7, wherein said monitoring unit contains a processing unit that analyzes said reflected radar signals, said camera signals, and said audio signals. 9. The method according to claim 8, wherein generating an alarm further includes the step of transmitting an alarm signal from said monitoring unit to a remote computing device. 10. The method according to claim 9, wherein said monitoring unit transmits said camera signals to said remote computing device. 11. A method of monitoring whether movements of a person that are indicative of breathing have stopped, said method comprising the steps of:
providing a radar transceiver that directs radar signals toward said person, wherein said radar signals detect said movements of said person that may include movements indicative of breathing; providing an imaging system that captures images of said person, wherein said imaging system optically detects said movements of said person that may include said movements indicative of breathing; analyzing said radar signals and said images to extract data corresponding to said movements indicative of breathing; generating an alarm should said movements indicative of breathing not be found for a selected period of time. 12. The method according to claim 11, further including providing at least one microphone that can detect sounds indicative of breathing and produce sound signals therefore. 13. The method according to claim 12, wherein analyzing said radar signals and said images further includes analyzing said sound signals to extract said sounds indicative of breathing. 14. The method according to claim 13, wherein generating an alarm only occurs should said movements indicative of breathing and said sounds indicative of breathing not be found for said selected period of time. 15. The method according to claim 12, wherein said radar transceiver, said imaging system and said at least one microphone are contained in a single monitoring unit that is directed toward said person. 16. The method according to claim 15, wherein said monitoring unit contains a processing unit that analyzes said radar signals, said images, and said sound signals. 17. The method according to claim 16, wherein generating an alarm further includes the step of transmitting an alarm signal from said monitoring unit to a remote computing device. 18. The method according to claim 16, wherein said monitoring unit transmits said camera signals to said remote computing device. 19. A method of monitoring whether movements of a person that are indicative of breathing have stopped, said method comprising the steps of:
providing a radar transceiver that directs radar signals toward said person, wherein said radar signals detect said movements of said person that may include movements indicative of breathing; providing a microphone for monitoring said person, wherein said microphone detects sound signals made by said person that may include sounds indicative of breathing; analyzing said radar signals and said sound signals to extract data corresponding to said movements indicative of breathing and said sounds indicative of breathing; generating an alarm should said movements indicative of breathing and said sounds indicative of breathing not be detected for a selected period of time. 20. The method according to claim 19, further including providing a camera that is directed toward said person, wherein said camera detects said movements of said person that may include said movements indicative of breathing. | A system and method for monitoring a person within a defined area by detecting breathing, or the lack thereof. Breathing is detected using radar signals, camera signals and/or microphone signals. The radar signals, camera signals and/or microphone signals are analyzed to determine if the subject person is moving, and if not moving if the person is breathing or not-breathing. An alarm is generated should the reflected radar signals, the camera signals and the microphone signals all simultaneously indicate no movement and no movement of the subject person in the defined area for a selected period of time.1. A method of monitoring a person within a defined area, said method comprising the steps of:
directing radar signals toward said defined area, wherein said radar signals reflect from said person within said defined area and create reflected radar signals; directing a camera toward said defined area, wherein said camera detects movement of said person in said defined area and produces camera signals indicative of said movement; monitoring said defined area with at least one microphone, wherein sounds made by said person in said defined area are detected by said at least one microphone and said at least one microphone produces audio signals indicative of said sound; analyzing said reflected radar signals, said camera signals and said audio signals to determine if said person is moving within said defined area; generating an alarm should said reflected radar signals, said camera signals and said audio signals all simultaneously indicate no movement of said person in said defined area for a selected period of time. 2. The method according to claim 1, wherein said movement is body movement selected from a group consisting of breathing and heartbeats. 3. The method according to claim 2, further including analyzing said reflected radar signals to extract signal data indicative of said body movement. 4. The method according to claim 2, further including analyzing said camera signals to extract signal data indicative of said body movement. 5. The method according to claim 2, further including analyzing said audio signals to extract signal data indicative of said body movement. 6. The method according to claim 1, wherein said radar signals are generated by a pulse Doppler radar transceiver. 7. The method according to claim 6, wherein said Doppler radar transceiver, said camera and said at least one microphone are contained in a single monitoring unit that is directed toward said defined area. 8. The method according to claim 7, wherein said monitoring unit contains a processing unit that analyzes said reflected radar signals, said camera signals, and said audio signals. 9. The method according to claim 8, wherein generating an alarm further includes the step of transmitting an alarm signal from said monitoring unit to a remote computing device. 10. The method according to claim 9, wherein said monitoring unit transmits said camera signals to said remote computing device. 11. A method of monitoring whether movements of a person that are indicative of breathing have stopped, said method comprising the steps of:
providing a radar transceiver that directs radar signals toward said person, wherein said radar signals detect said movements of said person that may include movements indicative of breathing; providing an imaging system that captures images of said person, wherein said imaging system optically detects said movements of said person that may include said movements indicative of breathing; analyzing said radar signals and said images to extract data corresponding to said movements indicative of breathing; generating an alarm should said movements indicative of breathing not be found for a selected period of time. 12. The method according to claim 11, further including providing at least one microphone that can detect sounds indicative of breathing and produce sound signals therefore. 13. The method according to claim 12, wherein analyzing said radar signals and said images further includes analyzing said sound signals to extract said sounds indicative of breathing. 14. The method according to claim 13, wherein generating an alarm only occurs should said movements indicative of breathing and said sounds indicative of breathing not be found for said selected period of time. 15. The method according to claim 12, wherein said radar transceiver, said imaging system and said at least one microphone are contained in a single monitoring unit that is directed toward said person. 16. The method according to claim 15, wherein said monitoring unit contains a processing unit that analyzes said radar signals, said images, and said sound signals. 17. The method according to claim 16, wherein generating an alarm further includes the step of transmitting an alarm signal from said monitoring unit to a remote computing device. 18. The method according to claim 16, wherein said monitoring unit transmits said camera signals to said remote computing device. 19. A method of monitoring whether movements of a person that are indicative of breathing have stopped, said method comprising the steps of:
providing a radar transceiver that directs radar signals toward said person, wherein said radar signals detect said movements of said person that may include movements indicative of breathing; providing a microphone for monitoring said person, wherein said microphone detects sound signals made by said person that may include sounds indicative of breathing; analyzing said radar signals and said sound signals to extract data corresponding to said movements indicative of breathing and said sounds indicative of breathing; generating an alarm should said movements indicative of breathing and said sounds indicative of breathing not be detected for a selected period of time. 20. The method according to claim 19, further including providing a camera that is directed toward said person, wherein said camera detects said movements of said person that may include said movements indicative of breathing. | 2,400 |
8,914 | 8,914 | 14,268,695 | 2,425 | A method, performed by a computer device, may include receiving a search query from a second screen device and determining that a video asset is being streamed to a first screen device associated with the second screen device. The may further include modifying the search query based on one or more keywords associated with the video asset, based on determining that the video asset is being streamed to the first screen device; obtaining search results based on the modified search query; and providing the obtained search results to the second screen device. | 1. A method, performed by a computer device, the method comprising:
receiving, by the computer device, a search query from a second screen device; determining, by the computer device, that a video asset is being streamed to a first screen device associated with the second screen device; modifying, by the computer device, the search query based on one or more keywords associated with the video asset, based on determining that the video asset is being streamed to the first screen device; obtaining, by the computer device, search results based on the modified search query; and providing, by the computer device, the obtained search results to the second screen device. 2. The method of claim 1, wherein modifying the search query based on one or more keywords associated with the video asset includes:
sending a list of keywords associated with the video asset to the second screen device; receiving, from the second screen device, a selection of at least one keyword from the sent list of keywords; and adding the selected at least one keyword to the search query. 3. The method of claim 1, wherein modifying the search query based on one or more keywords associated with the video asset includes:
determining that a particular keyword, included in the received search query, is classified in multiple categories; and selecting a particular one of the multiple categories for the particular keyword based on the video asset. 4. The method of claim 1, wherein modifying the search query based on one or more keywords associated with the video asset includes:
determining that a particular keyword, included in the received search query, is associated with a refinement keyword associated with the video asset; and replacing the particular keyword with the refinement keyword. 5. The method of claim 1, further comprising:
determining a current video segment of the video asset being streamed to the first screen device; and selecting the one or more keywords based on the current video segment. 6. The method of claim 1, further comprising:
selecting one or more advertisements based on the one or more keywords associated with the video asset; and providing the one or more advertisements to the second screen device in connection with the obtained search results. 7. The method of claim 1, further comprising:
modifying the search results based on a measure of relevance to the video asset. 8. The method of claim 1, further comprising:
determining the one or more keywords associated with the video asset based on at least one of: metadata associated with the video asset; historical search data associated with the video asset; web pages associated with the video asset; or content extracted from the video asset. 9. A method, performed by a second screen device, the method comprising:
detecting, by the second screen device, that a video asset is being streamed to a first screen device associated with the second screen device; receiving, by the second screen device, a request to execute a search query; modifying, by the second screen device, the search query based on detecting that the video asset is being streamed to the first screen device; obtaining, by the second screen device, search results from a search engine using the modified search query; and presenting, by the second screen device, the obtained search results on a second screen associated with the second screen device. 10. The method of claim 9, wherein detecting that the video asset is being streamed to the first screen device associated with the second screen device includes:
instructing the first screen device to stream the video asset; and receiving an indication from the first screen device that the video asset is being streamed to the first screen device. 11. The method of claim 9, wherein detecting that the video asset is being streamed to the first screen device associated with the second screen device includes:
detecting the first screen device; and requesting, from the first screen device, information identifying the video asset, in response to detecting the first screen device. 12. The method of claim 9, wherein detecting that the video asset is being streamed to the first screen device associated with the second screen device includes:
detecting the first screen device; determining that the first screen device is playing the video asset; and capturing an audio sample from the video asset being played by the first screen device. 13. The method of claim 9, wherein modifying the search query includes:
receiving, from the search engine, a list of keywords associated with the video asset; receiving a selection of one or more keywords from the list of keywords via an input device associated with the second screen device; and adding the selected one or more keywords to the search query. 14. The method of claim 9, wherein modifying the search query includes:
adding information identifying the video asset to the search query. 15. The method of claim 14, further comprising:
adding information associated with a current video segment of the video asset to the search query. 16. The method of claim 9, wherein obtaining search results from a search engine using the modified search query includes:
receiving one or more advertisements in connection with the search results; and wherein presenting the obtained search results on a second screen associated with the second screen device includes: presenting the received one or more advertisements on the second screen in connection with the obtained search results. 17. The method of claim 9, further comprising:
detecting activation of a message composition interface; obtaining a list of keywords associated with the video asset; modifying an auto-completion dictionary, associated with the message composition interface, based on the obtained list of keywords; and applying the modified auto-completion dictionary to the message composition interface. 18. A computer device comprising:
logic configured to:
receive a search query from a second screen device;
determine that a video asset is being streamed to a first screen device;
modify the search query based on one or more keywords associated with the video asset, based on determining that the video asset is being streamed to the first screen device;
obtain search results based on the modified search query; and
provide the obtained search results to the second screen device. 19. The computer device of claim 18, wherein, when modifying the search query based on one or more keywords associated with the video asset, the logic is further configured to:
send a list of keywords associated with the video asset to the second screen device; receive, from the second screen device, a selection of at least one keyword from the sent list of keywords; and add the selected at least one keyword to the search query. 20. The computer device of claim 18, wherein the logic is further configured to determine the one or more keywords associated with the video asset based on at least one of:
metadata associated with the video asset; historical search data associated with the video asset; web pages associated with the video asset; or content extracted from the video asset. | A method, performed by a computer device, may include receiving a search query from a second screen device and determining that a video asset is being streamed to a first screen device associated with the second screen device. The may further include modifying the search query based on one or more keywords associated with the video asset, based on determining that the video asset is being streamed to the first screen device; obtaining search results based on the modified search query; and providing the obtained search results to the second screen device.1. A method, performed by a computer device, the method comprising:
receiving, by the computer device, a search query from a second screen device; determining, by the computer device, that a video asset is being streamed to a first screen device associated with the second screen device; modifying, by the computer device, the search query based on one or more keywords associated with the video asset, based on determining that the video asset is being streamed to the first screen device; obtaining, by the computer device, search results based on the modified search query; and providing, by the computer device, the obtained search results to the second screen device. 2. The method of claim 1, wherein modifying the search query based on one or more keywords associated with the video asset includes:
sending a list of keywords associated with the video asset to the second screen device; receiving, from the second screen device, a selection of at least one keyword from the sent list of keywords; and adding the selected at least one keyword to the search query. 3. The method of claim 1, wherein modifying the search query based on one or more keywords associated with the video asset includes:
determining that a particular keyword, included in the received search query, is classified in multiple categories; and selecting a particular one of the multiple categories for the particular keyword based on the video asset. 4. The method of claim 1, wherein modifying the search query based on one or more keywords associated with the video asset includes:
determining that a particular keyword, included in the received search query, is associated with a refinement keyword associated with the video asset; and replacing the particular keyword with the refinement keyword. 5. The method of claim 1, further comprising:
determining a current video segment of the video asset being streamed to the first screen device; and selecting the one or more keywords based on the current video segment. 6. The method of claim 1, further comprising:
selecting one or more advertisements based on the one or more keywords associated with the video asset; and providing the one or more advertisements to the second screen device in connection with the obtained search results. 7. The method of claim 1, further comprising:
modifying the search results based on a measure of relevance to the video asset. 8. The method of claim 1, further comprising:
determining the one or more keywords associated with the video asset based on at least one of: metadata associated with the video asset; historical search data associated with the video asset; web pages associated with the video asset; or content extracted from the video asset. 9. A method, performed by a second screen device, the method comprising:
detecting, by the second screen device, that a video asset is being streamed to a first screen device associated with the second screen device; receiving, by the second screen device, a request to execute a search query; modifying, by the second screen device, the search query based on detecting that the video asset is being streamed to the first screen device; obtaining, by the second screen device, search results from a search engine using the modified search query; and presenting, by the second screen device, the obtained search results on a second screen associated with the second screen device. 10. The method of claim 9, wherein detecting that the video asset is being streamed to the first screen device associated with the second screen device includes:
instructing the first screen device to stream the video asset; and receiving an indication from the first screen device that the video asset is being streamed to the first screen device. 11. The method of claim 9, wherein detecting that the video asset is being streamed to the first screen device associated with the second screen device includes:
detecting the first screen device; and requesting, from the first screen device, information identifying the video asset, in response to detecting the first screen device. 12. The method of claim 9, wherein detecting that the video asset is being streamed to the first screen device associated with the second screen device includes:
detecting the first screen device; determining that the first screen device is playing the video asset; and capturing an audio sample from the video asset being played by the first screen device. 13. The method of claim 9, wherein modifying the search query includes:
receiving, from the search engine, a list of keywords associated with the video asset; receiving a selection of one or more keywords from the list of keywords via an input device associated with the second screen device; and adding the selected one or more keywords to the search query. 14. The method of claim 9, wherein modifying the search query includes:
adding information identifying the video asset to the search query. 15. The method of claim 14, further comprising:
adding information associated with a current video segment of the video asset to the search query. 16. The method of claim 9, wherein obtaining search results from a search engine using the modified search query includes:
receiving one or more advertisements in connection with the search results; and wherein presenting the obtained search results on a second screen associated with the second screen device includes: presenting the received one or more advertisements on the second screen in connection with the obtained search results. 17. The method of claim 9, further comprising:
detecting activation of a message composition interface; obtaining a list of keywords associated with the video asset; modifying an auto-completion dictionary, associated with the message composition interface, based on the obtained list of keywords; and applying the modified auto-completion dictionary to the message composition interface. 18. A computer device comprising:
logic configured to:
receive a search query from a second screen device;
determine that a video asset is being streamed to a first screen device;
modify the search query based on one or more keywords associated with the video asset, based on determining that the video asset is being streamed to the first screen device;
obtain search results based on the modified search query; and
provide the obtained search results to the second screen device. 19. The computer device of claim 18, wherein, when modifying the search query based on one or more keywords associated with the video asset, the logic is further configured to:
send a list of keywords associated with the video asset to the second screen device; receive, from the second screen device, a selection of at least one keyword from the sent list of keywords; and add the selected at least one keyword to the search query. 20. The computer device of claim 18, wherein the logic is further configured to determine the one or more keywords associated with the video asset based on at least one of:
metadata associated with the video asset; historical search data associated with the video asset; web pages associated with the video asset; or content extracted from the video asset. | 2,400 |
8,915 | 8,915 | 15,849,924 | 2,426 | Novel tools and techniques are provided for implementing a distributed computing mesh, and, more particularly, for implementing a distributed computing mesh using a hierarchical framework to distribute workload across multiple computing nodes. In various embodiments, a hierarchical distributed computing mesh might be implemented using a plurality of network nodes. A first control node may assign at least one first network node as at least one second control node. The second control node might receive a computing task from the first control node. The second control node might designate additional network nodes to process one or more portions of the computing task. The second control node may then divide the computing task and send the one or more portions of the computing task to the additional network nodes for processing. The second control node may receive one or more processed portions of the computing task from the additional network nodes. | 1. A method, comprising:
assigning, with a first control node, at least one first network node as at least one second control node; receiving, with the at least one second control node, a computing task from the first control node, wherein the computing task is a portion of a computational problem; determining, with the at least one second control node, an amount of computing power necessary to process the computing task; designating, with the at least one second control node, one or more additional network nodes to process one or more portions of the computing task, based at least in part on the determined amount of computing power; sending, with the at least one second control node, the one or more portions of the computing task to the one or more additional network nodes for processing; and receiving, with the at least one second control node and from the one or more additional network nodes, one or more processed portions of the computing task. 2. The method of claim 1, further comprising:
combining, with the at least one second control node, the one or more processed portions of the computing task to form a completed computing task; and sending, with the at least one second control node, the completed computing task to the first control node. 3. The method of claim 1, wherein the first control node is a master control node. 4. The method of claim 3, further comprising:
assigning, with the master control node, at least two first network nodes to be at least two second control nodes; combining, with each of the at least two second control nodes, the one or more portions of the computing task to form a completed computing task; and sending, with each of the at least two second control node, the completed computing task to the master control node; and combining, with the master control node, the completed computing tasks that are received from the at least two second control nodes, to form a completed computational problem. 5. The method of claim 1, wherein the first control node is at least one of a master control node or another intermediary control node. 6. The method of claim 1, further comprising:
assigning, with the at least one second control node, the one or more additional network nodes to be one or more additional intermediary control nodes. 7. The method of claim 1, wherein at least one of the first control node or the at least one second control node is one of a residential gateway, a business gateway, or a virtual gateway. 8. The method of claim 7, further comprising:
determining, with one of the residential gateway, the business gateway, or the virtual gateway, an amount of processing power available in a local area network; and based on a determination that the amount of processing power available in the local area network is insufficient to complete the computing task, designating, with one of the residential gateway, the business gateway, or the virtual gateway, at least one of one or more additional control nodes or one or more supplemental network nodes located in the service provider network to complete the computing task. 9. The method of claim 1, wherein the one or more additional network nodes are at least one of residential gateways, business gateways, or virtual gateways. 10. The method of claim 1, wherein the one or more additional network nodes are consumer grade equipment, wherein the consumer grade equipment are each at least one of a desktop computer, a tablet computer, a laptop computer, a handheld computer, an Internet-enabled mobile telephone, a personal digital assistant, a smart watch, or a video game console. 11. The method of claim 10, wherein the one or more additional network nodes are two different types of consumer grade equipment. 12. The method of claim 1, wherein the at least one second control node designates the one or more additional network nodes to process one or more portions of the computing task based at least in part on proximity of the one or more additional network nodes to the at least one second control node. 13. The method of claim 12, wherein the proximity of the one or more additional network nodes is determined based at least in part on at least one of logical proximity of the one or more additional network nodes to the at least one second control node or physical proximity of the one or more additional network nodes to the at least one second control node. 14. The method of claim 1, further comprising:
receiving, with the at least one second control node and from the one or more additional network nodes, information associated with the one or more additional network nodes, wherein the information includes information regarding processing power of the one or more additional network nodes; and determining, with the at least one second control node and based on the information received from the one or more additional network nodes, a number of the one or more additional network nodes necessary to complete the computing task. 15. An apparatus, comprising:
a first network node, wherein the first network node is assigned as an intermediary control node by a first control node, the intermediary control node comprising:
at least one processor; and
a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the intermediary control node to:
receive a computing task from the first control node, wherein the computing task is a portion of a computational problem;
determine an amount of computing power necessary to process the computing task;
designate one or more additional network nodes to process one or more portions of the computing task, based at least in part on the determined amount of computing power;
send the one or more portions of the computing task to the one or more additional network nodes for processing; and
receive, from the one or more additional network nodes, one or more processed portions of the computing task. 16. The apparatus of claim 15, wherein the set of instructions, when executed by the at least one processor, further causes the intermediary control node to:
combine the one or more processed portions of the computing task to form a completed computing task; and send the completed computing task to the first control node. 17. The apparatus of claim 15, wherein the set of instructions, when executed by the at least one processor, further causes the intermediary control node to:
assign at least one network node of the one or more additional network nodes to be an additional control node. 18. A system, comprising:
at least one first network node, wherein the at least one first network node is assigned as an intermediary control node by a first control node, each intermediary control node comprising:
at least one first processor; and
a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the intermediary control node to:
receive a computing task from the first control node, wherein the computing task is a portion of a computational problem;
determine an amount of computing power necessary to process the computing task;
designate one or more additional network nodes to process one or more portions of the computing task, based at least in part on the determined amount of computing power;
send the one or more portions of the computing task to the one or more additional network nodes for processing;
receive, from the one or more additional network nodes, one or more processed portions of the computing task; and
combine the one or more processed portions of the computing task to form a processed computing task;
the one or more additional network nodes, each comprising:
at least one second processor; and
a second non-transitory computer readable medium communicatively coupled to the at least one second processor, the second non-transitory computer readable medium having stored thereon computer software comprising a second set of instructions that, when executed by the at least one second processor, causes the additional network node to:
receive, from the at least one intermediary control node, one or more portions of the computing task; and
process the one or more portions of the computing task; and
send the one or more processed portions of the computing task to the at least one intermediary control node. 19. The system of claim 18, further comprising:
the first control node, comprising:
at least one third processor; and
a third non-transitory computer readable medium communicatively coupled to the at least one third processor, the third non-transitory computer readable medium having stored thereon computer software comprising a third set of instructions that, when executed by the at least one third processor, causes the first control node to:
assign the at least one first network node as the at least one intermediary control node;
send the computing task to the at least one intermediary control node, wherein the computing task is a portion of the computational problem;
receive the processed computing task from the at least one intermediary control node; and
combine the processed computing task from the at least one intermediary control node with additional processed computing tasks to form a completed computing task. 20. The system of claim 18, wherein the system has at least two intermediary control nodes, wherein each intermediary control node designates the one or more additional network nodes to process one or more portions of the computing task based at least in part on proximity of the one or more additional network nodes to the intermediary control node, and wherein each intermediary control node designates different network nodes. | Novel tools and techniques are provided for implementing a distributed computing mesh, and, more particularly, for implementing a distributed computing mesh using a hierarchical framework to distribute workload across multiple computing nodes. In various embodiments, a hierarchical distributed computing mesh might be implemented using a plurality of network nodes. A first control node may assign at least one first network node as at least one second control node. The second control node might receive a computing task from the first control node. The second control node might designate additional network nodes to process one or more portions of the computing task. The second control node may then divide the computing task and send the one or more portions of the computing task to the additional network nodes for processing. The second control node may receive one or more processed portions of the computing task from the additional network nodes.1. A method, comprising:
assigning, with a first control node, at least one first network node as at least one second control node; receiving, with the at least one second control node, a computing task from the first control node, wherein the computing task is a portion of a computational problem; determining, with the at least one second control node, an amount of computing power necessary to process the computing task; designating, with the at least one second control node, one or more additional network nodes to process one or more portions of the computing task, based at least in part on the determined amount of computing power; sending, with the at least one second control node, the one or more portions of the computing task to the one or more additional network nodes for processing; and receiving, with the at least one second control node and from the one or more additional network nodes, one or more processed portions of the computing task. 2. The method of claim 1, further comprising:
combining, with the at least one second control node, the one or more processed portions of the computing task to form a completed computing task; and sending, with the at least one second control node, the completed computing task to the first control node. 3. The method of claim 1, wherein the first control node is a master control node. 4. The method of claim 3, further comprising:
assigning, with the master control node, at least two first network nodes to be at least two second control nodes; combining, with each of the at least two second control nodes, the one or more portions of the computing task to form a completed computing task; and sending, with each of the at least two second control node, the completed computing task to the master control node; and combining, with the master control node, the completed computing tasks that are received from the at least two second control nodes, to form a completed computational problem. 5. The method of claim 1, wherein the first control node is at least one of a master control node or another intermediary control node. 6. The method of claim 1, further comprising:
assigning, with the at least one second control node, the one or more additional network nodes to be one or more additional intermediary control nodes. 7. The method of claim 1, wherein at least one of the first control node or the at least one second control node is one of a residential gateway, a business gateway, or a virtual gateway. 8. The method of claim 7, further comprising:
determining, with one of the residential gateway, the business gateway, or the virtual gateway, an amount of processing power available in a local area network; and based on a determination that the amount of processing power available in the local area network is insufficient to complete the computing task, designating, with one of the residential gateway, the business gateway, or the virtual gateway, at least one of one or more additional control nodes or one or more supplemental network nodes located in the service provider network to complete the computing task. 9. The method of claim 1, wherein the one or more additional network nodes are at least one of residential gateways, business gateways, or virtual gateways. 10. The method of claim 1, wherein the one or more additional network nodes are consumer grade equipment, wherein the consumer grade equipment are each at least one of a desktop computer, a tablet computer, a laptop computer, a handheld computer, an Internet-enabled mobile telephone, a personal digital assistant, a smart watch, or a video game console. 11. The method of claim 10, wherein the one or more additional network nodes are two different types of consumer grade equipment. 12. The method of claim 1, wherein the at least one second control node designates the one or more additional network nodes to process one or more portions of the computing task based at least in part on proximity of the one or more additional network nodes to the at least one second control node. 13. The method of claim 12, wherein the proximity of the one or more additional network nodes is determined based at least in part on at least one of logical proximity of the one or more additional network nodes to the at least one second control node or physical proximity of the one or more additional network nodes to the at least one second control node. 14. The method of claim 1, further comprising:
receiving, with the at least one second control node and from the one or more additional network nodes, information associated with the one or more additional network nodes, wherein the information includes information regarding processing power of the one or more additional network nodes; and determining, with the at least one second control node and based on the information received from the one or more additional network nodes, a number of the one or more additional network nodes necessary to complete the computing task. 15. An apparatus, comprising:
a first network node, wherein the first network node is assigned as an intermediary control node by a first control node, the intermediary control node comprising:
at least one processor; and
a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the intermediary control node to:
receive a computing task from the first control node, wherein the computing task is a portion of a computational problem;
determine an amount of computing power necessary to process the computing task;
designate one or more additional network nodes to process one or more portions of the computing task, based at least in part on the determined amount of computing power;
send the one or more portions of the computing task to the one or more additional network nodes for processing; and
receive, from the one or more additional network nodes, one or more processed portions of the computing task. 16. The apparatus of claim 15, wherein the set of instructions, when executed by the at least one processor, further causes the intermediary control node to:
combine the one or more processed portions of the computing task to form a completed computing task; and send the completed computing task to the first control node. 17. The apparatus of claim 15, wherein the set of instructions, when executed by the at least one processor, further causes the intermediary control node to:
assign at least one network node of the one or more additional network nodes to be an additional control node. 18. A system, comprising:
at least one first network node, wherein the at least one first network node is assigned as an intermediary control node by a first control node, each intermediary control node comprising:
at least one first processor; and
a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the intermediary control node to:
receive a computing task from the first control node, wherein the computing task is a portion of a computational problem;
determine an amount of computing power necessary to process the computing task;
designate one or more additional network nodes to process one or more portions of the computing task, based at least in part on the determined amount of computing power;
send the one or more portions of the computing task to the one or more additional network nodes for processing;
receive, from the one or more additional network nodes, one or more processed portions of the computing task; and
combine the one or more processed portions of the computing task to form a processed computing task;
the one or more additional network nodes, each comprising:
at least one second processor; and
a second non-transitory computer readable medium communicatively coupled to the at least one second processor, the second non-transitory computer readable medium having stored thereon computer software comprising a second set of instructions that, when executed by the at least one second processor, causes the additional network node to:
receive, from the at least one intermediary control node, one or more portions of the computing task; and
process the one or more portions of the computing task; and
send the one or more processed portions of the computing task to the at least one intermediary control node. 19. The system of claim 18, further comprising:
the first control node, comprising:
at least one third processor; and
a third non-transitory computer readable medium communicatively coupled to the at least one third processor, the third non-transitory computer readable medium having stored thereon computer software comprising a third set of instructions that, when executed by the at least one third processor, causes the first control node to:
assign the at least one first network node as the at least one intermediary control node;
send the computing task to the at least one intermediary control node, wherein the computing task is a portion of the computational problem;
receive the processed computing task from the at least one intermediary control node; and
combine the processed computing task from the at least one intermediary control node with additional processed computing tasks to form a completed computing task. 20. The system of claim 18, wherein the system has at least two intermediary control nodes, wherein each intermediary control node designates the one or more additional network nodes to process one or more portions of the computing task based at least in part on proximity of the one or more additional network nodes to the intermediary control node, and wherein each intermediary control node designates different network nodes. | 2,400 |
8,916 | 8,916 | 14,635,494 | 2,433 | A client computer that is connectable to a host computer by a network, includes a communication part to communicate with the host computer; a user input part; a system part to perform a function depending on an application; and a controller to control the system part to be put into a locking state to stop performing operations input by a user from the user input part if a locking signal is received from the host computer through the communication part, and to control the communication part to unlock the locking state if an unlocking signal is received from the host computer through the communication part. | 1. An apparatus comprising:
communication circuitry; and a processor operatively coupled with the communication circuitry, the processor configured to:
receive, via the communication circuitry, an instruction from an electronic device external to the apparatus; and
change an operation state related to the apparatus from an unlocked state to a locked state based at least in part on the receiving of the instruction. 2. The apparatus of claim 1, wherein the processor is configured to:
receive authentication information corresponding to a user from the electronic device, or via at least one sensor operatively coupled with the processor; and change the operation state from the locked state to the unlocked state based at least in part on a determination that the authentication information matches another authentication information stored in the apparatus. 3. The apparatus of claim 2, wherein the processor is configured to:
refrain from changing the operation state from the locked state to the unlocked state based at least in part on a determination that the authentication information does not match the other authentication information. 4. The apparatus of claim 2, wherein the authentication information is to be received as at least a part of the instruction, or separately from the instruction. 5. The apparatus of claim 2, wherein the authentication information comprises a password. 6. The apparatus of claim 2, further comprising:
a memory operatively coupled with the processor and configured to store the authentication information or the other authentication information. 7. The apparatus of claim 1, wherein the processor is configured to:
receive another instruction from the electronic device or another electronic device; and change the operation state from the locked state to the unlocked state based at least in part on the receiving of the other instruction. 8. The apparatus of claim 7, wherein the processor is configured to:
refrain from changing the operation state from the locked state to the unlocked state based at least in part on a determination that the other instruction corresponds to a lock instruction. 9. The apparatus of claim 1, wherein the process is configured to:
present a notification corresponding to the locked state. 10. The apparatus of claim 9, wherein the notification comprises at least one of a sound or a light signal. 11. An apparatus comprising:
communication circuitry; and a processor operatively coupled with the communication circuitry, the processor configured to:
select at least one electronic device from a plurality of electronic devices external to the apparatus as a target device to remotely control at least one function thereof; and
transmit an instruction to the at least one electronic device such that an operation state of the at least one electronic device can be changed from an unlocked state to a locked state based at least in part on the instruction. 12. The apparatus of claim 11, wherein the processor is configured to:
transmit another instruction to the at least one electronic device such that the operation state can be changed from the locked state to the unlocked state based at least in part on the other instruction. 13. The apparatus of claim 11, wherein the processor is configured to:
transmit authentication information to the at least one electronic device as at least a part of the instruction. 14. A method comprising:
receiving, at an electronic device, an instruction from another electronic device external to the electronic device; and changing an operation state related to the apparatus from an unlocked state to a locked state based at least in part on the receiving of the instruction. 15. The method of claim 14, wherein the changing comprises:
presenting an indication indicating that the operation state has been changed. 16. The method of claim 14, wherein the changing comprising:
receiving authentication information corresponding to a user as least a part of the instruction, or separately from the instruction. 17. The method of claim 16, wherein the changing comprises:
comparing the authentication information with another authentication information stored at the electronic device. 18. The method of claim 17, further comprising:
refraining from changing the operation state from the unlocked state to the locked state based at least in part on a determination that the authentication information does not match the other authentication information. 19. The method of claim 14, further comprising:
receiving another instruction from the other electronic device; and changing the operation state from the lock stated to the unlocked state based at least in part on the receiving of the other instruction. 20. The method of claim 14, further comprising:
selecting, by the other electronic device, the electronic device from a plurality of devices as a target device to remotely control at least one function thereof. | A client computer that is connectable to a host computer by a network, includes a communication part to communicate with the host computer; a user input part; a system part to perform a function depending on an application; and a controller to control the system part to be put into a locking state to stop performing operations input by a user from the user input part if a locking signal is received from the host computer through the communication part, and to control the communication part to unlock the locking state if an unlocking signal is received from the host computer through the communication part.1. An apparatus comprising:
communication circuitry; and a processor operatively coupled with the communication circuitry, the processor configured to:
receive, via the communication circuitry, an instruction from an electronic device external to the apparatus; and
change an operation state related to the apparatus from an unlocked state to a locked state based at least in part on the receiving of the instruction. 2. The apparatus of claim 1, wherein the processor is configured to:
receive authentication information corresponding to a user from the electronic device, or via at least one sensor operatively coupled with the processor; and change the operation state from the locked state to the unlocked state based at least in part on a determination that the authentication information matches another authentication information stored in the apparatus. 3. The apparatus of claim 2, wherein the processor is configured to:
refrain from changing the operation state from the locked state to the unlocked state based at least in part on a determination that the authentication information does not match the other authentication information. 4. The apparatus of claim 2, wherein the authentication information is to be received as at least a part of the instruction, or separately from the instruction. 5. The apparatus of claim 2, wherein the authentication information comprises a password. 6. The apparatus of claim 2, further comprising:
a memory operatively coupled with the processor and configured to store the authentication information or the other authentication information. 7. The apparatus of claim 1, wherein the processor is configured to:
receive another instruction from the electronic device or another electronic device; and change the operation state from the locked state to the unlocked state based at least in part on the receiving of the other instruction. 8. The apparatus of claim 7, wherein the processor is configured to:
refrain from changing the operation state from the locked state to the unlocked state based at least in part on a determination that the other instruction corresponds to a lock instruction. 9. The apparatus of claim 1, wherein the process is configured to:
present a notification corresponding to the locked state. 10. The apparatus of claim 9, wherein the notification comprises at least one of a sound or a light signal. 11. An apparatus comprising:
communication circuitry; and a processor operatively coupled with the communication circuitry, the processor configured to:
select at least one electronic device from a plurality of electronic devices external to the apparatus as a target device to remotely control at least one function thereof; and
transmit an instruction to the at least one electronic device such that an operation state of the at least one electronic device can be changed from an unlocked state to a locked state based at least in part on the instruction. 12. The apparatus of claim 11, wherein the processor is configured to:
transmit another instruction to the at least one electronic device such that the operation state can be changed from the locked state to the unlocked state based at least in part on the other instruction. 13. The apparatus of claim 11, wherein the processor is configured to:
transmit authentication information to the at least one electronic device as at least a part of the instruction. 14. A method comprising:
receiving, at an electronic device, an instruction from another electronic device external to the electronic device; and changing an operation state related to the apparatus from an unlocked state to a locked state based at least in part on the receiving of the instruction. 15. The method of claim 14, wherein the changing comprises:
presenting an indication indicating that the operation state has been changed. 16. The method of claim 14, wherein the changing comprising:
receiving authentication information corresponding to a user as least a part of the instruction, or separately from the instruction. 17. The method of claim 16, wherein the changing comprises:
comparing the authentication information with another authentication information stored at the electronic device. 18. The method of claim 17, further comprising:
refraining from changing the operation state from the unlocked state to the locked state based at least in part on a determination that the authentication information does not match the other authentication information. 19. The method of claim 14, further comprising:
receiving another instruction from the other electronic device; and changing the operation state from the lock stated to the unlocked state based at least in part on the receiving of the other instruction. 20. The method of claim 14, further comprising:
selecting, by the other electronic device, the electronic device from a plurality of devices as a target device to remotely control at least one function thereof. | 2,400 |
8,917 | 8,917 | 14,841,737 | 2,448 | Techniques disclosed herein provide an approach for identifying application dependencies in a hybrid environment in which one or more applications run in operating system (OS)-less containers. One embodiment provides a computer-implemented method that includes monitoring network traffic at one or more host computer systems, wherein OS-less containers run in at least one of the host computer systems. The method further includes monitoring network traffic at virtual bridges to which the OS-less containers are attached, and identifying network dependencies based on the monitored network traffic at the host computer systems and the monitored network traffic at the virtual bridges. In addition, the method includes determining the application dependencies based on the identified network dependencies. | 1. A computer-implemented method of identifying application dependencies in a hybrid environment in which one or more applications run in operating system (OS)-less containers, comprising:
monitoring network traffic at one or more host computer systems, wherein OS-less containers nm in at least one of the host computer systems; monitoring network traffic at virtual bridges to which the OS-less containers are attached; identifying network dependencies based on the monitored network traffic at the host computer systems and the monitored network traffic at the virtual bridges; and determining the application dependencies based on the identified network dependencies. 2. The method of claim 1,
wherein determining the application dependencies includes generating a hash map which has from internet protocol (IP) address, to IP address, and port number as keys and applications as values, and wherein the dependency of a first application on a second application is identified. When the first and second applications are associated With the same key in the hash map. 3. The method of claim 1, wherein the network traffic at the host computer systems and the network traffic at the virtual bridges are monitored via agents registered to the host computer systems. 4. The method of claim 3, wherein the agents further identify the network dependencies and transmit information on the connections to a central service which determines the application dependencies. 5. The method of claim 1, wherein monitoring the network traffic at the host computer systems includes:
identifying services running in the host Computer Systems; identifying a listening port for each of the services; and monitoring incoming and outgoing. connections associated with the identified services. 6. The method of claim 5, wherein monitoring the network traffic at the virtual bridges includes:
identifier OS-less container services miming in the host computer systems; for each of the OS-less Container services:
identifying an external port used on the host computer to accept requests from the OS-less container service and an internal port used by the OS-less container to process the requests, and
obtaining an assigned local address for the OS-less container service; and
capturing network packet details from the virtual bridges using Transmission Control Protocol (TCP) dumps. 7. The method of claim 1, wherein at least one of the host computer systems is a virtual machine. 8. The method of claim 1, further comprising, displaying the determined application dependencies to a user via a user interface. 9. A non-transitory computer-readable storage medium containing a program which, when executed by one or more processors, performs operations for identifying application dependencies in a hybrid environment in which one or more applications run in operating system (OS)-less containers, the operations comprising:
monitoring network traffic at one or more host computer systems, wherein OS-less containers run in at least one of the host computer systems; monitoring network traffic at virtual bridges to Which the OS-less containers are attached; identifying network dependencies based on the monitored network traffic at the host computer systems and the monitored network traffic at the virtual bridges; and determining the application dependencies based on the identified network dependencies. 10. The computer-readable storage medium of claim 9,
wherein determining the application dependencies includes generating a hash map which has from interne protocol (LP) address, to IP address, and port number as keys and applications as values, and wherein the dependency of a first application on a second application is identified when the first and second applications are associated with the same key in the hash map. 11. The computer-readable storage medium of claim 9, wherein the network traffic at the host computer systems and the network traffic at the virtual bridges are monitored via agents registered to the host computer systems. 12. The computer-readable storage medium of claim 11, wherein the agents further identify the network dependencies and transmit information on the connections to a central service which determines the application dependencies. 13. The computer-readable storage medium of claim 9, wherein monitoring the network traffic at the host computer systems includes:
identifying services running in the host computer systems; identifying a listening port for each of the services; and monitoring incoming and outgoing connections associated with the identified services. 14. The computer-readable storage medium of claim 13, wherein monitoring the network traffic at the virtual bridges includes:
identifier OS-less container services running in the host computer systems; for each of the OS-less container services:
identifying an external port used on the host computer to accept requests from the OS-less container service and an internal port used by the OS-less container to process the requests, and
obtaining an assigned local address for the OS-less container service: and
capturing network packet details from the virtual bridges using Transmission Control Protocol (TCP) dumps. 15. The computer-readable storage medium of claim 9, wherein at least one of the host computer systems is a virtual machine. 16. The computer-readable storage medium of claim 9, the operations farther comprising, displaying the determined application dependencies to a user via a user interface. 17. A system, comprising:
a processor; and a memory, wherein the memory includes a program executable in the processor to perform operations for identifying application dependencies in a hybrid environment in which one or more applications run in operating system (OS)-less containers, the operations comprising:
monitoring network traffic at one or more host computer systems, wherein OS-less containers run in at least one of the host computer systems;
monitoring network traffic at virtual bridges to which the OS-less containers are attached; and
identifying network dependencies based on the monitored network traffic at the host computer systems and the monitored network traffic at the virtual bridges,
wherein the application dependencies are determined based on the identified network dependencies. 18. The system of claim 17,
wherein determining the application dependencies includes generating a hash map which has from interne protocol (IP) address, to IP address, and port number as keys and applications as values, and wherein the dependency of a first application on a second application is identified. When the first and second applications are associated with the same key in the hash map. 19. The system of claim 17, Wherein the network traffic at the host computer systems and the network traffic at the virtual bridges are monitored via agents registered to the host computer systems. 20. The system of claim 19, wherein the agents further identify the network dependencies and transmit information on the connections to a central service which determines the application dependencies. | Techniques disclosed herein provide an approach for identifying application dependencies in a hybrid environment in which one or more applications run in operating system (OS)-less containers. One embodiment provides a computer-implemented method that includes monitoring network traffic at one or more host computer systems, wherein OS-less containers run in at least one of the host computer systems. The method further includes monitoring network traffic at virtual bridges to which the OS-less containers are attached, and identifying network dependencies based on the monitored network traffic at the host computer systems and the monitored network traffic at the virtual bridges. In addition, the method includes determining the application dependencies based on the identified network dependencies.1. A computer-implemented method of identifying application dependencies in a hybrid environment in which one or more applications run in operating system (OS)-less containers, comprising:
monitoring network traffic at one or more host computer systems, wherein OS-less containers nm in at least one of the host computer systems; monitoring network traffic at virtual bridges to which the OS-less containers are attached; identifying network dependencies based on the monitored network traffic at the host computer systems and the monitored network traffic at the virtual bridges; and determining the application dependencies based on the identified network dependencies. 2. The method of claim 1,
wherein determining the application dependencies includes generating a hash map which has from internet protocol (IP) address, to IP address, and port number as keys and applications as values, and wherein the dependency of a first application on a second application is identified. When the first and second applications are associated With the same key in the hash map. 3. The method of claim 1, wherein the network traffic at the host computer systems and the network traffic at the virtual bridges are monitored via agents registered to the host computer systems. 4. The method of claim 3, wherein the agents further identify the network dependencies and transmit information on the connections to a central service which determines the application dependencies. 5. The method of claim 1, wherein monitoring the network traffic at the host computer systems includes:
identifying services running in the host Computer Systems; identifying a listening port for each of the services; and monitoring incoming and outgoing. connections associated with the identified services. 6. The method of claim 5, wherein monitoring the network traffic at the virtual bridges includes:
identifier OS-less container services miming in the host computer systems; for each of the OS-less Container services:
identifying an external port used on the host computer to accept requests from the OS-less container service and an internal port used by the OS-less container to process the requests, and
obtaining an assigned local address for the OS-less container service; and
capturing network packet details from the virtual bridges using Transmission Control Protocol (TCP) dumps. 7. The method of claim 1, wherein at least one of the host computer systems is a virtual machine. 8. The method of claim 1, further comprising, displaying the determined application dependencies to a user via a user interface. 9. A non-transitory computer-readable storage medium containing a program which, when executed by one or more processors, performs operations for identifying application dependencies in a hybrid environment in which one or more applications run in operating system (OS)-less containers, the operations comprising:
monitoring network traffic at one or more host computer systems, wherein OS-less containers run in at least one of the host computer systems; monitoring network traffic at virtual bridges to Which the OS-less containers are attached; identifying network dependencies based on the monitored network traffic at the host computer systems and the monitored network traffic at the virtual bridges; and determining the application dependencies based on the identified network dependencies. 10. The computer-readable storage medium of claim 9,
wherein determining the application dependencies includes generating a hash map which has from interne protocol (LP) address, to IP address, and port number as keys and applications as values, and wherein the dependency of a first application on a second application is identified when the first and second applications are associated with the same key in the hash map. 11. The computer-readable storage medium of claim 9, wherein the network traffic at the host computer systems and the network traffic at the virtual bridges are monitored via agents registered to the host computer systems. 12. The computer-readable storage medium of claim 11, wherein the agents further identify the network dependencies and transmit information on the connections to a central service which determines the application dependencies. 13. The computer-readable storage medium of claim 9, wherein monitoring the network traffic at the host computer systems includes:
identifying services running in the host computer systems; identifying a listening port for each of the services; and monitoring incoming and outgoing connections associated with the identified services. 14. The computer-readable storage medium of claim 13, wherein monitoring the network traffic at the virtual bridges includes:
identifier OS-less container services running in the host computer systems; for each of the OS-less container services:
identifying an external port used on the host computer to accept requests from the OS-less container service and an internal port used by the OS-less container to process the requests, and
obtaining an assigned local address for the OS-less container service: and
capturing network packet details from the virtual bridges using Transmission Control Protocol (TCP) dumps. 15. The computer-readable storage medium of claim 9, wherein at least one of the host computer systems is a virtual machine. 16. The computer-readable storage medium of claim 9, the operations farther comprising, displaying the determined application dependencies to a user via a user interface. 17. A system, comprising:
a processor; and a memory, wherein the memory includes a program executable in the processor to perform operations for identifying application dependencies in a hybrid environment in which one or more applications run in operating system (OS)-less containers, the operations comprising:
monitoring network traffic at one or more host computer systems, wherein OS-less containers run in at least one of the host computer systems;
monitoring network traffic at virtual bridges to which the OS-less containers are attached; and
identifying network dependencies based on the monitored network traffic at the host computer systems and the monitored network traffic at the virtual bridges,
wherein the application dependencies are determined based on the identified network dependencies. 18. The system of claim 17,
wherein determining the application dependencies includes generating a hash map which has from interne protocol (IP) address, to IP address, and port number as keys and applications as values, and wherein the dependency of a first application on a second application is identified. When the first and second applications are associated with the same key in the hash map. 19. The system of claim 17, Wherein the network traffic at the host computer systems and the network traffic at the virtual bridges are monitored via agents registered to the host computer systems. 20. The system of claim 19, wherein the agents further identify the network dependencies and transmit information on the connections to a central service which determines the application dependencies. | 2,400 |
8,918 | 8,918 | 15,388,337 | 2,447 | Some embodiments provide a non-transitory machine-readable medium stores a program. The program receives, from an application a session identifier associated with a service instance in a plurality of service instances and a service identifier associated with the second service instance. The program further sends a response that includes a collaboration session identifier associated with the collaboration session to the application. The program also receives, from a web browser application the collaboration session identifier. The program further sends the session identifier and the service instance identifier to the web browser application. The program also receives, from the web browser application a request for a bidirectional communication channel for the collaboration session. The request includes the session identifier and the service instance identifier. The program further creates the bidirectional communication channel between the web browser application and the second service instance. | 1. A non-transitory machine-readable medium storing a program executable by at least one processing unit of a computing device, the program comprising sets of instructions for:
receiving, from an application, by a first service instance in a plurality of service instances, a session identifier associated with a second service instance in the plurality of service instances and a service identifier associated with the second service instance; sending, by the first service instance, a response that includes a collaboration session identifier associated with the collaboration session to the application; receiving, from a web browser application, by a third service instance in the plurality of service instances, the collaboration session identifier; sending, by the third service instance, the session identifier and the service instance identifier to the web browser application; receiving, from the web browser application, by the second service instance, a request for a bidirectional communication channel for the collaboration session, the request comprising the session identifier and the service instance identifier; and creating, by the second service instance, the bidirectional communication channel between the web browser application and the second service instance. 2. The non-transitory machine-readable medium of claim 1, wherein the request is a first request, wherein the program further comprises sets of instructions for, before receiving the session identifier:
receiving, from an application, by the second service instance in the plurality of service instances, a second request to start the collaboration session; creating, by the second service instance, the collaboration session; generating, by the second service instance, the session identifier associated with the second service instance; and sending, by the second service instance, a response to the application, the response including the session identifier associated with the second service instance. 3. The non-transitory machine-readable medium of claim 2, wherein the sending and receiving are performed via a load balancer, wherein the load balancer generates the service instance identifier and includes the service instance identifier in the response upon receiving, from the second service instance, the response that is destined for the application. 4. The non-transitory machine-readable medium of claim 1, wherein the sending and receiving are performed via a load balancer, wherein the service instance identifier is used by the load balance to determine to forward the request to the second service instance. 5. The non-transitory machine-readable medium of claim 1, wherein the program further comprises a set of instructions for, in response to receiving the session identifier and the service identifier, storing, by the first service instance, the session identifier and the service identifier for later retrieval. 6. The non-transitory machine-readable medium of claim 1, wherein the program further comprises a set of instructions for communicating, by the second service instance, data associated with the collaboration session via the bidirectional communication channel. 7. The non-transitory machine-readable medium of claim 1, wherein the second service instance and the third service instance are the same service instance in the plurality of service instances. 8. A method comprising:
receiving, from an application, by a first service instance in a plurality of service instances, a session identifier associated with a second service instance in the plurality of service instances and a service identifier associated with the second service instance; sending, by the first service instance, a response that includes a collaboration session identifier associated with the collaboration session to the application; receiving, from a web browser application, by a third service instance in the plurality of service instances, the collaboration session identifier; sending, by the third service instance, the session identifier and the service instance identifier to the web browser application; receiving, from the web browser application, by the second service instance, a request for a bidirectional communication channel for the collaboration session, the request comprising the session identifier and the service instance identifier; and creating, by the second service instance, the bidirectional communication channel between the web browser application and the second service instance. 9. The method of claim 8, wherein the request is a first request, wherein the method further comprises, before receiving the session identifier:
receiving, from an application, by the second service instance in the plurality of service instances, a second request to start the collaboration session; creating, by the second service instance, the collaboration session; generating, by the second service instance, the session identifier associated with the collaboration session; and sending, by the second service instance, a response to the application, the response including the session identifier associated with the collaboration session. 10. The method of claim 9, wherein the sending and receiving are performed via a load balancer, wherein the load balancer generates the service instance identifier and includes the service instance identifier in the response upon receiving, from the second service instance, the response that is destined for the application. 11. The method of claim 8, wherein the sending and receiving are performed via a load balancer, wherein the service instance identifier is used by the load balance to determine to forward the request to the second service instance. 12. The method of claim 8 further comprising, in response to receiving the session identifier and the service identifier, storing, by the first service instance, the session identifier and the service identifier for later retrieval. 13. The method of claim 8 further comprising communicating, by the second service instance, data associated with the collaboration session via the bidirectional communication channel. 14. The method of claim 8, wherein the second service instance and the third service instance are the same service instance in the plurality of service instances. 15. A computing system comprising:
a set of processing units; and a non-transitory computer-readable medium storing instructions that when executed by at least one processing unit in the set of processing units cause the at least one processing unit to: receive, from an application, by a first service instance in a plurality of service instances, a session identifier associated with a second service instance in the plurality of service instances and a service identifier associated with the second service instance; send, by the first service instance, a response that includes a collaboration session identifier associated with the collaboration session to the application; receive, from a web browser application, by a third service instance in the plurality of service instances, the collaboration session identifier; send, by the third service instance, the session identifier and the service instance identifier to the web browser application; receive, from the web browser application, by the second service instance, a request for a bidirectional communication channel for the collaboration session, the request comprising the session identifier and the service instance identifier; and create, by the second service instance, the bidirectional communication channel between the web browser application and the second service instance. 16. The computing system of claim 15, wherein the request is a first request, wherein the instructions further cause the at least one processing unit to, before receiving the session identifier:
receive, from an application, by the second service instance in the plurality of service instances, a second request to start the collaboration session; create, by the second service instance, the collaboration session; generate, by the second service instance, the session identifier associated with the collaboration session; and send, by the second service instance, a response to the application, the response including the session identifier associated with the collaboration session. 17. The computing system of claim 16, wherein the sending and receiving are performed via a load balancer, wherein the load balancer generates the service instance identifier and includes the service instance identifier in the response upon receiving, from the second service instance, the response that is destined for the application. 18. The computing system of claim 15, wherein the sending and receiving are performed via a load balancer, wherein the service instance identifier is used by the load balance to determine to forward the request to the second service instance. 19. The computing system of claim 15, wherein the instructions further cause the at least one processing unit to, in response to receiving the session identifier and the service identifier, store, by the first service instance, the session identifier and the service identifier for later retrieval. 20. The computing system of claim 15, wherein the instructions further cause the at least one processing unit to communicate, by the second service instance, data associated with the collaboration session via the bidirectional communication channel. | Some embodiments provide a non-transitory machine-readable medium stores a program. The program receives, from an application a session identifier associated with a service instance in a plurality of service instances and a service identifier associated with the second service instance. The program further sends a response that includes a collaboration session identifier associated with the collaboration session to the application. The program also receives, from a web browser application the collaboration session identifier. The program further sends the session identifier and the service instance identifier to the web browser application. The program also receives, from the web browser application a request for a bidirectional communication channel for the collaboration session. The request includes the session identifier and the service instance identifier. The program further creates the bidirectional communication channel between the web browser application and the second service instance.1. A non-transitory machine-readable medium storing a program executable by at least one processing unit of a computing device, the program comprising sets of instructions for:
receiving, from an application, by a first service instance in a plurality of service instances, a session identifier associated with a second service instance in the plurality of service instances and a service identifier associated with the second service instance; sending, by the first service instance, a response that includes a collaboration session identifier associated with the collaboration session to the application; receiving, from a web browser application, by a third service instance in the plurality of service instances, the collaboration session identifier; sending, by the third service instance, the session identifier and the service instance identifier to the web browser application; receiving, from the web browser application, by the second service instance, a request for a bidirectional communication channel for the collaboration session, the request comprising the session identifier and the service instance identifier; and creating, by the second service instance, the bidirectional communication channel between the web browser application and the second service instance. 2. The non-transitory machine-readable medium of claim 1, wherein the request is a first request, wherein the program further comprises sets of instructions for, before receiving the session identifier:
receiving, from an application, by the second service instance in the plurality of service instances, a second request to start the collaboration session; creating, by the second service instance, the collaboration session; generating, by the second service instance, the session identifier associated with the second service instance; and sending, by the second service instance, a response to the application, the response including the session identifier associated with the second service instance. 3. The non-transitory machine-readable medium of claim 2, wherein the sending and receiving are performed via a load balancer, wherein the load balancer generates the service instance identifier and includes the service instance identifier in the response upon receiving, from the second service instance, the response that is destined for the application. 4. The non-transitory machine-readable medium of claim 1, wherein the sending and receiving are performed via a load balancer, wherein the service instance identifier is used by the load balance to determine to forward the request to the second service instance. 5. The non-transitory machine-readable medium of claim 1, wherein the program further comprises a set of instructions for, in response to receiving the session identifier and the service identifier, storing, by the first service instance, the session identifier and the service identifier for later retrieval. 6. The non-transitory machine-readable medium of claim 1, wherein the program further comprises a set of instructions for communicating, by the second service instance, data associated with the collaboration session via the bidirectional communication channel. 7. The non-transitory machine-readable medium of claim 1, wherein the second service instance and the third service instance are the same service instance in the plurality of service instances. 8. A method comprising:
receiving, from an application, by a first service instance in a plurality of service instances, a session identifier associated with a second service instance in the plurality of service instances and a service identifier associated with the second service instance; sending, by the first service instance, a response that includes a collaboration session identifier associated with the collaboration session to the application; receiving, from a web browser application, by a third service instance in the plurality of service instances, the collaboration session identifier; sending, by the third service instance, the session identifier and the service instance identifier to the web browser application; receiving, from the web browser application, by the second service instance, a request for a bidirectional communication channel for the collaboration session, the request comprising the session identifier and the service instance identifier; and creating, by the second service instance, the bidirectional communication channel between the web browser application and the second service instance. 9. The method of claim 8, wherein the request is a first request, wherein the method further comprises, before receiving the session identifier:
receiving, from an application, by the second service instance in the plurality of service instances, a second request to start the collaboration session; creating, by the second service instance, the collaboration session; generating, by the second service instance, the session identifier associated with the collaboration session; and sending, by the second service instance, a response to the application, the response including the session identifier associated with the collaboration session. 10. The method of claim 9, wherein the sending and receiving are performed via a load balancer, wherein the load balancer generates the service instance identifier and includes the service instance identifier in the response upon receiving, from the second service instance, the response that is destined for the application. 11. The method of claim 8, wherein the sending and receiving are performed via a load balancer, wherein the service instance identifier is used by the load balance to determine to forward the request to the second service instance. 12. The method of claim 8 further comprising, in response to receiving the session identifier and the service identifier, storing, by the first service instance, the session identifier and the service identifier for later retrieval. 13. The method of claim 8 further comprising communicating, by the second service instance, data associated with the collaboration session via the bidirectional communication channel. 14. The method of claim 8, wherein the second service instance and the third service instance are the same service instance in the plurality of service instances. 15. A computing system comprising:
a set of processing units; and a non-transitory computer-readable medium storing instructions that when executed by at least one processing unit in the set of processing units cause the at least one processing unit to: receive, from an application, by a first service instance in a plurality of service instances, a session identifier associated with a second service instance in the plurality of service instances and a service identifier associated with the second service instance; send, by the first service instance, a response that includes a collaboration session identifier associated with the collaboration session to the application; receive, from a web browser application, by a third service instance in the plurality of service instances, the collaboration session identifier; send, by the third service instance, the session identifier and the service instance identifier to the web browser application; receive, from the web browser application, by the second service instance, a request for a bidirectional communication channel for the collaboration session, the request comprising the session identifier and the service instance identifier; and create, by the second service instance, the bidirectional communication channel between the web browser application and the second service instance. 16. The computing system of claim 15, wherein the request is a first request, wherein the instructions further cause the at least one processing unit to, before receiving the session identifier:
receive, from an application, by the second service instance in the plurality of service instances, a second request to start the collaboration session; create, by the second service instance, the collaboration session; generate, by the second service instance, the session identifier associated with the collaboration session; and send, by the second service instance, a response to the application, the response including the session identifier associated with the collaboration session. 17. The computing system of claim 16, wherein the sending and receiving are performed via a load balancer, wherein the load balancer generates the service instance identifier and includes the service instance identifier in the response upon receiving, from the second service instance, the response that is destined for the application. 18. The computing system of claim 15, wherein the sending and receiving are performed via a load balancer, wherein the service instance identifier is used by the load balance to determine to forward the request to the second service instance. 19. The computing system of claim 15, wherein the instructions further cause the at least one processing unit to, in response to receiving the session identifier and the service identifier, store, by the first service instance, the session identifier and the service identifier for later retrieval. 20. The computing system of claim 15, wherein the instructions further cause the at least one processing unit to communicate, by the second service instance, data associated with the collaboration session via the bidirectional communication channel. | 2,400 |
8,919 | 8,919 | 15,214,849 | 2,439 | A method of operating a mobile device includes displaying a user interface as an image, the user interface being composed of a plurality of widgets, storing a privacy policy identifying at least one of the widgets, capturing a screenshot image corresponding to the screenshot image, excluding the at least one of the widgets from the screenshot image to create a modified screenshot image, and transmitting the modified screenshot image over a network to a monitoring server. | 1. A method of operating a mobile device comprising:
displaying a user interface as an image, said user interface being composed of a plurality of widgets; storing a privacy policy identifying at least one of said widgets; capturing a screenshot image corresponding to said screenshot image; excluding said at least one of said widgets from said screenshot image to create a modified screenshot image; and transmitting said modified screenshot image over a network to a monitoring server. 2. The method of claim 1, further comprising running an application in said mobile device, said application including program instructions causing said mobile device to display said user interface, capture said screenshot image, exclude said at least of said widgets and transmit said modified screenshot image. 3. The method of claim 1, wherein excluding said at least one of said widgets comprises at least one of omitting a portion of said user interface corresponding to said at least one of said widgets from said capture of said screenshot image, occluding a portion of said user interface corresponding to said at least one of said widgets in said capture of said screenshot image, and removing a portion of said user interface corresponding to said at least one of said widgets said capture of said screenshot image. 4. The method of claim 1, further comprising receiving data from a server causing said mobile device to perform one of updating said privacy policy, modifying said privacy policy, and replacing said privacy policy. 5. The method of claim 1, further comprising recording metadata about said at least one of said widgets contemporaneously with said capture of said screenshot image. 6. The method of claim 1, further comprising:
receiving a selection of a widget not identified in said privacy policy; and updating said privacy policy to include said widget not identified in said privacy policy. 7. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, said program instructions executable by a processor to cause the processor to:
display a user interface as an image, said user interface being composed of a plurality of widgets; store a privacy policy identifying at least one of said widgets; capture a screenshot image corresponding to said screenshot image; exclude said at least one of said widgets from said screenshot image to create a modified screenshot image; and transmit said modified screenshot image over a network to a monitoring server. 8. The computer program product of claim 7, wherein said program instructions executable by said processor to cause said processor to exclude said at least one of said widgets from said screenshot image further comprises program instructions executable by said processor to cause said processor to omit a portion of said user interface corresponding to said at least one of said widgets from said capture of said screenshot image. 9. The computer program product of claim 7, wherein said program instructions executable by said processor to cause said processor to exclude said at least one of said widgets from said screenshot image further comprises program instructions executable by said processor to cause said processor to occlude a portion of said user interface corresponding to said at least one of said widgets in said capture of said screenshot image. 10. The computer program product of claim 7, wherein said program instructions executable by said processor to cause said processor to exclude said at least one of said widgets from said screenshot image further comprises program instructions executable by said processor to cause said processor to remove a portion of said user interface corresponding to said at least one of said widgets said capture of said screenshot image. 11. The computer program product of claim 7, further comprising program instructions executable by said processor to cause said processor to receive data from a server updating said privacy policy. 12. The computer program product of claim 7, further comprising program instructions executable by said processor to cause said processor to receive data from a server modifying said privacy policy. 13. The computer program product of claim 7, further comprising program instructions executable by said processor to cause said processor to receive data from a server replacing said privacy policy. 14. The computer program product of claim 7, further comprising program instructions executable by said processor to cause said processor to record metadata about said at least one of said widgets contemporaneously with said capture. 15. The computer program product of claim 7, further comprising program instructions executable by said processor to cause said processor to:
receive a selection of a widget not identified in said privacy policy; and updating said privacy policy to include said widget not identified in said privacy policy. 16. A computer network comprising:
a mobile device running an application capturing and modifying a screenshot image using privacy policy to generate a modified screenshot image; a computer network; and a monitoring server in signal communication with said mobile device over said computer network, wherein said monitoring server provides said privacy policy to said mobile device and receives said modified screenshot image from said mobile device, and wherein said privacy policy identifies a plurality of widgets of a user interface to be excluded from said screenshot image. | A method of operating a mobile device includes displaying a user interface as an image, the user interface being composed of a plurality of widgets, storing a privacy policy identifying at least one of the widgets, capturing a screenshot image corresponding to the screenshot image, excluding the at least one of the widgets from the screenshot image to create a modified screenshot image, and transmitting the modified screenshot image over a network to a monitoring server.1. A method of operating a mobile device comprising:
displaying a user interface as an image, said user interface being composed of a plurality of widgets; storing a privacy policy identifying at least one of said widgets; capturing a screenshot image corresponding to said screenshot image; excluding said at least one of said widgets from said screenshot image to create a modified screenshot image; and transmitting said modified screenshot image over a network to a monitoring server. 2. The method of claim 1, further comprising running an application in said mobile device, said application including program instructions causing said mobile device to display said user interface, capture said screenshot image, exclude said at least of said widgets and transmit said modified screenshot image. 3. The method of claim 1, wherein excluding said at least one of said widgets comprises at least one of omitting a portion of said user interface corresponding to said at least one of said widgets from said capture of said screenshot image, occluding a portion of said user interface corresponding to said at least one of said widgets in said capture of said screenshot image, and removing a portion of said user interface corresponding to said at least one of said widgets said capture of said screenshot image. 4. The method of claim 1, further comprising receiving data from a server causing said mobile device to perform one of updating said privacy policy, modifying said privacy policy, and replacing said privacy policy. 5. The method of claim 1, further comprising recording metadata about said at least one of said widgets contemporaneously with said capture of said screenshot image. 6. The method of claim 1, further comprising:
receiving a selection of a widget not identified in said privacy policy; and updating said privacy policy to include said widget not identified in said privacy policy. 7. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, said program instructions executable by a processor to cause the processor to:
display a user interface as an image, said user interface being composed of a plurality of widgets; store a privacy policy identifying at least one of said widgets; capture a screenshot image corresponding to said screenshot image; exclude said at least one of said widgets from said screenshot image to create a modified screenshot image; and transmit said modified screenshot image over a network to a monitoring server. 8. The computer program product of claim 7, wherein said program instructions executable by said processor to cause said processor to exclude said at least one of said widgets from said screenshot image further comprises program instructions executable by said processor to cause said processor to omit a portion of said user interface corresponding to said at least one of said widgets from said capture of said screenshot image. 9. The computer program product of claim 7, wherein said program instructions executable by said processor to cause said processor to exclude said at least one of said widgets from said screenshot image further comprises program instructions executable by said processor to cause said processor to occlude a portion of said user interface corresponding to said at least one of said widgets in said capture of said screenshot image. 10. The computer program product of claim 7, wherein said program instructions executable by said processor to cause said processor to exclude said at least one of said widgets from said screenshot image further comprises program instructions executable by said processor to cause said processor to remove a portion of said user interface corresponding to said at least one of said widgets said capture of said screenshot image. 11. The computer program product of claim 7, further comprising program instructions executable by said processor to cause said processor to receive data from a server updating said privacy policy. 12. The computer program product of claim 7, further comprising program instructions executable by said processor to cause said processor to receive data from a server modifying said privacy policy. 13. The computer program product of claim 7, further comprising program instructions executable by said processor to cause said processor to receive data from a server replacing said privacy policy. 14. The computer program product of claim 7, further comprising program instructions executable by said processor to cause said processor to record metadata about said at least one of said widgets contemporaneously with said capture. 15. The computer program product of claim 7, further comprising program instructions executable by said processor to cause said processor to:
receive a selection of a widget not identified in said privacy policy; and updating said privacy policy to include said widget not identified in said privacy policy. 16. A computer network comprising:
a mobile device running an application capturing and modifying a screenshot image using privacy policy to generate a modified screenshot image; a computer network; and a monitoring server in signal communication with said mobile device over said computer network, wherein said monitoring server provides said privacy policy to said mobile device and receives said modified screenshot image from said mobile device, and wherein said privacy policy identifies a plurality of widgets of a user interface to be excluded from said screenshot image. | 2,400 |
8,920 | 8,920 | 15,471,526 | 2,447 | Reservation of resources for a service includes receiving a request for resources for a project duration with a start time and an end time; determining if the requested resources are available for the project duration; determining a utilization level of one or more resource provisioning components during a provisioning time prior to the start time of the project; and determining if the one or more resource provisioning components have capacity to handle the provisioning of resources for the request prior to the start time of the project. The one or more resource provisioning components can be reserved for a provisioning time prior to the start time of the project. | 1-20. (canceled) 21. A computer-implemented method for reservation of resources for implementing a service within a distributed networking system, comprising:
receiving a request, indicating a project duration having a start time and an end time, for a resource; determining, using a hardware processor, that the requested resource is available for the project duration; determining a utilization level, during a provisioning time prior to the start time of the project, of at least one resource provisioning component; determining that the at least one resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request; and reserving, for a provisioning time prior to the start time of the project, the at least one resource provisioning component. 22. The method of claim 21, wherein
the determining that the at least one resource provisioning component has capacity includes
determining, upon a determination that a first resource provisioning component does not have capacity to handle provisioning the resource for the request, determining that a second resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request. 23. The method of claim 21, further comprising
estimating a provisioning time needed for the at least one resource provisioning component to provision the requested resource. 24. The method of claim 21, further comprising
estimating a de-provisioning time needed for the at least one resource provisioning component to de-provision the requested resource. 25. The method of claim 21, wherein
the at least one provisioning component is managed through a virtual server on a client machine. 26. A computer hardware system configured to reserve resources for implementing a service within a distributed networking system, comprising:
a hardware processor configured to execute the following operations:
receiving a request, indicating a project duration having a start time and an end time, for a resource;
determining that the requested resource is available for the project duration;
determining a utilization level, during a provisioning time prior to the start time of the project, of at least one resource provisioning component;
determining that the at least one resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request; and
reserving, for a provisioning time prior to the start time of the project, the at least one resource provisioning component. 27. The system of claim 26, wherein
the determining that the at least one resource provisioning component has capacity includes
determining, upon a determination that a first resource provisioning component does not have capacity to handle provisioning the resource for the request, determining that a second resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request. 28. The system of claim 26, wherein the hardware processor is further configured to execute the following operation
estimating a provisioning time needed for the at least one resource provisioning component to provision the requested resource. 29. The system of claim 26, wherein the hardware processor is further configured to execute the following operation
estimating a de-provisioning time needed for the at least one resource provisioning component to de-provision the requested resource. 30. The system of claim 26, wherein
the at least one provisioning component is managed through a virtual server on a client machine. 31. A computer program product, comprising
a computer readable hardware storage device having stored therein program code, the program code, which when executed by a computer hardware system, causes the computer hardware system to perform:
receiving a request, indicating a project duration having a start time and an end time, for a resource;
determining that the requested resource is available for the project duration;
determining a utilization level, during a provisioning time prior to the start time of the project, of at least one resource provisioning component;
determining that the at least one resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request; and
reserving, for a provisioning time prior to the start time of the project, the at least one resource provisioning component. 32. The computer product of claim 31, wherein
the determining that the at least one resource provisioning component has capacity includes
determining, upon a determination that a first resource provisioning component does not have capacity to handle provisioning the resource for the request, determining that a second resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request. 33. The computer product of claim 31, wherein the hardware processor is further configured to execute the following operation
estimating a provisioning time needed for the at least one resource provisioning component to provision the requested resource. 34. The computer product of claim 31, wherein the hardware processor is further configured to execute the following operation
estimating a de-provisioning time needed for the at least one resource provisioning component to de-provision the requested resource. 35. The computer product of claim 31, wherein
the at least one provisioning component is managed through a virtual server on a client machine. | Reservation of resources for a service includes receiving a request for resources for a project duration with a start time and an end time; determining if the requested resources are available for the project duration; determining a utilization level of one or more resource provisioning components during a provisioning time prior to the start time of the project; and determining if the one or more resource provisioning components have capacity to handle the provisioning of resources for the request prior to the start time of the project. The one or more resource provisioning components can be reserved for a provisioning time prior to the start time of the project.1-20. (canceled) 21. A computer-implemented method for reservation of resources for implementing a service within a distributed networking system, comprising:
receiving a request, indicating a project duration having a start time and an end time, for a resource; determining, using a hardware processor, that the requested resource is available for the project duration; determining a utilization level, during a provisioning time prior to the start time of the project, of at least one resource provisioning component; determining that the at least one resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request; and reserving, for a provisioning time prior to the start time of the project, the at least one resource provisioning component. 22. The method of claim 21, wherein
the determining that the at least one resource provisioning component has capacity includes
determining, upon a determination that a first resource provisioning component does not have capacity to handle provisioning the resource for the request, determining that a second resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request. 23. The method of claim 21, further comprising
estimating a provisioning time needed for the at least one resource provisioning component to provision the requested resource. 24. The method of claim 21, further comprising
estimating a de-provisioning time needed for the at least one resource provisioning component to de-provision the requested resource. 25. The method of claim 21, wherein
the at least one provisioning component is managed through a virtual server on a client machine. 26. A computer hardware system configured to reserve resources for implementing a service within a distributed networking system, comprising:
a hardware processor configured to execute the following operations:
receiving a request, indicating a project duration having a start time and an end time, for a resource;
determining that the requested resource is available for the project duration;
determining a utilization level, during a provisioning time prior to the start time of the project, of at least one resource provisioning component;
determining that the at least one resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request; and
reserving, for a provisioning time prior to the start time of the project, the at least one resource provisioning component. 27. The system of claim 26, wherein
the determining that the at least one resource provisioning component has capacity includes
determining, upon a determination that a first resource provisioning component does not have capacity to handle provisioning the resource for the request, determining that a second resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request. 28. The system of claim 26, wherein the hardware processor is further configured to execute the following operation
estimating a provisioning time needed for the at least one resource provisioning component to provision the requested resource. 29. The system of claim 26, wherein the hardware processor is further configured to execute the following operation
estimating a de-provisioning time needed for the at least one resource provisioning component to de-provision the requested resource. 30. The system of claim 26, wherein
the at least one provisioning component is managed through a virtual server on a client machine. 31. A computer program product, comprising
a computer readable hardware storage device having stored therein program code, the program code, which when executed by a computer hardware system, causes the computer hardware system to perform:
receiving a request, indicating a project duration having a start time and an end time, for a resource;
determining that the requested resource is available for the project duration;
determining a utilization level, during a provisioning time prior to the start time of the project, of at least one resource provisioning component;
determining that the at least one resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request; and
reserving, for a provisioning time prior to the start time of the project, the at least one resource provisioning component. 32. The computer product of claim 31, wherein
the determining that the at least one resource provisioning component has capacity includes
determining, upon a determination that a first resource provisioning component does not have capacity to handle provisioning the resource for the request, determining that a second resource provisioning component has capacity, prior to the start time of the project, to handle provisioning the resource for the request. 33. The computer product of claim 31, wherein the hardware processor is further configured to execute the following operation
estimating a provisioning time needed for the at least one resource provisioning component to provision the requested resource. 34. The computer product of claim 31, wherein the hardware processor is further configured to execute the following operation
estimating a de-provisioning time needed for the at least one resource provisioning component to de-provision the requested resource. 35. The computer product of claim 31, wherein
the at least one provisioning component is managed through a virtual server on a client machine. | 2,400 |
8,921 | 8,921 | 15,871,924 | 2,465 | A platform that facilities preservation of user privacy with respect to location-based applications executing on mobile computing devices is described. The platform registers triggers that are set forth by location-based applications, where a trigger specifies one or more rules and includes a location constraint. The platform causes a sensor on the mobile computing device to output location data, and the platform determines if the trigger has been satisfied by comparing the location constraint with the location data. If the trigger is satisfied, the platform transmits a callback to the application. Accordingly, the application does not receive location data from the sensor. | 1. A mobile computing (t rising:
a sensor; a processor; and memory that stores instructions that, when executed by the processor, cause the processor to perform acts comprising:
retrieving, from the sensor on the mobile computing device, location data, wherein the location data is indicative of a current location of the mobile computing device;
based upon the location data, determining whether the location data satisfies a location constraint defined by an application installed on the mobile computing device, wherein the application is prevented from receiving the location data output by the sensor; and
only when it is determined that the location data satisfies the location constraint, transmitting a callback to the application, wherein the callback indicates to the application that the location data satisfies the location constraint. 2. The mobile computing device of claim 1 being a mobile telephone. 3. The mobile computing device of claim 1, the acts further comprising:
prior to requesting the location data from the sensor, receiving the location constraint from the application. 4. The mobile computing device of claim 1, wherein the acts of requesting, determining, and transmitting are performed by an operating system installed on the mobile computing device. 5. The mobile computing device of claim 1, wherein the location data is in a first format, the location constraint is in a second format, the acts further comprising:
responsive to retrieving the location data, converting the location data from the first format to the second format, wherein determining whether the location data satisfies the location constraint is performed after the location data has been converted from the first format to the second format. 6. The mobile computing device of claim 5, wherein the first format is latitude/longitude coordinates, and wherein the second format is an address. 7. The mobile computing device of claim 1, wherein the sensor is a global positioning system sensor. 8. The mobile computing device of claim 1, the acts further comprising:
determining, for each of a plurality of applications installed on the mobile computing device, whether the location data satisfies location constraints respectively defined by the plurality of applications, wherein the applications are prevented from receiving the location data output by the sensor; and transmitting callbacks to each application whose location constraint has been satisfied by the location data while refraining from transmitting callbacks to applications in the plurality of applications whose location constraints have not been satisfied by the location data. 9. The mobile computing device of claim 1, wherein location data is retrieved from the sensor at a frequency that is dependent upon an amount of estimated charge of a battery of the mobile computing device. 10. The mobile computing device of claim 1, wherein the location constraint defines a distance between the mobile computing device and a second location, and further wherein the location data satisfies the location constraint only when the location data indicates that the mobile computing device is within the threshold distance to the second location. 11. The mobile computing device of claim 10, wherein the application is a social networking application, and further wherein the second location is a location of a contact of a user of the mobile computing device in the social networking application. 12. A method executed by a mobile computing device, the method comprising:
requesting location data from a sensor of the mobile computing device, the location data indicative of a current geographic location of the mobile computing device; responsive to requesting the location data, receiving the location data; based upon the location data, determining that the location data satisfies a location constraint defined by an application installed on the mobile computing device, wherein the application is prevented from receiving the location data; and only responsive to determining that the location data satisfies the location constraint, issuing a callback to the application, wherein the callback informs the application that the location data satisfies the location constraint. 13. The method of claim 12, wherein the location constraint identifies a second location, and further wherein determining that the location data satisfies the location constraint comprises:
based upon the location data, comparing the current geographic location of the mobile computing device with the second location, wherein the location data satisfies the location constraint when a distance between the current geographic location of the mobile computing device and the second location is beneath a threshold. 14. The method of claim 12, wherein the location constraint identifies a geographic region, the current geographic location is within the geographic region, and further wherein the callback issued to the application causes the application to assign a tag to content, the tag identifies the geographic region. 15. The method of claim 12, wherein the location data has a first format, the location constraint specifies a second format that is different from the first format, the method further comprising:
subsequent to receiving the location data and prior to determining that the location data satisfies the location constraint, converting the location data such that the location data has the second format. 16. The method of claim 12, wherein the acts of requesting, receiving, determining, and issuing are performed by an operating system of the mobile computing device. 17. The method of claim 12, wherein the mobile computing device is a mobile telephone. 18. The method of claim 12, further comprising:
determining, for each of a plurality of applications installed on the mobile computing device, whether the location data satisfies location constraints respectively defined by the plurality of applications, wherein the applications are prevented from receiving the location data; and issuing callbacks to each application whose location constraint has been satisfied by the location data while refraining from transmitting callbacks to applications in the plurality of applications whose location constraints have not been satisfied by the location data. 19. A computer-readable storage medium of a mobile computing device, the computer-readable storage medium has instructions stored thereon that, when executed by a processor, cause the processor to perform acts comprising:
retrieving, from the sensor on the mobile computing device, location data, wherein the location data is indicative of a current location of the mobile computing device; based upon the location data, determining whether the location data satisfies a location constraint defined by an application installed on the mobile computing device, wherein the application is prevented from receiving the location data output by the sensor; and only when it is determined that the location data satisfies the location constraint, transmitting a callback to the application, wherein the callback indicates to the application that the location data satisfies the location constraint. 20. The computer-readable storage medium of claim 19, wherein the location constraint defines a geographic region, and further wherein the location data satisfies the location constraint when the current location of the mobile computing device is within the geographic region. | A platform that facilities preservation of user privacy with respect to location-based applications executing on mobile computing devices is described. The platform registers triggers that are set forth by location-based applications, where a trigger specifies one or more rules and includes a location constraint. The platform causes a sensor on the mobile computing device to output location data, and the platform determines if the trigger has been satisfied by comparing the location constraint with the location data. If the trigger is satisfied, the platform transmits a callback to the application. Accordingly, the application does not receive location data from the sensor.1. A mobile computing (t rising:
a sensor; a processor; and memory that stores instructions that, when executed by the processor, cause the processor to perform acts comprising:
retrieving, from the sensor on the mobile computing device, location data, wherein the location data is indicative of a current location of the mobile computing device;
based upon the location data, determining whether the location data satisfies a location constraint defined by an application installed on the mobile computing device, wherein the application is prevented from receiving the location data output by the sensor; and
only when it is determined that the location data satisfies the location constraint, transmitting a callback to the application, wherein the callback indicates to the application that the location data satisfies the location constraint. 2. The mobile computing device of claim 1 being a mobile telephone. 3. The mobile computing device of claim 1, the acts further comprising:
prior to requesting the location data from the sensor, receiving the location constraint from the application. 4. The mobile computing device of claim 1, wherein the acts of requesting, determining, and transmitting are performed by an operating system installed on the mobile computing device. 5. The mobile computing device of claim 1, wherein the location data is in a first format, the location constraint is in a second format, the acts further comprising:
responsive to retrieving the location data, converting the location data from the first format to the second format, wherein determining whether the location data satisfies the location constraint is performed after the location data has been converted from the first format to the second format. 6. The mobile computing device of claim 5, wherein the first format is latitude/longitude coordinates, and wherein the second format is an address. 7. The mobile computing device of claim 1, wherein the sensor is a global positioning system sensor. 8. The mobile computing device of claim 1, the acts further comprising:
determining, for each of a plurality of applications installed on the mobile computing device, whether the location data satisfies location constraints respectively defined by the plurality of applications, wherein the applications are prevented from receiving the location data output by the sensor; and transmitting callbacks to each application whose location constraint has been satisfied by the location data while refraining from transmitting callbacks to applications in the plurality of applications whose location constraints have not been satisfied by the location data. 9. The mobile computing device of claim 1, wherein location data is retrieved from the sensor at a frequency that is dependent upon an amount of estimated charge of a battery of the mobile computing device. 10. The mobile computing device of claim 1, wherein the location constraint defines a distance between the mobile computing device and a second location, and further wherein the location data satisfies the location constraint only when the location data indicates that the mobile computing device is within the threshold distance to the second location. 11. The mobile computing device of claim 10, wherein the application is a social networking application, and further wherein the second location is a location of a contact of a user of the mobile computing device in the social networking application. 12. A method executed by a mobile computing device, the method comprising:
requesting location data from a sensor of the mobile computing device, the location data indicative of a current geographic location of the mobile computing device; responsive to requesting the location data, receiving the location data; based upon the location data, determining that the location data satisfies a location constraint defined by an application installed on the mobile computing device, wherein the application is prevented from receiving the location data; and only responsive to determining that the location data satisfies the location constraint, issuing a callback to the application, wherein the callback informs the application that the location data satisfies the location constraint. 13. The method of claim 12, wherein the location constraint identifies a second location, and further wherein determining that the location data satisfies the location constraint comprises:
based upon the location data, comparing the current geographic location of the mobile computing device with the second location, wherein the location data satisfies the location constraint when a distance between the current geographic location of the mobile computing device and the second location is beneath a threshold. 14. The method of claim 12, wherein the location constraint identifies a geographic region, the current geographic location is within the geographic region, and further wherein the callback issued to the application causes the application to assign a tag to content, the tag identifies the geographic region. 15. The method of claim 12, wherein the location data has a first format, the location constraint specifies a second format that is different from the first format, the method further comprising:
subsequent to receiving the location data and prior to determining that the location data satisfies the location constraint, converting the location data such that the location data has the second format. 16. The method of claim 12, wherein the acts of requesting, receiving, determining, and issuing are performed by an operating system of the mobile computing device. 17. The method of claim 12, wherein the mobile computing device is a mobile telephone. 18. The method of claim 12, further comprising:
determining, for each of a plurality of applications installed on the mobile computing device, whether the location data satisfies location constraints respectively defined by the plurality of applications, wherein the applications are prevented from receiving the location data; and issuing callbacks to each application whose location constraint has been satisfied by the location data while refraining from transmitting callbacks to applications in the plurality of applications whose location constraints have not been satisfied by the location data. 19. A computer-readable storage medium of a mobile computing device, the computer-readable storage medium has instructions stored thereon that, when executed by a processor, cause the processor to perform acts comprising:
retrieving, from the sensor on the mobile computing device, location data, wherein the location data is indicative of a current location of the mobile computing device; based upon the location data, determining whether the location data satisfies a location constraint defined by an application installed on the mobile computing device, wherein the application is prevented from receiving the location data output by the sensor; and only when it is determined that the location data satisfies the location constraint, transmitting a callback to the application, wherein the callback indicates to the application that the location data satisfies the location constraint. 20. The computer-readable storage medium of claim 19, wherein the location constraint defines a geographic region, and further wherein the location data satisfies the location constraint when the current location of the mobile computing device is within the geographic region. | 2,400 |
8,922 | 8,922 | 13,755,460 | 2,483 | Embodiments contemplate coding video data by generating a video encoded bitstream that may include reference picture set (RPS) extensions for inter-layer reference pictures, and the extensions may include inter-layer delta Picture Order Counts (POCs). Embodiments may also include signaling that lower layer reference pictures may be available in a lower layer decoder picture buffer (DPB), and/or an aggregate DPB, that may be added to the RPS set of a higher layer. The bitstream may include a signal indicating whether the higher layer RPS may be specified by a lower layer RPS, and the lower layer RPS may be temporal, inter-layer prediction (ILP), or both. | 1. A device for video data coding, configured at least in part, to:
generate a bitstream, the bitstream including:
one or more reference picture set (RPS) extensions indicating one or more inter-layer reference pictures for one or more decoding picture buffers (DPBs), the one or more DPBs respectively associated with one or more video coding layers. 2. The device of claim 1, wherein the device is further configured such that the bitstream is generated to further include at least one indication that a video coding layer of the one or more video coding layers is to serve as a reference layer for at least one inter-layer prediction of at least one higher video coding layer of the one or more video coding layers. 3. The device of claim 1, wherein the device is further configured such that the bitstream is generated to further include an indication that at least one of the one or more inter-layer reference pictures associated with a DPB of a first video coding layer of the one or more video coding layers is also associated with a DPB of a second video coding layer of the one or more video coding layers. 4. The device of claim 3, wherein the second video coding layer of the one or more video coding layers is higher than the first video coding layer of the one or more video coding layers. 5. The device of claim 1, wherein the device is further configured such that the bitstream is generated to further include one or more RPS extensions indicating one or more temporal reference pictures for the one or more DPBs, the bitstream further including an indication for inclusion of the one or more temporal reference pictures and the one or more inter-layer reference pictures to at least one reference picture list. 6. The device of claim 5, wherein the one or more inter-layer reference pictures include one or more co-located reference pictures and one or more non-co-located reference pictures, and the device is further configured such that the bitstream is generated to further include an indication of placement in the reference picture list of at least one of the one or more co-located reference pictures at a position of at least one of prior to or after a position of at least one of the one or more temporal reference pictures. 7. The device of claim 6, wherein the device is further configured such that the bitstream is generated such that the indication of placement further indicates placement of at least one of the one or more non-co-located reference pictures at a position of at least one of prior to or after the position of the at least one of the one or more temporal reference pictures. 8. The device of claim 1, wherein the one or more inter-layer reference pictures include one or more co-located inter-layer reference pictures and one or more non-co-located inter-layer reference pictures, the device being further configured such that the one or more RPS extensions indicate the one or more co-located inter-layer reference pictures for the one or more DPBs. 9. The device of claim 8, wherein the device is further configured such that the bitstream is generated to further include one or more RPS extensions indicating one or more temporal reference pictures for the one or more DPBs, the bitstream further including an indication that at least one of the one or more non-co-located inter-layer reference pictures are predictable from the one or more temporal reference pictures. 10. The device of claim 1, wherein the device is further configured such that the bitstream is generated to include the one or more reference picture set (RPS) extensions indicating the one or more inter-layer reference pictures for one or more decoding picture buffers (DPBs) within a parameter set. 11. The device of claim 1, wherein the device is further configured such that the bitstream is generated to further include at least one indication that one or more inter-layer reference pictures associated with a first DPB of a first video coding layer are to be included in a second DPB of a second video coding layer. 12. The device of claim 11, wherein the second video coding layer is higher than the first video coding layer. 13. A device for video data coding, configured at least in part to:
generate a bitstream, the bitstream including:
one or more reference picture set (RPS) extensions indicating one or more inter-layer delta picture order counts (POCs), the one or more POCs respectively associated with one or more video coding layers. 14. The device of claim 13, wherein the device is further configured such that the bitstream is generated to further include one or more RPS extensions indicating one or more temporal reference pictures for the one or more video coding layers. 15. The device of claim 13, wherein the device is further configured such that the bitstream is generated to further include an indication that one or more temporal reference pictures associated with a first video coding layer are to be used for a second video coding layer. 16. The device of claim 15, wherein the indication is a one bit flag, the first video coding layer is at least one of a base layer or a reference layer, and the second video coding layer is an enhancement layer, the enhancement layer being higher than the first video coding layer. 17. A device for video data processing, configured at least in part, to:
generate a first video coding layer, the first video coding layer including a first reference picture set (RPS), the first RPS including one or more temporal reference pictures in a first decoding picture buffer (DPB); generate a second video coding layer, based at least in part, on the temporal reference pictures of the first RPS, the second video coding layer including a second RPS, the second RPS including one or more temporal reference pictures and one or more inter-layer reference pictures in a second DPB; and generate a third video coding layer, based at least in part, on at least one of the first RPS or the second RPS. 18. The device of claim 17, wherein at least the first video coding layer is generated according to a high efficiency video coding (HEVC) protocol. 19. The device of claim 17, wherein the device is further configured to perform motion compensated prediction temporally within at least one of the second video coding layer or the third video coding layer. 20. The device of claim 17, wherein the third video coding layer includes a third DPB, the third DPB including at least one of the one or more inter-layer reference pictures included in the second DPB. 21. The device of claim 17, wherein the device is further configured such that the generation of the third video coding layer includes the prediction of one or more temporal reference pictures of a third RPS based on at least one of the first RPS or the second RPS. 22. The device of claim 17, wherein the device is further configured to receive an indication to scale at least one of the first RPS or the second RPS, and the generation of the third video coding layer includes the prediction of one or more temporal reference pictures of a third RPS based on at least one of a scaled first RPS or a scaled second RPS. 23. The device of claim 17, wherein the device is further configured such that an RPS extension of the second video coding layer includes a set of the one or more temporal reference pictures of the second DPB and a set of the one or more inter-layer reference pictures of the second DPB, and an RPS extension of the third video coding layer is predictable from the RPS extension of the second video coding layer. | Embodiments contemplate coding video data by generating a video encoded bitstream that may include reference picture set (RPS) extensions for inter-layer reference pictures, and the extensions may include inter-layer delta Picture Order Counts (POCs). Embodiments may also include signaling that lower layer reference pictures may be available in a lower layer decoder picture buffer (DPB), and/or an aggregate DPB, that may be added to the RPS set of a higher layer. The bitstream may include a signal indicating whether the higher layer RPS may be specified by a lower layer RPS, and the lower layer RPS may be temporal, inter-layer prediction (ILP), or both.1. A device for video data coding, configured at least in part, to:
generate a bitstream, the bitstream including:
one or more reference picture set (RPS) extensions indicating one or more inter-layer reference pictures for one or more decoding picture buffers (DPBs), the one or more DPBs respectively associated with one or more video coding layers. 2. The device of claim 1, wherein the device is further configured such that the bitstream is generated to further include at least one indication that a video coding layer of the one or more video coding layers is to serve as a reference layer for at least one inter-layer prediction of at least one higher video coding layer of the one or more video coding layers. 3. The device of claim 1, wherein the device is further configured such that the bitstream is generated to further include an indication that at least one of the one or more inter-layer reference pictures associated with a DPB of a first video coding layer of the one or more video coding layers is also associated with a DPB of a second video coding layer of the one or more video coding layers. 4. The device of claim 3, wherein the second video coding layer of the one or more video coding layers is higher than the first video coding layer of the one or more video coding layers. 5. The device of claim 1, wherein the device is further configured such that the bitstream is generated to further include one or more RPS extensions indicating one or more temporal reference pictures for the one or more DPBs, the bitstream further including an indication for inclusion of the one or more temporal reference pictures and the one or more inter-layer reference pictures to at least one reference picture list. 6. The device of claim 5, wherein the one or more inter-layer reference pictures include one or more co-located reference pictures and one or more non-co-located reference pictures, and the device is further configured such that the bitstream is generated to further include an indication of placement in the reference picture list of at least one of the one or more co-located reference pictures at a position of at least one of prior to or after a position of at least one of the one or more temporal reference pictures. 7. The device of claim 6, wherein the device is further configured such that the bitstream is generated such that the indication of placement further indicates placement of at least one of the one or more non-co-located reference pictures at a position of at least one of prior to or after the position of the at least one of the one or more temporal reference pictures. 8. The device of claim 1, wherein the one or more inter-layer reference pictures include one or more co-located inter-layer reference pictures and one or more non-co-located inter-layer reference pictures, the device being further configured such that the one or more RPS extensions indicate the one or more co-located inter-layer reference pictures for the one or more DPBs. 9. The device of claim 8, wherein the device is further configured such that the bitstream is generated to further include one or more RPS extensions indicating one or more temporal reference pictures for the one or more DPBs, the bitstream further including an indication that at least one of the one or more non-co-located inter-layer reference pictures are predictable from the one or more temporal reference pictures. 10. The device of claim 1, wherein the device is further configured such that the bitstream is generated to include the one or more reference picture set (RPS) extensions indicating the one or more inter-layer reference pictures for one or more decoding picture buffers (DPBs) within a parameter set. 11. The device of claim 1, wherein the device is further configured such that the bitstream is generated to further include at least one indication that one or more inter-layer reference pictures associated with a first DPB of a first video coding layer are to be included in a second DPB of a second video coding layer. 12. The device of claim 11, wherein the second video coding layer is higher than the first video coding layer. 13. A device for video data coding, configured at least in part to:
generate a bitstream, the bitstream including:
one or more reference picture set (RPS) extensions indicating one or more inter-layer delta picture order counts (POCs), the one or more POCs respectively associated with one or more video coding layers. 14. The device of claim 13, wherein the device is further configured such that the bitstream is generated to further include one or more RPS extensions indicating one or more temporal reference pictures for the one or more video coding layers. 15. The device of claim 13, wherein the device is further configured such that the bitstream is generated to further include an indication that one or more temporal reference pictures associated with a first video coding layer are to be used for a second video coding layer. 16. The device of claim 15, wherein the indication is a one bit flag, the first video coding layer is at least one of a base layer or a reference layer, and the second video coding layer is an enhancement layer, the enhancement layer being higher than the first video coding layer. 17. A device for video data processing, configured at least in part, to:
generate a first video coding layer, the first video coding layer including a first reference picture set (RPS), the first RPS including one or more temporal reference pictures in a first decoding picture buffer (DPB); generate a second video coding layer, based at least in part, on the temporal reference pictures of the first RPS, the second video coding layer including a second RPS, the second RPS including one or more temporal reference pictures and one or more inter-layer reference pictures in a second DPB; and generate a third video coding layer, based at least in part, on at least one of the first RPS or the second RPS. 18. The device of claim 17, wherein at least the first video coding layer is generated according to a high efficiency video coding (HEVC) protocol. 19. The device of claim 17, wherein the device is further configured to perform motion compensated prediction temporally within at least one of the second video coding layer or the third video coding layer. 20. The device of claim 17, wherein the third video coding layer includes a third DPB, the third DPB including at least one of the one or more inter-layer reference pictures included in the second DPB. 21. The device of claim 17, wherein the device is further configured such that the generation of the third video coding layer includes the prediction of one or more temporal reference pictures of a third RPS based on at least one of the first RPS or the second RPS. 22. The device of claim 17, wherein the device is further configured to receive an indication to scale at least one of the first RPS or the second RPS, and the generation of the third video coding layer includes the prediction of one or more temporal reference pictures of a third RPS based on at least one of a scaled first RPS or a scaled second RPS. 23. The device of claim 17, wherein the device is further configured such that an RPS extension of the second video coding layer includes a set of the one or more temporal reference pictures of the second DPB and a set of the one or more inter-layer reference pictures of the second DPB, and an RPS extension of the third video coding layer is predictable from the RPS extension of the second video coding layer. | 2,400 |
8,923 | 8,923 | 15,719,383 | 2,422 | The present disclosure relates to a method for calibrating a projector. In one example, the method includes receiving by a processing element light field data corresponding to a calibration image projected by a projector and captured by a light field capturing device, and modeling by a processing element one or more intrinsic properties of the projector using the light field data and the calibration image. The calibration image may be projected by the projector directly into the light field capturing device. | 1. A method of calibrating a projector, the method comprising:
receiving by a processing element light field data corresponding to a calibration image captured by a light field capturing device, wherein the calibration image is projected by a projector directly into a light field capturing device; estimating by the processing element directions of light rays emitted by the projector when projecting the calibration image by utilizing light ray data; and modeling by a processing element one or more intrinsic properties of the projector using the light field data and the calibration image. 2. The method of claim 1, further comprising estimating by the processing element a position of the light field capturing device relative to the projector using the calibration image. 3. (canceled) 4. The method of claim 1, further comprising transforming by the processing element the captured information from ray representations to a simplified model. 5. The method of claim 4, wherein the captured information is transformed from ray representations to a pinhole model. 6. The method of claim 4, further comprising modifying by a processing element a source image to be projected by the projector based on the modeled intrinsic properties of the projector. 7. The method of claim 1, wherein the calibration image is captured by the light field capturing device from at least one angle such that the whole image plane of the projector is at least sparsely acquired. 8. The method of claim 1, wherein the calibration image is projected by the projector onto a projection surface. 9. The method of claim 1, further comprising determining the intrinsic properties of the light field capturing device. 10. A system for calibrating a projector, the system comprising:
a projector configured to project a calibration image; a light field capturing device configured to capture at least a portion of the calibration image projected by the projector, wherein light rays making up the calibration image are projected into the light field capturing device without reflecting on an intermediate surface; and a processing element in communication with the light field capturing device, wherein the processing element is configured to:
estimate directions of light rays emitted by the projector when projecting the calibration image by utilizing ray data;
transform the ray representations to a simplified model; and
mode one or more intrinsic properties of the projector using light field data corresponding to the calibration image captured by the light field capturing device. 11. The system of claim 10, wherein the processing element is further configured to estimate a position of the light field capturing device relative to the projector using the light field data captured by the light field capturing device. 12. (canceled) 13. The system of claim 11, wherein the simplified model is a pinhole model. 14. The system of claim 10, wherein the processing element is part of a computing system separate from the projector and the light field capturing device. 15. The system of claim 10, wherein the processing element is part of a computing system defined as part of the projector or the light field capturing device. 16. The system of claim 10, wherein the light field capturing device is a light field camera or a scanner. | The present disclosure relates to a method for calibrating a projector. In one example, the method includes receiving by a processing element light field data corresponding to a calibration image projected by a projector and captured by a light field capturing device, and modeling by a processing element one or more intrinsic properties of the projector using the light field data and the calibration image. The calibration image may be projected by the projector directly into the light field capturing device.1. A method of calibrating a projector, the method comprising:
receiving by a processing element light field data corresponding to a calibration image captured by a light field capturing device, wherein the calibration image is projected by a projector directly into a light field capturing device; estimating by the processing element directions of light rays emitted by the projector when projecting the calibration image by utilizing light ray data; and modeling by a processing element one or more intrinsic properties of the projector using the light field data and the calibration image. 2. The method of claim 1, further comprising estimating by the processing element a position of the light field capturing device relative to the projector using the calibration image. 3. (canceled) 4. The method of claim 1, further comprising transforming by the processing element the captured information from ray representations to a simplified model. 5. The method of claim 4, wherein the captured information is transformed from ray representations to a pinhole model. 6. The method of claim 4, further comprising modifying by a processing element a source image to be projected by the projector based on the modeled intrinsic properties of the projector. 7. The method of claim 1, wherein the calibration image is captured by the light field capturing device from at least one angle such that the whole image plane of the projector is at least sparsely acquired. 8. The method of claim 1, wherein the calibration image is projected by the projector onto a projection surface. 9. The method of claim 1, further comprising determining the intrinsic properties of the light field capturing device. 10. A system for calibrating a projector, the system comprising:
a projector configured to project a calibration image; a light field capturing device configured to capture at least a portion of the calibration image projected by the projector, wherein light rays making up the calibration image are projected into the light field capturing device without reflecting on an intermediate surface; and a processing element in communication with the light field capturing device, wherein the processing element is configured to:
estimate directions of light rays emitted by the projector when projecting the calibration image by utilizing ray data;
transform the ray representations to a simplified model; and
mode one or more intrinsic properties of the projector using light field data corresponding to the calibration image captured by the light field capturing device. 11. The system of claim 10, wherein the processing element is further configured to estimate a position of the light field capturing device relative to the projector using the light field data captured by the light field capturing device. 12. (canceled) 13. The system of claim 11, wherein the simplified model is a pinhole model. 14. The system of claim 10, wherein the processing element is part of a computing system separate from the projector and the light field capturing device. 15. The system of claim 10, wherein the processing element is part of a computing system defined as part of the projector or the light field capturing device. 16. The system of claim 10, wherein the light field capturing device is a light field camera or a scanner. | 2,400 |
8,924 | 8,924 | 15,270,636 | 2,473 | The present disclosure relates to a pre-5th-generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th-generation (4G) communication system such as long term evolution (LTE). Next generation of wireless cellular operation is expected to be deployed in higher frequency above 6 GHz (eg. 10 GHz˜100 GHz, also called mmWave and/or cmWave) due to availability of large amount of spectrum bandwidths. The physical layer of wireless cellular system in both DL and UL operating in mmWave/cmWave would be based on new air-interface different from that of LTE-A air-interface because the radio characteristics is different for mmWave/cmWave bands. The wireless system deployed in mmWave/cmWave system is expected to employ DL beam sweeping on broadcast control information to provide cell coverage to the UE which would result in excessive signaling overhead. | 1. A method for acquiring system information by a user equipment (UE) in wireless communication system, the method comprising:
acquiring at least one system configuration index (SCI) from a primary broadcast channel (PBCH) or a secondary broadcast channel (SBCH); determining a probe resource based on pre-configured parameters or parameters signaled in the PBCH or the SBCH; transmitting a probe request on the determined probe resource, the probe request comprising the at least one SCI; receiving a probe response including at least the system configuration corresponding to the at least one SCI included in the probe request; and applying and storing the at least one system configuration acquired from the probe response. 2. The method of claim 1, wherein each of the at least one SCI is an index or identifier which is associated with a set of system information parameters and corresponding parameter values. 3. The method of claim 1, wherein the probe request is transmitted based on a preamble transmission or an on or off physical layer signal transmission. 4. The method of claim 3, further comprising:
selecting a probe preamble from a probe preamble group according to a capability of the UE; wherein the transmitting step comprising:
transmitting the probe request including the selected probe preamble within a probe repetition period or a UL beam sweeping period;
wherein the receiving step comprising:
receiving the probe response including the at least one system configuration corresponding to the at least one SCI included in the probe request, and
wherein the probe response includes at least one of a SCI value, a preamble index, and a system configuration corresponding to the SCI value. 5. The method of claim 3, further comprising:
determining a probe resource for transmission of a probe ON or OFF signal based on a capability of the UE; and transmitting the probe ON or OFF signal within a probe repetition period or an uplink (UL) beam sweeping period. 6. The method of claim 4, further comprising:
receiving a message including at least one of a UL grant, a detected preamble index, a UL beam index, a UL timing advance, a system frame number (SFN) if the SFN is not transmitted in the PBCH or the SBCH, and a physical uplink shared channel (PUSCH) configuration; and transmitting a message including at least one of the at least one SCI acquired from the PBCH or the SBCH, a UE identity, a downlink (DL) beam index, a buffer status report (BSR), and a UE capability based on the UL grant in the received message. 7. The method of claim 1, further comprising:
acquiring information related to mapping between a set of probe preambles and a UE capability or between a subset of probe preambles and DL coverage beams. 8. A method for providing system information to a user equipment (UE) by an enhanced node B (eNB) in wireless communication system, the method comprising:
determining a probe resource based on pre-configured parameters or parameters signaled in a primary broadcast channel (PBCH) or a secondary broadcast channel (SBCH); receiving a probe request comprising at least one system configuration index (SCI) on the determined probe resource; detecting a probe signal based on the probe request; determining whether there is a UE wanting a meaning of the at least one S CI in a cell coverage area of the eNB; and transmitting a probe response including at least one system configuration corresponding to the at least one SCI. 9. The method of claim 8, wherein the probe request is transmitted based on a preamble transmission or an on or off physical layer signal transmission. 10. The method of claim 8, further comprising:
determining whether an energy of the detected probe signal is above a threshold; and determining whether there is a UE wanting a meaning of the at least one of SCI in the cell coverage area using the result of the determining. 11. The method of claim 9, further comprising:
transmitting a message including at least one of a UL grant, a detected preamble index, a UL beam index, a UL timing advance, a SFN, if the SFN not transmitted in PBCH or SBCH, and a PUSCH configuration; and receiving a message including at least one of the one or more SCI value(s) acquired from PBCH/SBCH, a UE identity, a DL beam index, a buffer status report (BSR) and a UE capability based on the received message. 12. A user equipment for acquiring system information in wireless communication system, the user equipment comprising:
a processor module configured to:
acquire at least one system configuration index (SCI) from a primary broadcast channel (PBCH) or a secondary broadcast channel (SBCH),
determine a probe resource based on pre-configured parameters or parameters signaled in the PBCH or the SBCH,
transmit a probe request on the determined probe resource, the probe request comprising the at least one SCI,
receive a probe response including at least the system configuration corresponding to the at least one SCI included in the probe request, and
apply and store the at least one system configuration acquired from the probe response. 13. The user equipment of claim 12, wherein each of the at least one SCI is an index or identifier which is associated with a set of system information parameters and corresponding parameter values. 14. The user equipment of claim 12, wherein the probe request is transmitted based on a preamble transmission or an on or off physical layer signal transmission. 15. The user equipment of claim 14, wherein the processor module configured to:
select a probe preamble from a probe preamble group according to a capability of the UE, transmit the probe request including the selected probe preamble within a probe repetition period or a UL beam sweeping period, receive the probe response including the at least one system configuration corresponding to the at least one SCI included in the probe request, and wherein the probe response includes at least one of a SCI value, a preamble index, and a system configuration corresponding to the SCI value. 16. The user equipment of claim 14, wherein the processor module configured to:
determine a probe resource for transmission of a probe ON or OFF signal based on a capability of the UE, and transmit the probe ON or OFF signal within a probe repetition period or an uplink (UL) beam sweeping period. 17. The user equipment of claim 15, wherein the processor module configured to:
receive a message including at least one of a UL grant, a detected preamble index, a UL beam index, a UL timing advance, a system frame number (SFN) if the SFN is not transmitted in the PBCH or the SBCH, and a physical uplink shared channel (PUSCH) configuration; and transmit a message including at least one of the at least one SCI acquired from the PBCH or the SBCH, a UE identity, a downlink (DL) beam index, a buffer status report (BSR) and a UE capability based on the UL grant in the received message. 18. An enhanced node B (eNB) for providing system information to a user equipment (UE) in wireless communication system, the eNB comprising:
a processor module configured to:
determine a probe resource based on pre-configured parameters or parameters signaled in a primary broadcast channel (PBCH) or a secondary broadcast channel (SBCH);
receive a probe request comprising at least one system configuration index (SCI) on the determined probe resource;
detect a probe signal based on the probe request;
determine whether there is the UE wanting a meaning of the at least one SCI in a cell coverage area of the eNB; and
transmit a probe response including at least one system configuration corresponding to the at least one SCI. 19. The eNB of claim 18, wherein the probe request is transmitted based on a preamble transmission or an on or off physical layer signal transmission. 20. The eNB of claim 18, wherein the processor module configured to:
determine whether an energy of the detected probe signal is above a threshold, and determine whether there is a UE wanting a meaning of the at least one of SCI in the cell coverage area using the result of the determining. | The present disclosure relates to a pre-5th-generation (5G) or 5G communication system to be provided for supporting higher data rates beyond 4th-generation (4G) communication system such as long term evolution (LTE). Next generation of wireless cellular operation is expected to be deployed in higher frequency above 6 GHz (eg. 10 GHz˜100 GHz, also called mmWave and/or cmWave) due to availability of large amount of spectrum bandwidths. The physical layer of wireless cellular system in both DL and UL operating in mmWave/cmWave would be based on new air-interface different from that of LTE-A air-interface because the radio characteristics is different for mmWave/cmWave bands. The wireless system deployed in mmWave/cmWave system is expected to employ DL beam sweeping on broadcast control information to provide cell coverage to the UE which would result in excessive signaling overhead.1. A method for acquiring system information by a user equipment (UE) in wireless communication system, the method comprising:
acquiring at least one system configuration index (SCI) from a primary broadcast channel (PBCH) or a secondary broadcast channel (SBCH); determining a probe resource based on pre-configured parameters or parameters signaled in the PBCH or the SBCH; transmitting a probe request on the determined probe resource, the probe request comprising the at least one SCI; receiving a probe response including at least the system configuration corresponding to the at least one SCI included in the probe request; and applying and storing the at least one system configuration acquired from the probe response. 2. The method of claim 1, wherein each of the at least one SCI is an index or identifier which is associated with a set of system information parameters and corresponding parameter values. 3. The method of claim 1, wherein the probe request is transmitted based on a preamble transmission or an on or off physical layer signal transmission. 4. The method of claim 3, further comprising:
selecting a probe preamble from a probe preamble group according to a capability of the UE; wherein the transmitting step comprising:
transmitting the probe request including the selected probe preamble within a probe repetition period or a UL beam sweeping period;
wherein the receiving step comprising:
receiving the probe response including the at least one system configuration corresponding to the at least one SCI included in the probe request, and
wherein the probe response includes at least one of a SCI value, a preamble index, and a system configuration corresponding to the SCI value. 5. The method of claim 3, further comprising:
determining a probe resource for transmission of a probe ON or OFF signal based on a capability of the UE; and transmitting the probe ON or OFF signal within a probe repetition period or an uplink (UL) beam sweeping period. 6. The method of claim 4, further comprising:
receiving a message including at least one of a UL grant, a detected preamble index, a UL beam index, a UL timing advance, a system frame number (SFN) if the SFN is not transmitted in the PBCH or the SBCH, and a physical uplink shared channel (PUSCH) configuration; and transmitting a message including at least one of the at least one SCI acquired from the PBCH or the SBCH, a UE identity, a downlink (DL) beam index, a buffer status report (BSR), and a UE capability based on the UL grant in the received message. 7. The method of claim 1, further comprising:
acquiring information related to mapping between a set of probe preambles and a UE capability or between a subset of probe preambles and DL coverage beams. 8. A method for providing system information to a user equipment (UE) by an enhanced node B (eNB) in wireless communication system, the method comprising:
determining a probe resource based on pre-configured parameters or parameters signaled in a primary broadcast channel (PBCH) or a secondary broadcast channel (SBCH); receiving a probe request comprising at least one system configuration index (SCI) on the determined probe resource; detecting a probe signal based on the probe request; determining whether there is a UE wanting a meaning of the at least one S CI in a cell coverage area of the eNB; and transmitting a probe response including at least one system configuration corresponding to the at least one SCI. 9. The method of claim 8, wherein the probe request is transmitted based on a preamble transmission or an on or off physical layer signal transmission. 10. The method of claim 8, further comprising:
determining whether an energy of the detected probe signal is above a threshold; and determining whether there is a UE wanting a meaning of the at least one of SCI in the cell coverage area using the result of the determining. 11. The method of claim 9, further comprising:
transmitting a message including at least one of a UL grant, a detected preamble index, a UL beam index, a UL timing advance, a SFN, if the SFN not transmitted in PBCH or SBCH, and a PUSCH configuration; and receiving a message including at least one of the one or more SCI value(s) acquired from PBCH/SBCH, a UE identity, a DL beam index, a buffer status report (BSR) and a UE capability based on the received message. 12. A user equipment for acquiring system information in wireless communication system, the user equipment comprising:
a processor module configured to:
acquire at least one system configuration index (SCI) from a primary broadcast channel (PBCH) or a secondary broadcast channel (SBCH),
determine a probe resource based on pre-configured parameters or parameters signaled in the PBCH or the SBCH,
transmit a probe request on the determined probe resource, the probe request comprising the at least one SCI,
receive a probe response including at least the system configuration corresponding to the at least one SCI included in the probe request, and
apply and store the at least one system configuration acquired from the probe response. 13. The user equipment of claim 12, wherein each of the at least one SCI is an index or identifier which is associated with a set of system information parameters and corresponding parameter values. 14. The user equipment of claim 12, wherein the probe request is transmitted based on a preamble transmission or an on or off physical layer signal transmission. 15. The user equipment of claim 14, wherein the processor module configured to:
select a probe preamble from a probe preamble group according to a capability of the UE, transmit the probe request including the selected probe preamble within a probe repetition period or a UL beam sweeping period, receive the probe response including the at least one system configuration corresponding to the at least one SCI included in the probe request, and wherein the probe response includes at least one of a SCI value, a preamble index, and a system configuration corresponding to the SCI value. 16. The user equipment of claim 14, wherein the processor module configured to:
determine a probe resource for transmission of a probe ON or OFF signal based on a capability of the UE, and transmit the probe ON or OFF signal within a probe repetition period or an uplink (UL) beam sweeping period. 17. The user equipment of claim 15, wherein the processor module configured to:
receive a message including at least one of a UL grant, a detected preamble index, a UL beam index, a UL timing advance, a system frame number (SFN) if the SFN is not transmitted in the PBCH or the SBCH, and a physical uplink shared channel (PUSCH) configuration; and transmit a message including at least one of the at least one SCI acquired from the PBCH or the SBCH, a UE identity, a downlink (DL) beam index, a buffer status report (BSR) and a UE capability based on the UL grant in the received message. 18. An enhanced node B (eNB) for providing system information to a user equipment (UE) in wireless communication system, the eNB comprising:
a processor module configured to:
determine a probe resource based on pre-configured parameters or parameters signaled in a primary broadcast channel (PBCH) or a secondary broadcast channel (SBCH);
receive a probe request comprising at least one system configuration index (SCI) on the determined probe resource;
detect a probe signal based on the probe request;
determine whether there is the UE wanting a meaning of the at least one SCI in a cell coverage area of the eNB; and
transmit a probe response including at least one system configuration corresponding to the at least one SCI. 19. The eNB of claim 18, wherein the probe request is transmitted based on a preamble transmission or an on or off physical layer signal transmission. 20. The eNB of claim 18, wherein the processor module configured to:
determine whether an energy of the detected probe signal is above a threshold, and determine whether there is a UE wanting a meaning of the at least one of SCI in the cell coverage area using the result of the determining. | 2,400 |
8,925 | 8,925 | 15,112,722 | 2,474 | User equipment for transmitting an uplink control channel in multiple cells simultaneously in a radio communication system where transmission of the uplink control channel in a secondary cell is supported is disclosed. One aspect of the present invention relates to the user equipment, comprising: a transmission and reception unit configured to transmit and receive a radio channel to/from a base station via multiple cells configured for carrier aggregation; a simultaneous transmission availability determination unit configured to determine, in response to occurrence of an event where an uplink control channel is to be transmitted in the multiple cells simultaneously, whether the uplink control channel can be transmitted in the multiple cells simultaneously; and a transmission control unit configured to instruct the transmission and reception unit to transmit the uplink control channel in the multiple cells simultaneously if the uplink control channel can be transmitted in the multiple cells simultaneously and control transmission of the uplink control channel in accordance with transmission priorities corresponding to cell types if the uplink control channel cannot be transmitted in the multiple cells simultaneously. | 1. User equipment, comprising:
a transmission and reception unit configured to transmit and receive a radio channel to/from a base station via multiple cells configured for carrier aggregation; a simultaneous transmission availability determination unit configured to determine, in response to occurrence of an event where an uplink control channel is to be transmitted in the multiple cells simultaneously, whether the uplink control channel can be transmitted in the multiple cells simultaneously; and a transmission control unit configured to instruct the transmission and reception unit to transmit the uplink control channel in the multiple cells simultaneously if the uplink control channel can be transmitted in the multiple cells simultaneously and control transmission of the uplink control channel in accordance with transmission priorities corresponding to cell types if the uplink control channel cannot be transmitted in the multiple cells simultaneously. 2. The user equipment as claimed in claim 1, wherein the transmission control unit has a cell type determination unit configured to determine which of a primary cell, a Special secondary cell or a secondary cell the cell type of the cell is, and the transmission control unit controls transmission of the uplink control channel in the determined cell corresponding to the determination in accordance with the transmission priorities of order of the primary cell, the Special secondary cell and the secondary cell. 3. The user equipment as claimed in claim 2, wherein the transmission control unit assigns a relatively large amount of transmit power to a cell having a higher transmission priority and assigns a relatively small amount of transmit power to a cell having a lower transmission priority or stops transmission of the uplink control channel in the cell having the lower transmission priority in accordance with the transmission priorities based on cell types determined for the respective cells. 4. The user equipment as claimed in claim 3, wherein if the uplink control channel transmitted in the cell having the lower transmission priority includes a redundant symbol, the transmission control unit reduces the transmit power for a slot including the redundant symbol. 5. A transmission control method for use in user equipment transmitting and receiving a radio channel to/from a base station via multiple cells configured for carrier aggregation, comprising:
detecting occurrence of an event where an uplink control channel is to be transmitted in the multiple cells simultaneously; determining whether the uplink control channel can be transmitted in the multiple cells simultaneously; and transmitting the uplink control channel in the multiple cells simultaneously if the uplink control channel can be transmitted in the multiple cells simultaneously and controlling transmission of the uplink control channel in accordance with transmission priorities corresponding to cell types if the uplink control channel cannot be transmitted in the multiple cells simultaneously. 6. User equipment, comprising:
a transmission and reception unit configured to transmit and receive a radio channel to/from a base station via multiple cells configured for carrier aggregation; a simultaneous transmission availability determination unit configured to determine, in response to occurrence of an event where an uplink control channel is to be transmitted in the multiple cells simultaneously, whether the uplink control channel can be transmitted in the multiple cells simultaneously; and a transmission control unit configured to instruct the transmission and reception unit to transmit the uplink control channel in the multiple cells simultaneously if the uplink control channel can be transmitted in the multiple cells simultaneously and control transmission of the uplink control channel in accordance with transmission priorities corresponding to duplex modes if the uplink control channel cannot be transmitted in the multiple cells simultaneously. 7. The user equipment as claimed in claim 6, wherein the transmission control unit has a duplex mode determination unit configured to determine which of a frequency division duplex (FDD) mode and a time division duplex (TDD) mode the duplex mode of the cell is, and the transmission control unit controls transmission of the uplink control channel in the determined cell depending on the determination. 8. The user equipment as claimed in claim 7, wherein the transmission control unit adjusts the transmission priority for a TDD mode applied cell depending on a number of uplink transmission timings specified by a TDD configuration for the cell. 9. The user equipment as claimed in claim 7, wherein the transmission control unit assigns a relatively large amount of transmit power to a cell having a higher transmission priority and assigns a relatively small amount of transmit power to a cell having a lower transmission priority or stops transmission of the uplink control channel in the cell having the lower transmission priority in accordance with the transmission priorities based on duplex modes determined for the respective cells. 10. The user equipment as claimed in claim 9, wherein if the uplink control channel transmitted in the cell having the lower transmission priority includes a redundant symbol, the transmission control unit reduces the transmit power for a slot including the redundant symbol. 11. A transmission control method for use in user equipment transmitting and receiving a radio channel to/from a base station via multiple cells configured for carrier aggregation, comprising:
detecting occurrence of an event where an uplink control channel is to be transmitted in the multiple cells simultaneously; determining whether the uplink control channel can be transmitted in the multiple cells simultaneously; and transmitting the uplink control channel in the multiple cells simultaneously if the uplink control channel can be transmitted in the multiple cells simultaneously and controlling transmission of the uplink control channel in accordance with transmission priorities corresponding to duplex modes if the uplink control channel cannot be transmitted in the multiple cells simultaneously. | User equipment for transmitting an uplink control channel in multiple cells simultaneously in a radio communication system where transmission of the uplink control channel in a secondary cell is supported is disclosed. One aspect of the present invention relates to the user equipment, comprising: a transmission and reception unit configured to transmit and receive a radio channel to/from a base station via multiple cells configured for carrier aggregation; a simultaneous transmission availability determination unit configured to determine, in response to occurrence of an event where an uplink control channel is to be transmitted in the multiple cells simultaneously, whether the uplink control channel can be transmitted in the multiple cells simultaneously; and a transmission control unit configured to instruct the transmission and reception unit to transmit the uplink control channel in the multiple cells simultaneously if the uplink control channel can be transmitted in the multiple cells simultaneously and control transmission of the uplink control channel in accordance with transmission priorities corresponding to cell types if the uplink control channel cannot be transmitted in the multiple cells simultaneously.1. User equipment, comprising:
a transmission and reception unit configured to transmit and receive a radio channel to/from a base station via multiple cells configured for carrier aggregation; a simultaneous transmission availability determination unit configured to determine, in response to occurrence of an event where an uplink control channel is to be transmitted in the multiple cells simultaneously, whether the uplink control channel can be transmitted in the multiple cells simultaneously; and a transmission control unit configured to instruct the transmission and reception unit to transmit the uplink control channel in the multiple cells simultaneously if the uplink control channel can be transmitted in the multiple cells simultaneously and control transmission of the uplink control channel in accordance with transmission priorities corresponding to cell types if the uplink control channel cannot be transmitted in the multiple cells simultaneously. 2. The user equipment as claimed in claim 1, wherein the transmission control unit has a cell type determination unit configured to determine which of a primary cell, a Special secondary cell or a secondary cell the cell type of the cell is, and the transmission control unit controls transmission of the uplink control channel in the determined cell corresponding to the determination in accordance with the transmission priorities of order of the primary cell, the Special secondary cell and the secondary cell. 3. The user equipment as claimed in claim 2, wherein the transmission control unit assigns a relatively large amount of transmit power to a cell having a higher transmission priority and assigns a relatively small amount of transmit power to a cell having a lower transmission priority or stops transmission of the uplink control channel in the cell having the lower transmission priority in accordance with the transmission priorities based on cell types determined for the respective cells. 4. The user equipment as claimed in claim 3, wherein if the uplink control channel transmitted in the cell having the lower transmission priority includes a redundant symbol, the transmission control unit reduces the transmit power for a slot including the redundant symbol. 5. A transmission control method for use in user equipment transmitting and receiving a radio channel to/from a base station via multiple cells configured for carrier aggregation, comprising:
detecting occurrence of an event where an uplink control channel is to be transmitted in the multiple cells simultaneously; determining whether the uplink control channel can be transmitted in the multiple cells simultaneously; and transmitting the uplink control channel in the multiple cells simultaneously if the uplink control channel can be transmitted in the multiple cells simultaneously and controlling transmission of the uplink control channel in accordance with transmission priorities corresponding to cell types if the uplink control channel cannot be transmitted in the multiple cells simultaneously. 6. User equipment, comprising:
a transmission and reception unit configured to transmit and receive a radio channel to/from a base station via multiple cells configured for carrier aggregation; a simultaneous transmission availability determination unit configured to determine, in response to occurrence of an event where an uplink control channel is to be transmitted in the multiple cells simultaneously, whether the uplink control channel can be transmitted in the multiple cells simultaneously; and a transmission control unit configured to instruct the transmission and reception unit to transmit the uplink control channel in the multiple cells simultaneously if the uplink control channel can be transmitted in the multiple cells simultaneously and control transmission of the uplink control channel in accordance with transmission priorities corresponding to duplex modes if the uplink control channel cannot be transmitted in the multiple cells simultaneously. 7. The user equipment as claimed in claim 6, wherein the transmission control unit has a duplex mode determination unit configured to determine which of a frequency division duplex (FDD) mode and a time division duplex (TDD) mode the duplex mode of the cell is, and the transmission control unit controls transmission of the uplink control channel in the determined cell depending on the determination. 8. The user equipment as claimed in claim 7, wherein the transmission control unit adjusts the transmission priority for a TDD mode applied cell depending on a number of uplink transmission timings specified by a TDD configuration for the cell. 9. The user equipment as claimed in claim 7, wherein the transmission control unit assigns a relatively large amount of transmit power to a cell having a higher transmission priority and assigns a relatively small amount of transmit power to a cell having a lower transmission priority or stops transmission of the uplink control channel in the cell having the lower transmission priority in accordance with the transmission priorities based on duplex modes determined for the respective cells. 10. The user equipment as claimed in claim 9, wherein if the uplink control channel transmitted in the cell having the lower transmission priority includes a redundant symbol, the transmission control unit reduces the transmit power for a slot including the redundant symbol. 11. A transmission control method for use in user equipment transmitting and receiving a radio channel to/from a base station via multiple cells configured for carrier aggregation, comprising:
detecting occurrence of an event where an uplink control channel is to be transmitted in the multiple cells simultaneously; determining whether the uplink control channel can be transmitted in the multiple cells simultaneously; and transmitting the uplink control channel in the multiple cells simultaneously if the uplink control channel can be transmitted in the multiple cells simultaneously and controlling transmission of the uplink control channel in accordance with transmission priorities corresponding to duplex modes if the uplink control channel cannot be transmitted in the multiple cells simultaneously. | 2,400 |
8,926 | 8,926 | 14,865,346 | 2,447 | Systems, methods, and computer-readable media are presented for generating notifications for a person according to user-defined notification templates. In contrast to presenting notifications according to a default notification template, the disclosed subject matter is directed to generating a notification regarding a notification signal according to a user-defined notification template. Upon receiving a notification signal, a determination is made as to whether a first user-defined notification template from a template store is applicable to the notification signal. Upon determining that the user-defined notification template is applicable to the received notification signal, a notification corresponding to the notification signal is generated and presented according to the user-defined notification template. | 1. A computer-implemented method for presenting a notification from a notification source on a computing device, the method comprising each of the following as implemented on a computing device comprising at least a processor and a memory:
providing a template store, the template store including one or more user-defined notification templates; receiving a notification signal from a notification source; determining that a first user-defined notification template in the template store is applicable to the received notification signal; upon determining that the first user-defined notification template is applicable to the notification signal, generating a notification corresponding to the received notification signal according to the first user-defined notification template; and presenting the generated notification on the computing device as a notification regarding the received notification signal. 2. The computer-implemented method of claim 1:
wherein each of the one or more user-defined templates in the template store identifies a notification basis to which the user-defined notification template of the one or more user-defined notification templates of the template store is applicable to a corresponding notification signal; and wherein determining that the first user-defined notification template is applicable to the received notification signal comprises determining that the notification basis of the first user-defined notification template is applicable to the received notification signal. 3. The computer-implemented method of claim 2:
wherein each user-defined notification template of the one or more user-defined notification templates in the template store identifies a presentation format for generating the notification signal on the computing device; and wherein generating a notification corresponding to the received notification signal according to the first user-defined notification template comprises generating a notification corresponding to the received notification signal according to the identified presentation format of the first user-defined notification template. 4. The computer-implemented method of claim 3, wherein the first user-defined template identifies an associated condition, the associated condition not comprising the notification basis, to which the first user-defined notification template is applicable to a corresponding notification signal. 5. The computer-implemented method of claim 4, wherein determining that the first user-defined notification template is applicable to the received notification signal further comprises determining that the associated condition of the first user-defined notification template is satisfied by the received notification signal. 6. The computer-implemented method of claim 3, wherein the first user-defined template identifies an associated user action that a user can selectively carry out with regard to the received notification signal. 7. The computer-implemented method of claim 6, wherein generating the notification corresponding to the received notification signal according to the first user-defined notification template further comprises generating the notification corresponding to the received notification signal according to the first user-defined notification template to including a user-actionable control by which a user can selectively initiate the associated user action. 8. The computer-implemented method of claim 7 further comprising:
receiving an indication of a user activation of the user-actionable control; and
initiating the associated user action on the computing device. 9. The computer-implemented method of claim 3 further comprising upon determining that the first user-defined notification template is not applicable to the notification signal, generating a notification corresponding to the received notification signal according to a default notification template. 10. The computer-implemented method of claim 3, wherein the template store comprises a plurality of user-defined notification templates, including the first user-defined notification template. 11. The computer-implemented method of claim 10, wherein the plurality of user-defined notification templates in the template store includes at least one user-defined template obtained from a third party. 12. A computer-readable medium bearing computer-executable instructions which, when executed on a computing system comprising at least a processor, carry out a method for generating a notification in response to a notification signal, the method comprising:
providing a template store, the template store including one or more user-defined notification templates; receiving a notification signal from a notification source; determining that a first user-defined notification template in the template store is applicable to the received notification signal; upon determining that the first user-defined notification template is applicable to the notification signal, generating a notification corresponding to the received notification signal according to the first user-defined notification template; and presenting the generated notification on the computing device as a notification regarding the received notification signal. 13. The computer-readable medium of claim 12:
wherein each of the one or more user-defined templates in the template store identifies a notification basis to which the user-defined notification template of the one or more user-defined notification templates of the template store is applicable to a corresponding notification signal; and wherein determining that the first user-defined notification template is applicable to the received notification signal comprises determining that the notification basis of the first user-defined notification template is applicable to the received notification signal. 14. The computer-readable medium of claim 13:
wherein each user-defined notification template of the one or more user-defined notification templates in the template store identifies a presentation format for generating the notification signal on the computing device; and wherein generating a notification corresponding to the received notification signal according to the first user-defined notification template comprises generating a notification corresponding to the received notification signal according to the identified presentation format of the first user-defined notification template. 15. The computer-readable medium of claim 13:
wherein the first user-defined template identifies an associated condition, the associated condition not comprising the notification basis, to which the first user-defined notification template is applicable to a corresponding notification signal; and wherein determining that the first user-defined notification template is applicable to the received notification signal further comprises determining that the associated condition of the first user-defined notification template is satisfied by the received notification signal 16. The computer-readable medium of claim 13:
wherein the first user-defined template identifies an associated user action that a user can selectively carry out with regard to the received notification signal; and wherein generating the notification corresponding to the received notification signal according to the first user-defined notification template further comprises generating the notification corresponding to the received notification signal according to the first user-defined notification template to including a user-actionable control by which a user can selectively initiate the associated user action. 17. The computer-readable medium of claim 16, wherein the method further comprises:
receiving an indication of a user activation of the user-actionable control; and initiating the associated user action on the computing device. 18. A computing device for presenting a notification in response to receiving a notification signal, the computing device comprising a processor and a memory, wherein the processor executes instructions stored in the memory as part of or in conjunction with additional components to present a notification in response to a notification signal, the additional components comprising:
one or more notification sources, each notification source configured to detect a triggering condition corresponding to an event or condition for which a notification is to be generated, and upon detecting a triggering condition, is configured to generate and issue a notification signal; a notification system configured to receive an issued notification signal, and upon receiving the notification signal:
determine that a first user-defined notification template in a template store is applicable to the notification signal; and
upon determining that the first user-defined notification template is applicable to the notification signal, providing the first user-defined notification template and the notification signal to a notification builder; and
a notification builder configured to obtain a user-defined notification template and a notification signal from the notification system and generate a notification corresponding to the received notification signal according to the first user-defined notification template, and to present the generated notification on the computing device via an input/output (I/O) system of the computing device. 19. The computing device of claim 18, wherein the template store stores one or more user-defined notification templates, including the first user-defined notification template, and:
wherein each of the one or more user-defined templates in the template store identifies a notification basis to which the user-defined notification template of the one or more user-defined notification templates of the template store is applicable to a corresponding notification signal; and wherein determining that the first user-defined notification template is applicable to the received notification signal comprises determining that the notification basis of the first user-defined notification template is applicable to the received notification signal. 20. The computing device of claim 19:
wherein each user-defined notification template of the one or more user-defined notification templates in the template store identifies a presentation format for generating the notification signal on the computing device; and wherein the notification builder is configured to generate a notification corresponding to the received notification signal according to the first user-defined notification template, and further according to the identified presentation format of the first user-defined notification template. | Systems, methods, and computer-readable media are presented for generating notifications for a person according to user-defined notification templates. In contrast to presenting notifications according to a default notification template, the disclosed subject matter is directed to generating a notification regarding a notification signal according to a user-defined notification template. Upon receiving a notification signal, a determination is made as to whether a first user-defined notification template from a template store is applicable to the notification signal. Upon determining that the user-defined notification template is applicable to the received notification signal, a notification corresponding to the notification signal is generated and presented according to the user-defined notification template.1. A computer-implemented method for presenting a notification from a notification source on a computing device, the method comprising each of the following as implemented on a computing device comprising at least a processor and a memory:
providing a template store, the template store including one or more user-defined notification templates; receiving a notification signal from a notification source; determining that a first user-defined notification template in the template store is applicable to the received notification signal; upon determining that the first user-defined notification template is applicable to the notification signal, generating a notification corresponding to the received notification signal according to the first user-defined notification template; and presenting the generated notification on the computing device as a notification regarding the received notification signal. 2. The computer-implemented method of claim 1:
wherein each of the one or more user-defined templates in the template store identifies a notification basis to which the user-defined notification template of the one or more user-defined notification templates of the template store is applicable to a corresponding notification signal; and wherein determining that the first user-defined notification template is applicable to the received notification signal comprises determining that the notification basis of the first user-defined notification template is applicable to the received notification signal. 3. The computer-implemented method of claim 2:
wherein each user-defined notification template of the one or more user-defined notification templates in the template store identifies a presentation format for generating the notification signal on the computing device; and wherein generating a notification corresponding to the received notification signal according to the first user-defined notification template comprises generating a notification corresponding to the received notification signal according to the identified presentation format of the first user-defined notification template. 4. The computer-implemented method of claim 3, wherein the first user-defined template identifies an associated condition, the associated condition not comprising the notification basis, to which the first user-defined notification template is applicable to a corresponding notification signal. 5. The computer-implemented method of claim 4, wherein determining that the first user-defined notification template is applicable to the received notification signal further comprises determining that the associated condition of the first user-defined notification template is satisfied by the received notification signal. 6. The computer-implemented method of claim 3, wherein the first user-defined template identifies an associated user action that a user can selectively carry out with regard to the received notification signal. 7. The computer-implemented method of claim 6, wherein generating the notification corresponding to the received notification signal according to the first user-defined notification template further comprises generating the notification corresponding to the received notification signal according to the first user-defined notification template to including a user-actionable control by which a user can selectively initiate the associated user action. 8. The computer-implemented method of claim 7 further comprising:
receiving an indication of a user activation of the user-actionable control; and
initiating the associated user action on the computing device. 9. The computer-implemented method of claim 3 further comprising upon determining that the first user-defined notification template is not applicable to the notification signal, generating a notification corresponding to the received notification signal according to a default notification template. 10. The computer-implemented method of claim 3, wherein the template store comprises a plurality of user-defined notification templates, including the first user-defined notification template. 11. The computer-implemented method of claim 10, wherein the plurality of user-defined notification templates in the template store includes at least one user-defined template obtained from a third party. 12. A computer-readable medium bearing computer-executable instructions which, when executed on a computing system comprising at least a processor, carry out a method for generating a notification in response to a notification signal, the method comprising:
providing a template store, the template store including one or more user-defined notification templates; receiving a notification signal from a notification source; determining that a first user-defined notification template in the template store is applicable to the received notification signal; upon determining that the first user-defined notification template is applicable to the notification signal, generating a notification corresponding to the received notification signal according to the first user-defined notification template; and presenting the generated notification on the computing device as a notification regarding the received notification signal. 13. The computer-readable medium of claim 12:
wherein each of the one or more user-defined templates in the template store identifies a notification basis to which the user-defined notification template of the one or more user-defined notification templates of the template store is applicable to a corresponding notification signal; and wherein determining that the first user-defined notification template is applicable to the received notification signal comprises determining that the notification basis of the first user-defined notification template is applicable to the received notification signal. 14. The computer-readable medium of claim 13:
wherein each user-defined notification template of the one or more user-defined notification templates in the template store identifies a presentation format for generating the notification signal on the computing device; and wherein generating a notification corresponding to the received notification signal according to the first user-defined notification template comprises generating a notification corresponding to the received notification signal according to the identified presentation format of the first user-defined notification template. 15. The computer-readable medium of claim 13:
wherein the first user-defined template identifies an associated condition, the associated condition not comprising the notification basis, to which the first user-defined notification template is applicable to a corresponding notification signal; and wherein determining that the first user-defined notification template is applicable to the received notification signal further comprises determining that the associated condition of the first user-defined notification template is satisfied by the received notification signal 16. The computer-readable medium of claim 13:
wherein the first user-defined template identifies an associated user action that a user can selectively carry out with regard to the received notification signal; and wherein generating the notification corresponding to the received notification signal according to the first user-defined notification template further comprises generating the notification corresponding to the received notification signal according to the first user-defined notification template to including a user-actionable control by which a user can selectively initiate the associated user action. 17. The computer-readable medium of claim 16, wherein the method further comprises:
receiving an indication of a user activation of the user-actionable control; and initiating the associated user action on the computing device. 18. A computing device for presenting a notification in response to receiving a notification signal, the computing device comprising a processor and a memory, wherein the processor executes instructions stored in the memory as part of or in conjunction with additional components to present a notification in response to a notification signal, the additional components comprising:
one or more notification sources, each notification source configured to detect a triggering condition corresponding to an event or condition for which a notification is to be generated, and upon detecting a triggering condition, is configured to generate and issue a notification signal; a notification system configured to receive an issued notification signal, and upon receiving the notification signal:
determine that a first user-defined notification template in a template store is applicable to the notification signal; and
upon determining that the first user-defined notification template is applicable to the notification signal, providing the first user-defined notification template and the notification signal to a notification builder; and
a notification builder configured to obtain a user-defined notification template and a notification signal from the notification system and generate a notification corresponding to the received notification signal according to the first user-defined notification template, and to present the generated notification on the computing device via an input/output (I/O) system of the computing device. 19. The computing device of claim 18, wherein the template store stores one or more user-defined notification templates, including the first user-defined notification template, and:
wherein each of the one or more user-defined templates in the template store identifies a notification basis to which the user-defined notification template of the one or more user-defined notification templates of the template store is applicable to a corresponding notification signal; and wherein determining that the first user-defined notification template is applicable to the received notification signal comprises determining that the notification basis of the first user-defined notification template is applicable to the received notification signal. 20. The computing device of claim 19:
wherein each user-defined notification template of the one or more user-defined notification templates in the template store identifies a presentation format for generating the notification signal on the computing device; and wherein the notification builder is configured to generate a notification corresponding to the received notification signal according to the first user-defined notification template, and further according to the identified presentation format of the first user-defined notification template. | 2,400 |
8,927 | 8,927 | 15,436,575 | 2,454 | A network system stores in a database, a record associated with a service for a requesting user and provided by a service provider. The record can indicate a starting event for the requested service, including a start time. During a duration of time subsequent to the start time and before determining an end event for the service, the network system receives an event indication from a provider device of the service provider or a user device of the requesting user. The event indication can include audio data captured by the provider device or the user device. The network system can analyze the event indication to determine whether a safety event has occurred. In response to determining that the safety event has occurred, the network system can perform one or more safety operations. The safety operations can include transmitting a notification to the provider device and/or the user device. | 1. A network system comprising:
one or more processors; and one or more memory resources storing instructions that, when executed by the one or more processors, cause the one or more processors to:
store, in a database, a record associated with a service for a requesting user and provided by a service provider, the requesting user being associated with a requesting user device and the service provider being associated with a provider device;
associate, with the record, data indicating a start event for the service, including a start time;
during a duration of time subsequent to the start time and before a determination of an end event for the service, receive a first event indication from a first one of the provider device or the requesting user device, the first event indication including audio data captured by a microphone of the first one of the provider device or the requesting user device in an environment of the service provider and the requesting user;
determine whether a safety event has occurred by analyzing the first event indication; and
in response to determining that a safety event has occurred, perform one or more safety operations. 2. The network system of claim 1, wherein the first event indication is generated based on detecting an elevation in pitch or volume of an acoustic signal of the environment. 3. The network system of claim 2, wherein the executed instructions further cause the one or more processors to determine whether a safety event has occurred by comparing the detected elevation in pitch or volume against a normalized value for the environment. 4. The network system of claim 1, wherein the executed instructions further cause the one or more processors to determine whether a safety event has occurred by:
causing a second one of the provider device or the requesting user device to initiate monitoring of the environment of the service provider and the requesting user; receiving a second event indication generated by the second one of the provider device or the requesting user device, the second event indication including audio data captured by a microphone of the second one of the provider device or the requesting user device in the environment of the service provider and the requesting user; and analyzing the second event indication. 5. The network system of claim 1, wherein the executed instructions further cause the one or more processors to determine a concerned party based on the received first event indication. 6. The network system of claim 1, wherein the one or more safety operations include transmitting a notification to the provider device or to the requesting user device. 7. The network system of claim 1, wherein the one or more safety operations include transmitting data to the provider device or the requesting user device to initiate audio or video communication with the provider device or the requesting user device. 8. The network system of claim 1, wherein the one or more safety operations include transmitting data to the provider device or the requesting user device to cause the provider device or the requesting user device to capture video and to transmit, to the network system, data corresponding to the captured video. 9. The network system of claim 1, wherein the one or more safety operations include:
identifying, from a location database, a location determined to be safe based on a location of the provider device or the requesting user device; updating a service route of the service provider, the updated service route including the identified location; and transmitting data corresponding to an updated route to the provider device. 10. The network system of claim 1, wherein the one or more safety operations include transmitting location data to a third party. 11. The network system of claim 1, wherein the executed instructions further cause the one or more processors to:
receive a second event indication from a second provider device of a second service provider or a second user device of a second user; analyze the second event indication to determine whether the second event indication corresponds to the safety event; and in response to determining that the second event indication corresponds to the safety event, determine an approximate location of the safety event. 12. The network system of claim 11, wherein determining an approximate location of the safety event is based on respective times of receipt of the first event indication and the second event indication. 13. The network system of claim 11, wherein determining an approximate location of the safety event is based on the respective locations of the service provider and the second service provider. 14. The network system of claim 11, wherein the one or more safety operations include transmitting data corresponding to the safety event, including data corresponding to the approximate location of the safety event, to computer systems operated by one or more emergency services. 15. A non-transitory computer readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to:
store, in a database, a record associated with a service for a requesting user and provided by a service provider, the requesting user being associated with a requesting user device and the service provider being associated with a provider device; associate, with the record, data indicating a start event for the service, including a start time; during a duration of time subsequent to the start time and before a determination of an end event for the service, receive a first event indication from a first one of the provider device or the requesting user device, the first event indication including audio data captured by a microphone of the first one of the provider device or the requesting user device in an environment of the service provider and the requesting user; determine whether a safety event has occurred by analyzing the first event indication; and in response to determining that a safety event has occurred, perform one or more safety operations. 16. The non-transitory computer readable medium of claim 15, wherein the one or more safety operations include transmitting a notification to the provider device or to the requesting user device. 17. The non-transitory computer readable medium of claim 15, wherein the executed instructions further cause the one or more processors to:
receive a second event indication from a second provider device of a second service provider or a second user device of a second user; analyze the second event indication to determine whether the second event indication corresponds to the safety event; and in response to determining that the second event indication corresponds to the safety event, determine an approximate location of the safety event. 18. A computer-implemented method of determining potential safety events occurring during a provision of a network service by a service provider for a requesting user, comprising:
storing, in a database, a record associated with a service for a requesting user and provided by a service provider, the requesting user being associated with a requesting user device and the service provider being associated with a provider device; associating, with the record, data indicating a start event for the service, including a start time; during a duration of time subsequent to the start time and before a determination of an end event for the service, receiving a first event indication from a first one of the provider device or the requesting user device, the first event indication including audio data captured by a microphone of the first one of the provider device or the requesting user device in an environment of the service provider and the requesting user; determining whether a safety event has occurred by analyzing the first event indication; and in response to determining that a safety event has occurred, performing one or more safety operations. 19. The method of claim 18, wherein the one or more safety operations include transmitting a notification to the provider device or to the requesting user device. 20. The method of claim 18, further comprising:
receiving a second event indication from a second provider device of a second service provider or a second user device of a second user; analyzing the second event indication to determine whether the second event indication corresponds to the safety event; and in response to determining that the second event indication corresponds to the safety event, determining an approximate location of the safety event. | A network system stores in a database, a record associated with a service for a requesting user and provided by a service provider. The record can indicate a starting event for the requested service, including a start time. During a duration of time subsequent to the start time and before determining an end event for the service, the network system receives an event indication from a provider device of the service provider or a user device of the requesting user. The event indication can include audio data captured by the provider device or the user device. The network system can analyze the event indication to determine whether a safety event has occurred. In response to determining that the safety event has occurred, the network system can perform one or more safety operations. The safety operations can include transmitting a notification to the provider device and/or the user device.1. A network system comprising:
one or more processors; and one or more memory resources storing instructions that, when executed by the one or more processors, cause the one or more processors to:
store, in a database, a record associated with a service for a requesting user and provided by a service provider, the requesting user being associated with a requesting user device and the service provider being associated with a provider device;
associate, with the record, data indicating a start event for the service, including a start time;
during a duration of time subsequent to the start time and before a determination of an end event for the service, receive a first event indication from a first one of the provider device or the requesting user device, the first event indication including audio data captured by a microphone of the first one of the provider device or the requesting user device in an environment of the service provider and the requesting user;
determine whether a safety event has occurred by analyzing the first event indication; and
in response to determining that a safety event has occurred, perform one or more safety operations. 2. The network system of claim 1, wherein the first event indication is generated based on detecting an elevation in pitch or volume of an acoustic signal of the environment. 3. The network system of claim 2, wherein the executed instructions further cause the one or more processors to determine whether a safety event has occurred by comparing the detected elevation in pitch or volume against a normalized value for the environment. 4. The network system of claim 1, wherein the executed instructions further cause the one or more processors to determine whether a safety event has occurred by:
causing a second one of the provider device or the requesting user device to initiate monitoring of the environment of the service provider and the requesting user; receiving a second event indication generated by the second one of the provider device or the requesting user device, the second event indication including audio data captured by a microphone of the second one of the provider device or the requesting user device in the environment of the service provider and the requesting user; and analyzing the second event indication. 5. The network system of claim 1, wherein the executed instructions further cause the one or more processors to determine a concerned party based on the received first event indication. 6. The network system of claim 1, wherein the one or more safety operations include transmitting a notification to the provider device or to the requesting user device. 7. The network system of claim 1, wherein the one or more safety operations include transmitting data to the provider device or the requesting user device to initiate audio or video communication with the provider device or the requesting user device. 8. The network system of claim 1, wherein the one or more safety operations include transmitting data to the provider device or the requesting user device to cause the provider device or the requesting user device to capture video and to transmit, to the network system, data corresponding to the captured video. 9. The network system of claim 1, wherein the one or more safety operations include:
identifying, from a location database, a location determined to be safe based on a location of the provider device or the requesting user device; updating a service route of the service provider, the updated service route including the identified location; and transmitting data corresponding to an updated route to the provider device. 10. The network system of claim 1, wherein the one or more safety operations include transmitting location data to a third party. 11. The network system of claim 1, wherein the executed instructions further cause the one or more processors to:
receive a second event indication from a second provider device of a second service provider or a second user device of a second user; analyze the second event indication to determine whether the second event indication corresponds to the safety event; and in response to determining that the second event indication corresponds to the safety event, determine an approximate location of the safety event. 12. The network system of claim 11, wherein determining an approximate location of the safety event is based on respective times of receipt of the first event indication and the second event indication. 13. The network system of claim 11, wherein determining an approximate location of the safety event is based on the respective locations of the service provider and the second service provider. 14. The network system of claim 11, wherein the one or more safety operations include transmitting data corresponding to the safety event, including data corresponding to the approximate location of the safety event, to computer systems operated by one or more emergency services. 15. A non-transitory computer readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to:
store, in a database, a record associated with a service for a requesting user and provided by a service provider, the requesting user being associated with a requesting user device and the service provider being associated with a provider device; associate, with the record, data indicating a start event for the service, including a start time; during a duration of time subsequent to the start time and before a determination of an end event for the service, receive a first event indication from a first one of the provider device or the requesting user device, the first event indication including audio data captured by a microphone of the first one of the provider device or the requesting user device in an environment of the service provider and the requesting user; determine whether a safety event has occurred by analyzing the first event indication; and in response to determining that a safety event has occurred, perform one or more safety operations. 16. The non-transitory computer readable medium of claim 15, wherein the one or more safety operations include transmitting a notification to the provider device or to the requesting user device. 17. The non-transitory computer readable medium of claim 15, wherein the executed instructions further cause the one or more processors to:
receive a second event indication from a second provider device of a second service provider or a second user device of a second user; analyze the second event indication to determine whether the second event indication corresponds to the safety event; and in response to determining that the second event indication corresponds to the safety event, determine an approximate location of the safety event. 18. A computer-implemented method of determining potential safety events occurring during a provision of a network service by a service provider for a requesting user, comprising:
storing, in a database, a record associated with a service for a requesting user and provided by a service provider, the requesting user being associated with a requesting user device and the service provider being associated with a provider device; associating, with the record, data indicating a start event for the service, including a start time; during a duration of time subsequent to the start time and before a determination of an end event for the service, receiving a first event indication from a first one of the provider device or the requesting user device, the first event indication including audio data captured by a microphone of the first one of the provider device or the requesting user device in an environment of the service provider and the requesting user; determining whether a safety event has occurred by analyzing the first event indication; and in response to determining that a safety event has occurred, performing one or more safety operations. 19. The method of claim 18, wherein the one or more safety operations include transmitting a notification to the provider device or to the requesting user device. 20. The method of claim 18, further comprising:
receiving a second event indication from a second provider device of a second service provider or a second user device of a second user; analyzing the second event indication to determine whether the second event indication corresponds to the safety event; and in response to determining that the second event indication corresponds to the safety event, determining an approximate location of the safety event. | 2,400 |
8,928 | 8,928 | 15,364,036 | 2,419 | A computer-implemented method, operable on a device in a content delivery network (CDN), wherein the CDN delivers content on behalf of at least one content provider, the device implementing a content delivery (CD) service, the method includes receiving a request from a client for particular content; determining a second device in said CDN, said first device being in a first cluster and said second device being in a second cluster distinct from said first cluster; migrating said request to said second device; and then providing said second device with network traffic from said client. | 1. A computer-implemented method, operable on a first device in a content delivery network (CDN), wherein said CDN delivers content on behalf of at least one content provider, said first device implementing a content delivery (CD) service, the method comprising, by said CD service on said first device:
(A) receiving a request from a client for particular content; (B) determining a second device in said CDN, said first device being in a first cluster and said second device being in a second cluster distinct from said first cluster; (C) migrating said request to said second device; and then (D) providing said second device with network traffic from said client. 2. The method of claim 1 wherein said request from said client is at OSI layer 5, and wherein said network traffic from said client is at OSI layers 3 or 4. 3. The method of claim 1 wherein said service determines said second device in (B) using a rendezvous system. 4. The method of claim 3 wherein said rendezvous system comprises a domain name system (DNS). 5. The method of claim 1 wherein said service determines said second device without using said rendezvous system. 6. The method of claim 1 wherein said service determines said second device in (B) using one or more tables. 7. The method of claim 6 wherein said one or more tables comprise information from a rendezvous system. 8. The method of claim 6 wherein at least some of said one or more tables are on said first device. 9. The method of claim 6 wherein at least some of the tables are at a third device distinct from said first device. 10. The method of claim 1 wherein said service on said first device establishes a TCP/IP connection with the particular client prior to receiving said request in (A), and wherein said migrating in (C) migrates at least some TCP/IP information to the second device. 11. The method of claim 1 wherein the second device serves at least some of the particular content to the client. 12. The method of claim 11 wherein the request is an HTTP request and wherein the network traffic from the client comprises acknowledgments (ACKs), and wherein said providing in (D) comprises providing said second device with said ACKs from said client. 13. The method of claim 1 wherein said first device was chosen by a rendezvous system to handle the request from the client. 14. The method of claim 13 wherein the determining of the second device in (B) is based, at least in part, on information not known to the rendezvous system when said first device was chosen by said rendezvous system. 15. The method of claim 14 wherein said information comprises information associated with said request. 16. The method of claim 15 wherein said information comprises one or more of:
(i) a network address of the client;
(ii) customer information;
(iii) a size of the particular content;
(iv) a kind of the particular content;
(v) a serving policy associated with the particular content;
(vi) a media player need or used for the particular content;
(vii) a type of client's device;
(viii) a popularity of the particular content; and
(ix) an object identifier for the particular content. 17. The method of claim 1 wherein, in providing said second device with network traffic from said client in (D), said first device acts as a router for the request. 18. The method of claim 17 wherein, in providing said second device with network traffic from said client in (D), said first device acts as a pass-through router in only one direction for the request. 19. The method of claim 1 wherein multiple CD services in said CDN can handle said request, and wherein said CD service was selected for said request by a rendezvous system from a first subset of said multiple CD services in said CDN that can handle said request, and wherein CD services in said first subset are configured to handle a certain percentage or ratio of requests for said particular content and to migrate requests above that certain percentage or ratio. 20. The method of claim 1 wherein said CD service was selected for said request by a rendezvous system from a set of multiple CD services in said CDN that can handle said request, wherein said set of multiple CD services comprises fewer than all CD services in said CDN that can handle said request. 21. The method of claim 20 wherein each CD service in said set of multiple CD services attempts to migrate a certain predefined percentage of requests for said particular content. 22. The method of claim 21 wherein each CD service in said set of multiple CD services attempts to migrate at least some requests for said particular content when a number of requests for said particular content exceeds a predefined threshold associated with said particular content. 23. The method of claim 22 wherein each CD service in said set of multiple CD services attempts to migrate at least a certain ratio or percentage of said requests for said particular content when the number of requests for said particular content exceeds said predefined threshold associated with said particular content 24. The method of claim 23 wherein said certain ratio or percentage is 100%. 25. The method of claim 22 wherein said predefined threshold is based on utilization of said first device. 26. The method of claim 1 wherein said determining in (B) comprises determining a mapping of said request at the application level to a number in a particular range, wherein said number corresponds to a particular server in a particular cluster; and wherein said migrating in (C) migrates said request to said particular server. 27. The method of claim 26 wherein said determining of said mapping comprises applying a hash function to at least some of said request at the application level. 28. The method of claim 26 wherein said CD service on said first device is in a cluster different from said particular cluster. 29. The method of claim 26 wherein said particular server rejects the migration. 30. The method of claim 29 wherein, when said particular server rejects the migration, said CD service determines a third device in said CDN, distinct from said second device; migrates the request to the third device; and then provides the third device with network traffic from said client. 31. The method of claim 29 wherein, when said particular server rejects the migration, said CD service processes the request. 32. The method of claim 1 wherein said service on said first device comprises a first server and said second device in said CDN comprises a second server. 33. The method of claim 1 wherein said first device is capable of serving said particular content to said client. 34. An article of manufacture comprising a computer-readable medium having program instructions stored thereon, the program instructions, operable on a computer system in a content delivery network (CDN), said computer system implementing a content delivery (CD) service, wherein execution of the program instructions by one or more processors of said computer system causes the one or more processors to carry out the acts of:
(A) receiving a request from a client for particular content; (B) determining a second device in said CDN, said computer system being in a first cluster and said second device being in a second cluster distinct from said first cluster; (C) migrating said request to said second device; and then (D) providing said second device with network traffic from said client. 35. A particular device in a content delivery network (CDN), wherein said CDN delivers content on behalf of at least one content provider, said particular device implementing a content delivery (CD) service, the particular device:
(A) receiving a request from a client for particular content; (B) determining a second device in said CDN, said particular device being in a first cluster and said second device being in a second cluster distinct from said first cluster; (C) migrating said request to said second device; and then (D) providing said second device with network traffic from said client. 36. A content delivery network (CDN) wherein said CDN delivers content on behalf of at least one content provider, said CDN comprising:
one or more devices, including at least a first device implementing a content delivery (CD) service, the first device: (A) receiving a request from a client for particular content; (B) determining a second device in said CDN, said first device being in a first cluster and said second device being in a second cluster distinct from said first cluster; (C) migrating said request to said second device; and then (D) providing said second device with network traffic from said client. | A computer-implemented method, operable on a device in a content delivery network (CDN), wherein the CDN delivers content on behalf of at least one content provider, the device implementing a content delivery (CD) service, the method includes receiving a request from a client for particular content; determining a second device in said CDN, said first device being in a first cluster and said second device being in a second cluster distinct from said first cluster; migrating said request to said second device; and then providing said second device with network traffic from said client.1. A computer-implemented method, operable on a first device in a content delivery network (CDN), wherein said CDN delivers content on behalf of at least one content provider, said first device implementing a content delivery (CD) service, the method comprising, by said CD service on said first device:
(A) receiving a request from a client for particular content; (B) determining a second device in said CDN, said first device being in a first cluster and said second device being in a second cluster distinct from said first cluster; (C) migrating said request to said second device; and then (D) providing said second device with network traffic from said client. 2. The method of claim 1 wherein said request from said client is at OSI layer 5, and wherein said network traffic from said client is at OSI layers 3 or 4. 3. The method of claim 1 wherein said service determines said second device in (B) using a rendezvous system. 4. The method of claim 3 wherein said rendezvous system comprises a domain name system (DNS). 5. The method of claim 1 wherein said service determines said second device without using said rendezvous system. 6. The method of claim 1 wherein said service determines said second device in (B) using one or more tables. 7. The method of claim 6 wherein said one or more tables comprise information from a rendezvous system. 8. The method of claim 6 wherein at least some of said one or more tables are on said first device. 9. The method of claim 6 wherein at least some of the tables are at a third device distinct from said first device. 10. The method of claim 1 wherein said service on said first device establishes a TCP/IP connection with the particular client prior to receiving said request in (A), and wherein said migrating in (C) migrates at least some TCP/IP information to the second device. 11. The method of claim 1 wherein the second device serves at least some of the particular content to the client. 12. The method of claim 11 wherein the request is an HTTP request and wherein the network traffic from the client comprises acknowledgments (ACKs), and wherein said providing in (D) comprises providing said second device with said ACKs from said client. 13. The method of claim 1 wherein said first device was chosen by a rendezvous system to handle the request from the client. 14. The method of claim 13 wherein the determining of the second device in (B) is based, at least in part, on information not known to the rendezvous system when said first device was chosen by said rendezvous system. 15. The method of claim 14 wherein said information comprises information associated with said request. 16. The method of claim 15 wherein said information comprises one or more of:
(i) a network address of the client;
(ii) customer information;
(iii) a size of the particular content;
(iv) a kind of the particular content;
(v) a serving policy associated with the particular content;
(vi) a media player need or used for the particular content;
(vii) a type of client's device;
(viii) a popularity of the particular content; and
(ix) an object identifier for the particular content. 17. The method of claim 1 wherein, in providing said second device with network traffic from said client in (D), said first device acts as a router for the request. 18. The method of claim 17 wherein, in providing said second device with network traffic from said client in (D), said first device acts as a pass-through router in only one direction for the request. 19. The method of claim 1 wherein multiple CD services in said CDN can handle said request, and wherein said CD service was selected for said request by a rendezvous system from a first subset of said multiple CD services in said CDN that can handle said request, and wherein CD services in said first subset are configured to handle a certain percentage or ratio of requests for said particular content and to migrate requests above that certain percentage or ratio. 20. The method of claim 1 wherein said CD service was selected for said request by a rendezvous system from a set of multiple CD services in said CDN that can handle said request, wherein said set of multiple CD services comprises fewer than all CD services in said CDN that can handle said request. 21. The method of claim 20 wherein each CD service in said set of multiple CD services attempts to migrate a certain predefined percentage of requests for said particular content. 22. The method of claim 21 wherein each CD service in said set of multiple CD services attempts to migrate at least some requests for said particular content when a number of requests for said particular content exceeds a predefined threshold associated with said particular content. 23. The method of claim 22 wherein each CD service in said set of multiple CD services attempts to migrate at least a certain ratio or percentage of said requests for said particular content when the number of requests for said particular content exceeds said predefined threshold associated with said particular content 24. The method of claim 23 wherein said certain ratio or percentage is 100%. 25. The method of claim 22 wherein said predefined threshold is based on utilization of said first device. 26. The method of claim 1 wherein said determining in (B) comprises determining a mapping of said request at the application level to a number in a particular range, wherein said number corresponds to a particular server in a particular cluster; and wherein said migrating in (C) migrates said request to said particular server. 27. The method of claim 26 wherein said determining of said mapping comprises applying a hash function to at least some of said request at the application level. 28. The method of claim 26 wherein said CD service on said first device is in a cluster different from said particular cluster. 29. The method of claim 26 wherein said particular server rejects the migration. 30. The method of claim 29 wherein, when said particular server rejects the migration, said CD service determines a third device in said CDN, distinct from said second device; migrates the request to the third device; and then provides the third device with network traffic from said client. 31. The method of claim 29 wherein, when said particular server rejects the migration, said CD service processes the request. 32. The method of claim 1 wherein said service on said first device comprises a first server and said second device in said CDN comprises a second server. 33. The method of claim 1 wherein said first device is capable of serving said particular content to said client. 34. An article of manufacture comprising a computer-readable medium having program instructions stored thereon, the program instructions, operable on a computer system in a content delivery network (CDN), said computer system implementing a content delivery (CD) service, wherein execution of the program instructions by one or more processors of said computer system causes the one or more processors to carry out the acts of:
(A) receiving a request from a client for particular content; (B) determining a second device in said CDN, said computer system being in a first cluster and said second device being in a second cluster distinct from said first cluster; (C) migrating said request to said second device; and then (D) providing said second device with network traffic from said client. 35. A particular device in a content delivery network (CDN), wherein said CDN delivers content on behalf of at least one content provider, said particular device implementing a content delivery (CD) service, the particular device:
(A) receiving a request from a client for particular content; (B) determining a second device in said CDN, said particular device being in a first cluster and said second device being in a second cluster distinct from said first cluster; (C) migrating said request to said second device; and then (D) providing said second device with network traffic from said client. 36. A content delivery network (CDN) wherein said CDN delivers content on behalf of at least one content provider, said CDN comprising:
one or more devices, including at least a first device implementing a content delivery (CD) service, the first device: (A) receiving a request from a client for particular content; (B) determining a second device in said CDN, said first device being in a first cluster and said second device being in a second cluster distinct from said first cluster; (C) migrating said request to said second device; and then (D) providing said second device with network traffic from said client. | 2,400 |
8,929 | 8,929 | 15,808,937 | 2,433 | Embodiments include method, systems and computer program products for automatic detection of an incomplete static analysis security assessment. In some embodiments, a method includes obtaining component versioning data associated with a build of an application. The method further includes determining, using the component versioning data associated with the build of the application, that a static analysis security assessment configuration of the application is incomplete. The method further includes, responsive to determining that the static analysis security assessment configuration of the application is incomplete, generating metadata indicating that at least a portion of the build of the application has been changed from a previous build of the application. | 1. A computer-implemented method for automatic detection of an incomplete static analysis security assessment, the method comprising:
obtaining component versioning data associated with a build of an application; determining, using the component versioning data associated with the build of the application, that a static analysis security assessment configuration of the application is incomplete; and responsive to determining that the static analysis security assessment configuration of the application is incomplete, generating metadata indicating that at least a portion of the build of the application has been changed from a previous build of the application. 2. The computer-implemented method of claim 1, wherein obtaining the data associated with the new build of the application further comprises:
receiving a notification from a continuous integration server that indicates a build of an application has been generated; establishing a connection with a build product repository; and obtaining the data associated with the build of the application using information from the notification. 3. The computer-implemented method of claim 1, wherein the notification comprises the data associated with the build of the application. 4. The computer-implemented method of claim 1, further comprising:
initiating a new static analysis security assessment associated with the application using the data associated with the build of the application. 5. The computer-implemented method of claim 1, wherein the data associated with the build of the application indicates that the application comprises an updated version of a component of the application. 6. The computer-implemented method of claim 1, further comprising:
generating an application portfolio comprising a plurality of static analysis security assessment configurations associated with a plurality of applications, wherein the plurality of applications comprises the application; and updating the application portfolio using the metadata associated with the application. 7. The computer-implemented method of claim 1, further comprising:
receiving information from a source control server indicating that a change has been made affecting the static analysis security assessment configuration associated with the application; generating an updated static analysis security assessment configuration associated with the application; and initiating a new static analysis security assessment using the updated static analysis security assessment configuration associated with the application. | Embodiments include method, systems and computer program products for automatic detection of an incomplete static analysis security assessment. In some embodiments, a method includes obtaining component versioning data associated with a build of an application. The method further includes determining, using the component versioning data associated with the build of the application, that a static analysis security assessment configuration of the application is incomplete. The method further includes, responsive to determining that the static analysis security assessment configuration of the application is incomplete, generating metadata indicating that at least a portion of the build of the application has been changed from a previous build of the application.1. A computer-implemented method for automatic detection of an incomplete static analysis security assessment, the method comprising:
obtaining component versioning data associated with a build of an application; determining, using the component versioning data associated with the build of the application, that a static analysis security assessment configuration of the application is incomplete; and responsive to determining that the static analysis security assessment configuration of the application is incomplete, generating metadata indicating that at least a portion of the build of the application has been changed from a previous build of the application. 2. The computer-implemented method of claim 1, wherein obtaining the data associated with the new build of the application further comprises:
receiving a notification from a continuous integration server that indicates a build of an application has been generated; establishing a connection with a build product repository; and obtaining the data associated with the build of the application using information from the notification. 3. The computer-implemented method of claim 1, wherein the notification comprises the data associated with the build of the application. 4. The computer-implemented method of claim 1, further comprising:
initiating a new static analysis security assessment associated with the application using the data associated with the build of the application. 5. The computer-implemented method of claim 1, wherein the data associated with the build of the application indicates that the application comprises an updated version of a component of the application. 6. The computer-implemented method of claim 1, further comprising:
generating an application portfolio comprising a plurality of static analysis security assessment configurations associated with a plurality of applications, wherein the plurality of applications comprises the application; and updating the application portfolio using the metadata associated with the application. 7. The computer-implemented method of claim 1, further comprising:
receiving information from a source control server indicating that a change has been made affecting the static analysis security assessment configuration associated with the application; generating an updated static analysis security assessment configuration associated with the application; and initiating a new static analysis security assessment using the updated static analysis security assessment configuration associated with the application. | 2,400 |
8,930 | 8,930 | 15,904,923 | 2,497 | A system, method, apparatus, and computer program product to detect page impersonation in phishing attacks. The system detects phishing attempts by extracting an embedded URL from an e-mail message and captures a screenshot image of the referenced site. The captured screenshot is analyzed with an image recognition module that compares the captured screenshot with a record screenshot of one or more trusted sites. If the comparison indicates that the screenshots differ, the embedded URL is marked as safe. If the comparison indicates that the screenshots are the same, the domain of the embedded URL is compared with the domain for the trusted site. When the domains differ, the e-mail is marked as a page impersonation attempt. When the domains correspond, the e-mail is marked as safe. The system includes a page impersonation database of trusted site URLs, domains, and record screenshots. | 1. A system for detecting page impersonation in phishing attacks, comprising:
a computer having a processor and a network communication; and a program product comprising machine-readable program code for causing, when executed, the computer to perform the following process steps:
automatically analyzing the body of an e-mail message to detect an embedded universal resource locator (URL);
automatically extracting the embedded URL;
automatically capturing a screenshot of a website referenced by the embedded URL;
automatically comparing the captured screenshot with a record screenshot, wherein the record screenshot corresponds a trusted site; and
when the captured screenshot does not match the record screenshot, marking the embedded URL as safe. 2. The system of claim 1, further comprising:
when the captured screenshot matches the record screenshot, determining if a domain of the embedded URL corresponds to a trusted domain. 3. The system of claim 2, further comprising:
when the domain of the embedded URL corresponds to the trusted domain, marking the embedded URL as safe. 4. The system of claim 3, further comprising:
when the domain of the embedded URL does not correspond to the trusted domain, marking the e-mail message as a page impersonation attempt. 5. The system of claim 1, further comprising:
a page impersonation database storing data associated with the trusted site, wherein the trusted site data includes: a trusted URL, a trusted domain corresponding to the trusted URL, and the record screenshot. 6. The system of claim 5, further comprising:
receiving a URL designating a contributed site from a user; and storing the contributed site in the page impersonation database. 7. The system of claim 6, further comprising:
automatically capturing a screenshot of the contributed site; and storing the screenshot for the contributed site in the page impersonation database. 8. A method for detecting a page impersonation phishing attempt presented by an e-mail message, comprising:
automatically analyzing the body of an e-mail message to extract an embedded universal resource locator (URL); automatically capturing a screenshot of a website referenced by the embedded URL; automatically comparing the captured screenshot with a record screenshot, wherein the record screenshot corresponds with a trusted site; and when the captured screenshot does not match the record screenshot, marking the embedded URL as safe. 9. The method of claim 8, further comprising:
when the captured screenshot matches the record screenshot, determining if a domain of the embedded URL corresponds to a trusted domain associated with the trusted site. 10. The method of claim 9, further comprising:
when the domain of the embedded URL corresponds to the trusted domain, marking the embedded URL as safe. 11. The method of claim 10, further comprising:
when the domain of the embedded URL does not correspond to the trusted domain, marking the e-mail message as a page impersonation attempt. 12. The method of claim 9, further comprising:
storing the trusted site in a page impersonation database, wherein the trusted site includes a trusted URL, a trusted domain corresponding to the trusted URL, and the record screenshot. 13. The method of claim 12, further comprising:
receiving a URL designating a contributed site from a user; and storing the contributed site in the page impersonation database. 14. The method of claim 13, further comprising:
automatically capturing a screenshot of the contributed site; and storing the screenshot for the contributed site in the page impersonation database. 15. A non-transitory computer-readable memory adapted to detect page impersonation phishing attacks, the non-transitory computer readable memory used to direct a computer to perform process steps, comprising:
automatically analyzing the body of an e-mail message to extract an embedded universal resource locator (URL); automatically capturing a screenshot of a website referenced by the embedded URL; automatically comparing the captured screenshot with a record screenshot, wherein the record screenshot corresponds with a trusted site; and when the captured screenshot does not match the record screenshot, marking the embedded URL as safe. 16. The non-transitory computer-readable memory of claim 15, wherein the process steps further comprise:
when the captured screenshot matches the record screenshot, determining if a domain of the embedded URL corresponds to a trusted domain associated with the trusted site. 17. The non-transitory computer-readable memory of claim 9, wherein the process steps further comprise:
when the domain of the embedded URL corresponds to the trusted domain, marking the embedded URL as safe. 18. The non-transitory computer-readable memory of claim 17, wherein the process steps further comprise:
when the domain of the embedded URL does not correspond to the trusted domain, marking the e-mail message as a page impersonation attempt. 19. The non-transitory computer-readable memory of claim 18, wherein the process steps further comprise:
storing the trusted site in a page impersonation database, wherein the trusted site includes a trusted URL, a trusted domain corresponding to the trusted URL, and the record screenshot. 20. The non-transitory computer-readable memory of claim 19, wherein the process steps further comprise:
receiving a URL designating a contributed site from a user; automatically capturing a screenshot of the contributed site; and storing the contributed site and the screenshot of the contributed site in the page impersonation database. | A system, method, apparatus, and computer program product to detect page impersonation in phishing attacks. The system detects phishing attempts by extracting an embedded URL from an e-mail message and captures a screenshot image of the referenced site. The captured screenshot is analyzed with an image recognition module that compares the captured screenshot with a record screenshot of one or more trusted sites. If the comparison indicates that the screenshots differ, the embedded URL is marked as safe. If the comparison indicates that the screenshots are the same, the domain of the embedded URL is compared with the domain for the trusted site. When the domains differ, the e-mail is marked as a page impersonation attempt. When the domains correspond, the e-mail is marked as safe. The system includes a page impersonation database of trusted site URLs, domains, and record screenshots.1. A system for detecting page impersonation in phishing attacks, comprising:
a computer having a processor and a network communication; and a program product comprising machine-readable program code for causing, when executed, the computer to perform the following process steps:
automatically analyzing the body of an e-mail message to detect an embedded universal resource locator (URL);
automatically extracting the embedded URL;
automatically capturing a screenshot of a website referenced by the embedded URL;
automatically comparing the captured screenshot with a record screenshot, wherein the record screenshot corresponds a trusted site; and
when the captured screenshot does not match the record screenshot, marking the embedded URL as safe. 2. The system of claim 1, further comprising:
when the captured screenshot matches the record screenshot, determining if a domain of the embedded URL corresponds to a trusted domain. 3. The system of claim 2, further comprising:
when the domain of the embedded URL corresponds to the trusted domain, marking the embedded URL as safe. 4. The system of claim 3, further comprising:
when the domain of the embedded URL does not correspond to the trusted domain, marking the e-mail message as a page impersonation attempt. 5. The system of claim 1, further comprising:
a page impersonation database storing data associated with the trusted site, wherein the trusted site data includes: a trusted URL, a trusted domain corresponding to the trusted URL, and the record screenshot. 6. The system of claim 5, further comprising:
receiving a URL designating a contributed site from a user; and storing the contributed site in the page impersonation database. 7. The system of claim 6, further comprising:
automatically capturing a screenshot of the contributed site; and storing the screenshot for the contributed site in the page impersonation database. 8. A method for detecting a page impersonation phishing attempt presented by an e-mail message, comprising:
automatically analyzing the body of an e-mail message to extract an embedded universal resource locator (URL); automatically capturing a screenshot of a website referenced by the embedded URL; automatically comparing the captured screenshot with a record screenshot, wherein the record screenshot corresponds with a trusted site; and when the captured screenshot does not match the record screenshot, marking the embedded URL as safe. 9. The method of claim 8, further comprising:
when the captured screenshot matches the record screenshot, determining if a domain of the embedded URL corresponds to a trusted domain associated with the trusted site. 10. The method of claim 9, further comprising:
when the domain of the embedded URL corresponds to the trusted domain, marking the embedded URL as safe. 11. The method of claim 10, further comprising:
when the domain of the embedded URL does not correspond to the trusted domain, marking the e-mail message as a page impersonation attempt. 12. The method of claim 9, further comprising:
storing the trusted site in a page impersonation database, wherein the trusted site includes a trusted URL, a trusted domain corresponding to the trusted URL, and the record screenshot. 13. The method of claim 12, further comprising:
receiving a URL designating a contributed site from a user; and storing the contributed site in the page impersonation database. 14. The method of claim 13, further comprising:
automatically capturing a screenshot of the contributed site; and storing the screenshot for the contributed site in the page impersonation database. 15. A non-transitory computer-readable memory adapted to detect page impersonation phishing attacks, the non-transitory computer readable memory used to direct a computer to perform process steps, comprising:
automatically analyzing the body of an e-mail message to extract an embedded universal resource locator (URL); automatically capturing a screenshot of a website referenced by the embedded URL; automatically comparing the captured screenshot with a record screenshot, wherein the record screenshot corresponds with a trusted site; and when the captured screenshot does not match the record screenshot, marking the embedded URL as safe. 16. The non-transitory computer-readable memory of claim 15, wherein the process steps further comprise:
when the captured screenshot matches the record screenshot, determining if a domain of the embedded URL corresponds to a trusted domain associated with the trusted site. 17. The non-transitory computer-readable memory of claim 9, wherein the process steps further comprise:
when the domain of the embedded URL corresponds to the trusted domain, marking the embedded URL as safe. 18. The non-transitory computer-readable memory of claim 17, wherein the process steps further comprise:
when the domain of the embedded URL does not correspond to the trusted domain, marking the e-mail message as a page impersonation attempt. 19. The non-transitory computer-readable memory of claim 18, wherein the process steps further comprise:
storing the trusted site in a page impersonation database, wherein the trusted site includes a trusted URL, a trusted domain corresponding to the trusted URL, and the record screenshot. 20. The non-transitory computer-readable memory of claim 19, wherein the process steps further comprise:
receiving a URL designating a contributed site from a user; automatically capturing a screenshot of the contributed site; and storing the contributed site and the screenshot of the contributed site in the page impersonation database. | 2,400 |
8,931 | 8,931 | 15,546,053 | 2,413 | In a method for miming a computer network ( 2 ) comprising a number of devices ( 4 a - d ) comprising at least one network port ( 6 a - c ) and being interconnected by network links ( 8 a - c ) connecting two respective ports ( 6 a - c ), wherein each of the network ports ( 6 a - c ) is running the LLDP protocol ( 9 ) and comprises a remote MIB ( 10 a - c ), a change of a physical state (up, down) of a network link ( 8 a - c ) triggers an update of the information in the remote MIB ( 10 a - c ) of the ports ( 6 a - c ) associated with this link ( 8 a - c ), especially immediately after the change of the physical state (up, down). A computer network ( 2 ) comprising a number of devices ( 4 a - d ) comprising at least one network port ( 6 a - c ) and being interconnected by network links ( 8 a - c ) connecting two respective ports ( 6 a - c ), wherein each of the network ports ( 6 a - c ) is running the LLDP protocol ( 9 ) and comprises a remote MIB ( 10 a - c ) is adapted for performing the above method. | 1. A method for running a computer network (2) having a number of devices (4 a-d), wherein each of the devices (4 a-d) comprises at least one network port (6 a-c), wherein the devices (4 a-d) are interconnected within the network (2) by network links (8 a-c), each link (8 a-c) connecting two respective ports (6 a-c), the method comprising: running the LLDP protocol (9) at each of the network ports (6 a-c) having a remote MIB (10 a-c); and triggering an update of the information in the remote MIB (10 a-c) of the ports (6 a-c) associated with this link (8 a-c), in response to a change of a physical state (up, down) of a network link (8 a-c), especially immediately after the change of the physical state (up,down). 2. The method according to claim 1, whereby each information in the remote MIB (10 a-c) comprises a TTL, wherein the information in the remote MIB (10 a-c) is updated though the TTL associated with the respective information has not yet expired. 3. The method according to claim 1, wherein the information in the remote MIB (10 a-c) is updated at least in respect of information related to the ports (6 a-c) associated with the changed link (8 a-c). 4. The method according to claim 1, wherein after a link state (up,down) of a link (8 a-c) changes from “up” to “down”, for the ports (6 a-c) associated with this link (8 a-c) all information in the remote MIB (10 a-c) learned via the ports (6 a-c) of the changed link (8 a-c) are removed, especially immediately after the change of the physical state (up,down). 5. The method according to claim 1, wherein after a link state (up,down) of a link (8 a-c) changes from “down” to “up”, from the ports (6 a-c) associated with this link (8 a-c) an LLDPU that is updated in respect of this link (8 a-c) is sent out, especially immediately after the change of the physical state (up,down). 6. The method according to claim 1, wherein after an update of the information in the remote MIB (10 a-c), a receiver (12) is notified of the update, especially immediately after the update. 7. A computer network (2) comprising a number of devices (4 a-d), wherein each of the devices (4 a-d) comprises at least one network port (6 a-c), wherein the devices (4 a-d) are interconnected within the network (2) by network links (8 a-c), each link (8 a-c) connecting two respective ports (6 a-c), wherein each of the network ports (6 a-c) is running the LLDP protocol (9) and comprises a remote MIB (10 a-c), wherein the computer network (2) is adapted for performing a method according claim 1. | In a method for miming a computer network ( 2 ) comprising a number of devices ( 4 a - d ) comprising at least one network port ( 6 a - c ) and being interconnected by network links ( 8 a - c ) connecting two respective ports ( 6 a - c ), wherein each of the network ports ( 6 a - c ) is running the LLDP protocol ( 9 ) and comprises a remote MIB ( 10 a - c ), a change of a physical state (up, down) of a network link ( 8 a - c ) triggers an update of the information in the remote MIB ( 10 a - c ) of the ports ( 6 a - c ) associated with this link ( 8 a - c ), especially immediately after the change of the physical state (up, down). A computer network ( 2 ) comprising a number of devices ( 4 a - d ) comprising at least one network port ( 6 a - c ) and being interconnected by network links ( 8 a - c ) connecting two respective ports ( 6 a - c ), wherein each of the network ports ( 6 a - c ) is running the LLDP protocol ( 9 ) and comprises a remote MIB ( 10 a - c ) is adapted for performing the above method.1. A method for running a computer network (2) having a number of devices (4 a-d), wherein each of the devices (4 a-d) comprises at least one network port (6 a-c), wherein the devices (4 a-d) are interconnected within the network (2) by network links (8 a-c), each link (8 a-c) connecting two respective ports (6 a-c), the method comprising: running the LLDP protocol (9) at each of the network ports (6 a-c) having a remote MIB (10 a-c); and triggering an update of the information in the remote MIB (10 a-c) of the ports (6 a-c) associated with this link (8 a-c), in response to a change of a physical state (up, down) of a network link (8 a-c), especially immediately after the change of the physical state (up,down). 2. The method according to claim 1, whereby each information in the remote MIB (10 a-c) comprises a TTL, wherein the information in the remote MIB (10 a-c) is updated though the TTL associated with the respective information has not yet expired. 3. The method according to claim 1, wherein the information in the remote MIB (10 a-c) is updated at least in respect of information related to the ports (6 a-c) associated with the changed link (8 a-c). 4. The method according to claim 1, wherein after a link state (up,down) of a link (8 a-c) changes from “up” to “down”, for the ports (6 a-c) associated with this link (8 a-c) all information in the remote MIB (10 a-c) learned via the ports (6 a-c) of the changed link (8 a-c) are removed, especially immediately after the change of the physical state (up,down). 5. The method according to claim 1, wherein after a link state (up,down) of a link (8 a-c) changes from “down” to “up”, from the ports (6 a-c) associated with this link (8 a-c) an LLDPU that is updated in respect of this link (8 a-c) is sent out, especially immediately after the change of the physical state (up,down). 6. The method according to claim 1, wherein after an update of the information in the remote MIB (10 a-c), a receiver (12) is notified of the update, especially immediately after the update. 7. A computer network (2) comprising a number of devices (4 a-d), wherein each of the devices (4 a-d) comprises at least one network port (6 a-c), wherein the devices (4 a-d) are interconnected within the network (2) by network links (8 a-c), each link (8 a-c) connecting two respective ports (6 a-c), wherein each of the network ports (6 a-c) is running the LLDP protocol (9) and comprises a remote MIB (10 a-c), wherein the computer network (2) is adapted for performing a method according claim 1. | 2,400 |
8,932 | 8,932 | 15,907,382 | 2,483 | A method and apparatus for muting and unmuting audio is provided herein. During operation a dispatch center will have knowledge of a state of devices used to form an officer's personal-area network (PAN). Audio streamed from the officer may be unmuted based on a device state for any device within the PAN. | 1. (canceled) 2. (canceled) 3. (canceled) 4. (canceled) 5. (canceled) 6. (canceled) 7. A method comprising the steps of:
receiving state information at a dispatch center from a gun-draw sensor worn by an officer, the gun-draw sensor being part of a personal-area network (PAN), the officer being remote from the dispatch center; receiving streaming video and audio at the dispatch center from a camera; operating a speaker at the dispatch center in a muted state; mapping the state information for the gun-draw sensor worn by the officer to a mute/unmute state for the speaker at the dispatch center; and unmuting the speaker at the dispatch center based on the state information for the gun-draw sensor worn by the officer. 8. The method of claim 7 wherein the camera is not part of the PAN. 9. (canceled) 10. The method of claim 7 wherein the PAN and the camera are remote from the speaker. 11. The method of claim 7 further comprising the step of:
outputting the video received from the camera. 12. An method comprising the steps of:
receiving state information at a dispatch center from a gun-draw sensor that is part of a personal-area network (PAN); receiving streaming video and audio at the dispatch center from a remote body-worn camera that is part of the PAN; operating a speaker at the dispatch center in a muted state; mapping, at the dispatch center, the state information for the gun-draw sensor to a mute/unmute state for the speaker at the dispatch center; and unmuting the speaker at the dispatch center based on the state information for the gun-draw sensor. 13. The method of claim 12 further comprising the steps of:
receiving state information from devices and sensors that form a vehicle-area network (VAN); and
wherein the step of unmuting is additionally based on the state information from the devices and sensors that for the VAN. | A method and apparatus for muting and unmuting audio is provided herein. During operation a dispatch center will have knowledge of a state of devices used to form an officer's personal-area network (PAN). Audio streamed from the officer may be unmuted based on a device state for any device within the PAN.1. (canceled) 2. (canceled) 3. (canceled) 4. (canceled) 5. (canceled) 6. (canceled) 7. A method comprising the steps of:
receiving state information at a dispatch center from a gun-draw sensor worn by an officer, the gun-draw sensor being part of a personal-area network (PAN), the officer being remote from the dispatch center; receiving streaming video and audio at the dispatch center from a camera; operating a speaker at the dispatch center in a muted state; mapping the state information for the gun-draw sensor worn by the officer to a mute/unmute state for the speaker at the dispatch center; and unmuting the speaker at the dispatch center based on the state information for the gun-draw sensor worn by the officer. 8. The method of claim 7 wherein the camera is not part of the PAN. 9. (canceled) 10. The method of claim 7 wherein the PAN and the camera are remote from the speaker. 11. The method of claim 7 further comprising the step of:
outputting the video received from the camera. 12. An method comprising the steps of:
receiving state information at a dispatch center from a gun-draw sensor that is part of a personal-area network (PAN); receiving streaming video and audio at the dispatch center from a remote body-worn camera that is part of the PAN; operating a speaker at the dispatch center in a muted state; mapping, at the dispatch center, the state information for the gun-draw sensor to a mute/unmute state for the speaker at the dispatch center; and unmuting the speaker at the dispatch center based on the state information for the gun-draw sensor. 13. The method of claim 12 further comprising the steps of:
receiving state information from devices and sensors that form a vehicle-area network (VAN); and
wherein the step of unmuting is additionally based on the state information from the devices and sensors that for the VAN. | 2,400 |
8,933 | 8,933 | 16,138,650 | 2,468 | The present technology provides a system and method for implementing targeted collection of in-situ Operation, Administration and Maintenance data from select nodes in a Segment Routing Domain. The selection is programmable and is implemented by setting an iOAM bit in the function arguments field of a Segment Identifier. In this way only the nodes associated with local Segment Identifiers (Function field of a Segment Identifier) with an iOAM argument bit are directed to generate iOAM data. The iOAM data generated by target nodes may be stored in TLV field of the segment routing header. The Segment Routing packet is then decapsulated at a Segment Routing egress node and the Header information with the collected iOAM data is sent to a controller entity for further processing, analysis and/or monitoring. | 1. A method comprising:
encoding an in-situ Operation, Administration, and Maintenance (iOAM) instruction as a local argument in a function field defining an end portion of one or more segment identifiers selected from a plurality of segment identifiers in a segment identifier list of a segment routing header in a first packet, the one or more segment identifiers corresponding to one or more segment routing nodes selected for iOAM data collection, the encoding performed on the end portion of the one or more segment identifiers; sending the first packet to the one or more segment routing nodes based on the segment routing header; receiving a second packet containing the iOAM data from the one or more segment routing nodes selected for the iOAM data collection; and processing the iOAM data from the one or more segment routing nodes selected for the iOAM data collection. 2. (canceled) 3. The method of claim 1, wherein the iOAM data provided by the one or more segment routing nodes is inserted into one or more Type, Length, Value (TLV) fields of the segment routing header. 4. The method of claim 3, wherein the iOAM data is decapsulated by a Segment Routing egress node and sent to a controller entity. 5. The method of claim 1, wherein each of the one or more segment routing nodes selected for the iOAM data collection is configured to send a copy of the segment routing header containing iOAM data to a controller using a collector mechanism. 6. The method of claim 5, wherein the collector mechanism corresponds to a Netflow or IPFIX collector mechanism. 7. The method of claim 1, further comprising:
varying, using a controller entity, the one or more segment routing nodes selected for the iOAM data collection to optimize the iOAM data collection without increasing iOAM traffic. 8. The method of claim 7, wherein the controller entity is a Segment Routing Policy Headend router. 9. At least one non-transitory computer-readable storage medium comprising instructions stored therein, which when executed by one or more processors, cause the one or more processors to:
encode an in-situ Operation, Administration, and Maintenance (iOAM) instruction as a local argument in a function field defining an end portion of one or more segment identifiers, the one or more segment identifiers selected from a plurality of segment identifiers in a segment identifier list of a segment routing header in a first packet, the one or more segment identifiers corresponding to one or more segment routing nodes selected for iOAM data collection; send the first packet to the one or more segment routing nodes based on the segment routing header; receive a second packet containing the iOAM data from the one or more segment routing nodes selected for the iOAM data collection; and process the iOAM data provided by the one or more segment routing nodes tapped for the iOAM data collection. 10. (canceled) 11. The at least one non-transitory computer-readable storage medium of claim 9, wherein the iOAM data provided by the one or more segment routing nodes is inserted into one or more Type, Length, Value (TLV) fields of the segment routing header. 12. The at least one non-transitory computer-readable storage medium of claim 11, wherein the iOAM data is decapsulated by a Segment Routing egress node and sent to a controller entity. 13. The at least one non-transitory computer-readable storage medium of claim 9, wherein each of the one or more segment routing nodes selected for the iOAM data collection is configured to send a copy of the segment routing header containing iOAM data to a controller using a collector mechanism 14. The at least one non-transitory computer-readable storage medium of claim 13, wherein the collector mechanism corresponds to a Netflow or IPFIX collector mechanism. 15. The at least one non-transitory computer-readable storage medium of claim 9, wherein the instructions, when executed by the one or more processors, further cause the one or more processors to vary, using a controller entity, the one or more segment routing nodes selected for the iOAM data collection to optimize the iOAM data collection without increasing iOAM traffic. 16. The at least one non-transitory computer-readable storage medium of claim 15, wherein the controller entity is an Segment Routing Policy Headend router. 17. A system comprising:
one or more processors; and at least one computer-readable storage medium having stored therein instructions which, when executed by the one or more processors, cause the system to:
encode an in-situ Operation, Administration, and Maintenance (iOAM) instruction in a function field defining an end portion of one or more segment identifiers, the one or more segment identifiers selected from plurality of segment identifiers in a segment identifier list of a segment routing header in a first packet, the one or more segment identifiers corresponding to one or more segment routing nodes selected for iOAM data collection, wherein the segment identifier list represents a segment routing policy path;
send the first packet to the one or more segment routing nodes based on the segment routing header;
receive a second packet containing the iOAM data from the one or more segment routing nodes selected for the iOAM data collection; and
process the iOAM data in the second packet from the one or more segment routing nodes selected for the iOAM data collection. 18. (canceled) 19. The system of claim 17, wherein the iOAM data provided by the one or more segment routing nodes is inserted into one or more Type, Length, Value (TLV) fields of a second segment routing header associated with the second packet. 20. The system of claim 17, wherein the at least one computer-readable storage medium stores additional instructions which, when executed by the one or more processors, cause the system to:
decapsulate the segment routing header to yield decapsulated iOAM data; and send the decapsulated iOAM data to a collector entity. | The present technology provides a system and method for implementing targeted collection of in-situ Operation, Administration and Maintenance data from select nodes in a Segment Routing Domain. The selection is programmable and is implemented by setting an iOAM bit in the function arguments field of a Segment Identifier. In this way only the nodes associated with local Segment Identifiers (Function field of a Segment Identifier) with an iOAM argument bit are directed to generate iOAM data. The iOAM data generated by target nodes may be stored in TLV field of the segment routing header. The Segment Routing packet is then decapsulated at a Segment Routing egress node and the Header information with the collected iOAM data is sent to a controller entity for further processing, analysis and/or monitoring.1. A method comprising:
encoding an in-situ Operation, Administration, and Maintenance (iOAM) instruction as a local argument in a function field defining an end portion of one or more segment identifiers selected from a plurality of segment identifiers in a segment identifier list of a segment routing header in a first packet, the one or more segment identifiers corresponding to one or more segment routing nodes selected for iOAM data collection, the encoding performed on the end portion of the one or more segment identifiers; sending the first packet to the one or more segment routing nodes based on the segment routing header; receiving a second packet containing the iOAM data from the one or more segment routing nodes selected for the iOAM data collection; and processing the iOAM data from the one or more segment routing nodes selected for the iOAM data collection. 2. (canceled) 3. The method of claim 1, wherein the iOAM data provided by the one or more segment routing nodes is inserted into one or more Type, Length, Value (TLV) fields of the segment routing header. 4. The method of claim 3, wherein the iOAM data is decapsulated by a Segment Routing egress node and sent to a controller entity. 5. The method of claim 1, wherein each of the one or more segment routing nodes selected for the iOAM data collection is configured to send a copy of the segment routing header containing iOAM data to a controller using a collector mechanism. 6. The method of claim 5, wherein the collector mechanism corresponds to a Netflow or IPFIX collector mechanism. 7. The method of claim 1, further comprising:
varying, using a controller entity, the one or more segment routing nodes selected for the iOAM data collection to optimize the iOAM data collection without increasing iOAM traffic. 8. The method of claim 7, wherein the controller entity is a Segment Routing Policy Headend router. 9. At least one non-transitory computer-readable storage medium comprising instructions stored therein, which when executed by one or more processors, cause the one or more processors to:
encode an in-situ Operation, Administration, and Maintenance (iOAM) instruction as a local argument in a function field defining an end portion of one or more segment identifiers, the one or more segment identifiers selected from a plurality of segment identifiers in a segment identifier list of a segment routing header in a first packet, the one or more segment identifiers corresponding to one or more segment routing nodes selected for iOAM data collection; send the first packet to the one or more segment routing nodes based on the segment routing header; receive a second packet containing the iOAM data from the one or more segment routing nodes selected for the iOAM data collection; and process the iOAM data provided by the one or more segment routing nodes tapped for the iOAM data collection. 10. (canceled) 11. The at least one non-transitory computer-readable storage medium of claim 9, wherein the iOAM data provided by the one or more segment routing nodes is inserted into one or more Type, Length, Value (TLV) fields of the segment routing header. 12. The at least one non-transitory computer-readable storage medium of claim 11, wherein the iOAM data is decapsulated by a Segment Routing egress node and sent to a controller entity. 13. The at least one non-transitory computer-readable storage medium of claim 9, wherein each of the one or more segment routing nodes selected for the iOAM data collection is configured to send a copy of the segment routing header containing iOAM data to a controller using a collector mechanism 14. The at least one non-transitory computer-readable storage medium of claim 13, wherein the collector mechanism corresponds to a Netflow or IPFIX collector mechanism. 15. The at least one non-transitory computer-readable storage medium of claim 9, wherein the instructions, when executed by the one or more processors, further cause the one or more processors to vary, using a controller entity, the one or more segment routing nodes selected for the iOAM data collection to optimize the iOAM data collection without increasing iOAM traffic. 16. The at least one non-transitory computer-readable storage medium of claim 15, wherein the controller entity is an Segment Routing Policy Headend router. 17. A system comprising:
one or more processors; and at least one computer-readable storage medium having stored therein instructions which, when executed by the one or more processors, cause the system to:
encode an in-situ Operation, Administration, and Maintenance (iOAM) instruction in a function field defining an end portion of one or more segment identifiers, the one or more segment identifiers selected from plurality of segment identifiers in a segment identifier list of a segment routing header in a first packet, the one or more segment identifiers corresponding to one or more segment routing nodes selected for iOAM data collection, wherein the segment identifier list represents a segment routing policy path;
send the first packet to the one or more segment routing nodes based on the segment routing header;
receive a second packet containing the iOAM data from the one or more segment routing nodes selected for the iOAM data collection; and
process the iOAM data in the second packet from the one or more segment routing nodes selected for the iOAM data collection. 18. (canceled) 19. The system of claim 17, wherein the iOAM data provided by the one or more segment routing nodes is inserted into one or more Type, Length, Value (TLV) fields of a second segment routing header associated with the second packet. 20. The system of claim 17, wherein the at least one computer-readable storage medium stores additional instructions which, when executed by the one or more processors, cause the system to:
decapsulate the segment routing header to yield decapsulated iOAM data; and send the decapsulated iOAM data to a collector entity. | 2,400 |
8,934 | 8,934 | 15,926,569 | 2,481 | In one embodiment, a method receives a set of frames from a video at a first classifier. The first classifier classifies the set of frames with classification scores that indicate a confidence that a frame contains end credit content using the first classifier using a first model that classifies content from the set of frames. A second classifier then refines the classification scores from neighboring frames in the set of frames using a second classifier using a second model that classifies classification scores from the first classifier. A boundary point is selected between a frame in the set of frames considered not including end credit content and a frame in the set of frames including end credit content based on the refined classification scores. | 1. A method comprising:
receiving, by a computing device, a set of frames from a video at a first classifier; classifying, by the computing device, the set of frames with a set of classification scores indicating a confidence that a frame contains end credit content using the first classifier, the first classifier using a first model that classifies content from the set of frames; after performing the classifying by the first classifier, adjusting, by the computing device, a classification score in the set of classification scores for a frame to another classification score using one or more classification scores from one or more neighboring frames to the frame using a second classifier, the second classifier using a second model that classifies classification scores from the first classifier and not content of the one or more neighboring frames that was used by the first classifier; and selecting, by the computing device, a boundary point in the set of frames between a first frame in the set of frames that is considered to not include end credit content and a second frame in the set of frames that is considered to include end credit content using the adjusted classification score. 2. The method of claim 1, wherein classifying the set of frames using the first classifier comprises:
receiving a frame in the set of frames; analyzing content in the frame; and selecting between a first classification node that the frame includes the end credits content and a second classification node that the frame does not include the end credits content. 3. The method of claim 2, wherein the classification score indicates the confidence in selecting one of the first classification and the second classification. 4. The method of claim 2, wherein the first classifier is configured with output nodes that output a first classification score for the first classification node and a second classification score for the second classification node. 5. The method of claim 1, further comprising:
inputting the set of classification scores into the second model; and adjusting at least a portion of the set of classification scores to different classification scores based on the one or more classification scores of the one or more neighboring frames in the set of frames. 6. The method of claim 1, wherein adjusting the classification score using the second classifier comprises:
inputting the classification score into the second model; and adjusting the classification score based on secondary information for the frame or the neighboring frames. 7. The method of claim 1, wherein adjusting the classification score using the second classifier comprises:
changing a classification of the frame from including end credit content to not including end credit content or from not including end credit content to including end credit content based on the one or more classification scores of the one or more neighboring frames in the set of frames. 8. The method of claim 1, wherein selecting the boundary point comprises:
selecting a prospective boundary point; calculating a left window score based on classification scores for at least a portion of frames before the prospective boundary point; calculating a right window score based on classification scores for at least a portion of frames after the prospective boundary point; and calculating a boundary score based on the left window score and the right window score. 9. The method of claim 8, further comprising:
continuing to select different prospective boundary points; calculating the left window score and the right window score based on the different boundary points; and calculating different boundary scores for the different prospective boundary points. 10. The method of claim 9, further comprising:
selecting one of the different boundary scores for the boundary point. 11. The method of claim 10, wherein the selected one of the different boundary scores is a maximum score out of the different boundary scores. 12. The method of claim 1, further comprising:
extracting the set of frames from the video based on a point in the video. 13. The method of claim 12, wherein extracting the set of frames comprises:
extracting frames after a time in the video to form the set of frames. 14. The method of claim 1, wherein:
the video is received during a live broadcast, and the boundary point is selected during the live broadcast. 15. A non-transitory computer-readable storage medium containing instructions, that when executed, control a computer system to be configured for:
receiving a set of frames from a video at a first classifier; classifying the set of frames with a set of classification scores indicating a confidence that a frame contains end credit content using the first classifier, the first classifier using a first model that classifies content from the set of frames; after performing the classifying by the first classifier, adjusting a classification score in the set of classification scores for a frame to another classification score using one or more classification scores from one or more neighboring frames to the frame using a second classifier, the second classifier using a second model that classifies classification scores from the first classifier and not content of the one or more neighboring frames that was used by the first classifier; and selecting a boundary point in the set of frames between a first frame in the set of frames that is considered to not include end credit content and a second frame in the set of frames that is considered to include end credit content using the adjusted classification score. 16. The non-transitory computer-readable storage medium of claim 15, wherein classifying the set of frames using the first classifier comprises:
receiving a frame in the set of frames; analyzing content in the frame; and selecting between a first classification node that the frame includes the end credits content and a second classification node that the frame does not include the end credits content. 17. The non-transitory computer-readable storage medium of claim 15, further configured for:
inputting the set of classification scores into the second model; and adjusting at least a portion of the set of classification scores to different classification scores based on the one or more classification scores of the one or more neighboring frames in the set of frames. 18. The non-transitory computer-readable storage medium of claim 15, wherein adjusting the classification scores using the second classifier comprises:
changing a classification of the frame from including end credit content to not including end credit content or from not including end credit content to including end credit content based on the classification scores of the neighboring frames in the set of frames. 19. The non-transitory computer-readable storage medium of claim 15, wherein selecting the boundary point comprises:
selecting a prospective boundary point; calculating a left window score based on classification scores for at least a portion of frames before the prospective boundary point; calculating a right window score based on classification scores for at least a portion of frames after the prospective boundary point; and calculating a boundary score based on the left window score and the right window score. 20. An apparatus comprising:
one or more computer processors; and a non-transitory computer-readable storage medium comprising instructions, that when executed, control the one or more computer processors to be configured for: receiving a set of frames from a video at a first classifier; classifying the set of frames with a set of classification scores indicating a confidence that a frame contains end credit content using the first classifier, the first classifier using a first model that classifies content from the set of frames; after performing the classifying by the first classifier, adjusting a classification score in the set of classification scores for a frame to another classification score using one or more classification scores from one or more neighboring frames to the frame using a second classifier, the second classifier using a second model that classifies classification scores from the first classifier and not content of the one or more neighboring frames that was used by the first classifier; and selecting a boundary point in the set of frames between a first frame in the set of frames that is considered to not include end credit content and a second frame in the set of frames that is considered to include end credit content using the adjusted classification score. | In one embodiment, a method receives a set of frames from a video at a first classifier. The first classifier classifies the set of frames with classification scores that indicate a confidence that a frame contains end credit content using the first classifier using a first model that classifies content from the set of frames. A second classifier then refines the classification scores from neighboring frames in the set of frames using a second classifier using a second model that classifies classification scores from the first classifier. A boundary point is selected between a frame in the set of frames considered not including end credit content and a frame in the set of frames including end credit content based on the refined classification scores.1. A method comprising:
receiving, by a computing device, a set of frames from a video at a first classifier; classifying, by the computing device, the set of frames with a set of classification scores indicating a confidence that a frame contains end credit content using the first classifier, the first classifier using a first model that classifies content from the set of frames; after performing the classifying by the first classifier, adjusting, by the computing device, a classification score in the set of classification scores for a frame to another classification score using one or more classification scores from one or more neighboring frames to the frame using a second classifier, the second classifier using a second model that classifies classification scores from the first classifier and not content of the one or more neighboring frames that was used by the first classifier; and selecting, by the computing device, a boundary point in the set of frames between a first frame in the set of frames that is considered to not include end credit content and a second frame in the set of frames that is considered to include end credit content using the adjusted classification score. 2. The method of claim 1, wherein classifying the set of frames using the first classifier comprises:
receiving a frame in the set of frames; analyzing content in the frame; and selecting between a first classification node that the frame includes the end credits content and a second classification node that the frame does not include the end credits content. 3. The method of claim 2, wherein the classification score indicates the confidence in selecting one of the first classification and the second classification. 4. The method of claim 2, wherein the first classifier is configured with output nodes that output a first classification score for the first classification node and a second classification score for the second classification node. 5. The method of claim 1, further comprising:
inputting the set of classification scores into the second model; and adjusting at least a portion of the set of classification scores to different classification scores based on the one or more classification scores of the one or more neighboring frames in the set of frames. 6. The method of claim 1, wherein adjusting the classification score using the second classifier comprises:
inputting the classification score into the second model; and adjusting the classification score based on secondary information for the frame or the neighboring frames. 7. The method of claim 1, wherein adjusting the classification score using the second classifier comprises:
changing a classification of the frame from including end credit content to not including end credit content or from not including end credit content to including end credit content based on the one or more classification scores of the one or more neighboring frames in the set of frames. 8. The method of claim 1, wherein selecting the boundary point comprises:
selecting a prospective boundary point; calculating a left window score based on classification scores for at least a portion of frames before the prospective boundary point; calculating a right window score based on classification scores for at least a portion of frames after the prospective boundary point; and calculating a boundary score based on the left window score and the right window score. 9. The method of claim 8, further comprising:
continuing to select different prospective boundary points; calculating the left window score and the right window score based on the different boundary points; and calculating different boundary scores for the different prospective boundary points. 10. The method of claim 9, further comprising:
selecting one of the different boundary scores for the boundary point. 11. The method of claim 10, wherein the selected one of the different boundary scores is a maximum score out of the different boundary scores. 12. The method of claim 1, further comprising:
extracting the set of frames from the video based on a point in the video. 13. The method of claim 12, wherein extracting the set of frames comprises:
extracting frames after a time in the video to form the set of frames. 14. The method of claim 1, wherein:
the video is received during a live broadcast, and the boundary point is selected during the live broadcast. 15. A non-transitory computer-readable storage medium containing instructions, that when executed, control a computer system to be configured for:
receiving a set of frames from a video at a first classifier; classifying the set of frames with a set of classification scores indicating a confidence that a frame contains end credit content using the first classifier, the first classifier using a first model that classifies content from the set of frames; after performing the classifying by the first classifier, adjusting a classification score in the set of classification scores for a frame to another classification score using one or more classification scores from one or more neighboring frames to the frame using a second classifier, the second classifier using a second model that classifies classification scores from the first classifier and not content of the one or more neighboring frames that was used by the first classifier; and selecting a boundary point in the set of frames between a first frame in the set of frames that is considered to not include end credit content and a second frame in the set of frames that is considered to include end credit content using the adjusted classification score. 16. The non-transitory computer-readable storage medium of claim 15, wherein classifying the set of frames using the first classifier comprises:
receiving a frame in the set of frames; analyzing content in the frame; and selecting between a first classification node that the frame includes the end credits content and a second classification node that the frame does not include the end credits content. 17. The non-transitory computer-readable storage medium of claim 15, further configured for:
inputting the set of classification scores into the second model; and adjusting at least a portion of the set of classification scores to different classification scores based on the one or more classification scores of the one or more neighboring frames in the set of frames. 18. The non-transitory computer-readable storage medium of claim 15, wherein adjusting the classification scores using the second classifier comprises:
changing a classification of the frame from including end credit content to not including end credit content or from not including end credit content to including end credit content based on the classification scores of the neighboring frames in the set of frames. 19. The non-transitory computer-readable storage medium of claim 15, wherein selecting the boundary point comprises:
selecting a prospective boundary point; calculating a left window score based on classification scores for at least a portion of frames before the prospective boundary point; calculating a right window score based on classification scores for at least a portion of frames after the prospective boundary point; and calculating a boundary score based on the left window score and the right window score. 20. An apparatus comprising:
one or more computer processors; and a non-transitory computer-readable storage medium comprising instructions, that when executed, control the one or more computer processors to be configured for: receiving a set of frames from a video at a first classifier; classifying the set of frames with a set of classification scores indicating a confidence that a frame contains end credit content using the first classifier, the first classifier using a first model that classifies content from the set of frames; after performing the classifying by the first classifier, adjusting a classification score in the set of classification scores for a frame to another classification score using one or more classification scores from one or more neighboring frames to the frame using a second classifier, the second classifier using a second model that classifies classification scores from the first classifier and not content of the one or more neighboring frames that was used by the first classifier; and selecting a boundary point in the set of frames between a first frame in the set of frames that is considered to not include end credit content and a second frame in the set of frames that is considered to include end credit content using the adjusted classification score. | 2,400 |
8,935 | 8,935 | 15,779,291 | 2,466 | An input/output (I/O) and control system for long distance communications and industrial applications having a bus and protocol for communications between field devices and a channel generator for monitoring and control of the field devices. The channel generator produces an offset square wave of configurable frequency on the bus, and sends a synchronization pulse of selected duration at the start of each bus scan cycle in a pulse train cycle to reset counters in the field devices before the bus scan cycle is repeated, to ensure field devices are synchronized, transmitters transmit on the correct channel, and receivers sample the pulse cycle at the correct time. Changing the synchronization pulse length increases bandwidth for shorter, less noisy and more stable systems and inversely decreases bandwidth for increased noise immunity and distance for longer, noisier and less stable systems. | 1. A method of implementing a bus protocol for interfacing a control unit to plural devices connected to the bus comprising:
generating a pulse train comprising a plurality of cycles for transmission on the bus, each of the cycles comprising a low voltage level portion for a designated period of time and a high voltage level portion for a designated period of time and, at least some of the cycles being assigned to respective ones of the plural devices as input/output (I/O) channels; wherein the pulse train comprises bus scan cycles that each comprise a selected number of the I/O channels, and a synchronization pulse after the I/O channels that is configured to vary in duration in accordance with a designated change in channel bandwidth. 2. The method of claim 1, wherein the pulse train is a periodic waveform comprising instantaneous transition between the high voltage level and the low voltage level. 3. The method of claim 1, wherein pulse train has configurable frequency. 4. The method of claim 3, wherein the pulse train is an offset square wave with configurable frequency. 5. The method of claim 3, wherein the configurable frequency is dynamically configurable by the control unit during operation of the bus. 6. The method of claim 1, wherein the bus scan cycles comprise dual scan bus cycles having alternating A and B scan cycles where each A scan cycle and each B scan cycle comprises the selected number of I/O channels and that synchronization pulse. 7. The method of claim 1, wherein the pulse train is an offset square wave with configurable frequency, and comprises a selected number of cycles that are assigned to a corresponding number of the I/O channels and that are generated by the control unit. 8. The method of claim 7, wherein the selected number of I/O channels is configured in the control unit. 9. The method of claim 1, wherein the pulse train is an offset square wave and the high voltage level is between 12 VDC and 48 VDC and the low voltage level is between 2 VDC and 9 VDC. 10. The method of claim 1, wherein each of the plural devices is assigned to a corresponding one of the I/O channels in each of the bus scan cycles and has a counter, and the plural devices each reset their counter in response to the synchronization pulse to ensure that the plural devices transmit and receive on their corresponding I/O channels and that the control unit samples the pulse train at a correct pulse corresponding to a selected one of the plural devices. 11. The method of claim 1, wherein the synchronization pulse is generated at the high voltage level for different respective durations of time corresponding to different channel bandwidths. 12. The method of claim 1, wherein the high voltage level portions in the cycles of the I/O channels in the bus scan cycles can vary in at least one of duration within a cycle, and start of a rising edge of the high voltage level portion within a cycle, depending on whether the cycles are pulse width modulated as a mark or a space, the synchronization pulse is at the high voltage level for a selected duration of time depending on the channel bandwidth, and detection of the synchronization pulse employs a detection window having a range between the duration of the synchronization pulse and a mark and the duration of synchronization pulse and a space for detection of the synchronization pulse regardless of whether the last one of the I/O channels has a mark or a space. 13. The method of claim 1, wherein an I/O channel comprises one of the cycles. 14. The method of claim 1, wherein an I/O channel comprises a designated plural number of the cycles. | An input/output (I/O) and control system for long distance communications and industrial applications having a bus and protocol for communications between field devices and a channel generator for monitoring and control of the field devices. The channel generator produces an offset square wave of configurable frequency on the bus, and sends a synchronization pulse of selected duration at the start of each bus scan cycle in a pulse train cycle to reset counters in the field devices before the bus scan cycle is repeated, to ensure field devices are synchronized, transmitters transmit on the correct channel, and receivers sample the pulse cycle at the correct time. Changing the synchronization pulse length increases bandwidth for shorter, less noisy and more stable systems and inversely decreases bandwidth for increased noise immunity and distance for longer, noisier and less stable systems.1. A method of implementing a bus protocol for interfacing a control unit to plural devices connected to the bus comprising:
generating a pulse train comprising a plurality of cycles for transmission on the bus, each of the cycles comprising a low voltage level portion for a designated period of time and a high voltage level portion for a designated period of time and, at least some of the cycles being assigned to respective ones of the plural devices as input/output (I/O) channels; wherein the pulse train comprises bus scan cycles that each comprise a selected number of the I/O channels, and a synchronization pulse after the I/O channels that is configured to vary in duration in accordance with a designated change in channel bandwidth. 2. The method of claim 1, wherein the pulse train is a periodic waveform comprising instantaneous transition between the high voltage level and the low voltage level. 3. The method of claim 1, wherein pulse train has configurable frequency. 4. The method of claim 3, wherein the pulse train is an offset square wave with configurable frequency. 5. The method of claim 3, wherein the configurable frequency is dynamically configurable by the control unit during operation of the bus. 6. The method of claim 1, wherein the bus scan cycles comprise dual scan bus cycles having alternating A and B scan cycles where each A scan cycle and each B scan cycle comprises the selected number of I/O channels and that synchronization pulse. 7. The method of claim 1, wherein the pulse train is an offset square wave with configurable frequency, and comprises a selected number of cycles that are assigned to a corresponding number of the I/O channels and that are generated by the control unit. 8. The method of claim 7, wherein the selected number of I/O channels is configured in the control unit. 9. The method of claim 1, wherein the pulse train is an offset square wave and the high voltage level is between 12 VDC and 48 VDC and the low voltage level is between 2 VDC and 9 VDC. 10. The method of claim 1, wherein each of the plural devices is assigned to a corresponding one of the I/O channels in each of the bus scan cycles and has a counter, and the plural devices each reset their counter in response to the synchronization pulse to ensure that the plural devices transmit and receive on their corresponding I/O channels and that the control unit samples the pulse train at a correct pulse corresponding to a selected one of the plural devices. 11. The method of claim 1, wherein the synchronization pulse is generated at the high voltage level for different respective durations of time corresponding to different channel bandwidths. 12. The method of claim 1, wherein the high voltage level portions in the cycles of the I/O channels in the bus scan cycles can vary in at least one of duration within a cycle, and start of a rising edge of the high voltage level portion within a cycle, depending on whether the cycles are pulse width modulated as a mark or a space, the synchronization pulse is at the high voltage level for a selected duration of time depending on the channel bandwidth, and detection of the synchronization pulse employs a detection window having a range between the duration of the synchronization pulse and a mark and the duration of synchronization pulse and a space for detection of the synchronization pulse regardless of whether the last one of the I/O channels has a mark or a space. 13. The method of claim 1, wherein an I/O channel comprises one of the cycles. 14. The method of claim 1, wherein an I/O channel comprises a designated plural number of the cycles. | 2,400 |
8,936 | 8,936 | 14,490,798 | 2,485 | An initial content is encoded a first time to obtain a first encoded content. One or more parameters obtained from the first encoding are used to generate an encoding coefficient. The initial content is encoded a second time to obtain a second encoded content. The second encoding is performed using encoding coefficients, at least one of which is derived from the parameter associated with the first encoding. The two encodings can be implemented using a single encoder or two separate encoders. | 1. An apparatus for generating encoded content in an output format from an initial content in an initial format comprising:
a log storing encoding coefficients generated when said initial content is encoded a first encoded content using a first encoding scheme, said first encoded being suitable for display on a first display device; an encoder receiving said initial content and encoding said initial content into a second encoded using a second coefficient; and a coefficient generator receiving said first coefficient and generating said second encoding coefficient based on said first coefficient. 2. The apparatus of claim 1 wherein said coefficient generator includes a processor element receiving an initial parameter and generating said second coefficient from said initial parameter. 3. The apparatus of claim 1 wherein said encoder encodes said initial content twice using different encoding coefficients for each encoding. 4. The apparatus of claim 2 wherein coefficient generator includes an analyzer that analyzes the first encoded content to determine said initial parameter. 5. The apparatus of claim 1 wherein said coefficient generator includes a mapping member mapping said parameter into said coefficient. 6. A method of generating an output encoded content from an initial content comprising the steps of:
generating a first parameter based on a first encoding of said initial content; and encoding said initial content using an encoder to obtain a second encoded content, said encoder performing said encoding using an encoding coefficient derived from said first parameter, wherein said first parameter is generated during said initial encoding by an initial encoder and compiled in a log and wherein said encoding coefficient is generated from said first parameter from said log. 7. The method of claim 6 further comprising processing said first parameter into a form suitable for encoding to obtain said final encoded content. 8. The method of claim 6 further comprising analyzing said previously encoded content and generating from said previously encoded content said first parameter. 9. The method of claim 6 wherein said parameter is one of groups of pictures (GOP) associated with various segments, frames or scenes, bit rate parameters associated with each GOP, (e.g., peak, average, minimum values), I-frames, video buffer size and a motion vector. 10. The method of claim 6 wherein said second encoder performs said second encoding using at least one encoding coefficient, wherein said encoding coefficient is related to said parameter. 11. The method of claim 6 wherein said second encoder performs said second encoding using at least a first and a second encoding coefficient, wherein said first encoding coefficient is preselected and said second encoding coefficient is dependent on said parameter. 12. The method of claim 6 wherein said second encoder performs said second encoding using a set of coefficients including a first subset of coefficients and a second subset of coefficients, and wherein said first subset of coefficients are preset and said second set of coefficients is derived from said parameters. 13. The method of claim 6 wherein said second encoder performs said second encoding using a set of coefficients, further comprising mapping said parameters to derive said set of coefficients. | An initial content is encoded a first time to obtain a first encoded content. One or more parameters obtained from the first encoding are used to generate an encoding coefficient. The initial content is encoded a second time to obtain a second encoded content. The second encoding is performed using encoding coefficients, at least one of which is derived from the parameter associated with the first encoding. The two encodings can be implemented using a single encoder or two separate encoders.1. An apparatus for generating encoded content in an output format from an initial content in an initial format comprising:
a log storing encoding coefficients generated when said initial content is encoded a first encoded content using a first encoding scheme, said first encoded being suitable for display on a first display device; an encoder receiving said initial content and encoding said initial content into a second encoded using a second coefficient; and a coefficient generator receiving said first coefficient and generating said second encoding coefficient based on said first coefficient. 2. The apparatus of claim 1 wherein said coefficient generator includes a processor element receiving an initial parameter and generating said second coefficient from said initial parameter. 3. The apparatus of claim 1 wherein said encoder encodes said initial content twice using different encoding coefficients for each encoding. 4. The apparatus of claim 2 wherein coefficient generator includes an analyzer that analyzes the first encoded content to determine said initial parameter. 5. The apparatus of claim 1 wherein said coefficient generator includes a mapping member mapping said parameter into said coefficient. 6. A method of generating an output encoded content from an initial content comprising the steps of:
generating a first parameter based on a first encoding of said initial content; and encoding said initial content using an encoder to obtain a second encoded content, said encoder performing said encoding using an encoding coefficient derived from said first parameter, wherein said first parameter is generated during said initial encoding by an initial encoder and compiled in a log and wherein said encoding coefficient is generated from said first parameter from said log. 7. The method of claim 6 further comprising processing said first parameter into a form suitable for encoding to obtain said final encoded content. 8. The method of claim 6 further comprising analyzing said previously encoded content and generating from said previously encoded content said first parameter. 9. The method of claim 6 wherein said parameter is one of groups of pictures (GOP) associated with various segments, frames or scenes, bit rate parameters associated with each GOP, (e.g., peak, average, minimum values), I-frames, video buffer size and a motion vector. 10. The method of claim 6 wherein said second encoder performs said second encoding using at least one encoding coefficient, wherein said encoding coefficient is related to said parameter. 11. The method of claim 6 wherein said second encoder performs said second encoding using at least a first and a second encoding coefficient, wherein said first encoding coefficient is preselected and said second encoding coefficient is dependent on said parameter. 12. The method of claim 6 wherein said second encoder performs said second encoding using a set of coefficients including a first subset of coefficients and a second subset of coefficients, and wherein said first subset of coefficients are preset and said second set of coefficients is derived from said parameters. 13. The method of claim 6 wherein said second encoder performs said second encoding using a set of coefficients, further comprising mapping said parameters to derive said set of coefficients. | 2,400 |
8,937 | 8,937 | 15,308,688 | 2,463 | Methods and apparatus, including computer program products, are provided for MBSFN measurements. In one aspect there is provided a method. The method may include receiving, by a user equipment, measurement configuration information indicative of one or more first measurements to be performed on a first set of subframes and one or more second measurements to be performed on a second set of subframes, wherein the first set of subframes are associated with multicast broadcast mobile services and the second set of subframes are associated with non-multicast broadcast mobile services; and performing one or more measurements in accordance with the received measurement configuration information; and reporting one or more first measurement results for the one or more first measurements supplemented with one or more second measurement results for the one or more second measurements. Related apparatus, systems, methods, and articles are also described. | 1-47. (canceled) 48. A method comprising:
receiving, by a user equipment, measurement configuration information indicative of one or more first measurements to be performed on a first set of subframes and one or more second measurements to be performed on a second set of subframes, wherein the first set of subframes are associated with multicast broadcast mobile services and the second set of subframes are associated with non-multicast broadcast mobile services; performing one or more measurements in accordance with the received measurement configuration information; and reporting one or more first measurement results for the one or more first measurements supplemented with one or more second measurement results for the one or more second measurements. 49. The method of claim 48, wherein one or more gaps in the one or more first measurement results are filled with the one or more second measurement results. 50. The method of claim 48, wherein the one or more first measurement results are reported along with the one or more second measurement results. 51. The method of claim 48, wherein the one or more first measurements are performed on multicast broadcast mobile services subframes. 52. The method of claim 48, wherein the one or more measurements are performed in an idle state or a connected state. 53. The method of claim 48, wherein the one or more second measurement results include results for multiple cells. 54. The method of claim 53, wherein a cell result is associated with a cell identification. 55. The method of claim 48, wherein the one or more second measurement results are reported for cells on a same frequency or cells on a different frequency as a multicast broadcast single frequency network carrier frequency. 56. An apparatus comprising:
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following:
receive, by the apparatus, measurement configuration information indicative of one or more first measurements to be performed on a first set of subframes and one or more second measurements to be performed on a second set of subframes, wherein the first set of subframes are associated with multicast broadcast mobile services and the second set of subframes are associated with non-multicast broadcast mobile services;
perform one or more measurements in accordance with the received measurement configuration information; and
report one or more first measurement results for the one or more first measurements supplemented with one or more second measurement results for the one or more second measurements. 57. The apparatus of claim 56, wherein the one or more first measurement results are non-continuous. 58. The apparatus of claim 56, wherein one or more gaps in the one or more first measurement results are filled with the one or more second measurement results. 59. The apparatus of claim 56, wherein the one or more first measurement results are reported along with the one or more second measurement results. 60. The apparatus of claim 56, wherein the one or more first measurements are performed on multicast broadcast mobile services subframes. 61. The apparatus of claim 56, wherein the one or more measurements are performed in an idle state or a connected state. 62. The apparatus of claim 56, wherein the one or more second measurement results include results for multiple cells. 63. The apparatus of claim 62, wherein a cell result is associated with a cell identification. 64. The apparatus of claim 56, wherein the one or more second measurement results are reported for cells on a same frequency or for cells on a different frequency as a multicast broadcast single frequency network carrier frequency. 65. A method comprising:
sending, by a network node, measurement configuration information indicative of one or more first measurements to be performed on a first set of subframes and one or more second measurements to be performed on a second set of subframes, wherein the first set of subframes are associated with multicast broadcast mobile services and the second set of subframes are associated with non-multicast broadcast mobile services; and receiving, in response to the measurement configuration information, one or more reports including one or more first measurement results for the one or more first measurements supplemented with one or more second measurement results for the one or more second measurements. 66. The method of claim 65, wherein the one or more first measurement results are reported along with the one or more second measurement results. 67. The method of claim 65 further comprising:
adjusting, based on received one or more reports, at least a modulation and coding scheme for a multicast broadcast single frequency network. 68. An apparatus comprising:
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following: send, by the apparatus, measurement configuration information indicative of one or more first measurements to be performed on a first set of subframes and one or more second measurements to be performed on a second set of subframes, wherein the first set of subframes are associated with multicast broadcast mobile services and the second set of subframes are associated with non-multicast broadcast mobile services; and receive, in response to the measurement configuration information, one or more reports including one or more first measurement results for the one or more first measurements supplemented with one or more second measurement results for the one or more second measurements. 69. The apparatus of claim 68, wherein the one or more first measurement results are reported along with the one or more second measurement results. 70. The apparatus of claim 68, wherein the one or more first measurements are performed on multicast broadcast mobile services subframes. 71. The apparatus of claim 68, wherein the one or more second measurements are performed for radio resource management purposes. 72. The apparatus of claim 68, wherein the apparatus is further configured to at least adjust, based on received one or more reports, at least a modulation and coding scheme for a multicast broadcast single frequency network. | Methods and apparatus, including computer program products, are provided for MBSFN measurements. In one aspect there is provided a method. The method may include receiving, by a user equipment, measurement configuration information indicative of one or more first measurements to be performed on a first set of subframes and one or more second measurements to be performed on a second set of subframes, wherein the first set of subframes are associated with multicast broadcast mobile services and the second set of subframes are associated with non-multicast broadcast mobile services; and performing one or more measurements in accordance with the received measurement configuration information; and reporting one or more first measurement results for the one or more first measurements supplemented with one or more second measurement results for the one or more second measurements. Related apparatus, systems, methods, and articles are also described.1-47. (canceled) 48. A method comprising:
receiving, by a user equipment, measurement configuration information indicative of one or more first measurements to be performed on a first set of subframes and one or more second measurements to be performed on a second set of subframes, wherein the first set of subframes are associated with multicast broadcast mobile services and the second set of subframes are associated with non-multicast broadcast mobile services; performing one or more measurements in accordance with the received measurement configuration information; and reporting one or more first measurement results for the one or more first measurements supplemented with one or more second measurement results for the one or more second measurements. 49. The method of claim 48, wherein one or more gaps in the one or more first measurement results are filled with the one or more second measurement results. 50. The method of claim 48, wherein the one or more first measurement results are reported along with the one or more second measurement results. 51. The method of claim 48, wherein the one or more first measurements are performed on multicast broadcast mobile services subframes. 52. The method of claim 48, wherein the one or more measurements are performed in an idle state or a connected state. 53. The method of claim 48, wherein the one or more second measurement results include results for multiple cells. 54. The method of claim 53, wherein a cell result is associated with a cell identification. 55. The method of claim 48, wherein the one or more second measurement results are reported for cells on a same frequency or cells on a different frequency as a multicast broadcast single frequency network carrier frequency. 56. An apparatus comprising:
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following:
receive, by the apparatus, measurement configuration information indicative of one or more first measurements to be performed on a first set of subframes and one or more second measurements to be performed on a second set of subframes, wherein the first set of subframes are associated with multicast broadcast mobile services and the second set of subframes are associated with non-multicast broadcast mobile services;
perform one or more measurements in accordance with the received measurement configuration information; and
report one or more first measurement results for the one or more first measurements supplemented with one or more second measurement results for the one or more second measurements. 57. The apparatus of claim 56, wherein the one or more first measurement results are non-continuous. 58. The apparatus of claim 56, wherein one or more gaps in the one or more first measurement results are filled with the one or more second measurement results. 59. The apparatus of claim 56, wherein the one or more first measurement results are reported along with the one or more second measurement results. 60. The apparatus of claim 56, wherein the one or more first measurements are performed on multicast broadcast mobile services subframes. 61. The apparatus of claim 56, wherein the one or more measurements are performed in an idle state or a connected state. 62. The apparatus of claim 56, wherein the one or more second measurement results include results for multiple cells. 63. The apparatus of claim 62, wherein a cell result is associated with a cell identification. 64. The apparatus of claim 56, wherein the one or more second measurement results are reported for cells on a same frequency or for cells on a different frequency as a multicast broadcast single frequency network carrier frequency. 65. A method comprising:
sending, by a network node, measurement configuration information indicative of one or more first measurements to be performed on a first set of subframes and one or more second measurements to be performed on a second set of subframes, wherein the first set of subframes are associated with multicast broadcast mobile services and the second set of subframes are associated with non-multicast broadcast mobile services; and receiving, in response to the measurement configuration information, one or more reports including one or more first measurement results for the one or more first measurements supplemented with one or more second measurement results for the one or more second measurements. 66. The method of claim 65, wherein the one or more first measurement results are reported along with the one or more second measurement results. 67. The method of claim 65 further comprising:
adjusting, based on received one or more reports, at least a modulation and coding scheme for a multicast broadcast single frequency network. 68. An apparatus comprising:
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following: send, by the apparatus, measurement configuration information indicative of one or more first measurements to be performed on a first set of subframes and one or more second measurements to be performed on a second set of subframes, wherein the first set of subframes are associated with multicast broadcast mobile services and the second set of subframes are associated with non-multicast broadcast mobile services; and receive, in response to the measurement configuration information, one or more reports including one or more first measurement results for the one or more first measurements supplemented with one or more second measurement results for the one or more second measurements. 69. The apparatus of claim 68, wherein the one or more first measurement results are reported along with the one or more second measurement results. 70. The apparatus of claim 68, wherein the one or more first measurements are performed on multicast broadcast mobile services subframes. 71. The apparatus of claim 68, wherein the one or more second measurements are performed for radio resource management purposes. 72. The apparatus of claim 68, wherein the apparatus is further configured to at least adjust, based on received one or more reports, at least a modulation and coding scheme for a multicast broadcast single frequency network. | 2,400 |
8,938 | 8,938 | 15,662,592 | 2,449 | An apparatus and method for synchronized content display across a plurality of devices are disclosed herein. Content specified at a first device is deployed to the rest of the plurality of devices that are of diverse device types to each other. The first device instructs the other devices to render the content at each of the respective devices according to the respective device's content viewer and configuration. The first device also instructs the other devices to achieve a certain setting or state pertaining to true rendering of the content depending on the type of content to be rendered. | 1. A method for displaying content, the method comprising:
identifying a content displayed at a first device; establishing a wireless peer-to-peer direct connection between the first device and a second device without utilizing any server to establish the wireless peer-to-peer direct connection; identifying, from the second device via the wireless peer-to-peer direct connection, device information of the second device, wherein the device information for the second device includes a display size and a resolution of the second device; communicating the device information of the second device to the first device via the wireless peer-to-peer direct connection; based on dimensions of the content and the display size and the resolution of the second device, modifying, at the first device, the content to generate a first version of the content that is customized for the dimensions of the content, and the display size and the resolution identified for the second device; and transmitting to the second device from the first device, via the wireless peer-to-peer direct connection between the first device and the second device and without utilizing any server, the first version of the content and a command to render the first version of the content at the second device, wherein the command causes the second device to display the first version of content at the second device according to one or more device settings included in the command. 2. The method of claim 1, wherein the one or more device settings includes clearing a cache on the second device. 3. The method of claim 1, wherein the one or more device settings includes clearing cookies on the second device. 4. The method of claim 1, wherein the one or more device settings includes a particular screen orientation. 5. The method of claim 1, wherein the wireless peer-to-peer direct connection comprises a WiFi or cellular network. 6. The method of claim 1, wherein the content comprises at least one of an image, video, print media, web page, web site, visual asset, and visual content. 7. The method of claim 1, further comprising:
establishing a wireless peer-to-peer direct connection between the first device and a third device without utilizing any server to establish the wireless peer-to-peer direct connection; identifying, from the third device via the wireless peer-to-peer direct connection, device information of the third device, wherein the device information for the third device includes a display size and a resolution of the third device; communicating the device information of the third device to the first device via the wireless peer-to-peer direct connection; based on dimensions of the content and the display size and the resolution of the third device, modifying, at the first device, the content to generate a second version of the content that is customized for the dimensions of the content, and the display size and the resolution identified for the third device; and transmitting to the third device, via the wireless peer-to-peer direct connection between the first device and the third device and without utilizing any server, the second version of the content and a command to render the second version of the content at the third device, wherein the command causes the third device to display the second version of content at the third device according to one or more device settings included in the command. 8. One or more computer-readable media having a plurality of executable instructions embodied thereon, which, when executed by one or more processors, cause the one or more processors to perform a method comprising:
identifying a content displayed at a first device; establishing a wireless peer-to-peer direct connection between the first device and a second device without utilizing any server to establish the wireless peer-to-peer direct connection; identifying, from the second device via the wireless peer-to-peer direct connection, device information of the second device, wherein the device information for the second device includes a display size and a resolution of the second device; communicating the device information of the second device to the first device via the wireless peer-to-peer direct connection; based on dimensions of the content and the display size and the resolution of the second device, modifying, at the first device, the content to generate a first version of the content that is customized for the dimensions of the content, and the display size and the resolution identified for the second device; and transmitting to the second device from the first device, via the wireless peer-to-peer direct connection between the first device and the second device and without utilizing any server, the first version of the content and a command to render the first version of the content at the second device, wherein the command causes the second device to display the first version of content at the second device according to one or more device settings included in the command. 9. The one or more computer-readable media of claim 8, wherein the one or more device settings includes clearing a cache on the second device. 10. The one or more computer-readable media of claim 8, wherein the one or more device settings includes clearing cookies on the second device. 11. The one or more computer-readable media of claim 8, wherein the one or more device settings includes a particular screen orientation. 12. The one or more computer-readable media of claim 8, wherein the wireless peer-to-peer direct connection comprises a WiFi or cellular network. 13. The one or more computer-readable media of claim 8, wherein the content comprises at least one of an image, video, print media, web page, web site, visual asset, and visual content. 14. The one or more computer-readable media of claim 8, further comprising:
establishing a wireless peer-to-peer direct connection between the first device and a third device without utilizing any server to establish the wireless peer-to-peer direct connection; identifying, from the third device via the wireless peer-to-peer direct connection, device information of the third device, wherein the device information for the third device includes a display size and a resolution of the third device; based on dimensions of the content and the display size and the resolution of the third device, modifying the content to generate a second version of the content that is customized for the dimensions of the content, and the display size and the resolution identified for the third device; and transmitting to the third device, via the wireless peer-to-peer direct connection between the first device and the third device and without utilizing any server, the second version of the content and a command to render the second version of the content at the third device, wherein the command causes the third device to display the second version of content at the third device according to one or more device settings included in the command. 15. A method for displaying content, the method comprising:
identifying a content displayed at a first device; establishing a wireless peer-to-peer direct connection between the first device, a second device, and a third device without utilizing any server to establish the wireless peer-to-peer direct connection; customizing the content, at the first device, to be specific to each of the second device and the third device, wherein the customizing comprises:
identifying, from the second device via the wireless peer-to-peer direct connection, device information of the second device, wherein the device information for the second device includes a display size and a resolution of the second device;
identifying, from the third device via the wireless peer-to-peer direct connection, device information for the third device, wherein the device information for the third device includes a display size and a resolution of the third device, wherein the display size and resolution of the third device are different from the display size and resolution of the second device;
communicating the device information of each of the second and third devices to the first device via the wireless peer-to-peer direct connection;
identifying, at the first device, a second version of the content corresponding to the display size and the resolution for the second device; and
identifying, at the first device, a third version of the content corresponding to the display size and the resolution for the third device;
transmitting to the second device, via the wireless peer-to-peer direct connection between the first device and the second device and without utilizing any server, the second version of the content and a command to render the second version of the content at the second device, wherein the command causes the second device to display the second version of content at the second device; and transmitting to the third device, via the wireless peer-to-peer direct connection between the first device and the third device and without utilizing any server, the third version of the content and a command to render the third version of the content at the third device, wherein the command causes the third device to display the third version of content at the third device. 16. The method of claim 15, wherein the content comprises at least one of an image, video, print media, web page, web site, visual asset, and visual content. 17. The method of claim 15, wherein the command causes the second device to display the second version of content at the second device according to one or more device settings included in the command. 18. The method of claim 17, wherein the one or more device settings include clearing a cache and cookies on the second device. 19. The method of claim 17, wherein the one or more device settings include achieving a particular screen orientation. 20. The method of claim 15, wherein the second device and the third device differ from each other in at least one of hardware, firmware, software, operating system, platform, browser, and content viewing applications. | An apparatus and method for synchronized content display across a plurality of devices are disclosed herein. Content specified at a first device is deployed to the rest of the plurality of devices that are of diverse device types to each other. The first device instructs the other devices to render the content at each of the respective devices according to the respective device's content viewer and configuration. The first device also instructs the other devices to achieve a certain setting or state pertaining to true rendering of the content depending on the type of content to be rendered.1. A method for displaying content, the method comprising:
identifying a content displayed at a first device; establishing a wireless peer-to-peer direct connection between the first device and a second device without utilizing any server to establish the wireless peer-to-peer direct connection; identifying, from the second device via the wireless peer-to-peer direct connection, device information of the second device, wherein the device information for the second device includes a display size and a resolution of the second device; communicating the device information of the second device to the first device via the wireless peer-to-peer direct connection; based on dimensions of the content and the display size and the resolution of the second device, modifying, at the first device, the content to generate a first version of the content that is customized for the dimensions of the content, and the display size and the resolution identified for the second device; and transmitting to the second device from the first device, via the wireless peer-to-peer direct connection between the first device and the second device and without utilizing any server, the first version of the content and a command to render the first version of the content at the second device, wherein the command causes the second device to display the first version of content at the second device according to one or more device settings included in the command. 2. The method of claim 1, wherein the one or more device settings includes clearing a cache on the second device. 3. The method of claim 1, wherein the one or more device settings includes clearing cookies on the second device. 4. The method of claim 1, wherein the one or more device settings includes a particular screen orientation. 5. The method of claim 1, wherein the wireless peer-to-peer direct connection comprises a WiFi or cellular network. 6. The method of claim 1, wherein the content comprises at least one of an image, video, print media, web page, web site, visual asset, and visual content. 7. The method of claim 1, further comprising:
establishing a wireless peer-to-peer direct connection between the first device and a third device without utilizing any server to establish the wireless peer-to-peer direct connection; identifying, from the third device via the wireless peer-to-peer direct connection, device information of the third device, wherein the device information for the third device includes a display size and a resolution of the third device; communicating the device information of the third device to the first device via the wireless peer-to-peer direct connection; based on dimensions of the content and the display size and the resolution of the third device, modifying, at the first device, the content to generate a second version of the content that is customized for the dimensions of the content, and the display size and the resolution identified for the third device; and transmitting to the third device, via the wireless peer-to-peer direct connection between the first device and the third device and without utilizing any server, the second version of the content and a command to render the second version of the content at the third device, wherein the command causes the third device to display the second version of content at the third device according to one or more device settings included in the command. 8. One or more computer-readable media having a plurality of executable instructions embodied thereon, which, when executed by one or more processors, cause the one or more processors to perform a method comprising:
identifying a content displayed at a first device; establishing a wireless peer-to-peer direct connection between the first device and a second device without utilizing any server to establish the wireless peer-to-peer direct connection; identifying, from the second device via the wireless peer-to-peer direct connection, device information of the second device, wherein the device information for the second device includes a display size and a resolution of the second device; communicating the device information of the second device to the first device via the wireless peer-to-peer direct connection; based on dimensions of the content and the display size and the resolution of the second device, modifying, at the first device, the content to generate a first version of the content that is customized for the dimensions of the content, and the display size and the resolution identified for the second device; and transmitting to the second device from the first device, via the wireless peer-to-peer direct connection between the first device and the second device and without utilizing any server, the first version of the content and a command to render the first version of the content at the second device, wherein the command causes the second device to display the first version of content at the second device according to one or more device settings included in the command. 9. The one or more computer-readable media of claim 8, wherein the one or more device settings includes clearing a cache on the second device. 10. The one or more computer-readable media of claim 8, wherein the one or more device settings includes clearing cookies on the second device. 11. The one or more computer-readable media of claim 8, wherein the one or more device settings includes a particular screen orientation. 12. The one or more computer-readable media of claim 8, wherein the wireless peer-to-peer direct connection comprises a WiFi or cellular network. 13. The one or more computer-readable media of claim 8, wherein the content comprises at least one of an image, video, print media, web page, web site, visual asset, and visual content. 14. The one or more computer-readable media of claim 8, further comprising:
establishing a wireless peer-to-peer direct connection between the first device and a third device without utilizing any server to establish the wireless peer-to-peer direct connection; identifying, from the third device via the wireless peer-to-peer direct connection, device information of the third device, wherein the device information for the third device includes a display size and a resolution of the third device; based on dimensions of the content and the display size and the resolution of the third device, modifying the content to generate a second version of the content that is customized for the dimensions of the content, and the display size and the resolution identified for the third device; and transmitting to the third device, via the wireless peer-to-peer direct connection between the first device and the third device and without utilizing any server, the second version of the content and a command to render the second version of the content at the third device, wherein the command causes the third device to display the second version of content at the third device according to one or more device settings included in the command. 15. A method for displaying content, the method comprising:
identifying a content displayed at a first device; establishing a wireless peer-to-peer direct connection between the first device, a second device, and a third device without utilizing any server to establish the wireless peer-to-peer direct connection; customizing the content, at the first device, to be specific to each of the second device and the third device, wherein the customizing comprises:
identifying, from the second device via the wireless peer-to-peer direct connection, device information of the second device, wherein the device information for the second device includes a display size and a resolution of the second device;
identifying, from the third device via the wireless peer-to-peer direct connection, device information for the third device, wherein the device information for the third device includes a display size and a resolution of the third device, wherein the display size and resolution of the third device are different from the display size and resolution of the second device;
communicating the device information of each of the second and third devices to the first device via the wireless peer-to-peer direct connection;
identifying, at the first device, a second version of the content corresponding to the display size and the resolution for the second device; and
identifying, at the first device, a third version of the content corresponding to the display size and the resolution for the third device;
transmitting to the second device, via the wireless peer-to-peer direct connection between the first device and the second device and without utilizing any server, the second version of the content and a command to render the second version of the content at the second device, wherein the command causes the second device to display the second version of content at the second device; and transmitting to the third device, via the wireless peer-to-peer direct connection between the first device and the third device and without utilizing any server, the third version of the content and a command to render the third version of the content at the third device, wherein the command causes the third device to display the third version of content at the third device. 16. The method of claim 15, wherein the content comprises at least one of an image, video, print media, web page, web site, visual asset, and visual content. 17. The method of claim 15, wherein the command causes the second device to display the second version of content at the second device according to one or more device settings included in the command. 18. The method of claim 17, wherein the one or more device settings include clearing a cache and cookies on the second device. 19. The method of claim 17, wherein the one or more device settings include achieving a particular screen orientation. 20. The method of claim 15, wherein the second device and the third device differ from each other in at least one of hardware, firmware, software, operating system, platform, browser, and content viewing applications. | 2,400 |
8,939 | 8,939 | 14,456,880 | 2,416 | Methods, systems, devices, and apparatuses are described for wireless communications. In one method, a set of one or more data subframes of a data frame may be transmitted over an unlicensed spectrum, to a user equipment (UE), during a transmission period. A group hybrid automatic repeat request (HARQ) feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes may then be received over the unlicensed spectrum, from the UE, during the transmission period. In another method, a set of one or more data subframes of a data frame may be received over an unlicensed spectrum during a transmission period. A group HARQ feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes may then be transmitted over the unlicensed spectrum during the transmission period. | 1. A method for wireless communications, comprising:
transmitting, over an unlicensed spectrum to a user equipment (UE), during a transmission period, a set of one or more data subframes of a data frame; and receiving, over the unlicensed spectrum from the UE, during the transmission period, a group hybrid automatic repeat request (HARQ) feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes. 2. The method of claim 1, wherein the group HARQ feedback message comprises an acknowledgment for each of the plurality of data subframes decoded by the UE, the group HARQ feedback message received either periodically or in response to a trigger. 3. The method of claim 1, wherein the group HARQ feedback message comprises a bitmap that indicates, based on a position in the bitmap, a process identifier for each of the plurality of data subframes being acknowledged by the UE in the group HARQ feedback message. 4. The method of claim 1, wherein receiving the group HARQ feedback message for the plurality of data subframes comprises receiving the group HARQ feedback message after a downlink portion of the transmission period. 5. The method of claim 1, further comprising:
transmitting, over the unlicensed spectrum to the UE, a Request to Send message; and receiving, over the unlicensed spectrum from the UE, a Clear to Send message to reserve an uplink portion of the transmission period to receive the group HARQ feedback message from the UE. 6. The method of claim 1, wherein the group HARQ feedback message comprises HARQ feedback information for a subset of the set of one or more data subframes, the method further comprising:
receiving, over the unlicensed spectrum from the UE, a next group HARQ feedback message comprising HARQ feedback information for a remaining subset of the set of one or more data subframes, the next group HARQ feedback message being received during a next transmission period. 7. The method of claim 1, further comprising:
performing clear channel assessment (CCA) to determine availability of the unlicensed spectrum; and accessing the unlicensed spectrum during the transmission period when a determination is made that the unlicensed spectrum is available. 8. The method of claim 1, further comprising:
transmitting a clear to send (CTS) signal when the unlicensed spectrum is available for transmission. 9. An apparatus for wireless communications, comprising:
a processor; and memory communicatively coupled to the processor; wherein the processor is configured to: transmit, over an unlicensed spectrum to a user equipment (UE), during a transmission period, a set of one or more data subframes of a data frame; and receive, over the unlicensed spectrum from the UE, during the transmission period, a group hybrid automatic repeat request (HARQ) feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes. 10. The apparatus of claim 9, wherein the group HARQ feedback message comprises an acknowledgment for each of the plurality of data subframes decoded by the UE, the group HARQ feedback message received either periodically or in response to a trigger. 11. The apparatus of claim 9, wherein the group HARQ feedback message comprises a bitmap that indicates, based on a position in the bitmap, a process identifier for each of the plurality of data subframes being acknowledged by the UE in the group HARQ feedback message. 12. The apparatus of claim 9, wherein processor is further configured to receive the group HARQ feedback message for the plurality of data subframes comprise instructions executable by the processor to receive the group HARQ feedback message after a downlink portion of the transmission period. 13. The apparatus of claim 9, wherein the processor is further configured to:
transmit, over the unlicensed spectrum to the UE, a Request to Send message; and receive, over the unlicensed spectrum from the UE, a Clear to Send message to reserve an uplink portion of the transmission period to receive the group HARQ feedback message from the UE. 14. The apparatus of claim 9, wherein the group HARQ feedback message comprises HARQ feedback information for a subset of the set of one or more data subframes, and wherein the processor is further configured to:
receive, over the unlicensed spectrum from the UE, a next group HARQ feedback message comprising HARQ feedback information for a remaining subset of the set of one or more data subframes, the next group HARQ feedback message being received during a next transmission period. 15. The apparatus of claim 9, wherein the processor is further configured to:
perform clear channel assessment (CCA) to determine availability of the unlicensed spectrum; and access the unlicensed spectrum during the transmission period when a determination is made that the unlicensed spectrum is available. 16. The apparatus of claim 9, wherein the processor is further configured to:
transmit a clear to send (CTS) signal when the unlicensed spectrum is available for transmission. 17. A method for wireless communications, comprising:
receiving, over an unlicensed spectrum, during a transmission period, a set of one or more data subframes of a data frame; and transmitting, over the unlicensed spectrum, during the transmission period, a group hybrid automatic repeat request (HARQ) feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes. 18. The method of claim 17, further comprising identifying which data subframes are correctly decoded after reception, the group HARQ feedback message comprising an acknowledgement for each of the plurality of data subframes correctly decoded, and wherein the group HARQ feedback message is transmitted, over the unlicensed spectrum either periodically or in response to a trigger. 19. The method of claim 17, further comprising identifying which data subframes are correctly decoded after reception, the group HARQ feedback message comprising a bitmap that indicates, based on a position in the bitmap, a process identifier for each of the plurality of data subframes correctly decoded. 20. The method of claim 17, wherein transmitting the group HARQ feedback message for the plurality of data subframes comprises transmitting the group HARQ feedback message after a downlink portion of the transmission period. 21. The method of claim 17, further comprising:
receiving, over the unlicensed spectrum, a Request to Send message; and transmitting, over the unlicensed spectrum, a Clear to Send message to reserve an uplink portion of the transmission period to transmit the group HARQ feedback message. 22. The method of claim 17, wherein the group HARQ feedback message comprises HARQ feedback information for a subset of the set of one or more data subframes, the method further comprising:
transmitting, over the unlicensed spectrum, a next group HARQ feedback message comprising HARQ feedback information for a remaining subset of the set of one or more data subframes, the next group HARQ feedback message being transmitted during a next transmission period. 23. The method of claim 17, further comprising receiving, after the transmission period, an uplink grant over the unlicensed spectrum, wherein the group HARQ feedback message is transmitted in response to the uplink grant. 24. An apparatus for wireless communications, comprising:
a processor; and memory in communicatively coupled to the processor; wherein the processor is configured to: receive, over an unlicensed spectrum, during a transmission period, a set of one or more data subframes of a data frame; and transmit, over the unlicensed spectrum, during the transmission period, a group hybrid automatic repeat request (HARQ) feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes. 25. The apparatus of claim 24, wherein the processor is further configured to identify which data subframes are correctly decoded after reception, the group HARQ feedback message comprising an acknowledgement for each of the plurality of data subframes correctly decoded, and wherein the group HARQ feedback message is transmitted, over the unlicensed spectrum either periodically or in response to a trigger. 26. The apparatus of claim 24, wherein the processor is further configured to identify which data subframes are correctly decoded after reception, the group HARQ feedback message comprising a bitmap that indicates, based on a position in the bitmap, a process identifier for each of the plurality of data subframes correctly decoded. 27. The apparatus of claim 24, wherein the processor is further configured to transmit the group HARQ feedback message after a downlink portion of the transmission period. 28. The apparatus of claim 24, wherein the processor is further configured to:
receive, over the unlicensed spectrum, a Request to Send message; and transmit, over the unlicensed spectrum, a Clear to Send message to reserve an uplink portion of the transmission period to transmit the group HARQ feedback message. 29. The apparatus of claim 24, wherein the group HARQ feedback message comprises HARQ feedback information for a subset of the set of one or more data subframes, and wherein the processor is further configured to:
transmit, over the unlicensed spectrum, a next group HARQ feedback message comprising HARQ feedback information for a remaining subset of the set of one or more data subframes, the next group HARQ feedback message being transmitted during a next transmission period. 30. The apparatus of claim 24, wherein the processor is further configured to:
receive, after the transmission period, an uplink grant over the unlicensed spectrum, wherein the group HARQ feedback message is transmitted in response to the uplink grant. | Methods, systems, devices, and apparatuses are described for wireless communications. In one method, a set of one or more data subframes of a data frame may be transmitted over an unlicensed spectrum, to a user equipment (UE), during a transmission period. A group hybrid automatic repeat request (HARQ) feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes may then be received over the unlicensed spectrum, from the UE, during the transmission period. In another method, a set of one or more data subframes of a data frame may be received over an unlicensed spectrum during a transmission period. A group HARQ feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes may then be transmitted over the unlicensed spectrum during the transmission period.1. A method for wireless communications, comprising:
transmitting, over an unlicensed spectrum to a user equipment (UE), during a transmission period, a set of one or more data subframes of a data frame; and receiving, over the unlicensed spectrum from the UE, during the transmission period, a group hybrid automatic repeat request (HARQ) feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes. 2. The method of claim 1, wherein the group HARQ feedback message comprises an acknowledgment for each of the plurality of data subframes decoded by the UE, the group HARQ feedback message received either periodically or in response to a trigger. 3. The method of claim 1, wherein the group HARQ feedback message comprises a bitmap that indicates, based on a position in the bitmap, a process identifier for each of the plurality of data subframes being acknowledged by the UE in the group HARQ feedback message. 4. The method of claim 1, wherein receiving the group HARQ feedback message for the plurality of data subframes comprises receiving the group HARQ feedback message after a downlink portion of the transmission period. 5. The method of claim 1, further comprising:
transmitting, over the unlicensed spectrum to the UE, a Request to Send message; and receiving, over the unlicensed spectrum from the UE, a Clear to Send message to reserve an uplink portion of the transmission period to receive the group HARQ feedback message from the UE. 6. The method of claim 1, wherein the group HARQ feedback message comprises HARQ feedback information for a subset of the set of one or more data subframes, the method further comprising:
receiving, over the unlicensed spectrum from the UE, a next group HARQ feedback message comprising HARQ feedback information for a remaining subset of the set of one or more data subframes, the next group HARQ feedback message being received during a next transmission period. 7. The method of claim 1, further comprising:
performing clear channel assessment (CCA) to determine availability of the unlicensed spectrum; and accessing the unlicensed spectrum during the transmission period when a determination is made that the unlicensed spectrum is available. 8. The method of claim 1, further comprising:
transmitting a clear to send (CTS) signal when the unlicensed spectrum is available for transmission. 9. An apparatus for wireless communications, comprising:
a processor; and memory communicatively coupled to the processor; wherein the processor is configured to: transmit, over an unlicensed spectrum to a user equipment (UE), during a transmission period, a set of one or more data subframes of a data frame; and receive, over the unlicensed spectrum from the UE, during the transmission period, a group hybrid automatic repeat request (HARQ) feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes. 10. The apparatus of claim 9, wherein the group HARQ feedback message comprises an acknowledgment for each of the plurality of data subframes decoded by the UE, the group HARQ feedback message received either periodically or in response to a trigger. 11. The apparatus of claim 9, wherein the group HARQ feedback message comprises a bitmap that indicates, based on a position in the bitmap, a process identifier for each of the plurality of data subframes being acknowledged by the UE in the group HARQ feedback message. 12. The apparatus of claim 9, wherein processor is further configured to receive the group HARQ feedback message for the plurality of data subframes comprise instructions executable by the processor to receive the group HARQ feedback message after a downlink portion of the transmission period. 13. The apparatus of claim 9, wherein the processor is further configured to:
transmit, over the unlicensed spectrum to the UE, a Request to Send message; and receive, over the unlicensed spectrum from the UE, a Clear to Send message to reserve an uplink portion of the transmission period to receive the group HARQ feedback message from the UE. 14. The apparatus of claim 9, wherein the group HARQ feedback message comprises HARQ feedback information for a subset of the set of one or more data subframes, and wherein the processor is further configured to:
receive, over the unlicensed spectrum from the UE, a next group HARQ feedback message comprising HARQ feedback information for a remaining subset of the set of one or more data subframes, the next group HARQ feedback message being received during a next transmission period. 15. The apparatus of claim 9, wherein the processor is further configured to:
perform clear channel assessment (CCA) to determine availability of the unlicensed spectrum; and access the unlicensed spectrum during the transmission period when a determination is made that the unlicensed spectrum is available. 16. The apparatus of claim 9, wherein the processor is further configured to:
transmit a clear to send (CTS) signal when the unlicensed spectrum is available for transmission. 17. A method for wireless communications, comprising:
receiving, over an unlicensed spectrum, during a transmission period, a set of one or more data subframes of a data frame; and transmitting, over the unlicensed spectrum, during the transmission period, a group hybrid automatic repeat request (HARQ) feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes. 18. The method of claim 17, further comprising identifying which data subframes are correctly decoded after reception, the group HARQ feedback message comprising an acknowledgement for each of the plurality of data subframes correctly decoded, and wherein the group HARQ feedback message is transmitted, over the unlicensed spectrum either periodically or in response to a trigger. 19. The method of claim 17, further comprising identifying which data subframes are correctly decoded after reception, the group HARQ feedback message comprising a bitmap that indicates, based on a position in the bitmap, a process identifier for each of the plurality of data subframes correctly decoded. 20. The method of claim 17, wherein transmitting the group HARQ feedback message for the plurality of data subframes comprises transmitting the group HARQ feedback message after a downlink portion of the transmission period. 21. The method of claim 17, further comprising:
receiving, over the unlicensed spectrum, a Request to Send message; and transmitting, over the unlicensed spectrum, a Clear to Send message to reserve an uplink portion of the transmission period to transmit the group HARQ feedback message. 22. The method of claim 17, wherein the group HARQ feedback message comprises HARQ feedback information for a subset of the set of one or more data subframes, the method further comprising:
transmitting, over the unlicensed spectrum, a next group HARQ feedback message comprising HARQ feedback information for a remaining subset of the set of one or more data subframes, the next group HARQ feedback message being transmitted during a next transmission period. 23. The method of claim 17, further comprising receiving, after the transmission period, an uplink grant over the unlicensed spectrum, wherein the group HARQ feedback message is transmitted in response to the uplink grant. 24. An apparatus for wireless communications, comprising:
a processor; and memory in communicatively coupled to the processor; wherein the processor is configured to: receive, over an unlicensed spectrum, during a transmission period, a set of one or more data subframes of a data frame; and transmit, over the unlicensed spectrum, during the transmission period, a group hybrid automatic repeat request (HARQ) feedback message for a plurality of data subframes including at least one of the data subframes in the set of one or more data subframes. 25. The apparatus of claim 24, wherein the processor is further configured to identify which data subframes are correctly decoded after reception, the group HARQ feedback message comprising an acknowledgement for each of the plurality of data subframes correctly decoded, and wherein the group HARQ feedback message is transmitted, over the unlicensed spectrum either periodically or in response to a trigger. 26. The apparatus of claim 24, wherein the processor is further configured to identify which data subframes are correctly decoded after reception, the group HARQ feedback message comprising a bitmap that indicates, based on a position in the bitmap, a process identifier for each of the plurality of data subframes correctly decoded. 27. The apparatus of claim 24, wherein the processor is further configured to transmit the group HARQ feedback message after a downlink portion of the transmission period. 28. The apparatus of claim 24, wherein the processor is further configured to:
receive, over the unlicensed spectrum, a Request to Send message; and transmit, over the unlicensed spectrum, a Clear to Send message to reserve an uplink portion of the transmission period to transmit the group HARQ feedback message. 29. The apparatus of claim 24, wherein the group HARQ feedback message comprises HARQ feedback information for a subset of the set of one or more data subframes, and wherein the processor is further configured to:
transmit, over the unlicensed spectrum, a next group HARQ feedback message comprising HARQ feedback information for a remaining subset of the set of one or more data subframes, the next group HARQ feedback message being transmitted during a next transmission period. 30. The apparatus of claim 24, wherein the processor is further configured to:
receive, after the transmission period, an uplink grant over the unlicensed spectrum, wherein the group HARQ feedback message is transmitted in response to the uplink grant. | 2,400 |
8,940 | 8,940 | 14,716,699 | 2,449 | Systems and methods accessing remote digital data over a wide area network (WAN) are disclosed. In an embodiment, a network device is disclosed. The network device includes a local area network (LAN) switching fabric physical interface configured to communicate according to a LAN switching fabric protocol, a WAN physical interface configured to communicate according to a WAN protocol, and a fabric extension function configured to map LAN switching fabric interfaces to pseudo-ports, map pseudo-ports to WAN interfaces, and transmit LAN fabric datagrams received at the LAN switching fabric physical interface from the WAN physical interface via a mapped pseudo-port and a corresponding WAN interface. | 1. A network device comprising:
a local area network (LAN) switching fabric physical interface configured to communicate according to a LAN switching fabric protocol; a wide area network (WAN) physical interface configured to communicate according to a WAN protocol; a fabric extension function configured to;
map LAN switching fabric interfaces to pseudo-ports;
map pseudo-ports to WAN interfaces; and
transmit LAN fabric datagrams received at the LAN switching fabric physical interface from the WAN physical interface via a mapped pseudo-port and a corresponding WAN interface. 2. The network device of claim 1 wherein the fabric extension function is further configured to transmit and receive pseudo-port link packets via the WAN physical interface to establish a link across the WAN. 3. The network device of claim 1 wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to implement flow control across the WAN. 4. The network device of claim 1 wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to implement credit-based flow control across the WAN. 5. The network device of claim 1 wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to establish a link across the WAN, wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to implement credit-based flow control across the WAN, and wherein the fabric extension function is further configured to transmit and receive LAN fabric datagrams over the established link via the WAN physical interface according the credit-based flow control. 6. The network device of claim 1 wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to establish a link across the WAN, wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to implement XON/XOFF flow control across the WAN, and wherein the fabric extension function is further configured to transmit and receive LAN fabric datagrams over the established link via the WAN physical interface according the XON/XOFF flow control. 7. The network device of claim 1 wherein the fabric extension function is further configured to measure delay through the WAN and to use the measured delay to adjust buffer depths to maintain buffer extension and lossless characteristics of the pseudo-ports. 8. The network device of claim 1 wherein the LAN switching fabric physical interface is configured to communicate according to one of INFINIBAND, Fibre channel, IEEE 802.3x pause fames, Data Center Bridging (DCB), IEEE 802.1Qbb (Priority-based Flow Control), IEEE 802.1 Qaz (Enhanced Transmission Selection), IEEE 802.1Qau (Congestion Notification), OpenFabrics RDMA over Converged Ethernet (RoCE), and Omni-Path and wherein the WAN physical interface is configured to interface with SONET, SDH, OTN, dark fiber, Ethernet, or satellite. 9. The network device of claim 1 wherein a pseudo-port is associated with a logical WAN connection that allows a port of the LAN switching fabric to be extended across WAN. 10. A method for accessing remote digital data over a wide area network (WAN), the method comprising:
receiving LAN fabric datagrams at a LAN switching fabric physical interface of a first network device; mapping the LAN switching fabric interface of the received LAN fabric datagrams to a pseudo-port; and transmitting the LAN fabric datagrams from a WAN physical interface of the first network device using the mapped pseudo-port. 11. The method of claim 10, wherein the LAN fabric datagrams are transmitted from the WAN physical interface of the first network device using credit-based flow control. 12. The method of claim 10, wherein the LAN fabric datagrams are transmitted from the WAN physical interface of the first network device using a logical WAN interface carried within the WAN physical interface. 13. The method of claim 10, further comprising:
receiving the LAN fabric datagrams at a WAN physical interface of a second network device; mapping the pseudo-port of the received LAN fabric datagrams to a LAN switching fabric interface of the second network device; and transmitting the LAN fabric datagrams from a LAN switching fabric physical interface of the second network device via the mapped LAN switching fabric interface. 14. A method for accessing remote digital data over a wide area network (WAN), the method comprising:
at a first network device that includes a local area network (LAN) switching fabric physical interface configured to communicate according to a LAN switching fabric protocol and a WAN physical interface configured to communicate according to a WAN protocol; exchanging pseudo-port packets with a WAN physical interface of a second network device to couple the LAN switching fabric across the WAN, the pseudo-port packets comprising;
a field for carrying a pseudo-port identifier;
a link state operations code field for carrying information to establish a link between the first network device and the second network device across the WAN;
a link state field for carrying information about a link state;
exchanging pseudo-port packets with the WAN physical interface of the second network device via the WAN physical interface of the first network device to implement flow control of LAN fabric datagrams that are transmitted across the WAN. 15. The method of claim 14, wherein the pseudo-port packets comprise a Flow Control Transmit Blocks Sent (FCTBS) field. 16. The method of claim 14, wherein the FCTBS field of the pseudo-port packets carries a running count of blocks sent. 17. The method of claim 14, wherein the pseudo-port packets comprise a Flow Control Credit Limit (FCCL) field. 18. The method of claim 14, wherein the FCCL field of the pseudo-port packets carries rolling count of credits. 19. The method of claim 14, wherein the pseudo-port packets comprise a Flow Control Transmit Blocks Sent (FCTBS) field, wherein the FCTBS field of the pseudo-port packets carries a running count of blocks sent, wherein the pseudo-port packets comprise a Flow Control Credit Limit (FCCL) field, wherein the FCCL field of the pseudo-port packets carries rolling count of credits. 20. The method of claim 14, wherein the LAN switching fabric physical interface is configured to communicate according to INFINIBAND, Fibre channel, IEEE 802.3x pause fames, Data Center Bridging (DCB), IEEE 802.1Qbb (Priority-based Flow Control), IEEE 802.1 Qaz (Enhanced Transmission Selection), IEEE 802.1Qau (Congestion Notification), OpenFabrics RDMA over Converged Ethernet (RoCE), and Omni-Path and wherein the WAN physical interface is configured to interface with SONET, SDH, OTN, dark fiber, Ethernet, or satellite. | Systems and methods accessing remote digital data over a wide area network (WAN) are disclosed. In an embodiment, a network device is disclosed. The network device includes a local area network (LAN) switching fabric physical interface configured to communicate according to a LAN switching fabric protocol, a WAN physical interface configured to communicate according to a WAN protocol, and a fabric extension function configured to map LAN switching fabric interfaces to pseudo-ports, map pseudo-ports to WAN interfaces, and transmit LAN fabric datagrams received at the LAN switching fabric physical interface from the WAN physical interface via a mapped pseudo-port and a corresponding WAN interface.1. A network device comprising:
a local area network (LAN) switching fabric physical interface configured to communicate according to a LAN switching fabric protocol; a wide area network (WAN) physical interface configured to communicate according to a WAN protocol; a fabric extension function configured to;
map LAN switching fabric interfaces to pseudo-ports;
map pseudo-ports to WAN interfaces; and
transmit LAN fabric datagrams received at the LAN switching fabric physical interface from the WAN physical interface via a mapped pseudo-port and a corresponding WAN interface. 2. The network device of claim 1 wherein the fabric extension function is further configured to transmit and receive pseudo-port link packets via the WAN physical interface to establish a link across the WAN. 3. The network device of claim 1 wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to implement flow control across the WAN. 4. The network device of claim 1 wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to implement credit-based flow control across the WAN. 5. The network device of claim 1 wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to establish a link across the WAN, wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to implement credit-based flow control across the WAN, and wherein the fabric extension function is further configured to transmit and receive LAN fabric datagrams over the established link via the WAN physical interface according the credit-based flow control. 6. The network device of claim 1 wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to establish a link across the WAN, wherein the fabric extension function is further configured to transmit and receive pseudo-port packets via the WAN physical interface to implement XON/XOFF flow control across the WAN, and wherein the fabric extension function is further configured to transmit and receive LAN fabric datagrams over the established link via the WAN physical interface according the XON/XOFF flow control. 7. The network device of claim 1 wherein the fabric extension function is further configured to measure delay through the WAN and to use the measured delay to adjust buffer depths to maintain buffer extension and lossless characteristics of the pseudo-ports. 8. The network device of claim 1 wherein the LAN switching fabric physical interface is configured to communicate according to one of INFINIBAND, Fibre channel, IEEE 802.3x pause fames, Data Center Bridging (DCB), IEEE 802.1Qbb (Priority-based Flow Control), IEEE 802.1 Qaz (Enhanced Transmission Selection), IEEE 802.1Qau (Congestion Notification), OpenFabrics RDMA over Converged Ethernet (RoCE), and Omni-Path and wherein the WAN physical interface is configured to interface with SONET, SDH, OTN, dark fiber, Ethernet, or satellite. 9. The network device of claim 1 wherein a pseudo-port is associated with a logical WAN connection that allows a port of the LAN switching fabric to be extended across WAN. 10. A method for accessing remote digital data over a wide area network (WAN), the method comprising:
receiving LAN fabric datagrams at a LAN switching fabric physical interface of a first network device; mapping the LAN switching fabric interface of the received LAN fabric datagrams to a pseudo-port; and transmitting the LAN fabric datagrams from a WAN physical interface of the first network device using the mapped pseudo-port. 11. The method of claim 10, wherein the LAN fabric datagrams are transmitted from the WAN physical interface of the first network device using credit-based flow control. 12. The method of claim 10, wherein the LAN fabric datagrams are transmitted from the WAN physical interface of the first network device using a logical WAN interface carried within the WAN physical interface. 13. The method of claim 10, further comprising:
receiving the LAN fabric datagrams at a WAN physical interface of a second network device; mapping the pseudo-port of the received LAN fabric datagrams to a LAN switching fabric interface of the second network device; and transmitting the LAN fabric datagrams from a LAN switching fabric physical interface of the second network device via the mapped LAN switching fabric interface. 14. A method for accessing remote digital data over a wide area network (WAN), the method comprising:
at a first network device that includes a local area network (LAN) switching fabric physical interface configured to communicate according to a LAN switching fabric protocol and a WAN physical interface configured to communicate according to a WAN protocol; exchanging pseudo-port packets with a WAN physical interface of a second network device to couple the LAN switching fabric across the WAN, the pseudo-port packets comprising;
a field for carrying a pseudo-port identifier;
a link state operations code field for carrying information to establish a link between the first network device and the second network device across the WAN;
a link state field for carrying information about a link state;
exchanging pseudo-port packets with the WAN physical interface of the second network device via the WAN physical interface of the first network device to implement flow control of LAN fabric datagrams that are transmitted across the WAN. 15. The method of claim 14, wherein the pseudo-port packets comprise a Flow Control Transmit Blocks Sent (FCTBS) field. 16. The method of claim 14, wherein the FCTBS field of the pseudo-port packets carries a running count of blocks sent. 17. The method of claim 14, wherein the pseudo-port packets comprise a Flow Control Credit Limit (FCCL) field. 18. The method of claim 14, wherein the FCCL field of the pseudo-port packets carries rolling count of credits. 19. The method of claim 14, wherein the pseudo-port packets comprise a Flow Control Transmit Blocks Sent (FCTBS) field, wherein the FCTBS field of the pseudo-port packets carries a running count of blocks sent, wherein the pseudo-port packets comprise a Flow Control Credit Limit (FCCL) field, wherein the FCCL field of the pseudo-port packets carries rolling count of credits. 20. The method of claim 14, wherein the LAN switching fabric physical interface is configured to communicate according to INFINIBAND, Fibre channel, IEEE 802.3x pause fames, Data Center Bridging (DCB), IEEE 802.1Qbb (Priority-based Flow Control), IEEE 802.1 Qaz (Enhanced Transmission Selection), IEEE 802.1Qau (Congestion Notification), OpenFabrics RDMA over Converged Ethernet (RoCE), and Omni-Path and wherein the WAN physical interface is configured to interface with SONET, SDH, OTN, dark fiber, Ethernet, or satellite. | 2,400 |
8,941 | 8,941 | 15,663,109 | 2,413 | Some examples relate to identifying components of a wireless local area network based on a geographical specification. In an example, a connection may be established between a client device and a wireless access point (WAP) in a wireless local area network (WLAN) comprising a plurality of WAPs. The client device may transmit a geographical specification to a range monitoring engine. The range monitoring engine may identify a component of the WLAN based on the geographical specification and a first set of geographical coordinates of the WAP acting as a reference point. | 1. A method comprising:
establishing a connection between a client device and a wireless access point (WAP) in a wireless local area network (WLAN) comprising a plurality of WAPs; transmitting from the client device, a geographical specification to a range monitoring engine; receiving information related to a component of the WLAN from the range monitoring engine, wherein the range monitoring engine identifies the component of the WLAN based on the geographical specification and a first set of geographical coordinates of the WAP acting as a reference point; and causing information related to the component of the WLAN to be displayed via a user interface coupled to the client device. 2. The method of claim 1, wherein the geographical specification includes a second set of geographical coordinates. 3. The method of claim 2, wherein the second set of geographical coordinates indicates a location of the client device. 4. The method of claim 1, wherein the geographical specification is provided by a user. 5. The method of claim 1, wherein the information relates to performance of the component. 6. The method of claim 1, wherein the component includes a wireless controller in the WLAN. 7. The method of claim 1, wherein the component includes a client device coupled to a WAP amongst the plurality of WAPs in the WLAN. 8. A system comprising:
a range monitoring engine to:
receive, from a client device, an input defining a geographical specification, wherein the client device is coupled to a wireless access point (WAP) in a wireless local area network (WLAN) comprising a plurality of WAPs;
identify a component of the WLAN based on the geographical specification and a first set of geographical coordinates of the WAP acting as a reference point;
determine information related to the component of the WLAN; and
provide information related to the component of the WLAN to the client device. 9. The system of claim 8, wherein the component includes a WAP amongst the plurality of wireless access points in the WLAN. 10. The system of claim 8, wherein the first set of geographical coordinates of the WAP include latitude and latitude coordinates of the WAP. 11. The system of claim 8, wherein the geographical specification includes a geographical range from the reference point. 12. The system of claim 11, wherein the client device is located within the geographical range from the reference point. 13. The system of claim 8, wherein the client device includes a mobile device. 14. The system of claim 8, wherein the information related to the component of the WLAN is present in a network management system. 15. A non-transitory machine-readable storage medium comprising instructions, the instructions executable by a processor to:
establish a connection between a client device to a wireless access point (WAP) in a wireless local area network (WLAN) comprising a plurality of WAPs; provide from the client device, a geographical specification to a range monitoring engine; receive information related to a component of the WLAN from the range monitoring engine, wherein the range monitoring engine identifies the component of the WLAN based on the geographical specification and a first set of geographical coordinates of the WAP acting as a reference point; present information related to performance of the component of the WLAN via a user interface coupled to the client device; and receive an input defining an action to be performed in relation to the component based on the received information. 16. The storage medium of claim 15, wherein the reference point includes geographical latitude and longitude of the WAP. 17. The storage medium of claim 15, wherein the component includes the WAP. 18. The storage medium of claim 15, wherein the geographical specification is provided via an interface of the range monitoring engine on the client device. 19. The storage medium of claim 15, wherein the range monitoring engine receives the information related to the component of the WLAN from a network management system. 20. The storage medium of claim 19, wherein the range monitoring engine correlates the information received from the network management system with information from a visual radio frequency (RF) system. | Some examples relate to identifying components of a wireless local area network based on a geographical specification. In an example, a connection may be established between a client device and a wireless access point (WAP) in a wireless local area network (WLAN) comprising a plurality of WAPs. The client device may transmit a geographical specification to a range monitoring engine. The range monitoring engine may identify a component of the WLAN based on the geographical specification and a first set of geographical coordinates of the WAP acting as a reference point.1. A method comprising:
establishing a connection between a client device and a wireless access point (WAP) in a wireless local area network (WLAN) comprising a plurality of WAPs; transmitting from the client device, a geographical specification to a range monitoring engine; receiving information related to a component of the WLAN from the range monitoring engine, wherein the range monitoring engine identifies the component of the WLAN based on the geographical specification and a first set of geographical coordinates of the WAP acting as a reference point; and causing information related to the component of the WLAN to be displayed via a user interface coupled to the client device. 2. The method of claim 1, wherein the geographical specification includes a second set of geographical coordinates. 3. The method of claim 2, wherein the second set of geographical coordinates indicates a location of the client device. 4. The method of claim 1, wherein the geographical specification is provided by a user. 5. The method of claim 1, wherein the information relates to performance of the component. 6. The method of claim 1, wherein the component includes a wireless controller in the WLAN. 7. The method of claim 1, wherein the component includes a client device coupled to a WAP amongst the plurality of WAPs in the WLAN. 8. A system comprising:
a range monitoring engine to:
receive, from a client device, an input defining a geographical specification, wherein the client device is coupled to a wireless access point (WAP) in a wireless local area network (WLAN) comprising a plurality of WAPs;
identify a component of the WLAN based on the geographical specification and a first set of geographical coordinates of the WAP acting as a reference point;
determine information related to the component of the WLAN; and
provide information related to the component of the WLAN to the client device. 9. The system of claim 8, wherein the component includes a WAP amongst the plurality of wireless access points in the WLAN. 10. The system of claim 8, wherein the first set of geographical coordinates of the WAP include latitude and latitude coordinates of the WAP. 11. The system of claim 8, wherein the geographical specification includes a geographical range from the reference point. 12. The system of claim 11, wherein the client device is located within the geographical range from the reference point. 13. The system of claim 8, wherein the client device includes a mobile device. 14. The system of claim 8, wherein the information related to the component of the WLAN is present in a network management system. 15. A non-transitory machine-readable storage medium comprising instructions, the instructions executable by a processor to:
establish a connection between a client device to a wireless access point (WAP) in a wireless local area network (WLAN) comprising a plurality of WAPs; provide from the client device, a geographical specification to a range monitoring engine; receive information related to a component of the WLAN from the range monitoring engine, wherein the range monitoring engine identifies the component of the WLAN based on the geographical specification and a first set of geographical coordinates of the WAP acting as a reference point; present information related to performance of the component of the WLAN via a user interface coupled to the client device; and receive an input defining an action to be performed in relation to the component based on the received information. 16. The storage medium of claim 15, wherein the reference point includes geographical latitude and longitude of the WAP. 17. The storage medium of claim 15, wherein the component includes the WAP. 18. The storage medium of claim 15, wherein the geographical specification is provided via an interface of the range monitoring engine on the client device. 19. The storage medium of claim 15, wherein the range monitoring engine receives the information related to the component of the WLAN from a network management system. 20. The storage medium of claim 19, wherein the range monitoring engine correlates the information received from the network management system with information from a visual radio frequency (RF) system. | 2,400 |
8,942 | 8,942 | 15,053,899 | 2,436 | Systems and methods are disclosed for securing an application running on a guest. An example method includes detecting, by a guest running on a virtual machine, that a set of physical memory pages is allocated to an application. The virtual machine runs on a hypervisor, and the application runs on the guest. During runtime, the guest may send a request to the hypervisor to set the set of physical memory pages to an executable-by-user mode in the hypervisor's page tables. | 1. A method of securing an application running on a guest, comprising:
detecting, by a guest running on a virtual machine, that a set of physical memory pages is allocated to an application, the virtual machine running on a hypervisor, and the application running on the guest; and sending, by the guest, a request to the hypervisor to set the set of physical memory pages to an executable-by-user mode in the hypervisor's page tables. 2. The method of claim 1, wherein application memory allocated to the application is mapped to the set of physical memory pages stored at a set of guest physical memory addresses. 3. The method of claim 1, wherein any memory page set to the executable-by-user mode in the hypervisor's page tables is not executable in kernel space. 4. The method of claim 1, wherein sending a request includes invoking a hypercall that causes the hypervisor to set the physical memory pages to the executable-by-user mode in the hypervisor's page tables. 5. The method of claim 1, wherein the guest maintains one or more mappings from a guest virtual memory address to a guest physical address, and sets permissions on the guest virtual memory addresses, the one or more guest virtual memory addresses being allocated to the application. 6. The method of claim 5, wherein the hypervisor maintains hypervisor pages tables including one or more mappings from a guest physical address to a host physical address, and sets permissions on the guest physical addresses. 7. The method of claim 5, further comprising:
determining, by the guest, whether the application has requested execution permissions for the set of physical memory pages; in response to a determination that the application has requested execution permissions for the set of physical memory pages, setting a set of virtual memory pages corresponding to the set of physical memory pages to an executable-by-user mode; and in response to a determination that the application has not requested execution permissions for the set of physical memory pages, setting the set of virtual memory pages corresponding to the set of physical memory pages to an executable-by-none mode. 8. The method of claim 1, wherein the set of physical memory pages stores application code including data or executable code of the application. 9. A system for securing an application running on a guest, comprising:
a guest that runs on a virtual machine and detects that an application is loaded, wherein the virtual machine runs on a hypervisor; an application code protector that detects that a set of physical memory pages is allocated to the application; and an I/O module that sends a request to the hypervisor to set the set of physical memory pages to an executable-by-user mode in the hypervisor's page tables. 10. The system of claim 9, wherein application memory allocated to the application is mapped to the set of physical memory pages stored at a set of guest physical memory addresses. 11. The system of claim 9, wherein any memory page set to the executable-by-user mode in the hypervisor's page tables is not executable in kernel space. 12. The system of claim 9, wherein the guest invokes a hypercall that causes the hypervisor to set the physical memory pages to the executable-by-user mode in the hypervisor's page tables. 13. The system of claim 9, wherein the guest maintains one or more mappings from a guest virtual memory address to a guest physical address, and sets permissions on the guest virtual memory addresses, the one or more guest virtual memory addresses being allocated to the application. 14. The system of claim 13, wherein the hypervisor maintains hypervisor pages tables including one or more mappings from a guest physical address to a host physical address, and sets permissions on the guest physical addresses. 15. The system of claim 13, wherein the guest determines whether the application has requested execution permissions for the set of physical memory pages, wherein in response to a determination that the application has requested execution permissions for the set of physical memory pages, the guest sets a set of virtual memory pages corresponding to the set of physical memory pages to an executable-by-user mode, and wherein in response to a determination that the application has not requested execution permissions for the set of physical memory pages, the guest sets the set of virtual memory pages corresponding to the set of physical memory pages to an executable-by-none mode. 16. The system of claim 9, wherein the set of physical memory pages stores application code including data or executable code of the application. 17. The system of claim 9, wherein the hypervisor sets the physical memory pages to an executable-by-none mode in the hypervisor's page tables. 18. The system of claim 17, wherein application code protector sends a range of guest physical memory addresses corresponding to memory pages storing kernel executable code to the hypervisor. 19. The system of claim 18, wherein the hypervisor sets the memory pages that are outside of the range of guest physical memory addresses to the executable-by-user mode or the executable-by-none mode. 20. A machine-readable medium comprising a plurality of machine-readable instructions that when executed by one or more processors is adapted to cause the one or more processors to perform a method comprising:
detecting, by a guest running on a virtual machine, that a set of physical memory pages is allocated to an application, the virtual machine running on a hypervisor, and the application running on the guest; and sending, by the guest, a request to the hypervisor to set the set of physical memory pages to an executable-by-user mode in the hypervisor's page tables. | Systems and methods are disclosed for securing an application running on a guest. An example method includes detecting, by a guest running on a virtual machine, that a set of physical memory pages is allocated to an application. The virtual machine runs on a hypervisor, and the application runs on the guest. During runtime, the guest may send a request to the hypervisor to set the set of physical memory pages to an executable-by-user mode in the hypervisor's page tables.1. A method of securing an application running on a guest, comprising:
detecting, by a guest running on a virtual machine, that a set of physical memory pages is allocated to an application, the virtual machine running on a hypervisor, and the application running on the guest; and sending, by the guest, a request to the hypervisor to set the set of physical memory pages to an executable-by-user mode in the hypervisor's page tables. 2. The method of claim 1, wherein application memory allocated to the application is mapped to the set of physical memory pages stored at a set of guest physical memory addresses. 3. The method of claim 1, wherein any memory page set to the executable-by-user mode in the hypervisor's page tables is not executable in kernel space. 4. The method of claim 1, wherein sending a request includes invoking a hypercall that causes the hypervisor to set the physical memory pages to the executable-by-user mode in the hypervisor's page tables. 5. The method of claim 1, wherein the guest maintains one or more mappings from a guest virtual memory address to a guest physical address, and sets permissions on the guest virtual memory addresses, the one or more guest virtual memory addresses being allocated to the application. 6. The method of claim 5, wherein the hypervisor maintains hypervisor pages tables including one or more mappings from a guest physical address to a host physical address, and sets permissions on the guest physical addresses. 7. The method of claim 5, further comprising:
determining, by the guest, whether the application has requested execution permissions for the set of physical memory pages; in response to a determination that the application has requested execution permissions for the set of physical memory pages, setting a set of virtual memory pages corresponding to the set of physical memory pages to an executable-by-user mode; and in response to a determination that the application has not requested execution permissions for the set of physical memory pages, setting the set of virtual memory pages corresponding to the set of physical memory pages to an executable-by-none mode. 8. The method of claim 1, wherein the set of physical memory pages stores application code including data or executable code of the application. 9. A system for securing an application running on a guest, comprising:
a guest that runs on a virtual machine and detects that an application is loaded, wherein the virtual machine runs on a hypervisor; an application code protector that detects that a set of physical memory pages is allocated to the application; and an I/O module that sends a request to the hypervisor to set the set of physical memory pages to an executable-by-user mode in the hypervisor's page tables. 10. The system of claim 9, wherein application memory allocated to the application is mapped to the set of physical memory pages stored at a set of guest physical memory addresses. 11. The system of claim 9, wherein any memory page set to the executable-by-user mode in the hypervisor's page tables is not executable in kernel space. 12. The system of claim 9, wherein the guest invokes a hypercall that causes the hypervisor to set the physical memory pages to the executable-by-user mode in the hypervisor's page tables. 13. The system of claim 9, wherein the guest maintains one or more mappings from a guest virtual memory address to a guest physical address, and sets permissions on the guest virtual memory addresses, the one or more guest virtual memory addresses being allocated to the application. 14. The system of claim 13, wherein the hypervisor maintains hypervisor pages tables including one or more mappings from a guest physical address to a host physical address, and sets permissions on the guest physical addresses. 15. The system of claim 13, wherein the guest determines whether the application has requested execution permissions for the set of physical memory pages, wherein in response to a determination that the application has requested execution permissions for the set of physical memory pages, the guest sets a set of virtual memory pages corresponding to the set of physical memory pages to an executable-by-user mode, and wherein in response to a determination that the application has not requested execution permissions for the set of physical memory pages, the guest sets the set of virtual memory pages corresponding to the set of physical memory pages to an executable-by-none mode. 16. The system of claim 9, wherein the set of physical memory pages stores application code including data or executable code of the application. 17. The system of claim 9, wherein the hypervisor sets the physical memory pages to an executable-by-none mode in the hypervisor's page tables. 18. The system of claim 17, wherein application code protector sends a range of guest physical memory addresses corresponding to memory pages storing kernel executable code to the hypervisor. 19. The system of claim 18, wherein the hypervisor sets the memory pages that are outside of the range of guest physical memory addresses to the executable-by-user mode or the executable-by-none mode. 20. A machine-readable medium comprising a plurality of machine-readable instructions that when executed by one or more processors is adapted to cause the one or more processors to perform a method comprising:
detecting, by a guest running on a virtual machine, that a set of physical memory pages is allocated to an application, the virtual machine running on a hypervisor, and the application running on the guest; and sending, by the guest, a request to the hypervisor to set the set of physical memory pages to an executable-by-user mode in the hypervisor's page tables. | 2,400 |
8,943 | 8,943 | 16,191,219 | 2,421 | Described herein are apparatuses, systems and methods for predicting audience measurements of a television program. A method comprises inputting a target program for acquisition into a prediction model, wherein the prediction model is based on a plurality of television acquisition performance predictors, and generating a recommendation as to whether the target program should be acquired based on the prediction model and the plurality of television acquisition performance predictors. | 1-20. (canceled) 21. A method, comprising:
at a predictive modeling server: identifying each of a plurality of programs; identifying each of a plurality of networks, each of the networks having aired a subset of the programs; receiving a network ratings value corresponding to a broadcast of one of the programs on one of the networks; identifying one of the programs that has not aired on a selected one of the networks; and determining a predicted network ratings value for the identified program on the selected network by collaboratively filtering the network ratings values. 22. The method of claim 21, wherein the network ratings values are collaboratively filtered using a model-based collaborative filtering employing matrix factorization. 23. The method of claim 22, wherein the model-based collaborative filtering identifies a latent network vector and a latent program vector for the identified program. 24. The method of claim 23, wherein the predicted network ratings value is further determined based on the latent network vector and the latent program vector for the identified program. 25. The method of claim 21, further comprising:
quantifying a comparison between the selected network and an aired network that aired the identified program based on a network-level variable. 26. The method of claim 25, wherein the network-level variable is an audience size for the selected network and the aired network for one of a given time or a given time period. 27. The method of claim 21, wherein, when the identified program was aired by more than one of the networks, the collaborative filtering uses the networks ratings values for each of the networks that aired the identified program. 28. The method of claim 27, wherein the networks ratings values for each of the networks that aired the identified program includes a variable indicative of a time at which the network aired the identified program. 29. A non-transitory computer readable storage medium with an executable program stored thereon, wherein the program instructs a processor to perform actions that include:
identifying each of a plurality of programs; identifying each of a plurality of networks, each of the networks having aired a subset of the programs; receiving a network ratings value corresponding to a broadcast of one of the programs on one of the networks; identifying one of the programs that has not aired on a selected one of the networks; and determining a predicted network ratings value for the identified program on the selected network by collaboratively filtering the network ratings values. 30. The non-transitory computer readable storage medium of claim 29, wherein the network ratings value is calculated Nielsen ratings. 31. The non-transitory computer readable storage medium of claim 29, wherein the network ratings values are collaboratively filtered using a model-based collaborative filtering employing matrix factorization. 32. The non-transitory computer readable storage medium of claim 31, wherein the model-based collaborative filtering identifies a latent network vector and a latent program vector for the identified program. 33. The non-transitory computer readable storage medium of claim 32, wherein the predicted network ratings value is further determined based on the latent network vector and the latent program vector for the identified program. 34. The non-transitory computer readable storage medium of claim 29, wherein the actions further include:
quantifying a comparison between the selected network and an aired network that aired the identified program based on a network-level variable. 35. The non-transitory computer readable storage medium of claim 34, wherein the network-level variable is an audience size for the selected network and the aired network for one of a given time or a given time period. 36. The non-transitory computer readable storage medium of claim 29, wherein, when the identified program was aired by more than one of the networks, the collaborative filtering uses the networks ratings values for each of the networks that aired the identified program. 37. The non-transitory computer readable storage medium of claim 36, wherein the networks ratings values for each of the networks that aired the identified program includes a variable indicative of a time at which the network aired the identified program. 38. A system, comprising:
a memory storing a plurality of rules; and a processor coupled to the memory and configured to perform actions that include:
identifying each of a plurality of programs;
identifying each of a plurality of networks, each of the networks having aired a subset of the programs;
receiving a network ratings value corresponding to a broadcast of one of the programs on one of the networks;
identifying one of the programs that has not aired on a selected one of the networks; and
determining a predicted network ratings value for the identified program on the selected network by collaboratively filtering the network ratings values. | Described herein are apparatuses, systems and methods for predicting audience measurements of a television program. A method comprises inputting a target program for acquisition into a prediction model, wherein the prediction model is based on a plurality of television acquisition performance predictors, and generating a recommendation as to whether the target program should be acquired based on the prediction model and the plurality of television acquisition performance predictors.1-20. (canceled) 21. A method, comprising:
at a predictive modeling server: identifying each of a plurality of programs; identifying each of a plurality of networks, each of the networks having aired a subset of the programs; receiving a network ratings value corresponding to a broadcast of one of the programs on one of the networks; identifying one of the programs that has not aired on a selected one of the networks; and determining a predicted network ratings value for the identified program on the selected network by collaboratively filtering the network ratings values. 22. The method of claim 21, wherein the network ratings values are collaboratively filtered using a model-based collaborative filtering employing matrix factorization. 23. The method of claim 22, wherein the model-based collaborative filtering identifies a latent network vector and a latent program vector for the identified program. 24. The method of claim 23, wherein the predicted network ratings value is further determined based on the latent network vector and the latent program vector for the identified program. 25. The method of claim 21, further comprising:
quantifying a comparison between the selected network and an aired network that aired the identified program based on a network-level variable. 26. The method of claim 25, wherein the network-level variable is an audience size for the selected network and the aired network for one of a given time or a given time period. 27. The method of claim 21, wherein, when the identified program was aired by more than one of the networks, the collaborative filtering uses the networks ratings values for each of the networks that aired the identified program. 28. The method of claim 27, wherein the networks ratings values for each of the networks that aired the identified program includes a variable indicative of a time at which the network aired the identified program. 29. A non-transitory computer readable storage medium with an executable program stored thereon, wherein the program instructs a processor to perform actions that include:
identifying each of a plurality of programs; identifying each of a plurality of networks, each of the networks having aired a subset of the programs; receiving a network ratings value corresponding to a broadcast of one of the programs on one of the networks; identifying one of the programs that has not aired on a selected one of the networks; and determining a predicted network ratings value for the identified program on the selected network by collaboratively filtering the network ratings values. 30. The non-transitory computer readable storage medium of claim 29, wherein the network ratings value is calculated Nielsen ratings. 31. The non-transitory computer readable storage medium of claim 29, wherein the network ratings values are collaboratively filtered using a model-based collaborative filtering employing matrix factorization. 32. The non-transitory computer readable storage medium of claim 31, wherein the model-based collaborative filtering identifies a latent network vector and a latent program vector for the identified program. 33. The non-transitory computer readable storage medium of claim 32, wherein the predicted network ratings value is further determined based on the latent network vector and the latent program vector for the identified program. 34. The non-transitory computer readable storage medium of claim 29, wherein the actions further include:
quantifying a comparison between the selected network and an aired network that aired the identified program based on a network-level variable. 35. The non-transitory computer readable storage medium of claim 34, wherein the network-level variable is an audience size for the selected network and the aired network for one of a given time or a given time period. 36. The non-transitory computer readable storage medium of claim 29, wherein, when the identified program was aired by more than one of the networks, the collaborative filtering uses the networks ratings values for each of the networks that aired the identified program. 37. The non-transitory computer readable storage medium of claim 36, wherein the networks ratings values for each of the networks that aired the identified program includes a variable indicative of a time at which the network aired the identified program. 38. A system, comprising:
a memory storing a plurality of rules; and a processor coupled to the memory and configured to perform actions that include:
identifying each of a plurality of programs;
identifying each of a plurality of networks, each of the networks having aired a subset of the programs;
receiving a network ratings value corresponding to a broadcast of one of the programs on one of the networks;
identifying one of the programs that has not aired on a selected one of the networks; and
determining a predicted network ratings value for the identified program on the selected network by collaboratively filtering the network ratings values. | 2,400 |
8,944 | 8,944 | 13,924,805 | 2,483 | An arrangement for wireless transmission of electrical signals in a motor vehicle maintains a cassette equipped with a stator ( 3 ) and a rotor ( 4 ) rotatably mounted in the stator ( 3 ) is arranged on the steering wheel of the motor vehicle, where the cassette has at least one electrical line extending in windings mounted between stator and rotor. The stator of the cassette is connected to the steering column, while the rotor is connected to the steering wheel. The transmitter ( 6 ) is arranged in the immediate vicinity of the stator ( 3 ) of the cassette and the receiver ( 7 ) is mechanically connected to the rotor ( 4 ) of the cassette and electrically to at least one electrical line ( 9 ) with a display ( 8 ) for displaying received signals. | 1. Arrangement for wireless transmission of electrical signals in a motor vehicle, said motor vehicle equipped with a steering wheel which is capable of turning in a stationary steering column, wherein a transmitter for the electrical signals is mounted on the steering wheel and a receiver for the electrical signals is mounted stationary in the motor vehicle, said arrangement comprising:
a cassette equipped with a stator and a rotor rotatably mounted in the stator, wherein the cassette includes an electrical line mounted between the stator and the rotor and extending in windings, wherein the line is at one end secured to the stator and with the other end to the rotor, wherein the stator of the cassette is connected to the steering column, while the rotor is connected to the steering wheel; wherein said transmitter is arranged in the immediate area of the stator of the cassette on a stationary part of the motor vehicle; and wherein said receiver is connected mechanically to the rotor of the cassette and electrically by means of an electrical line to a display for displaying received signals. 2. Arrangement according to claim 1, wherein the receiver as well as the display are connected for their current supply electrically conductively to the line of the cassette. 3. Arrangement according to claim 1, wherein the transmitter is mounted directly on the stator of the cassette. 4. Arrangement according to claim 1, wherein the display is constructed as a screen. | An arrangement for wireless transmission of electrical signals in a motor vehicle maintains a cassette equipped with a stator ( 3 ) and a rotor ( 4 ) rotatably mounted in the stator ( 3 ) is arranged on the steering wheel of the motor vehicle, where the cassette has at least one electrical line extending in windings mounted between stator and rotor. The stator of the cassette is connected to the steering column, while the rotor is connected to the steering wheel. The transmitter ( 6 ) is arranged in the immediate vicinity of the stator ( 3 ) of the cassette and the receiver ( 7 ) is mechanically connected to the rotor ( 4 ) of the cassette and electrically to at least one electrical line ( 9 ) with a display ( 8 ) for displaying received signals.1. Arrangement for wireless transmission of electrical signals in a motor vehicle, said motor vehicle equipped with a steering wheel which is capable of turning in a stationary steering column, wherein a transmitter for the electrical signals is mounted on the steering wheel and a receiver for the electrical signals is mounted stationary in the motor vehicle, said arrangement comprising:
a cassette equipped with a stator and a rotor rotatably mounted in the stator, wherein the cassette includes an electrical line mounted between the stator and the rotor and extending in windings, wherein the line is at one end secured to the stator and with the other end to the rotor, wherein the stator of the cassette is connected to the steering column, while the rotor is connected to the steering wheel; wherein said transmitter is arranged in the immediate area of the stator of the cassette on a stationary part of the motor vehicle; and wherein said receiver is connected mechanically to the rotor of the cassette and electrically by means of an electrical line to a display for displaying received signals. 2. Arrangement according to claim 1, wherein the receiver as well as the display are connected for their current supply electrically conductively to the line of the cassette. 3. Arrangement according to claim 1, wherein the transmitter is mounted directly on the stator of the cassette. 4. Arrangement according to claim 1, wherein the display is constructed as a screen. | 2,400 |
8,945 | 8,945 | 15,792,033 | 2,439 | Embodiments disclosed herein provide systems, methods, and computer readable media for using a single sign-on proxy to regulate access to a cloud service. In a particular embodiment, a method provides receiving an authentication request from a user system directed to a SSO service and determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the SSO service. Upon determining that the authentication request satisfies the at least one criterion, the method provides forwarding the authentication request to the SSO service. | 1. A method of regulating access to a cloud service using a single sign-on (SSO) proxy, the method comprising:
receiving an authentication request at the SSO proxy from a user system directed to a SSO service; in the SSO proxy, responsive to receipt of the authentication request, determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the SSO service; and upon determining that the authentication request satisfies the at least one criterion, forwarding the authentication request from the SSO proxy to the SSO service. 2. The method of claim 1, wherein the at least one criterion includes a geographic location limitation, and the method further comprises:
determining whether the authentication request was received from a geographic location that satisfies the geographic location limitation. 3. The method of claim 2, wherein determining whether the authentication request was received from a geographic location that satisfies the geographic location limitation comprises:
identifying a network address from which the authentication request was received; and identifying the geographic location associated with the network address. 4. The method of claim 1, wherein the at least one criterion includes a time limitation, and the method further comprises:
determining whether the authentication request was received at a time that satisfies the time limitation. 5. The method of claim 1, wherein the at least one criterion includes a device type limitation, and the method further comprises:
determining whether the user system satisfies the device type limitation. 6. The method of claim 1, wherein the at least one criterion includes an application limitation, and the method further comprises:
determining whether a Uniform Resource Locator (URL) included in the authentication request satisfies the application limitation. 7. The method of claim 1, further comprising:
after the SSO service authenticates the authentication request, determining that the at least one criterion is no longer satisfied; and upon determining that the at least one criterion is no longer satisfied, transferring a sign-off request to the SSO service. 8. The method of claim 1, wherein the at least one criterion comprises a first criterion upon which satisfaction of a second criterion depends. 9. The method of claim 1, further comprising:
upon determining that the authentication request does not satisfy the at least one criterion, transferring a notification to the user system indicating that the authentication request was not forwarded to the SSO service. 10. The method of claim 9, wherein the notification further indicates a reason that the authentication request was not forwarded to the SSO service. 11. A single sign-on (SSO) proxy system for regulating access to a cloud service, the SSO proxy system comprising:
a communication interface configured to receive an authentication request from a user system directed to a SSO service; a processing system configured to, in response to receipt of the authentication request, determine whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the SSO service and, upon determining that the authentication request satisfies the at least one criterion, forward the authentication request to the SSO service via the communication interface. 12. The SSO proxy of claim 11, wherein the at least one criterion includes a geographic location limitation, and the SSO proxy further comprises:
the processing system configured to determine whether the authentication request was received from a geographic location that satisfies the geographic location limitation. 13. The SSO proxy of claim 12, wherein the processing system configured to determine whether the authentication request was received from a geographic location that satisfies the geographic location limitation comprises:
the processing system configured to identify a network address from which the authentication request was received and identify the geographic location associated with the network address. 14. The SSO proxy of claim 11, wherein the at least one criterion includes a time limitation, and the SSO proxy further comprises:
the processing system configured to determine whether the authentication request was received at a time that satisfies the time limitation. 15. The SSO proxy of claim 11, wherein the at least one criterion includes a device type limitation, and the SSO proxy further comprises:
the processing system configured to determine whether the user system satisfies the device type limitation. 16. The SSO proxy of claim 11, wherein the at least one criterion includes an application limitation, and the SSO proxy further comprises:
the processing system configured to determine whether a Uniform Resource Locator (URL) included in the authentication request satisfies the application limitation. 17. The SSO proxy of claim 11, further comprising:
the processing system configured to determine that the at least one criterion is no longer satisfied after the SSO service authenticates the authentication request; and the communication interface configured to transfer a sign-off request to the SSO service upon determining that the at least one criterion is no longer satisfied. 18. The SSO proxy of claim 11, wherein the at least one criterion comprises a first criterion upon which satisfaction of a second criterion depends. 19. The SSO proxy of claim 11, further comprising:
the communication interface configured to transfer a notification to the user system indicating that the authentication request was not forwarded to the SSO service upon determining that the authentication request does not satisfy the at least one criterion. 20. A non-transitory computer readable storage medium having instructions stored thereon for regulating access to a cloud service, the instructions, when executed by a single sign-on (SSO) proxy system, direct the SSO proxy system to:
receive an authentication request from a user system directed to a SSO service; responsive to receipt of the authentication request, determine whether the authentication request satisfies criteria for allowing access to the cloud service associated with the SSO service; and upon determining that the authentication request satisfies the criteria, forward the authentication request to the SSO service. | Embodiments disclosed herein provide systems, methods, and computer readable media for using a single sign-on proxy to regulate access to a cloud service. In a particular embodiment, a method provides receiving an authentication request from a user system directed to a SSO service and determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the SSO service. Upon determining that the authentication request satisfies the at least one criterion, the method provides forwarding the authentication request to the SSO service.1. A method of regulating access to a cloud service using a single sign-on (SSO) proxy, the method comprising:
receiving an authentication request at the SSO proxy from a user system directed to a SSO service; in the SSO proxy, responsive to receipt of the authentication request, determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the SSO service; and upon determining that the authentication request satisfies the at least one criterion, forwarding the authentication request from the SSO proxy to the SSO service. 2. The method of claim 1, wherein the at least one criterion includes a geographic location limitation, and the method further comprises:
determining whether the authentication request was received from a geographic location that satisfies the geographic location limitation. 3. The method of claim 2, wherein determining whether the authentication request was received from a geographic location that satisfies the geographic location limitation comprises:
identifying a network address from which the authentication request was received; and identifying the geographic location associated with the network address. 4. The method of claim 1, wherein the at least one criterion includes a time limitation, and the method further comprises:
determining whether the authentication request was received at a time that satisfies the time limitation. 5. The method of claim 1, wherein the at least one criterion includes a device type limitation, and the method further comprises:
determining whether the user system satisfies the device type limitation. 6. The method of claim 1, wherein the at least one criterion includes an application limitation, and the method further comprises:
determining whether a Uniform Resource Locator (URL) included in the authentication request satisfies the application limitation. 7. The method of claim 1, further comprising:
after the SSO service authenticates the authentication request, determining that the at least one criterion is no longer satisfied; and upon determining that the at least one criterion is no longer satisfied, transferring a sign-off request to the SSO service. 8. The method of claim 1, wherein the at least one criterion comprises a first criterion upon which satisfaction of a second criterion depends. 9. The method of claim 1, further comprising:
upon determining that the authentication request does not satisfy the at least one criterion, transferring a notification to the user system indicating that the authentication request was not forwarded to the SSO service. 10. The method of claim 9, wherein the notification further indicates a reason that the authentication request was not forwarded to the SSO service. 11. A single sign-on (SSO) proxy system for regulating access to a cloud service, the SSO proxy system comprising:
a communication interface configured to receive an authentication request from a user system directed to a SSO service; a processing system configured to, in response to receipt of the authentication request, determine whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the SSO service and, upon determining that the authentication request satisfies the at least one criterion, forward the authentication request to the SSO service via the communication interface. 12. The SSO proxy of claim 11, wherein the at least one criterion includes a geographic location limitation, and the SSO proxy further comprises:
the processing system configured to determine whether the authentication request was received from a geographic location that satisfies the geographic location limitation. 13. The SSO proxy of claim 12, wherein the processing system configured to determine whether the authentication request was received from a geographic location that satisfies the geographic location limitation comprises:
the processing system configured to identify a network address from which the authentication request was received and identify the geographic location associated with the network address. 14. The SSO proxy of claim 11, wherein the at least one criterion includes a time limitation, and the SSO proxy further comprises:
the processing system configured to determine whether the authentication request was received at a time that satisfies the time limitation. 15. The SSO proxy of claim 11, wherein the at least one criterion includes a device type limitation, and the SSO proxy further comprises:
the processing system configured to determine whether the user system satisfies the device type limitation. 16. The SSO proxy of claim 11, wherein the at least one criterion includes an application limitation, and the SSO proxy further comprises:
the processing system configured to determine whether a Uniform Resource Locator (URL) included in the authentication request satisfies the application limitation. 17. The SSO proxy of claim 11, further comprising:
the processing system configured to determine that the at least one criterion is no longer satisfied after the SSO service authenticates the authentication request; and the communication interface configured to transfer a sign-off request to the SSO service upon determining that the at least one criterion is no longer satisfied. 18. The SSO proxy of claim 11, wherein the at least one criterion comprises a first criterion upon which satisfaction of a second criterion depends. 19. The SSO proxy of claim 11, further comprising:
the communication interface configured to transfer a notification to the user system indicating that the authentication request was not forwarded to the SSO service upon determining that the authentication request does not satisfy the at least one criterion. 20. A non-transitory computer readable storage medium having instructions stored thereon for regulating access to a cloud service, the instructions, when executed by a single sign-on (SSO) proxy system, direct the SSO proxy system to:
receive an authentication request from a user system directed to a SSO service; responsive to receipt of the authentication request, determine whether the authentication request satisfies criteria for allowing access to the cloud service associated with the SSO service; and upon determining that the authentication request satisfies the criteria, forward the authentication request to the SSO service. | 2,400 |
8,946 | 8,946 | 16,239,633 | 2,486 | Video coding using tiling may include encoding a current frame by identifying a tile-width for encoding a current tile of the current frame, the tile-width indicating a cardinality of horizontally adjacent blocks in the current tile, identifying a tile-height for encoding the current tile of the current frame, the tile-height indicating a cardinality of vertically adjacent block in the current tile, and generating an encoded tile by encoding the current tile, such that a row of the current tile includes tile-width horizontally adjacent blocks from the plurality of blocks, and a column of the current tile includes tile-height vertically adjacent blocks from the plurality of blocks. Encoding the current frame may include outputting the encoded tile, wherein outputting the encoded tile includes including an encoded-tile size in an output bitstream, the encoded-tile size indicating a cardinality of bytes for including the encoded tile in the output bitstream. | 1. A method comprising:
encoding, by a processor, a video stream including a plurality of frames, wherein encoding the video stream includes:
identifying a current frame from the plurality of frames, wherein the current frame includes a plurality of blocks, and wherein the current frame has a frame-width indicating a cardinality of horizontally adjacent blocks in the current frame, and a frame-height indicating a cardinality of vertically adjacent blocks in the current frame;
encoding the current frame by:
identifying a tile-width for encoding a current tile of the current frame, the tile-width indicating a cardinality of horizontally adjacent blocks in the current tile;
identifying a tile-height for encoding the current tile of the current frame, the tile-height indicating a cardinality of vertically adjacent block in the current tile; and
generating an encoded tile by encoding the current tile, such that a row of the current tile includes tile-width horizontally adjacent blocks from the plurality of blocks, and a column of the current tile includes tile-height vertically adjacent blocks from the plurality of blocks; and
outputting the encoded tile, wherein outputting the encoded tile includes including an encoded-tile size in an output bitstream, the encoded-tile size indicating a cardinality of bytes for including the encoded tile in the output bitstream. 2. The method of claim 1, wherein outputting the encoded tile includes:
including the encoded tile in the output bitstream as an array of bytes. 3. The method of claim 2, wherein outputting the encoded tile includes:
including the encoded-tile size in a header for the encoded tile. 4. The method of claim 1, wherein encoding the current tile includes independently encoding the current tile, wherein independently encoding the current tile includes encoding the current tile without reference to information associated with another tile in the current frame. 5. The method of claim 4, wherein independently encoding the current tile includes independently encoding a plurality of tiles concurrently using parallel processing, the plurality of tiles including the current tile. 6. The method of claim 1, wherein, in response to a determination that the encoded tile is a last encoded tile in the current frame, omitting including the encoded-tile size in the output bitstream. 7. The method of claim 1, wherein each block from the plurality of blocks includes a respective plurality of pixels, such that a block from the plurality of blocks has a block-width indicating a cardinality of horizontally adjacent pixels in the block, and a block-height indicating a cardinality of vertically adjacent pixels in the block, and wherein a sum of the tile-width multiplied by the block-width is a multiple of a superblock size. 8. A method comprising:
decoding, by a processor, an encoded video stream, wherein decoding the encoded video stream includes:
receiving at least a portion of the encoded video stream;
identifying at least a portion of a current frame from the encoded video stream, wherein identifying the portion of the current frame includes identifying a frame-width indicating a cardinality of horizontally adjacent blocks in the current frame, and a frame-height indicating a cardinality of vertically adjacent blocks in the current frame;
decoding the current frame by:
obtaining an encoded-tile size from the encoded video stream, the encoded-tile size indicating a cardinality of bytes for the encoded tile in the encoded video stream;
obtaining encoded tile data for a current tile based on the encoded-tile size;
identifying a tile-width for decoding the current tile, the tile-width indicating a cardinality of horizontally adjacent blocks in the current tile;
identifying a tile-height for decoding the current tile, the tile-height indicating a cardinality of vertically adjacent block in the current tile; and
generating a decoded tile by decoding the current tile, such that a row of the decoded tile includes tile-width horizontally adjacent blocks, and a column of the decoded tile includes tile-height vertically adjacent blocks; and
outputting the decoded tile. 9. The method of claim 8, wherein obtaining encoded tile data for the current tile includes obtaining an array of bytes from the encoded video stream based on the encoded-tile size. 10. The method of claim 8, wherein obtaining encoded tile data for the current tile includes obtaining the encoded-tile size from a header for the current tile. 11. The method of claim 8, wherein decoding the current tile includes independently decoding the current tile, and wherein independently decoding the current tile includes decoding the current tile without reference information associated with another tile of the current frame. 12. The method of claim 11, wherein independently decoding the current tile includes independently decoding a plurality of tiles concurrently using parallel processing, wherein the plurality of tiles includes the current tile. 13. The method of claim 8, wherein the current tile is one of a plurality of tiles included in the current frame, and wherein decoding the current frame includes decoding the current frame wherein at least a portion of another tile in the plurality of tiles is missing or corrupt. 14. The method of claim 8, wherein a block includes plurality of pixels, such that the block has a block-width indicating a cardinality of horizontally adjacent pixels in the block, and a block-height indicating a cardinality of vertically adjacent pixels in the block; and wherein decoding the current frame includes storing at least a portion of the current tile in a memory configured to store block-width by tile-width pixels. 15. The method of claim 8, wherein the portion of the video stream is a first portion, the current tile is a first tile of the current frame, and the first portion corresponds to the first tile, the method further comprising:
receiving a second portion of the video stream based on the encoded-tile size, the second portion corresponding to a second tile of the current frame, wherein receiving the second portion is performed concurrently with decoding the first tile. 16. The method of claim 8, wherein a block includes a plurality of pixels, such that a block from the plurality of blocks has a block-width indicating a cardinality of horizontally adjacent pixels in the block, and a block-height indicating a cardinality of vertically adjacent pixels in the block, and wherein a sum of the tile-width multiplied by the block-width is a multiple of a superblock size. 17. A non-transitory computer-readable medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:
generating an encoded video by encoding a video stream including a plurality of frames, wherein generating the encoded video includes:
identifying a current frame from the plurality of frames, wherein the current frame includes a plurality of blocks, and wherein the current frame has a frame-width indicating a cardinality of horizontally adjacent blocks in the current frame, and a frame-height indicating a cardinality of vertically adjacent blocks in the current frame; and
encoding the current frame as a plurality of tiles based on the tiling mode, wherein each tile in the plurality of tiles includes a respective set of blocks from the plurality of blocks, by encoding each tile from the plurality of tiles, wherein encoding each tile from the plurality of tiles includes:
compressing the tile into an output bitstream as an array of bytes; and
including an encoded-tile size value in the output bitstream, the encoded-tile size value indicating a cardinality of bytes for the array of
bytes in the output bitstream; and
transmitting or storing output bitstream. 18. The non-transitory computer-readable storage medium of claim 17, wherein including the encoded-tile size value in the output bitstream includes:
including the encoded-tile size in a header for the tile in the output bitstream. 19. The non-transitory computer-readable storage medium of claim 17, wherein encoding each tile from the plurality of tiles includes independently encoding at least two tiles from the plurality of tiles concurrently using parallel processing. 20. The non-transitory computer-readable storage medium of claim 17, wherein, in response to a determination that a tile from the plurality of tiles is a last tile in the current frame, omitting including the encoded-tile size in the output bitstream. | Video coding using tiling may include encoding a current frame by identifying a tile-width for encoding a current tile of the current frame, the tile-width indicating a cardinality of horizontally adjacent blocks in the current tile, identifying a tile-height for encoding the current tile of the current frame, the tile-height indicating a cardinality of vertically adjacent block in the current tile, and generating an encoded tile by encoding the current tile, such that a row of the current tile includes tile-width horizontally adjacent blocks from the plurality of blocks, and a column of the current tile includes tile-height vertically adjacent blocks from the plurality of blocks. Encoding the current frame may include outputting the encoded tile, wherein outputting the encoded tile includes including an encoded-tile size in an output bitstream, the encoded-tile size indicating a cardinality of bytes for including the encoded tile in the output bitstream.1. A method comprising:
encoding, by a processor, a video stream including a plurality of frames, wherein encoding the video stream includes:
identifying a current frame from the plurality of frames, wherein the current frame includes a plurality of blocks, and wherein the current frame has a frame-width indicating a cardinality of horizontally adjacent blocks in the current frame, and a frame-height indicating a cardinality of vertically adjacent blocks in the current frame;
encoding the current frame by:
identifying a tile-width for encoding a current tile of the current frame, the tile-width indicating a cardinality of horizontally adjacent blocks in the current tile;
identifying a tile-height for encoding the current tile of the current frame, the tile-height indicating a cardinality of vertically adjacent block in the current tile; and
generating an encoded tile by encoding the current tile, such that a row of the current tile includes tile-width horizontally adjacent blocks from the plurality of blocks, and a column of the current tile includes tile-height vertically adjacent blocks from the plurality of blocks; and
outputting the encoded tile, wherein outputting the encoded tile includes including an encoded-tile size in an output bitstream, the encoded-tile size indicating a cardinality of bytes for including the encoded tile in the output bitstream. 2. The method of claim 1, wherein outputting the encoded tile includes:
including the encoded tile in the output bitstream as an array of bytes. 3. The method of claim 2, wherein outputting the encoded tile includes:
including the encoded-tile size in a header for the encoded tile. 4. The method of claim 1, wherein encoding the current tile includes independently encoding the current tile, wherein independently encoding the current tile includes encoding the current tile without reference to information associated with another tile in the current frame. 5. The method of claim 4, wherein independently encoding the current tile includes independently encoding a plurality of tiles concurrently using parallel processing, the plurality of tiles including the current tile. 6. The method of claim 1, wherein, in response to a determination that the encoded tile is a last encoded tile in the current frame, omitting including the encoded-tile size in the output bitstream. 7. The method of claim 1, wherein each block from the plurality of blocks includes a respective plurality of pixels, such that a block from the plurality of blocks has a block-width indicating a cardinality of horizontally adjacent pixels in the block, and a block-height indicating a cardinality of vertically adjacent pixels in the block, and wherein a sum of the tile-width multiplied by the block-width is a multiple of a superblock size. 8. A method comprising:
decoding, by a processor, an encoded video stream, wherein decoding the encoded video stream includes:
receiving at least a portion of the encoded video stream;
identifying at least a portion of a current frame from the encoded video stream, wherein identifying the portion of the current frame includes identifying a frame-width indicating a cardinality of horizontally adjacent blocks in the current frame, and a frame-height indicating a cardinality of vertically adjacent blocks in the current frame;
decoding the current frame by:
obtaining an encoded-tile size from the encoded video stream, the encoded-tile size indicating a cardinality of bytes for the encoded tile in the encoded video stream;
obtaining encoded tile data for a current tile based on the encoded-tile size;
identifying a tile-width for decoding the current tile, the tile-width indicating a cardinality of horizontally adjacent blocks in the current tile;
identifying a tile-height for decoding the current tile, the tile-height indicating a cardinality of vertically adjacent block in the current tile; and
generating a decoded tile by decoding the current tile, such that a row of the decoded tile includes tile-width horizontally adjacent blocks, and a column of the decoded tile includes tile-height vertically adjacent blocks; and
outputting the decoded tile. 9. The method of claim 8, wherein obtaining encoded tile data for the current tile includes obtaining an array of bytes from the encoded video stream based on the encoded-tile size. 10. The method of claim 8, wherein obtaining encoded tile data for the current tile includes obtaining the encoded-tile size from a header for the current tile. 11. The method of claim 8, wherein decoding the current tile includes independently decoding the current tile, and wherein independently decoding the current tile includes decoding the current tile without reference information associated with another tile of the current frame. 12. The method of claim 11, wherein independently decoding the current tile includes independently decoding a plurality of tiles concurrently using parallel processing, wherein the plurality of tiles includes the current tile. 13. The method of claim 8, wherein the current tile is one of a plurality of tiles included in the current frame, and wherein decoding the current frame includes decoding the current frame wherein at least a portion of another tile in the plurality of tiles is missing or corrupt. 14. The method of claim 8, wherein a block includes plurality of pixels, such that the block has a block-width indicating a cardinality of horizontally adjacent pixels in the block, and a block-height indicating a cardinality of vertically adjacent pixels in the block; and wherein decoding the current frame includes storing at least a portion of the current tile in a memory configured to store block-width by tile-width pixels. 15. The method of claim 8, wherein the portion of the video stream is a first portion, the current tile is a first tile of the current frame, and the first portion corresponds to the first tile, the method further comprising:
receiving a second portion of the video stream based on the encoded-tile size, the second portion corresponding to a second tile of the current frame, wherein receiving the second portion is performed concurrently with decoding the first tile. 16. The method of claim 8, wherein a block includes a plurality of pixels, such that a block from the plurality of blocks has a block-width indicating a cardinality of horizontally adjacent pixels in the block, and a block-height indicating a cardinality of vertically adjacent pixels in the block, and wherein a sum of the tile-width multiplied by the block-width is a multiple of a superblock size. 17. A non-transitory computer-readable medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:
generating an encoded video by encoding a video stream including a plurality of frames, wherein generating the encoded video includes:
identifying a current frame from the plurality of frames, wherein the current frame includes a plurality of blocks, and wherein the current frame has a frame-width indicating a cardinality of horizontally adjacent blocks in the current frame, and a frame-height indicating a cardinality of vertically adjacent blocks in the current frame; and
encoding the current frame as a plurality of tiles based on the tiling mode, wherein each tile in the plurality of tiles includes a respective set of blocks from the plurality of blocks, by encoding each tile from the plurality of tiles, wherein encoding each tile from the plurality of tiles includes:
compressing the tile into an output bitstream as an array of bytes; and
including an encoded-tile size value in the output bitstream, the encoded-tile size value indicating a cardinality of bytes for the array of
bytes in the output bitstream; and
transmitting or storing output bitstream. 18. The non-transitory computer-readable storage medium of claim 17, wherein including the encoded-tile size value in the output bitstream includes:
including the encoded-tile size in a header for the tile in the output bitstream. 19. The non-transitory computer-readable storage medium of claim 17, wherein encoding each tile from the plurality of tiles includes independently encoding at least two tiles from the plurality of tiles concurrently using parallel processing. 20. The non-transitory computer-readable storage medium of claim 17, wherein, in response to a determination that a tile from the plurality of tiles is a last tile in the current frame, omitting including the encoded-tile size in the output bitstream. | 2,400 |
8,947 | 8,947 | 14,039,352 | 2,451 | A representative sample of an online social network is formed by performing a deterministic process that coalesces to indicate success. A random value is selected for seeding the process. Based on the random value, the process is executed and once the process coalesces, a proper sampling of the online social network results. | 1. A method comprising:
providing an online social network, the online social network comprising at least a data store for storing data relating to a plurality of nodes and connections forming a state space and a communication port for supporting communication with individuals to whom the connections relate, the individuals communicating with the online social network via a wide area communication network; iteratively selecting a sampling of the nodes according to an iterative process, the iterative process coalescing based on a conditional independence coalescence. 2. A method according to claim 1 wherein the iteration coalesces based on a first one of each of geometrical coalescence and conditional independence coalescence. 3. A method according to claim 1 comprising:
providing a first seed value
wherein the iterative process comprises:
providing a coupling-from-the-past process having an update function for resulting in a non-trivial state space smaller than the state space of the online social network and forming a representative sample thereof;
based on the first seed value selecting a sampling of the nodes of the social network;
retrieving from the online social network dataset via the wide area communication network data based on the selected at least a first node; and
applying the coupling-from-the-past process having the update function to the at least a first node to determine a non-trivial state space based on the first seed value, the non-trivial state space smaller than the state space of the online social network and the non-trivial state space forming an intermediate state in determining a representative sample of the online social network, and using the non-trivial state space to form a first representative sample. 4. A method according to claim 1 wherein the coupling-from-the-past process comprises:
verifying that the process has other than coalesced to a single state and iterating the coupling-from-the-past process again from further in the past. 5. A method according to claim 3 wherein further in the past is achieved by incrementing a negative offset to the time by 1. 6. A method according to claim 1 comprising:
iteratively selecting a second sampling of the nodes according to the iterative process. 7. A method according to claim 1 comprising:
iteratively selecting a second sampling of the nodes according to a second iterative process, the second iterative process coalescing based on a first one of each of geometrical coalescence and conditional independence coalescence. 8. A method according to claim 7 comprising:
providing a second seed other than the first seed
wherein the second iterative process comprises:
based on the second seed value selecting at least a second node;
retrieving from the online social network dataset via the wide area communication network data based on the selected at least a second node; and
applying the coupling-from-the-past process having the update function to the at least a second node to determine a second non-trivial state space based on the second seed value, the second non-trivial state space smaller than the state space of the online social network and the non-trivial state space forming an intermediate state in determining a representative sample of the online social network, and using the non-trivial state space to form a second representative sample. 9. A method according to claim 8 comprising:
combining the first representative sample and the second representative sample. 10. A method according to claim 9 wherein the combined first representative sample and the second representative sample includes some nodes more than once. 11. A method according to claim 9 wherein the combined first representative sample and the second representative sample includes a number of nodes equal to the number of nodes in each space combined and includes only unique nodes. 12. A method according to claim 9 comprising:
using the first representative sample, surveying data within the online social network, a result of surveying statistically relevant to the online social network on which it is performed. 13. A method according to claim 1 comprising:
using the first representative sample, surveying data within the online social network, a result of surveying statistically relevant to the online social network on which it is performed. 14. A method according to claim 13 comprising:
updating the first representative sample at intervals. 15. A method according to claim 14 wherein the update function is selected for avoiding self-transitions. 16. A method according to claim 15 wherein the update function is
Rt
=
{
R
t
+
R
^
i
,
if
R
^
t
+
R
i
≤
1
R
t
+
R
^
i
-
1
,
otherwise
(
14
) 17. A method comprising:
deterministically determining a representative sample of a large online graph by selecting at least a first node and iterating until a process coalesces on the representative sample, the process coalescing based on an earlier of a geometrical coalescence condition and a conditional independence coalescence condition. 18. A method of sampling an online social network dataset comprising:
providing a statistical description of a representative sample of a state space; determining based on the statistical description a first number of nodes within a representative sample meeting the statistical description; at intervals automatically extracting a representative sample having the first number of nodes therein from an online social network dataset, the extracting performed iteratively and coalescing upon occurrence of a conditional independence coalescence condition. 19. A method according to claim 18 wherein extracting coalesces upon an earlier of an occurrence of a conditional independence coalescence condition and an occurrence of a geometrical coalescence condition. 20. A method according to claim 18 comprising:
using a most recently generated sample for analyzing activity of a group of individuals within the online social network. | A representative sample of an online social network is formed by performing a deterministic process that coalesces to indicate success. A random value is selected for seeding the process. Based on the random value, the process is executed and once the process coalesces, a proper sampling of the online social network results.1. A method comprising:
providing an online social network, the online social network comprising at least a data store for storing data relating to a plurality of nodes and connections forming a state space and a communication port for supporting communication with individuals to whom the connections relate, the individuals communicating with the online social network via a wide area communication network; iteratively selecting a sampling of the nodes according to an iterative process, the iterative process coalescing based on a conditional independence coalescence. 2. A method according to claim 1 wherein the iteration coalesces based on a first one of each of geometrical coalescence and conditional independence coalescence. 3. A method according to claim 1 comprising:
providing a first seed value
wherein the iterative process comprises:
providing a coupling-from-the-past process having an update function for resulting in a non-trivial state space smaller than the state space of the online social network and forming a representative sample thereof;
based on the first seed value selecting a sampling of the nodes of the social network;
retrieving from the online social network dataset via the wide area communication network data based on the selected at least a first node; and
applying the coupling-from-the-past process having the update function to the at least a first node to determine a non-trivial state space based on the first seed value, the non-trivial state space smaller than the state space of the online social network and the non-trivial state space forming an intermediate state in determining a representative sample of the online social network, and using the non-trivial state space to form a first representative sample. 4. A method according to claim 1 wherein the coupling-from-the-past process comprises:
verifying that the process has other than coalesced to a single state and iterating the coupling-from-the-past process again from further in the past. 5. A method according to claim 3 wherein further in the past is achieved by incrementing a negative offset to the time by 1. 6. A method according to claim 1 comprising:
iteratively selecting a second sampling of the nodes according to the iterative process. 7. A method according to claim 1 comprising:
iteratively selecting a second sampling of the nodes according to a second iterative process, the second iterative process coalescing based on a first one of each of geometrical coalescence and conditional independence coalescence. 8. A method according to claim 7 comprising:
providing a second seed other than the first seed
wherein the second iterative process comprises:
based on the second seed value selecting at least a second node;
retrieving from the online social network dataset via the wide area communication network data based on the selected at least a second node; and
applying the coupling-from-the-past process having the update function to the at least a second node to determine a second non-trivial state space based on the second seed value, the second non-trivial state space smaller than the state space of the online social network and the non-trivial state space forming an intermediate state in determining a representative sample of the online social network, and using the non-trivial state space to form a second representative sample. 9. A method according to claim 8 comprising:
combining the first representative sample and the second representative sample. 10. A method according to claim 9 wherein the combined first representative sample and the second representative sample includes some nodes more than once. 11. A method according to claim 9 wherein the combined first representative sample and the second representative sample includes a number of nodes equal to the number of nodes in each space combined and includes only unique nodes. 12. A method according to claim 9 comprising:
using the first representative sample, surveying data within the online social network, a result of surveying statistically relevant to the online social network on which it is performed. 13. A method according to claim 1 comprising:
using the first representative sample, surveying data within the online social network, a result of surveying statistically relevant to the online social network on which it is performed. 14. A method according to claim 13 comprising:
updating the first representative sample at intervals. 15. A method according to claim 14 wherein the update function is selected for avoiding self-transitions. 16. A method according to claim 15 wherein the update function is
Rt
=
{
R
t
+
R
^
i
,
if
R
^
t
+
R
i
≤
1
R
t
+
R
^
i
-
1
,
otherwise
(
14
) 17. A method comprising:
deterministically determining a representative sample of a large online graph by selecting at least a first node and iterating until a process coalesces on the representative sample, the process coalescing based on an earlier of a geometrical coalescence condition and a conditional independence coalescence condition. 18. A method of sampling an online social network dataset comprising:
providing a statistical description of a representative sample of a state space; determining based on the statistical description a first number of nodes within a representative sample meeting the statistical description; at intervals automatically extracting a representative sample having the first number of nodes therein from an online social network dataset, the extracting performed iteratively and coalescing upon occurrence of a conditional independence coalescence condition. 19. A method according to claim 18 wherein extracting coalesces upon an earlier of an occurrence of a conditional independence coalescence condition and an occurrence of a geometrical coalescence condition. 20. A method according to claim 18 comprising:
using a most recently generated sample for analyzing activity of a group of individuals within the online social network. | 2,400 |
8,948 | 8,948 | 14,510,840 | 2,423 | A method including receiving video of an event; generating an overlay for the video; generating an information message containing information enabling a receiver of the video and the overlay to selectively display or hide the overlay; and transmitting the video, the overlay, and the information message. The video is transmitted in a primary stream of a multi-stream transmission including a primary stream and one or more auxiliary streams. The overlay is transmitted in a first one of the auxiliary streams. | 1. A method, comprising:
receiving video of an event; generating an overlay for the video; generating an information message containing information enabling a receiver of the video and the overlay to selectively display or hide the overlay; and transmitting the video, the overlay, and the information message, the video being transmitted in a primary stream of a multi-stream transmission including a primary stream and one or more auxiliary streams, the overlay being transmitted in a first one of the auxiliary streams. 2. The method of claim 1, wherein the information is transmitted in a second one of the auxiliary streams. 3. The method of claim 2, wherein the information includes a label of the overlay. 4. The method of claim 3, wherein the information further includes a transparency of the overlay. 5. The method of claim 4, wherein the label of the overlay is transmitted in the second one of the auxiliary streams and the transparency of the overlay is transmitted in a third one of the auxiliary streams. 6. The method of claim 1, further comprising:
generating a further overlay for the video, wherein the further overlay is transmitted with the video, the overlay, and the information message. 7. The method of claim 6, wherein the further overlay is transmitted in one of the first one of the auxiliary streams and a second one of the auxiliary streams. 8. The method of claim 1, wherein the multi-stream transmission is encoded according to the second version of the High Efficiency Video Coding standard. 9. The method of claim 1, wherein the overlay includes one of a score of a game, a game clock, a player name, a player role, a current game statistic, a historical game statistic, a position of an in-game object, a news ticker, a stock ticker, and an advertisement. 10. The method of claim 9, wherein the overlay includes an advertisement, and wherein a viewer of the multi-stream transmission may subscribe to a premium service to selectively remove the overlay. 11. The method of claim 1, wherein the overlay comprises an image including a plurality of pixels. 12. A system, comprising:
an interface receiving a multi-stream transmission, a primary stream of the multi-stream transmission comprising video of an event, a first one of one or more auxiliary streams of the multi-stream transmission comprising an overlay for the video, the multi-stream transmission further comprising an information message containing information enabling a receiver of the multi-stream transmission to selectively display or hide the overlay; a user interface receiving a user instruction instructing the device to one of display the overlay and hide the overlay; and an overlayer performing one of displaying the overlay and hiding the overlay based on the user instruction and the information message. 13. The system of claim 12, wherein the information is transmitted in a second one of the auxiliary streams. 14. The system of claim 13, wherein the information includes a label of the overlay. 15. The system of claim 14, wherein the information further includes a transparency of the overlay. 16. The system, of claim 15, wherein the label of the overlay is transmitted in the second one of the auxiliary streams and the transparency of the overlay is transmitted in a third one of the auxiliary streams. 17. The system of claim 12, wherein the multi-stream transmission further includes a further overlay for the video. 18. The system of claim 17, wherein the further overlay is transmitted in one of the first one of the auxiliary streams and a second one of the auxiliary streams. 19. The system of claim 12, wherein the multi-stream transmission is encoded according to the second version of the High Efficiency Video Coding standard. 20. The system of claim 12, wherein the overlay includes one of a score of a game, a game clock, a player name, a player role, a current game statistic, a historical game statistic, a position of an in-game object, a news ticker, a stock ticker, and an advertisement. 21. The system of claim 12, wherein the overlay comprises an image including a plurality of pixels. 22. A method, comprising:
receiving a multi-stream transmission including a video of an event in a primary stream of the multi-stream transmission, an overlay in an auxiliary stream of the multi-stream transmission, and an information message; receiving a user selection to one of display the overlay and hide the overlay; and outputting a display including the video based on the user selection and the information message, the display including the overlay when the user selection is to display the overlay, the display not including the overlay when the user selection is to hide the overlay. | A method including receiving video of an event; generating an overlay for the video; generating an information message containing information enabling a receiver of the video and the overlay to selectively display or hide the overlay; and transmitting the video, the overlay, and the information message. The video is transmitted in a primary stream of a multi-stream transmission including a primary stream and one or more auxiliary streams. The overlay is transmitted in a first one of the auxiliary streams.1. A method, comprising:
receiving video of an event; generating an overlay for the video; generating an information message containing information enabling a receiver of the video and the overlay to selectively display or hide the overlay; and transmitting the video, the overlay, and the information message, the video being transmitted in a primary stream of a multi-stream transmission including a primary stream and one or more auxiliary streams, the overlay being transmitted in a first one of the auxiliary streams. 2. The method of claim 1, wherein the information is transmitted in a second one of the auxiliary streams. 3. The method of claim 2, wherein the information includes a label of the overlay. 4. The method of claim 3, wherein the information further includes a transparency of the overlay. 5. The method of claim 4, wherein the label of the overlay is transmitted in the second one of the auxiliary streams and the transparency of the overlay is transmitted in a third one of the auxiliary streams. 6. The method of claim 1, further comprising:
generating a further overlay for the video, wherein the further overlay is transmitted with the video, the overlay, and the information message. 7. The method of claim 6, wherein the further overlay is transmitted in one of the first one of the auxiliary streams and a second one of the auxiliary streams. 8. The method of claim 1, wherein the multi-stream transmission is encoded according to the second version of the High Efficiency Video Coding standard. 9. The method of claim 1, wherein the overlay includes one of a score of a game, a game clock, a player name, a player role, a current game statistic, a historical game statistic, a position of an in-game object, a news ticker, a stock ticker, and an advertisement. 10. The method of claim 9, wherein the overlay includes an advertisement, and wherein a viewer of the multi-stream transmission may subscribe to a premium service to selectively remove the overlay. 11. The method of claim 1, wherein the overlay comprises an image including a plurality of pixels. 12. A system, comprising:
an interface receiving a multi-stream transmission, a primary stream of the multi-stream transmission comprising video of an event, a first one of one or more auxiliary streams of the multi-stream transmission comprising an overlay for the video, the multi-stream transmission further comprising an information message containing information enabling a receiver of the multi-stream transmission to selectively display or hide the overlay; a user interface receiving a user instruction instructing the device to one of display the overlay and hide the overlay; and an overlayer performing one of displaying the overlay and hiding the overlay based on the user instruction and the information message. 13. The system of claim 12, wherein the information is transmitted in a second one of the auxiliary streams. 14. The system of claim 13, wherein the information includes a label of the overlay. 15. The system of claim 14, wherein the information further includes a transparency of the overlay. 16. The system, of claim 15, wherein the label of the overlay is transmitted in the second one of the auxiliary streams and the transparency of the overlay is transmitted in a third one of the auxiliary streams. 17. The system of claim 12, wherein the multi-stream transmission further includes a further overlay for the video. 18. The system of claim 17, wherein the further overlay is transmitted in one of the first one of the auxiliary streams and a second one of the auxiliary streams. 19. The system of claim 12, wherein the multi-stream transmission is encoded according to the second version of the High Efficiency Video Coding standard. 20. The system of claim 12, wherein the overlay includes one of a score of a game, a game clock, a player name, a player role, a current game statistic, a historical game statistic, a position of an in-game object, a news ticker, a stock ticker, and an advertisement. 21. The system of claim 12, wherein the overlay comprises an image including a plurality of pixels. 22. A method, comprising:
receiving a multi-stream transmission including a video of an event in a primary stream of the multi-stream transmission, an overlay in an auxiliary stream of the multi-stream transmission, and an information message; receiving a user selection to one of display the overlay and hide the overlay; and outputting a display including the video based on the user selection and the information message, the display including the overlay when the user selection is to display the overlay, the display not including the overlay when the user selection is to hide the overlay. | 2,400 |
8,949 | 8,949 | 15,268,279 | 2,473 | Aspects of the present disclosure provide methods and apparatus for beam selection in uplink-based and downlink-based mobility scenarios, for example, for new radio (NR) systems which can improve handover reliability, reduce handover frequency, and improve power efficiency. Certain aspects provide a method for wireless communications by a user equipment (UE). The method generally includes transmitting an uplink reference signal with an indication of a preferred downlink beam and receiving a downlink transmission based, at least in part, on the uplink reference signal. | 1. A method for wireless communication by a user equipment (UE), comprising:
transmitting an uplink reference signal with an indication of a preferred downlink beam; and receiving a downlink transmission based, at least in part, on the uplink reference signal. 2. The method of claim 1, further comprising including an ID of the UE in the uplink reference signal. 3. The method of claim 1, further comprising:
selecting the preferred beam during a connection establishment procedure, wherein transmitting the uplink reference signal comprises transmitting the uplink reference signal during the connection establishment procedure. 4. The method of claim 3, further comprising:
receiving one or more measurement reference signals (MRSs) transmitted using different beams; and selecting the preferred beam based on the one or more MRSs. 5. The method of claim 4, wherein:
receiving the one or more MRSs comprises receiving the one or more MRSs from a plurality of base stations (BSs); and selecting the preferred beam comprises the preferred beam based on. 6. The method of claim 1, wherein:
the preferred beam is selected after a connection establishment procedure; and the uplink reference signal is transmitted while the UE is in a connected state. 7. The method of claim 6, further comprising:
during the connection establishment procedure, transmitting another uplink reference signal without an indication of a preferred beam. 8. The method of claim 6, wherein:
the uplink reference signal does not include an ID of the UE. 9. The method of claim 1, further comprising:
receiving a handover command based on the uplink reference signal. 10. A method for wireless communication by a base station (BS), comprising:
receiving, from a user equipment (UE), an uplink reference signal with an indication of a preferred downlink beam; and transmitting a downlink transmission to the UE based, at least in part, on the uplink reference signal. 11. The method of claim 10, wherein the uplink reference signal includes an ID of the UE. 12. The method of claim 10, further comprising:
performing a connection establishment procedure with the UE, wherein receiving the uplink reference signal comprises receiving the preferred beam during the connection establishment procedure. 13. The method of claim 12, further comprising:
transmitting one or more measurement reference signals (MRSs) using different beams, and wherein the preferred beam is based on the one or more MRSs. 14. The method of claim 10, further comprising:
performing a connection establishment procedure with the UE, wherein receiving the uplink reference signal comprises receiving the uplink reference signal after the connection establishment procedure while the UE is in a connected state. 15. The method of claim 14, further comprising:
during the connection establishment procedure, receiving another uplink reference signal without an indication of a preferred beam. 16. The method of claim 14, wherein:
the uplink reference signal does not include an ID of the UE. 17. The method of claim 10, further comprising:
transmitting a handover command based on the uplink reference signal. 18. The method of claim 10, wherein transmitting the handover command based on the uplink reference signal comprises transmitting the handover command based on at least one of the indication of the preferred beam or measurement of the uplink reference signal. 19. An apparatus for wireless communication by a user equipment (UE), comprising:
at least one processor configured to:
transmit an uplink reference signal with an indication of a preferred downlink beam; and
receive a downlink transmission based, at least in part, on the uplink reference signal; and
a memory coupled with the at least one processor. 20. The apparatus of claim 19, wherein the at least one processor is configured to:
select the preferred beam during a connection establishment procedure; and transmit the uplink reference signal during the connection establishment procedure. 21. The apparatus of claim 20, wherein the at least one processor is configured to:
receive one or more measurement reference signals (MRSs) transmitted using different beams, and select the preferred beam based on the one or more MRSs. 22. The apparatus of claim 20, wherein the at least one processor is configured to:
select the preferred beam after a connection establishment procedure; and transmit the uplink reference signal while the UE is in a connected state. 23. The apparatus of claim 22, wherein the at least one processor is further configured to:
during the connection establishment procedure, transmit another uplink reference signal without an indication of a preferred beam. 24. The apparatus of claim 20, wherein the at least one processor is further configured to:
receive a handover command based on the uplink reference signal. 25. An apparatus for wireless communication by a base station (BS), comprising:
at least one processor configured to:
receive, from a user equipment (UE), an uplink reference signal with an indication of a preferred downlink beam; and
transmit a downlink transmission to the UE based, at least in part, on the uplink reference signal; and
a memory coupled with the at least one processor. 26. The apparatus of claim 25, wherein the at least one processor is configured to:
perform a connection establishment procedure with the UE; and receive the uplink reference signal during the connection establishment procedure. 27. The apparatus of claim 26, wherein:
the at least one processor is further configured to transmit one or more measurement reference signals (MRSs) using different beams, and the preferred beam is selected based on the one or more MRSs. 28. The apparatus of claim 25, wherein the at least one processor is configured to:
perform a connection establishment procedure with the UE; and receive the uplink reference signal while the UE is in a connected state. 29. The apparatus of claim 25, wherein the at least one processor is configured to:
transmit a handover command based on the uplink reference signal. 30. The apparatus of claim 25, wherein the at least one processor is configured to transmit the handover command based on at least one of the indication of the preferred beam or measurement of the uplink reference signal. | Aspects of the present disclosure provide methods and apparatus for beam selection in uplink-based and downlink-based mobility scenarios, for example, for new radio (NR) systems which can improve handover reliability, reduce handover frequency, and improve power efficiency. Certain aspects provide a method for wireless communications by a user equipment (UE). The method generally includes transmitting an uplink reference signal with an indication of a preferred downlink beam and receiving a downlink transmission based, at least in part, on the uplink reference signal.1. A method for wireless communication by a user equipment (UE), comprising:
transmitting an uplink reference signal with an indication of a preferred downlink beam; and receiving a downlink transmission based, at least in part, on the uplink reference signal. 2. The method of claim 1, further comprising including an ID of the UE in the uplink reference signal. 3. The method of claim 1, further comprising:
selecting the preferred beam during a connection establishment procedure, wherein transmitting the uplink reference signal comprises transmitting the uplink reference signal during the connection establishment procedure. 4. The method of claim 3, further comprising:
receiving one or more measurement reference signals (MRSs) transmitted using different beams; and selecting the preferred beam based on the one or more MRSs. 5. The method of claim 4, wherein:
receiving the one or more MRSs comprises receiving the one or more MRSs from a plurality of base stations (BSs); and selecting the preferred beam comprises the preferred beam based on. 6. The method of claim 1, wherein:
the preferred beam is selected after a connection establishment procedure; and the uplink reference signal is transmitted while the UE is in a connected state. 7. The method of claim 6, further comprising:
during the connection establishment procedure, transmitting another uplink reference signal without an indication of a preferred beam. 8. The method of claim 6, wherein:
the uplink reference signal does not include an ID of the UE. 9. The method of claim 1, further comprising:
receiving a handover command based on the uplink reference signal. 10. A method for wireless communication by a base station (BS), comprising:
receiving, from a user equipment (UE), an uplink reference signal with an indication of a preferred downlink beam; and transmitting a downlink transmission to the UE based, at least in part, on the uplink reference signal. 11. The method of claim 10, wherein the uplink reference signal includes an ID of the UE. 12. The method of claim 10, further comprising:
performing a connection establishment procedure with the UE, wherein receiving the uplink reference signal comprises receiving the preferred beam during the connection establishment procedure. 13. The method of claim 12, further comprising:
transmitting one or more measurement reference signals (MRSs) using different beams, and wherein the preferred beam is based on the one or more MRSs. 14. The method of claim 10, further comprising:
performing a connection establishment procedure with the UE, wherein receiving the uplink reference signal comprises receiving the uplink reference signal after the connection establishment procedure while the UE is in a connected state. 15. The method of claim 14, further comprising:
during the connection establishment procedure, receiving another uplink reference signal without an indication of a preferred beam. 16. The method of claim 14, wherein:
the uplink reference signal does not include an ID of the UE. 17. The method of claim 10, further comprising:
transmitting a handover command based on the uplink reference signal. 18. The method of claim 10, wherein transmitting the handover command based on the uplink reference signal comprises transmitting the handover command based on at least one of the indication of the preferred beam or measurement of the uplink reference signal. 19. An apparatus for wireless communication by a user equipment (UE), comprising:
at least one processor configured to:
transmit an uplink reference signal with an indication of a preferred downlink beam; and
receive a downlink transmission based, at least in part, on the uplink reference signal; and
a memory coupled with the at least one processor. 20. The apparatus of claim 19, wherein the at least one processor is configured to:
select the preferred beam during a connection establishment procedure; and transmit the uplink reference signal during the connection establishment procedure. 21. The apparatus of claim 20, wherein the at least one processor is configured to:
receive one or more measurement reference signals (MRSs) transmitted using different beams, and select the preferred beam based on the one or more MRSs. 22. The apparatus of claim 20, wherein the at least one processor is configured to:
select the preferred beam after a connection establishment procedure; and transmit the uplink reference signal while the UE is in a connected state. 23. The apparatus of claim 22, wherein the at least one processor is further configured to:
during the connection establishment procedure, transmit another uplink reference signal without an indication of a preferred beam. 24. The apparatus of claim 20, wherein the at least one processor is further configured to:
receive a handover command based on the uplink reference signal. 25. An apparatus for wireless communication by a base station (BS), comprising:
at least one processor configured to:
receive, from a user equipment (UE), an uplink reference signal with an indication of a preferred downlink beam; and
transmit a downlink transmission to the UE based, at least in part, on the uplink reference signal; and
a memory coupled with the at least one processor. 26. The apparatus of claim 25, wherein the at least one processor is configured to:
perform a connection establishment procedure with the UE; and receive the uplink reference signal during the connection establishment procedure. 27. The apparatus of claim 26, wherein:
the at least one processor is further configured to transmit one or more measurement reference signals (MRSs) using different beams, and the preferred beam is selected based on the one or more MRSs. 28. The apparatus of claim 25, wherein the at least one processor is configured to:
perform a connection establishment procedure with the UE; and receive the uplink reference signal while the UE is in a connected state. 29. The apparatus of claim 25, wherein the at least one processor is configured to:
transmit a handover command based on the uplink reference signal. 30. The apparatus of claim 25, wherein the at least one processor is configured to transmit the handover command based on at least one of the indication of the preferred beam or measurement of the uplink reference signal. | 2,400 |
8,950 | 8,950 | 14,846,293 | 2,459 | Technologies are presented directed to smart attachment of cloud-based files to communications such as email. A communication service may determine and select automatically between local and cloud versions of synchronized files allowing the recipient of the message to receive a version of the file regardless of whether the sender is offline or online when the attachment was made and in a user-friendly manner to the sender through a single representation. | 1. A computing device to provide smart attachment of cloud-based files to exchanged communications, the computing device comprising:
a memory configured to store instructions; and one or more processors coupled to the memory, the one or more processors configured to execute, in conjunction with the instructions stored in the memory, a communication service, wherein the communication service comprises:
a communication exchange module configured to facilitate exchange of communications arriving between senders and recipients; and
an attachment module configured to:
detect inclusion of a locally stored attachment in an outgoing communication;
determine if a cloud version of the attachment is available;
automatically select one of the locally stored version and the cloud version of the attachment to be transmitted to a recipient; and
transmit the selected version of the attachment to the recipient along with the outgoing communication. 2. The computing device of claim 1, wherein the attachment module is configured to select the cloud version of the attachment if a sender of the outgoing communication is connected to a cloud storage associated with the cloud version of the attachment. 3. The computing device of claim 2, wherein the attachment module is configured to select the locally stored version of the attachment if the sender of the outgoing communication is not connected to a cloud storage associated with the cloud version of the attachment. 4. The computing device of claim 1, wherein the attachment module is further configured to:
determine if the attachment is synchronized to a file in a local storage of the recipient; and determine if the recipient is connected to a cloud storage associated with the cloud version of the attachment. 5. The computing device of claim 4, wherein the attachment module is further configured to:
if the attachment is not synchronized to the file in the local storage of the recipient and the recipient is not connected to the cloud storage associated with the cloud version of the attachment, alert the recipient. 6. The computing device of claim 1, wherein the attachment module is configured to select one of the locally stored version and the cloud version of the attachment based on one or more or whether the cloud version of the attachment is newer than the locally stored version and a size of the attachment. 7. The computing device of claim 1, wherein the attachment module is configured to select one of the locally stored version and the cloud version of the attachment based on whether the attachment includes dynamic content. 8. The computing device of claim 1, wherein the attachment is one of a file and an object. 9. The computing device of claim 1, wherein the attachment module is configured to select the locally stored version of the attachment if a sender of the outgoing communication includes the attachment to the outgoing communication from a local folder. 10. The computing device of claim 1, wherein the attachment module is configured to select the cloud version of the attachment if a sender of the outgoing communication accesses the communication service through a web application. 11. The computing device of claim 1, wherein the outgoing communication is one of an email, an instant message, an online conference recording, a data sharing session, and an application sharing session. 12. A method executed on a computing device to provide smart attachment of cloud-based files to exchanged communications, the method comprising:
detecting inclusion of a locally stored attachment in an outgoing communication; determining if a cloud version of the attachment is available; automatically selecting one of the locally stored version and the cloud version of the attachment to be transmitted to a recipient; and transmitting the selected version of the attachment to the recipient along with the outgoing communication. 13. The method of claim 12, further comprising:
selecting the cloud version of the attachment if a sender of the outgoing communication is connected to a cloud storage associated with the cloud version of the attachment; and selecting the locally stored version of the attachment if the sender of the outgoing communication is not connected to a cloud storage associated with the cloud version of the attachment. 14. The method of claim 12, further comprising:
displaying the locally stored version and the cloud version of the attachment in a same manner. 15. The method of claim 14, further comprising:
indicating a change from the locally stored version of the attachment to the cloud version of the attachment employing a graphical scheme. 16. The method of claim 12, wherein detecting inclusion of the a locally stored attachment, determining if the cloud version of the attachment is available, and automatically selecting one of the locally stored version and the cloud version of the attachment are performed at one or more of a module of communication service server, a module of a client device communicatively coupled to the communication service server, and a communication application executed on the client device communicatively coupled to the communication service server. 17. The method of claim 12, further comprising:
maintaining information associated with selection of attachments in a data structure that includes a top-level class and two subclasses, wherein the subclasses include a groups class including information about a current group and a list of user selected groups and an accounts list class including further subclasses associated with cloud folders, web-location folders, and collaboration service folders. 18. The method of claim 17, further comprising:
upon activation of an attachment control, querying the subclasses; and populating a selection menu based on results of the querying of the subclasses. 19. A computer readable memory device with instructions stored thereon to provide smart attachment of cloud-based files to exchanged emails, the instructions comprising:
detecting inclusion of a locally stored attachment in an outgoing email; determining if a cloud version of the attachment is available; selecting the cloud version of the attachment if a sender of the outgoing email is connected to a cloud storage associated with the cloud version of the attachment; selecting the locally stored version of the attachment if the sender of the outgoing email is not connected to a cloud storage associated with the cloud version of the attachment; and transmitting the selected version of the attachment to the recipient along with the outgoing email. 20. The computer readable memory device of claim 19, wherein a selection menu is presented to the sender of the email suggesting the cloud version of the attachment when the locally stored version of the attachment is selected. | Technologies are presented directed to smart attachment of cloud-based files to communications such as email. A communication service may determine and select automatically between local and cloud versions of synchronized files allowing the recipient of the message to receive a version of the file regardless of whether the sender is offline or online when the attachment was made and in a user-friendly manner to the sender through a single representation.1. A computing device to provide smart attachment of cloud-based files to exchanged communications, the computing device comprising:
a memory configured to store instructions; and one or more processors coupled to the memory, the one or more processors configured to execute, in conjunction with the instructions stored in the memory, a communication service, wherein the communication service comprises:
a communication exchange module configured to facilitate exchange of communications arriving between senders and recipients; and
an attachment module configured to:
detect inclusion of a locally stored attachment in an outgoing communication;
determine if a cloud version of the attachment is available;
automatically select one of the locally stored version and the cloud version of the attachment to be transmitted to a recipient; and
transmit the selected version of the attachment to the recipient along with the outgoing communication. 2. The computing device of claim 1, wherein the attachment module is configured to select the cloud version of the attachment if a sender of the outgoing communication is connected to a cloud storage associated with the cloud version of the attachment. 3. The computing device of claim 2, wherein the attachment module is configured to select the locally stored version of the attachment if the sender of the outgoing communication is not connected to a cloud storage associated with the cloud version of the attachment. 4. The computing device of claim 1, wherein the attachment module is further configured to:
determine if the attachment is synchronized to a file in a local storage of the recipient; and determine if the recipient is connected to a cloud storage associated with the cloud version of the attachment. 5. The computing device of claim 4, wherein the attachment module is further configured to:
if the attachment is not synchronized to the file in the local storage of the recipient and the recipient is not connected to the cloud storage associated with the cloud version of the attachment, alert the recipient. 6. The computing device of claim 1, wherein the attachment module is configured to select one of the locally stored version and the cloud version of the attachment based on one or more or whether the cloud version of the attachment is newer than the locally stored version and a size of the attachment. 7. The computing device of claim 1, wherein the attachment module is configured to select one of the locally stored version and the cloud version of the attachment based on whether the attachment includes dynamic content. 8. The computing device of claim 1, wherein the attachment is one of a file and an object. 9. The computing device of claim 1, wherein the attachment module is configured to select the locally stored version of the attachment if a sender of the outgoing communication includes the attachment to the outgoing communication from a local folder. 10. The computing device of claim 1, wherein the attachment module is configured to select the cloud version of the attachment if a sender of the outgoing communication accesses the communication service through a web application. 11. The computing device of claim 1, wherein the outgoing communication is one of an email, an instant message, an online conference recording, a data sharing session, and an application sharing session. 12. A method executed on a computing device to provide smart attachment of cloud-based files to exchanged communications, the method comprising:
detecting inclusion of a locally stored attachment in an outgoing communication; determining if a cloud version of the attachment is available; automatically selecting one of the locally stored version and the cloud version of the attachment to be transmitted to a recipient; and transmitting the selected version of the attachment to the recipient along with the outgoing communication. 13. The method of claim 12, further comprising:
selecting the cloud version of the attachment if a sender of the outgoing communication is connected to a cloud storage associated with the cloud version of the attachment; and selecting the locally stored version of the attachment if the sender of the outgoing communication is not connected to a cloud storage associated with the cloud version of the attachment. 14. The method of claim 12, further comprising:
displaying the locally stored version and the cloud version of the attachment in a same manner. 15. The method of claim 14, further comprising:
indicating a change from the locally stored version of the attachment to the cloud version of the attachment employing a graphical scheme. 16. The method of claim 12, wherein detecting inclusion of the a locally stored attachment, determining if the cloud version of the attachment is available, and automatically selecting one of the locally stored version and the cloud version of the attachment are performed at one or more of a module of communication service server, a module of a client device communicatively coupled to the communication service server, and a communication application executed on the client device communicatively coupled to the communication service server. 17. The method of claim 12, further comprising:
maintaining information associated with selection of attachments in a data structure that includes a top-level class and two subclasses, wherein the subclasses include a groups class including information about a current group and a list of user selected groups and an accounts list class including further subclasses associated with cloud folders, web-location folders, and collaboration service folders. 18. The method of claim 17, further comprising:
upon activation of an attachment control, querying the subclasses; and populating a selection menu based on results of the querying of the subclasses. 19. A computer readable memory device with instructions stored thereon to provide smart attachment of cloud-based files to exchanged emails, the instructions comprising:
detecting inclusion of a locally stored attachment in an outgoing email; determining if a cloud version of the attachment is available; selecting the cloud version of the attachment if a sender of the outgoing email is connected to a cloud storage associated with the cloud version of the attachment; selecting the locally stored version of the attachment if the sender of the outgoing email is not connected to a cloud storage associated with the cloud version of the attachment; and transmitting the selected version of the attachment to the recipient along with the outgoing email. 20. The computer readable memory device of claim 19, wherein a selection menu is presented to the sender of the email suggesting the cloud version of the attachment when the locally stored version of the attachment is selected. | 2,400 |
8,951 | 8,951 | 15,223,012 | 2,439 | Disclosed are various examples for remotely managing passwords using local security policies. A client device can be enrolled with a management service. The management service then transmits a password policy requiring a password hint to be defined by the user. A management component executed on the client device can then enforce the password policy by requiring a user to define a password hint in order to access enterprise resources. | 1. A non-transitory computer-readable medium embodying a management component executed by a client device, wherein the management component is configured to cause the client device to at least:
enroll the client device with a management service through a management component installed on the client device; determine whether a local security policy stored by the management component on the client device indicates that a password hint is required to be defined by a user; determine that the local security policy indicates that the password hint is required to be defined; prompt a user to define the password hint associated with a local password corresponding to the client device; and store the password hint in a registry entry on the client device. 2. The non-transitory computer-readable medium of claim 1, wherein the management component is further configured to cause the client device to at least identify the registry entry on the client device associated with the password hint by determining a user identifier corresponding to a local user identity of the client device. 3. The non-transitory computer-readable medium of claim 2, wherein the registry entry is based upon a Windows Security Identifier (SID) associated with the local user identity of the client device. 4. The non-transitory computer-readable medium of claim 3, wherein the management component is further configured to cause the client device to extract a Windows Relative Identifier (RID) from the SID, and wherein the registry entry is based upon the RID. 5. The non-transitory computer-readable medium of claim 1, wherein the management component is further configured to cause the client device to obtain the SID using a Windows application programming interface (API) call to retrieve the SID associated with a currently logged-in user. 6. The non-transitory computer-readable medium of claim 1, wherein the management component is executed as a system process to access the registry entry. 7. The non-transitory computer-readable medium of claim 1, wherein the local security policy is obtained by the management component from a management service and the management service is remotely executed. 8. A method comprising:
enrolling, by a management component, a client device with a management service, wherein the management component is installed on the client device; determining, by the management component, whether a local security policy stored by the management component on the client device indicates that a password hint is required to be defined by a user; determining, by the management component, that the local security policy indicates that the password hint is required to be defined; prompting, by the management component, a user to define the password hint associated with a local password corresponding to the client device; and storing, by the management component, the password hint in a registry entry on the client device. 9. The method of claim 8, further comprising identifying, by the management component, the registry entry on the client device associated with the password hint by determining a user identifier corresponding to a local user identity of the client device. 10. The method of claim 9, wherein the registry entry is based upon a Windows Security Identifier (SID) associated with the local user identity of the client device. 11. The method of claim 10, wherein the management component is further configured to cause the client device to extract a Windows Relative Identifier (RID) from the SID, and wherein the registry entry is based upon the RID. 12. The method of claim 8, wherein the management component is further configured to cause the client device to obtain the SID using a Windows application programming interface (API) call to retrieve the SID associated with a currently logged-in user. 13. The method of claim 8, wherein the management component is executed as a system process to access the registry entry. 14. The method of claim 8, wherein the local security policy is obtained by the management component from a management service, wherein the management service is remotely executed. 15. A system comprising:
client device; and a management component executable by the client device, wherein the client management causes the client device to at least:
enroll a client device with a management service through a management component installed on the client device;
determine whether a local security policy stored by the management component on the client device indicates that a password hint is required to be defined by a user;
determine that the local security policy indicates that the password hint is required to be defined;
prompt a user to define the password hint associated with a local password corresponding to the client device; and
store the password hint in a registry entry on the client device. 16. The system of claim 15, wherein the management component is further configured to cause the client device to at least identify the registry entry on the client device associated with the password hint by determining a user identifier corresponding to a local user identity of the client device. 17. The system of claim 16, wherein the registry entry is based upon a Windows Security Identifier (SID) associated with the local user identity of the client device. 18. The system of claim 17, wherein the management component is further configured'to cause the client device to extract a Windows Relative Identifier (RID) from the SID, and wherein the registry entry is based upon the RID. 19. The system of claim 15, wherein the management component is further configured to cause the client device to obtain the SID using a Windows application programming interface (API) call to retrieve the SID associated with a currently logged-in user. 20. The system of claim 15, wherein the local security policy is obtained by the management component from a management service, wherein the management service is remotely executed. | Disclosed are various examples for remotely managing passwords using local security policies. A client device can be enrolled with a management service. The management service then transmits a password policy requiring a password hint to be defined by the user. A management component executed on the client device can then enforce the password policy by requiring a user to define a password hint in order to access enterprise resources.1. A non-transitory computer-readable medium embodying a management component executed by a client device, wherein the management component is configured to cause the client device to at least:
enroll the client device with a management service through a management component installed on the client device; determine whether a local security policy stored by the management component on the client device indicates that a password hint is required to be defined by a user; determine that the local security policy indicates that the password hint is required to be defined; prompt a user to define the password hint associated with a local password corresponding to the client device; and store the password hint in a registry entry on the client device. 2. The non-transitory computer-readable medium of claim 1, wherein the management component is further configured to cause the client device to at least identify the registry entry on the client device associated with the password hint by determining a user identifier corresponding to a local user identity of the client device. 3. The non-transitory computer-readable medium of claim 2, wherein the registry entry is based upon a Windows Security Identifier (SID) associated with the local user identity of the client device. 4. The non-transitory computer-readable medium of claim 3, wherein the management component is further configured to cause the client device to extract a Windows Relative Identifier (RID) from the SID, and wherein the registry entry is based upon the RID. 5. The non-transitory computer-readable medium of claim 1, wherein the management component is further configured to cause the client device to obtain the SID using a Windows application programming interface (API) call to retrieve the SID associated with a currently logged-in user. 6. The non-transitory computer-readable medium of claim 1, wherein the management component is executed as a system process to access the registry entry. 7. The non-transitory computer-readable medium of claim 1, wherein the local security policy is obtained by the management component from a management service and the management service is remotely executed. 8. A method comprising:
enrolling, by a management component, a client device with a management service, wherein the management component is installed on the client device; determining, by the management component, whether a local security policy stored by the management component on the client device indicates that a password hint is required to be defined by a user; determining, by the management component, that the local security policy indicates that the password hint is required to be defined; prompting, by the management component, a user to define the password hint associated with a local password corresponding to the client device; and storing, by the management component, the password hint in a registry entry on the client device. 9. The method of claim 8, further comprising identifying, by the management component, the registry entry on the client device associated with the password hint by determining a user identifier corresponding to a local user identity of the client device. 10. The method of claim 9, wherein the registry entry is based upon a Windows Security Identifier (SID) associated with the local user identity of the client device. 11. The method of claim 10, wherein the management component is further configured to cause the client device to extract a Windows Relative Identifier (RID) from the SID, and wherein the registry entry is based upon the RID. 12. The method of claim 8, wherein the management component is further configured to cause the client device to obtain the SID using a Windows application programming interface (API) call to retrieve the SID associated with a currently logged-in user. 13. The method of claim 8, wherein the management component is executed as a system process to access the registry entry. 14. The method of claim 8, wherein the local security policy is obtained by the management component from a management service, wherein the management service is remotely executed. 15. A system comprising:
client device; and a management component executable by the client device, wherein the client management causes the client device to at least:
enroll a client device with a management service through a management component installed on the client device;
determine whether a local security policy stored by the management component on the client device indicates that a password hint is required to be defined by a user;
determine that the local security policy indicates that the password hint is required to be defined;
prompt a user to define the password hint associated with a local password corresponding to the client device; and
store the password hint in a registry entry on the client device. 16. The system of claim 15, wherein the management component is further configured to cause the client device to at least identify the registry entry on the client device associated with the password hint by determining a user identifier corresponding to a local user identity of the client device. 17. The system of claim 16, wherein the registry entry is based upon a Windows Security Identifier (SID) associated with the local user identity of the client device. 18. The system of claim 17, wherein the management component is further configured'to cause the client device to extract a Windows Relative Identifier (RID) from the SID, and wherein the registry entry is based upon the RID. 19. The system of claim 15, wherein the management component is further configured to cause the client device to obtain the SID using a Windows application programming interface (API) call to retrieve the SID associated with a currently logged-in user. 20. The system of claim 15, wherein the local security policy is obtained by the management component from a management service, wherein the management service is remotely executed. | 2,400 |
8,952 | 8,952 | 14,871,913 | 2,411 | A technique for reducing interference on conducted RF links involves a determination of active wireless channels in an electronic device. For example, the device can determine whether there are any active cellular, WiFi, and/or Bluetooth channels. If so, any active channels can be removed from a list of possible channels that can be used for generating the RF signals for the conducted RF link. If any idle channels remain available, one or more may be selected for use for the conducted RF link. Those idle channels having a higher offset from any active channels may be given a greater weight in the selection since they should be less likely to be subject to interference. If not, one of the least crowded active channels may be selected for use for the conducted RF link. | 1. A method for reducing interference in a conducted radio frequency (RF) link, the method comprising:
determining whether an electronic device having a conducted RF link has an inactive RF channel; and if an inactive RF channel exists, using the inactive RF channel for RF signal generation and transmission over the conducted RF link. 2. The method, as set forth in claim 1, wherein determining whether the electronic device has an inactive RF channel comprises:
determining if any RF channels of the electronic device are active and, if so, placing any active RF channels on a channel avoidance list. 3. The method, as set forth in claim 2, wherein determining whether the electronic device has an inactive RF channel comprises:
updating an idle channel list using the channel avoidance list. 4. The method, as set forth in claim 3, wherein using the inactive RF channel for RF signal generation and transmission over the conducted RF link comprises:
selecting the inactive RF channel from the idle channel list. 5. The method, as set forth in claim 4, wherein selecting the inactive RF channel from the idle channel list comprises:
selecting from among a plurality of inactive RF channels from the idle channel list. 6. The method, as set forth in claim 5, wherein selecting from among a plurality of inactive RF channels from the idle channel list comprises:
giving a greater weight to inactive RF channels that have a higher offset from any active RF channels; and selecting the inactive RF channel that has the greatest weight. 7. The method, as set forth in claim 2, wherein determining whether the electronic device has an inactive RF channel comprises:
determining if any cellular channels of the electronic device are active and, if so, placing the active cellular channels on the channel avoidance list. 8. The method, as set forth in claim 2, wherein determining whether the electronic device has an inactive RF channel comprises:
determining if any wifi channels of the electronic device are active and, if so, placing the active wifi channels on the channel avoidance list. 9. The method, as set forth in claim 2, wherein determining whether the electronic has an inactive RF channel comprises:
determining if any Bluetooth channels of the electronic device are active and, if so, placing the active Bluetooth channels on the channel avoidance list. 10. The method, as set forth in claim 1, comprising:
if an inactive RF channel does not exist, selecting one of the least used active channels for RF signal generation and transmission over the conducted RF link. 11. An electronic device comprising:
a wireless communications device having at least one antenna configured for wireless communications and having at least one conducted RF link; data processing circuitry operably coupled to the wireless communications device, wherein the data processing circuitry is configured to: determine whether the electronic device has an inactive RF channel; and if an inactive RF channel exists, cause the wireless communications device to use the inactive RF channel for RF signal generation and transmission over the conducted RF link. 12. The electronic device, as set forth in claim 11, wherein the data processing circuitry determines whether the electronic device has an inactive RF channel by determining if any RF channels of the electronic device are active and, if so, placing any active RF channels on a channel avoidance list. 13. The electronic device, as set forth in claim 12, wherein the data processing circuitry determines whether the electronic device has an inactive RF channel by updating an idle channel list using the channel avoidance list. 14. The electronic device, as set forth in claim 13, wherein the data processing circuitry causes the wireless communications device to use the inactive RF channel for RF signal generation and transmission over the conducted RF link by selecting the inactive RF channel from the idle channel list. 15. The electronic device, as set forth in claim 14, wherein the data processing circuitry selects the inactive RF channel from the idle channel list by selecting from among a plurality of inactive RF channels from the idle channel list. 16. The electronic device, as set forth in claim 15, wherein the data processing circuitry selects from among a plurality of inactive RF channels from the idle channel list by giving a greater weight to inactive RF channels that have a higher offset from any active RF channels and selecting the inactive RF channel that has the greatest weight. 17. The electronic device, as set forth in claim 12, wherein the data processing circuitry determines whether the electronic device has an inactive RF channel by determining if any cellular channels of the electronic device are active and, if so, placing the active cellular channels on the channel avoidance list. 18. The electronic device, as set forth in claim 12, wherein the data processing circuitry determines whether the electronic device has an inactive wifi channel by determining if any wifi channels of the electronic device are active and, if so, placing the active wifi channels on the channel avoidance list. 19. The electronic device, as set forth in claim 12, wherein the data processing circuitry determines whether the electronic device has an inactive RF channel by determining if any Bluetooth channels of the electronic device are active and, if so, placing the active Bluetooth channels on the channel avoidance list. 20. The electronic device, as set forth in claim 12, wherein the data processing circuitry is configured to select one of the least used active channels for RF signal generation and transmission over the conducted RF link if an inactive RF channel does not exist. | A technique for reducing interference on conducted RF links involves a determination of active wireless channels in an electronic device. For example, the device can determine whether there are any active cellular, WiFi, and/or Bluetooth channels. If so, any active channels can be removed from a list of possible channels that can be used for generating the RF signals for the conducted RF link. If any idle channels remain available, one or more may be selected for use for the conducted RF link. Those idle channels having a higher offset from any active channels may be given a greater weight in the selection since they should be less likely to be subject to interference. If not, one of the least crowded active channels may be selected for use for the conducted RF link.1. A method for reducing interference in a conducted radio frequency (RF) link, the method comprising:
determining whether an electronic device having a conducted RF link has an inactive RF channel; and if an inactive RF channel exists, using the inactive RF channel for RF signal generation and transmission over the conducted RF link. 2. The method, as set forth in claim 1, wherein determining whether the electronic device has an inactive RF channel comprises:
determining if any RF channels of the electronic device are active and, if so, placing any active RF channels on a channel avoidance list. 3. The method, as set forth in claim 2, wherein determining whether the electronic device has an inactive RF channel comprises:
updating an idle channel list using the channel avoidance list. 4. The method, as set forth in claim 3, wherein using the inactive RF channel for RF signal generation and transmission over the conducted RF link comprises:
selecting the inactive RF channel from the idle channel list. 5. The method, as set forth in claim 4, wherein selecting the inactive RF channel from the idle channel list comprises:
selecting from among a plurality of inactive RF channels from the idle channel list. 6. The method, as set forth in claim 5, wherein selecting from among a plurality of inactive RF channels from the idle channel list comprises:
giving a greater weight to inactive RF channels that have a higher offset from any active RF channels; and selecting the inactive RF channel that has the greatest weight. 7. The method, as set forth in claim 2, wherein determining whether the electronic device has an inactive RF channel comprises:
determining if any cellular channels of the electronic device are active and, if so, placing the active cellular channels on the channel avoidance list. 8. The method, as set forth in claim 2, wherein determining whether the electronic device has an inactive RF channel comprises:
determining if any wifi channels of the electronic device are active and, if so, placing the active wifi channels on the channel avoidance list. 9. The method, as set forth in claim 2, wherein determining whether the electronic has an inactive RF channel comprises:
determining if any Bluetooth channels of the electronic device are active and, if so, placing the active Bluetooth channels on the channel avoidance list. 10. The method, as set forth in claim 1, comprising:
if an inactive RF channel does not exist, selecting one of the least used active channels for RF signal generation and transmission over the conducted RF link. 11. An electronic device comprising:
a wireless communications device having at least one antenna configured for wireless communications and having at least one conducted RF link; data processing circuitry operably coupled to the wireless communications device, wherein the data processing circuitry is configured to: determine whether the electronic device has an inactive RF channel; and if an inactive RF channel exists, cause the wireless communications device to use the inactive RF channel for RF signal generation and transmission over the conducted RF link. 12. The electronic device, as set forth in claim 11, wherein the data processing circuitry determines whether the electronic device has an inactive RF channel by determining if any RF channels of the electronic device are active and, if so, placing any active RF channels on a channel avoidance list. 13. The electronic device, as set forth in claim 12, wherein the data processing circuitry determines whether the electronic device has an inactive RF channel by updating an idle channel list using the channel avoidance list. 14. The electronic device, as set forth in claim 13, wherein the data processing circuitry causes the wireless communications device to use the inactive RF channel for RF signal generation and transmission over the conducted RF link by selecting the inactive RF channel from the idle channel list. 15. The electronic device, as set forth in claim 14, wherein the data processing circuitry selects the inactive RF channel from the idle channel list by selecting from among a plurality of inactive RF channels from the idle channel list. 16. The electronic device, as set forth in claim 15, wherein the data processing circuitry selects from among a plurality of inactive RF channels from the idle channel list by giving a greater weight to inactive RF channels that have a higher offset from any active RF channels and selecting the inactive RF channel that has the greatest weight. 17. The electronic device, as set forth in claim 12, wherein the data processing circuitry determines whether the electronic device has an inactive RF channel by determining if any cellular channels of the electronic device are active and, if so, placing the active cellular channels on the channel avoidance list. 18. The electronic device, as set forth in claim 12, wherein the data processing circuitry determines whether the electronic device has an inactive wifi channel by determining if any wifi channels of the electronic device are active and, if so, placing the active wifi channels on the channel avoidance list. 19. The electronic device, as set forth in claim 12, wherein the data processing circuitry determines whether the electronic device has an inactive RF channel by determining if any Bluetooth channels of the electronic device are active and, if so, placing the active Bluetooth channels on the channel avoidance list. 20. The electronic device, as set forth in claim 12, wherein the data processing circuitry is configured to select one of the least used active channels for RF signal generation and transmission over the conducted RF link if an inactive RF channel does not exist. | 2,400 |
8,953 | 8,953 | 14,827,548 | 2,468 | A system for collecting information associated with a telephonic communication made through a VoIP system by dynamically integrating a plurality of end user software applications including a client side integration proxy in electronic communication with a hosted VoIP PBX. The client side integration proxy includes its own API for communicating and exchanging data with a plurality of end user software applications. Software executing on the client side integration proxy receives a request from the end user to retrieve information about a previous telephonic communication, retrieves data related to the previous telephonic communication from a data store, assigns a portion of a memory cache for storing the retrieved data about the previous telephonic communication, enables one or more of the plurality of end user software applications to access the data about the previous telephonic communication currently stored in the assigned portion of the memory cache, enables one or more of the plurality of end user software applications, in response to the data about the previous telephonic communication accessed from the assigned portion of the memory cache, to update, modify, or add to the data about the previous telephonic communication currently stored in the assigned portion of the memory cache based on data relevant to the previous telephonic communication obtainable or generated by the one or more of the plurality of end user software applications, and retrieves and presents the supplemented data about the previous telephonic communication to the end user. | 1. A system for capturing data related to a communication processed through a VoIP system for integration into one or more software applications, the system comprising:
a hosted VoIP private branch exchange (PBX) incorporating a client integration proxy for capturing, storing, and sharing data related to the communications of at least one client device managed by the hosted VoIP PBX, and wherein the client integration proxy comprises an Application Programming Interface (API) for communicating and exchanging data with the one or more software applications, wherein the client integration proxy is capable of:
(a) retrieving a prior communication data of the at least one client device based upon a request,
(b) sharing the precedent communication data of the at least one client device with the one or more software applications,
(c) receiving from the one or more software applications, modified data related to the precedent communication data of the at least one client device, and
(d) using the modified data related to the precedent communication data of the at least one client device to present the modified data to a user or to share the modified data with a data store. 2. The system of claim 1, wherein when the precedent communication data is updated, added to or otherwise modified, resulting in new updated precedent communications data, the client integration proxy automatically alerts and provides the one or more software applications with this new updated precedent communications data. 3. The system of claim 1, wherein the client integration proxy enables the one or more software applications to access the precedent communications data stored in a data store (i) by pushing at least a portion of the precedent communications data to one or more of the plurality of software applications or (ii) by polling and pulling at least a portion of the precedent communications data from its assigned portion of the data store. 4. The system of claim 1, wherein the one or more software applications may update, add data or otherwise modify the precedent communications data after the precedent communications data is stored in an assigned portion of a data store, creating a modified precedent communication data that can be accessed and used by another of the one or more software applications. 5. The system of claim 1, wherein the precedent communications data comprises one or more of the following: a physical address of a third party, an email address of a third party, a name of the company with which a third party works, a job title of a third party, a communication history between the at least one client device and a third party, a communication history between the company with which the at least one client device is associated and a third party, a communication history between the company with which a third party is associated and the at least one client device, notes regarding a third party, links to databases having additional information about a third party or about the company with which a third party works, biographical information about a third party, current geographical location of a third party or of the company associated with a third party, a graphical representation or image of a third party, documents available to the at least one client device and related to a third party or related to a company associated with a third party, and emails available to the at least one client device and related to a third party or related to a company associated with the third party. 6. The system of claim 1, wherein the data captured by the client integration proxy from the hosted VoIP PBX includes one or more of the following: a phone number of a third party, a name of a third party, an IP address of a device being used by the third party for the telephonic communication, a phone number or extension of an end user, a name of an end user, an IP address of the client device of an end user, an indication whether a portion or all of the telephonic communication is encrypted, an indication of whether a portion or all of a communication is using a secured communication line, an indication whether a communication is inbound to or outbound from the hosted VoIP PBX, an indication whether a communication is being monitored, an indication whether a communication is being recorded, an indication of call ringing, an indication of call answered, and an indication of call disconnected. 7. A system for collecting information associated with a telephonic communication made through a voice over Internet Protocol (VoIP) system by dynamically integrating a plurality of software applications, the system comprising:
a client integration proxy executing on a hosted VoIP private branch exchange (PBX) and in communication with the plurality of software applications, the client integration proxy comprises an application programming interface (API) for communicating and exchanging data with the plurality of software applications and the hosted VoIP PBX; and capable of performing the acts of:
(a) detecting each telephonic communication handled and managed by the hosted VoIP PBX;
(b) receiving a request to retrieve information about a previous telephonic communication;
(c) retrieving information associated with the previous telephonic communication;
(d) enabling the one or more of the plurality of software applications to access the information about the previous telephonic communication;
(e) enabling one or more of the plurality of software applications to update, add to, or otherwise modify the information about the previous telephonic communication, thereby creating supplemented data that is based on data relevant to the previous telephonic communication,
(f) retrieving and presenting the supplemented Data about the previous telephonic communication to the end user. 8. The system of claim 7, wherein, if the data related to the previous telephonic communication is updated, added to, or otherwise modified to create updated information, the client integration proxy notifies one or more of the plurality of software applications about this updated information and requests the one or more of the plurality of software applications to further update, add to, or modify the information regarding the previous telephonic communication in response to this updated information. 9. The system of claim 7, wherein the client integration proxy enables one or more of the plurality of software applications to access the data related to the previous telephonic communication stored in an assigned portion of a memory cache (i) by pushing at least a portion of the stored information to one or more of the plurality of software applications or (ii) by polling and pulling at least a portion of the stored information from the assigned portion of the memory cache. 10. The system of claim 7, wherein one or more of the plurality of software applications further updates, adds to, or modifies, the data related to the previous telephonic communication after the data related to the previous telephonic communication has been previously modified by another respective one or more of the plurality of software applications or by the end user. 11. The system of claim 7, wherein the supplemented information about the previous telephonic communication comprises one or more of the following provided by one or more of the plurality of software applications: a physical address of the third party, an email address of the third party, a name of the company with which the third party works, a job title of the third party, a communication history between the end user and the third party, a communication history between the company with which the end user works and the third party, a communication history between the company with which the third party works and the end user, notes regarding the third party, links to databases having additional information about the third party or about the company with which the third party works, biographical information about the third party, current geographical location of the third party or of the company with which the third party works, a graphical representation or image of the third party, documents available to the end user and related to the third party or related to the company with which the third party works, and emails available to the end user and related to the third party or related to the company with which the third party works. 12. The system of claim 7, wherein the data obtained from the hosted VoIP PBX includes one or more of the following: a phone number of the third party, a name of the third party, an IP address of the device being used by the third party for the telephonic communication, a phone number or extension of the end user, a name of the end user, an IP address of the client device of the end user, an indication whether a portion or all of the telephonic communication is encrypted, an indication whether a portion or all of the telephonic communication is using a secured communication line, an indication whether the telephonic communication is inbound to or outbound from the hosted VoIP PBX, an indication whether the telephonic communication is being monitored, an indication whether the telephonic communication is being recorded, an indication of call ringing, an indication of call answered, and an indication of call disconnected. 13. A system for collecting data associated with a digital communication made through a Voice over Internet Protocol (VoIP) system by dynamically integrating a plurality of software applications comprising:
a hosted VoIP private branch exchange (PBX) in electronic communication with a VoIP-enabled client device, the VoIP PBX comprising:
a client integration proxy having an application programming interface (API) for communicating with the plurality of software applications, wherein the client integration proxy:
(a) retrieves data associated with a precedent digital communication in response to a request;
(b) enables the one or more of the plurality of software applications to access the data associated with the precedent digital communication;
(c) enables one or more of the plurality of software applications to update, add to, or modify the data related to the precedent digital communication to create supplemental data based on information relevant to the precedent digital communication that is obtainable or generated by the one or more of the plurality of software applications; and
(d) retrieves and presents the supplemented data about the precedent digital communication to the end user. 14. The system of claim 13, wherein, each time supplemental data is generated for a precedent digital communication, the client integration proxy notifies the one or more of the plurality of software applications regarding the supplemental data, thereby prompting the one or more of the plurality of software applications to request this supplemental data if needed. 15. The system of claim 13, wherein the client integration proxy enables one or more of the plurality of software applications to access the data related to the precedent digital communication (i) by pushing at least a portion of the data related to the precedent digital communication to one or more of the plurality of end user software applications or (ii) by polling and pulling at least a portion of the data related to the precedent digital communication from an assigned portion of a data store. 16. The system of claim 13, wherein one or more of the plurality of software applications further updates, adds to, or modifies, the data related to the precedent digital communication after the data related to the precedent digital communication has been previously modified by another respective one or more of the plurality of software applications or by the end user. 17. The system of claim 13, wherein the supplemented data about the precedent digital communication comprises one or more of the following provided by one or more of the plurality of software applications regarding a third party related to the precedent digital communication: a physical address of the third party, an email address of the third party, a name of the company with which the third party works, a job title of the third party, a communication history between the end user and the third party, a communication history between the company with which the end user works and the third party, a communication history between the company with which the third party works and the end user, notes regarding the third party, links to databases having additional information about the third party or about the company with which the third party works, biographical information about the third party, current geographical location of the third party or of the company with which the third party works, a graphical representation or image of the third party, documents available to the end user and related to the third party or related to the company with which the third party works, and emails available to the end user and related to the third party or related to the company with which the third party works. 18. The system of claim 13, wherein the data obtained from the hosted VoIP PBX regarding a third party in digital communication with VoIP PBX, includes one or more of the following: a phone number of the third party, a name of the third party, an IP address of the device being used by the third party for the digital communication, a phone number or extension of the end user, a name of the end user, an IP address of the client device of the end user, an indication whether a portion or all of the digital communication is encrypted, an indication whether a portion or all of the digital communication is using a secured communication line, an indication whether the digital communication is inbound to or outbound from the hosted VoIP PBX, an indication whether the digital communication is being monitored, an indication whether the digital communication is being recorded, an indication of call ringing, an indication of call answered, and an indication of call disconnected. | A system for collecting information associated with a telephonic communication made through a VoIP system by dynamically integrating a plurality of end user software applications including a client side integration proxy in electronic communication with a hosted VoIP PBX. The client side integration proxy includes its own API for communicating and exchanging data with a plurality of end user software applications. Software executing on the client side integration proxy receives a request from the end user to retrieve information about a previous telephonic communication, retrieves data related to the previous telephonic communication from a data store, assigns a portion of a memory cache for storing the retrieved data about the previous telephonic communication, enables one or more of the plurality of end user software applications to access the data about the previous telephonic communication currently stored in the assigned portion of the memory cache, enables one or more of the plurality of end user software applications, in response to the data about the previous telephonic communication accessed from the assigned portion of the memory cache, to update, modify, or add to the data about the previous telephonic communication currently stored in the assigned portion of the memory cache based on data relevant to the previous telephonic communication obtainable or generated by the one or more of the plurality of end user software applications, and retrieves and presents the supplemented data about the previous telephonic communication to the end user.1. A system for capturing data related to a communication processed through a VoIP system for integration into one or more software applications, the system comprising:
a hosted VoIP private branch exchange (PBX) incorporating a client integration proxy for capturing, storing, and sharing data related to the communications of at least one client device managed by the hosted VoIP PBX, and wherein the client integration proxy comprises an Application Programming Interface (API) for communicating and exchanging data with the one or more software applications, wherein the client integration proxy is capable of:
(a) retrieving a prior communication data of the at least one client device based upon a request,
(b) sharing the precedent communication data of the at least one client device with the one or more software applications,
(c) receiving from the one or more software applications, modified data related to the precedent communication data of the at least one client device, and
(d) using the modified data related to the precedent communication data of the at least one client device to present the modified data to a user or to share the modified data with a data store. 2. The system of claim 1, wherein when the precedent communication data is updated, added to or otherwise modified, resulting in new updated precedent communications data, the client integration proxy automatically alerts and provides the one or more software applications with this new updated precedent communications data. 3. The system of claim 1, wherein the client integration proxy enables the one or more software applications to access the precedent communications data stored in a data store (i) by pushing at least a portion of the precedent communications data to one or more of the plurality of software applications or (ii) by polling and pulling at least a portion of the precedent communications data from its assigned portion of the data store. 4. The system of claim 1, wherein the one or more software applications may update, add data or otherwise modify the precedent communications data after the precedent communications data is stored in an assigned portion of a data store, creating a modified precedent communication data that can be accessed and used by another of the one or more software applications. 5. The system of claim 1, wherein the precedent communications data comprises one or more of the following: a physical address of a third party, an email address of a third party, a name of the company with which a third party works, a job title of a third party, a communication history between the at least one client device and a third party, a communication history between the company with which the at least one client device is associated and a third party, a communication history between the company with which a third party is associated and the at least one client device, notes regarding a third party, links to databases having additional information about a third party or about the company with which a third party works, biographical information about a third party, current geographical location of a third party or of the company associated with a third party, a graphical representation or image of a third party, documents available to the at least one client device and related to a third party or related to a company associated with a third party, and emails available to the at least one client device and related to a third party or related to a company associated with the third party. 6. The system of claim 1, wherein the data captured by the client integration proxy from the hosted VoIP PBX includes one or more of the following: a phone number of a third party, a name of a third party, an IP address of a device being used by the third party for the telephonic communication, a phone number or extension of an end user, a name of an end user, an IP address of the client device of an end user, an indication whether a portion or all of the telephonic communication is encrypted, an indication of whether a portion or all of a communication is using a secured communication line, an indication whether a communication is inbound to or outbound from the hosted VoIP PBX, an indication whether a communication is being monitored, an indication whether a communication is being recorded, an indication of call ringing, an indication of call answered, and an indication of call disconnected. 7. A system for collecting information associated with a telephonic communication made through a voice over Internet Protocol (VoIP) system by dynamically integrating a plurality of software applications, the system comprising:
a client integration proxy executing on a hosted VoIP private branch exchange (PBX) and in communication with the plurality of software applications, the client integration proxy comprises an application programming interface (API) for communicating and exchanging data with the plurality of software applications and the hosted VoIP PBX; and capable of performing the acts of:
(a) detecting each telephonic communication handled and managed by the hosted VoIP PBX;
(b) receiving a request to retrieve information about a previous telephonic communication;
(c) retrieving information associated with the previous telephonic communication;
(d) enabling the one or more of the plurality of software applications to access the information about the previous telephonic communication;
(e) enabling one or more of the plurality of software applications to update, add to, or otherwise modify the information about the previous telephonic communication, thereby creating supplemented data that is based on data relevant to the previous telephonic communication,
(f) retrieving and presenting the supplemented Data about the previous telephonic communication to the end user. 8. The system of claim 7, wherein, if the data related to the previous telephonic communication is updated, added to, or otherwise modified to create updated information, the client integration proxy notifies one or more of the plurality of software applications about this updated information and requests the one or more of the plurality of software applications to further update, add to, or modify the information regarding the previous telephonic communication in response to this updated information. 9. The system of claim 7, wherein the client integration proxy enables one or more of the plurality of software applications to access the data related to the previous telephonic communication stored in an assigned portion of a memory cache (i) by pushing at least a portion of the stored information to one or more of the plurality of software applications or (ii) by polling and pulling at least a portion of the stored information from the assigned portion of the memory cache. 10. The system of claim 7, wherein one or more of the plurality of software applications further updates, adds to, or modifies, the data related to the previous telephonic communication after the data related to the previous telephonic communication has been previously modified by another respective one or more of the plurality of software applications or by the end user. 11. The system of claim 7, wherein the supplemented information about the previous telephonic communication comprises one or more of the following provided by one or more of the plurality of software applications: a physical address of the third party, an email address of the third party, a name of the company with which the third party works, a job title of the third party, a communication history between the end user and the third party, a communication history between the company with which the end user works and the third party, a communication history between the company with which the third party works and the end user, notes regarding the third party, links to databases having additional information about the third party or about the company with which the third party works, biographical information about the third party, current geographical location of the third party or of the company with which the third party works, a graphical representation or image of the third party, documents available to the end user and related to the third party or related to the company with which the third party works, and emails available to the end user and related to the third party or related to the company with which the third party works. 12. The system of claim 7, wherein the data obtained from the hosted VoIP PBX includes one or more of the following: a phone number of the third party, a name of the third party, an IP address of the device being used by the third party for the telephonic communication, a phone number or extension of the end user, a name of the end user, an IP address of the client device of the end user, an indication whether a portion or all of the telephonic communication is encrypted, an indication whether a portion or all of the telephonic communication is using a secured communication line, an indication whether the telephonic communication is inbound to or outbound from the hosted VoIP PBX, an indication whether the telephonic communication is being monitored, an indication whether the telephonic communication is being recorded, an indication of call ringing, an indication of call answered, and an indication of call disconnected. 13. A system for collecting data associated with a digital communication made through a Voice over Internet Protocol (VoIP) system by dynamically integrating a plurality of software applications comprising:
a hosted VoIP private branch exchange (PBX) in electronic communication with a VoIP-enabled client device, the VoIP PBX comprising:
a client integration proxy having an application programming interface (API) for communicating with the plurality of software applications, wherein the client integration proxy:
(a) retrieves data associated with a precedent digital communication in response to a request;
(b) enables the one or more of the plurality of software applications to access the data associated with the precedent digital communication;
(c) enables one or more of the plurality of software applications to update, add to, or modify the data related to the precedent digital communication to create supplemental data based on information relevant to the precedent digital communication that is obtainable or generated by the one or more of the plurality of software applications; and
(d) retrieves and presents the supplemented data about the precedent digital communication to the end user. 14. The system of claim 13, wherein, each time supplemental data is generated for a precedent digital communication, the client integration proxy notifies the one or more of the plurality of software applications regarding the supplemental data, thereby prompting the one or more of the plurality of software applications to request this supplemental data if needed. 15. The system of claim 13, wherein the client integration proxy enables one or more of the plurality of software applications to access the data related to the precedent digital communication (i) by pushing at least a portion of the data related to the precedent digital communication to one or more of the plurality of end user software applications or (ii) by polling and pulling at least a portion of the data related to the precedent digital communication from an assigned portion of a data store. 16. The system of claim 13, wherein one or more of the plurality of software applications further updates, adds to, or modifies, the data related to the precedent digital communication after the data related to the precedent digital communication has been previously modified by another respective one or more of the plurality of software applications or by the end user. 17. The system of claim 13, wherein the supplemented data about the precedent digital communication comprises one or more of the following provided by one or more of the plurality of software applications regarding a third party related to the precedent digital communication: a physical address of the third party, an email address of the third party, a name of the company with which the third party works, a job title of the third party, a communication history between the end user and the third party, a communication history between the company with which the end user works and the third party, a communication history between the company with which the third party works and the end user, notes regarding the third party, links to databases having additional information about the third party or about the company with which the third party works, biographical information about the third party, current geographical location of the third party or of the company with which the third party works, a graphical representation or image of the third party, documents available to the end user and related to the third party or related to the company with which the third party works, and emails available to the end user and related to the third party or related to the company with which the third party works. 18. The system of claim 13, wherein the data obtained from the hosted VoIP PBX regarding a third party in digital communication with VoIP PBX, includes one or more of the following: a phone number of the third party, a name of the third party, an IP address of the device being used by the third party for the digital communication, a phone number or extension of the end user, a name of the end user, an IP address of the client device of the end user, an indication whether a portion or all of the digital communication is encrypted, an indication whether a portion or all of the digital communication is using a secured communication line, an indication whether the digital communication is inbound to or outbound from the hosted VoIP PBX, an indication whether the digital communication is being monitored, an indication whether the digital communication is being recorded, an indication of call ringing, an indication of call answered, and an indication of call disconnected. | 2,400 |
8,954 | 8,954 | 15,000,813 | 2,468 | A security system is provided. The security system includes a control panel located within a secured space, a plurality of sensors coupled to the control panel that detect security events within the secured space, a user interface within the secured area coupled to the control panel, a camera located in the user interface that collects video images in the secured space surrounding the user interface upon activation of one of the plurality of sensors, a sound transducer located in the user interface, a programmed processor within one of the user interface and the control panel that supports VoIP calls between a called or calling party and the user interface and a control button on the user interface that activates a VoIP connection with a called or calling party through the user interface and control panel. | 1-21. (canceled) 22. A method comprising:
a security system control panel receiving user input via a user interface device of the control panel; and responsive to receiving the user input, the control panel transmitting a first message to a displaced party, via the Internet, to establish a voice connection, a video connection, or a voice and video connection with the displaced party via the Internet. 23. The method of claim 22 wherein receiving the user input includes receiving an identification number of the displaced party. 24. The method of claim 22 further comprising:
a camera of the control panel capturing one or more images of a region in which the control panel is located; and
the control panel transmitting the one or more images to the displaced party, via the Internet, and via the voice connection, the video connection, or the voice and video connection. 25. The method of claim 24 further comprising the control panel receiving second user input via the user interface device to activate the camera for capturing the one or more images. 26. The method of claim 24 further comprising the control panel receiving a second message from the displaced party, via the Internet, to activate the camera for capturing the one or more images. 27. The method of claim 24 further comprising the control panel activating the camera for capturing the one or more images responsive to the control panel receiving a second message from an intrusion sensor indicative of activation of the intrusion sensor. 28. The method of claim 22 further comprising:
a voice transducer of the control panel capturing one or more sound recordings in a region in which the control panel is located; and
the control panel transmitting the one or more sound recordings to the displaced party, via the Internet, and via the voice connection, the video connection, or the voice and video connection. 29. The method of claim 28 further comprising the control panel receiving second user input via the user interface to activate the voice transducer for capturing the one or more sound recordings. 30. The method of claim 28 further comprising the control panel receiving a second message from the displaced party, via the Internet, to activate the voice transducer for capturing the one or more sound recordings. 31. The method of claim 28 further comprising the control panel activating the voice transducer for capturing the one or more sound recordings responsive to the control panel receiving a second message from an intrusion sensor indicative of activation of the intrusion sensor. 32. The method of claim 22 further comprising:
the control panel receiving second user input via a user interface device; and
responsive to receiving the second user input, the control panel transmitting a second message to the displaced party, via the Internet, to terminate the voice connection, the video connection, or the voice and video connection with the displaced party via the Internet. 33. A method comprising:
a security system control panel receiving a first message from a displaced party, via the Internet, to establish a voice connection, a video connection, or a voice and video connection with the displaced party via the Internet; and responsive to receiving the first message, the control panel establishing the voice connection, the video connection, or the voice and video connection with the displaced party via the Internet. 34. A security system control panel comprising:
a user interface device; a transceiver connected to the Internet; one or more programmable processors; and executable control software stored on a non-transitory computer readable medium, wherein the user interface device receives user input, and wherein, responsive to the user input, the programmable processors and the control software transmit a first message to a displaced party, via the transceiver and the Internet, to establish a voice connection, a video connection, or a voice and video connection with the displaced party via the Internet. 35. The security system control panel of claim 34 further comprising:
a camera or a voice transducer,
wherein the camera captures one or more images of an ambient region or the voice transducer captures one or more sound recordings in the ambient region, and
wherein the programmable processors and the control panel transmit the one or more images or the one or more sound recordings to the displaced party, via the Internet, and via the voice connection, the video connection, or the voice and video connection. 36. The security system control panel of claim 35 wherein the user interface device receives second user input, and responsive to the second user input, the programmable processors and the control software activate the camera or the voice transducer for capturing the one or more images or the one or more sound recordings. 37. The security system control panel of claim 35 wherein the programmable processor and the control software receive a second message from the displaced party, via the Internet and the transceiver, to activate the camera or the voice transducer for capturing the one or more images or the one or more sound recordings. 38. The security system control panel of claim 35 wherein the programmable processor and the control software receive a second message from an intrusion sensor indicative of activation of the intrusion sensor, and responsive to the second message, activate the camera or the voice transducer for capturing the one or more images or the one or more sound recordings. 39. The security system control panel of claim 34, wherein the user interface device receives second user input, and wherein, responsive to the second user input, the programmable processors and the control software transmit a second message to the displaced party, via the transceiver and the Internet, to terminate the voice connection, the video connection, or the voice and video connection with the displaced party via the Internet. 40. The security system control panel of claim 34, wherein the user interface device is local to the control panel. 41. The security system control panel of claim 34, wherein the user interface device is displaced from the control panel and communicates with the control panel via a wired or wireless connection. | A security system is provided. The security system includes a control panel located within a secured space, a plurality of sensors coupled to the control panel that detect security events within the secured space, a user interface within the secured area coupled to the control panel, a camera located in the user interface that collects video images in the secured space surrounding the user interface upon activation of one of the plurality of sensors, a sound transducer located in the user interface, a programmed processor within one of the user interface and the control panel that supports VoIP calls between a called or calling party and the user interface and a control button on the user interface that activates a VoIP connection with a called or calling party through the user interface and control panel.1-21. (canceled) 22. A method comprising:
a security system control panel receiving user input via a user interface device of the control panel; and responsive to receiving the user input, the control panel transmitting a first message to a displaced party, via the Internet, to establish a voice connection, a video connection, or a voice and video connection with the displaced party via the Internet. 23. The method of claim 22 wherein receiving the user input includes receiving an identification number of the displaced party. 24. The method of claim 22 further comprising:
a camera of the control panel capturing one or more images of a region in which the control panel is located; and
the control panel transmitting the one or more images to the displaced party, via the Internet, and via the voice connection, the video connection, or the voice and video connection. 25. The method of claim 24 further comprising the control panel receiving second user input via the user interface device to activate the camera for capturing the one or more images. 26. The method of claim 24 further comprising the control panel receiving a second message from the displaced party, via the Internet, to activate the camera for capturing the one or more images. 27. The method of claim 24 further comprising the control panel activating the camera for capturing the one or more images responsive to the control panel receiving a second message from an intrusion sensor indicative of activation of the intrusion sensor. 28. The method of claim 22 further comprising:
a voice transducer of the control panel capturing one or more sound recordings in a region in which the control panel is located; and
the control panel transmitting the one or more sound recordings to the displaced party, via the Internet, and via the voice connection, the video connection, or the voice and video connection. 29. The method of claim 28 further comprising the control panel receiving second user input via the user interface to activate the voice transducer for capturing the one or more sound recordings. 30. The method of claim 28 further comprising the control panel receiving a second message from the displaced party, via the Internet, to activate the voice transducer for capturing the one or more sound recordings. 31. The method of claim 28 further comprising the control panel activating the voice transducer for capturing the one or more sound recordings responsive to the control panel receiving a second message from an intrusion sensor indicative of activation of the intrusion sensor. 32. The method of claim 22 further comprising:
the control panel receiving second user input via a user interface device; and
responsive to receiving the second user input, the control panel transmitting a second message to the displaced party, via the Internet, to terminate the voice connection, the video connection, or the voice and video connection with the displaced party via the Internet. 33. A method comprising:
a security system control panel receiving a first message from a displaced party, via the Internet, to establish a voice connection, a video connection, or a voice and video connection with the displaced party via the Internet; and responsive to receiving the first message, the control panel establishing the voice connection, the video connection, or the voice and video connection with the displaced party via the Internet. 34. A security system control panel comprising:
a user interface device; a transceiver connected to the Internet; one or more programmable processors; and executable control software stored on a non-transitory computer readable medium, wherein the user interface device receives user input, and wherein, responsive to the user input, the programmable processors and the control software transmit a first message to a displaced party, via the transceiver and the Internet, to establish a voice connection, a video connection, or a voice and video connection with the displaced party via the Internet. 35. The security system control panel of claim 34 further comprising:
a camera or a voice transducer,
wherein the camera captures one or more images of an ambient region or the voice transducer captures one or more sound recordings in the ambient region, and
wherein the programmable processors and the control panel transmit the one or more images or the one or more sound recordings to the displaced party, via the Internet, and via the voice connection, the video connection, or the voice and video connection. 36. The security system control panel of claim 35 wherein the user interface device receives second user input, and responsive to the second user input, the programmable processors and the control software activate the camera or the voice transducer for capturing the one or more images or the one or more sound recordings. 37. The security system control panel of claim 35 wherein the programmable processor and the control software receive a second message from the displaced party, via the Internet and the transceiver, to activate the camera or the voice transducer for capturing the one or more images or the one or more sound recordings. 38. The security system control panel of claim 35 wherein the programmable processor and the control software receive a second message from an intrusion sensor indicative of activation of the intrusion sensor, and responsive to the second message, activate the camera or the voice transducer for capturing the one or more images or the one or more sound recordings. 39. The security system control panel of claim 34, wherein the user interface device receives second user input, and wherein, responsive to the second user input, the programmable processors and the control software transmit a second message to the displaced party, via the transceiver and the Internet, to terminate the voice connection, the video connection, or the voice and video connection with the displaced party via the Internet. 40. The security system control panel of claim 34, wherein the user interface device is local to the control panel. 41. The security system control panel of claim 34, wherein the user interface device is displaced from the control panel and communicates with the control panel via a wired or wireless connection. | 2,400 |
8,955 | 8,955 | 14,449,034 | 2,483 | A video encoder is configured to determine a picture size for one or more pictures included in a video sequence. The picture size associated with the video sequence may be a multiple of an aligned coding unit size for the video sequence. In one example, the aligned coding unit size for the video sequence may comprise a minimum coding unit size where the minimum coding unit size is selected from a plurality of smallest coding unit sizes corresponding to different pictures in the video sequence. A video decoder is configured to obtain syntax elements to determine the picture size and the aligned coding unit size for the video sequence. The video decoder decodes the pictures included in the video sequence with the picture size, and stores the decoded pictures in a decoded picture buffer. | 1. A method of encoding video data comprising:
determining a smallest coding unit size for a video sequence, wherein the video sequence comprises a plurality of pictures and wherein the smallest coding unit size is selected from a plurality of possible coding unit sizes; determining a picture size associated with the video sequence, wherein the picture size associated with the video sequence is determined as a multiple of the smallest coding unit size; signaling the smallest coding unit size in sequence level syntax information and signaling the picture size as a multiple of the smallest coding unit size in the sequence level syntax information; and encoding the plurality of pictures. 2. The method of claim 1, wherein the plurality of possible coding unit sizes includes a maximum coding unit size of 64×64 pixels. 3. The method of claim 1, wherein determining a smallest coding unit size for the video sequence includes determining a first smallest coding unit size for a first picture and determining a second smallest coding unit size for a second picture, wherein the first smallest coding unit size is less than the second smallest coding unit size, and wherein the smallest coding unit size for the video sequence is the first smallest coding unit size. 4. The method of claim 1, wherein the picture size specifies a picture size of a decoded picture stored in a decoded picture buffer. 5. The method of claim 1, wherein signaling the smallest coding unit size in sequence level syntax information and signaling the picture size as a multiple of the smallest coding unit size in the sequence level syntax information comprises signaling a sequence parameter set syntax element in a video bitstream. 6. The method of claim 1, wherein the picture size includes a picture width determined as a multiple of the smallest coding unit size and a picture height determined as a multiple of the smallest coding unit size. 7. A method of decoding video data comprising:
obtaining a coded video sequence including a plurality of coded pictures; obtaining sequence level syntax information indicating a smallest coding unit size of the video sequence, wherein the smallest coding unit size is selected from a plurality of possible coding unit sizes; obtaining sequence level information indicating a picture size associated with the video sequence, the picture size having been signaled as a multiple of the smallest coding unit size, and wherein the picture size is determined as a multiple of the smallest coding unit size; decode the coded pictures based on the picture size. 8. The method of claim 7, wherein a first picture of the video sequence has a first smallest coding unit size and a second picture of the video sequence has a second smallest coding unit size, the first smallest coding unit size is less than the second smallest coding unit size, the smallest coding unit size is the first smallest coding unit size, and the picture size is a multiple of the first smallest coding unit size. 9. The method of claim 7, wherein the plurality of possible coding unit sizes includes a maximum coding unit size of 64×64 pixels. 10. The method of claim 7, wherein obtaining sequence level syntax information indicating a smallest coding unit size of the video sequence and obtaining sequence level information indicating a picture size associated with the video sequence comprises receiving a sequence parameter set syntax element in a video bitstream. 11. The method of claim 7, wherein the picture size includes a picture width determined as a multiple of the smallest coding unit size and a picture height determined as a multiple of the smallest coding unit size. 12. The method of claim 7, the method further comprising storing the decoded pictures in a decoded picture buffer, wherein the decoded picture buffer includes one or more decoded pictures having a picture size equal to the picture size associated with the video sequence. 13. A device for decoding video data, the device comprising:
a decoded picture buffer configured to store one or more decoded pictures; and one or more processors in communication with the decoded picture buffer and configured to:
obtain the coded video sequence including a plurality of coded pictures;
obtain sequence level syntax information indicating a smallest coding unit size of the video sequence, wherein the smallest coding unit size is selected from a plurality of possible coding unit sizes;
obtain sequence level information indicating a picture size associated with the video sequence, the picture size having been indicated as a multiple of smallest coding unit size, and wherein the picture size is determined as a multiple of the smallest coding unit size; and
decode the coded pictures based on the picture size. 14. The device of claim 13, wherein a first picture of the video sequence has a first smallest coding unit size and a second picture of the video sequence has a second smallest coding unit size, the first smallest coding unit size is less than the second smallest coding unit size, the smallest coding unit size is the first smallest coding unit size, and the picture size is a multiple of the first smallest coding unit size. 15. The device of claim 13, wherein the plurality of possible coding unit sizes includes a maximum coding unit size of 64×64 pixels. 16. The device of claim 13, further comprising a display configured to display the video sequence. 17. The device of claim 13, further comprising a receiver in communication with the processor and configured to receive the coded video sequence. 18. The device of claim 13, wherein to obtain sequence level syntax information indicating a smallest coding unit size of the video sequence and obtain sequence level information indicating a picture size associated with the video sequence, the processor is configured to receive a sequence parameter set syntax element in a video bitstream. 19. The device of claim 13, wherein the picture size includes a picture width determined as a multiple of the smallest coding unit size and a picture height determined as a multiple of the smallest coding unit size. 20. The device of claim 19, wherein the decoded picture buffer comprises one or more decoded pictures that have a picture size equal to the picture size associated with the video sequence and wherein the processor is further configured to store the decoded pictures in the decoded picture buffer. | A video encoder is configured to determine a picture size for one or more pictures included in a video sequence. The picture size associated with the video sequence may be a multiple of an aligned coding unit size for the video sequence. In one example, the aligned coding unit size for the video sequence may comprise a minimum coding unit size where the minimum coding unit size is selected from a plurality of smallest coding unit sizes corresponding to different pictures in the video sequence. A video decoder is configured to obtain syntax elements to determine the picture size and the aligned coding unit size for the video sequence. The video decoder decodes the pictures included in the video sequence with the picture size, and stores the decoded pictures in a decoded picture buffer.1. A method of encoding video data comprising:
determining a smallest coding unit size for a video sequence, wherein the video sequence comprises a plurality of pictures and wherein the smallest coding unit size is selected from a plurality of possible coding unit sizes; determining a picture size associated with the video sequence, wherein the picture size associated with the video sequence is determined as a multiple of the smallest coding unit size; signaling the smallest coding unit size in sequence level syntax information and signaling the picture size as a multiple of the smallest coding unit size in the sequence level syntax information; and encoding the plurality of pictures. 2. The method of claim 1, wherein the plurality of possible coding unit sizes includes a maximum coding unit size of 64×64 pixels. 3. The method of claim 1, wherein determining a smallest coding unit size for the video sequence includes determining a first smallest coding unit size for a first picture and determining a second smallest coding unit size for a second picture, wherein the first smallest coding unit size is less than the second smallest coding unit size, and wherein the smallest coding unit size for the video sequence is the first smallest coding unit size. 4. The method of claim 1, wherein the picture size specifies a picture size of a decoded picture stored in a decoded picture buffer. 5. The method of claim 1, wherein signaling the smallest coding unit size in sequence level syntax information and signaling the picture size as a multiple of the smallest coding unit size in the sequence level syntax information comprises signaling a sequence parameter set syntax element in a video bitstream. 6. The method of claim 1, wherein the picture size includes a picture width determined as a multiple of the smallest coding unit size and a picture height determined as a multiple of the smallest coding unit size. 7. A method of decoding video data comprising:
obtaining a coded video sequence including a plurality of coded pictures; obtaining sequence level syntax information indicating a smallest coding unit size of the video sequence, wherein the smallest coding unit size is selected from a plurality of possible coding unit sizes; obtaining sequence level information indicating a picture size associated with the video sequence, the picture size having been signaled as a multiple of the smallest coding unit size, and wherein the picture size is determined as a multiple of the smallest coding unit size; decode the coded pictures based on the picture size. 8. The method of claim 7, wherein a first picture of the video sequence has a first smallest coding unit size and a second picture of the video sequence has a second smallest coding unit size, the first smallest coding unit size is less than the second smallest coding unit size, the smallest coding unit size is the first smallest coding unit size, and the picture size is a multiple of the first smallest coding unit size. 9. The method of claim 7, wherein the plurality of possible coding unit sizes includes a maximum coding unit size of 64×64 pixels. 10. The method of claim 7, wherein obtaining sequence level syntax information indicating a smallest coding unit size of the video sequence and obtaining sequence level information indicating a picture size associated with the video sequence comprises receiving a sequence parameter set syntax element in a video bitstream. 11. The method of claim 7, wherein the picture size includes a picture width determined as a multiple of the smallest coding unit size and a picture height determined as a multiple of the smallest coding unit size. 12. The method of claim 7, the method further comprising storing the decoded pictures in a decoded picture buffer, wherein the decoded picture buffer includes one or more decoded pictures having a picture size equal to the picture size associated with the video sequence. 13. A device for decoding video data, the device comprising:
a decoded picture buffer configured to store one or more decoded pictures; and one or more processors in communication with the decoded picture buffer and configured to:
obtain the coded video sequence including a plurality of coded pictures;
obtain sequence level syntax information indicating a smallest coding unit size of the video sequence, wherein the smallest coding unit size is selected from a plurality of possible coding unit sizes;
obtain sequence level information indicating a picture size associated with the video sequence, the picture size having been indicated as a multiple of smallest coding unit size, and wherein the picture size is determined as a multiple of the smallest coding unit size; and
decode the coded pictures based on the picture size. 14. The device of claim 13, wherein a first picture of the video sequence has a first smallest coding unit size and a second picture of the video sequence has a second smallest coding unit size, the first smallest coding unit size is less than the second smallest coding unit size, the smallest coding unit size is the first smallest coding unit size, and the picture size is a multiple of the first smallest coding unit size. 15. The device of claim 13, wherein the plurality of possible coding unit sizes includes a maximum coding unit size of 64×64 pixels. 16. The device of claim 13, further comprising a display configured to display the video sequence. 17. The device of claim 13, further comprising a receiver in communication with the processor and configured to receive the coded video sequence. 18. The device of claim 13, wherein to obtain sequence level syntax information indicating a smallest coding unit size of the video sequence and obtain sequence level information indicating a picture size associated with the video sequence, the processor is configured to receive a sequence parameter set syntax element in a video bitstream. 19. The device of claim 13, wherein the picture size includes a picture width determined as a multiple of the smallest coding unit size and a picture height determined as a multiple of the smallest coding unit size. 20. The device of claim 19, wherein the decoded picture buffer comprises one or more decoded pictures that have a picture size equal to the picture size associated with the video sequence and wherein the processor is further configured to store the decoded pictures in the decoded picture buffer. | 2,400 |
8,956 | 8,956 | 15,501,717 | 2,461 | The invention relates to a method to process data packets of a vehicle message received by a privacy gateway ( 100 ) from a vehicle ( 10 ) via a mobile communications network ( 20 ). The method comprises the following steps: The vehicle message transmitted by the vehicle ( 10 ) is received. A The source IP address in the data packets of the vehicle message is identified. The source IP address in the data packets of the vehicle message is replaced by an IP address of a location collecting entity ( 50 ) of the mobile communications network ( 20 ). Said mobile communications network collects location information of a plurality of vehicles ( 10 ) resulting in an adapted vehicle message with adapted data packets containing the IP address of the location collecting entity as source IP address. Then, the adapted vehicle message is transmitted to a service providing entity ( 40 ) which is configured to provide location dependent services for the plurality of vehicles. | 1-16. (canceled) 17. A method of processing data packets of vehicle messages received by a privacy gateway from vehicles via a mobile communications network, the method comprising:
receiving a first vehicle message transmitted by a first vehicle; identifying a source IP address in data packets of the first vehicle message; replacing the source IP address in the data packets of the first vehicle message with an IP address of a location-collecting entity of the mobile communications network which collects location information of a plurality of vehicles, resulting in an adapted vehicle message with adapted data packets containing the IP address of the location-collecting entity as source IP address; transmitting the adapted vehicle message to a service-providing entity configured to provide location dependent services for the plurality of vehicles. 18. The method of claim 17, further comprising the step of checking whether a destination IP address of the service-providing entity contained in the data packets is known to the privacy gateway as a valid destination IP address for a service-providing entity, wherein the replacing of the source IP address and the transmitting of the adapted vehicle message to the service-providing entity are responsive to determining that the destination IP address is known as a valid destination IP address. 19. The method of claim 17, further comprising the step of determining whether the received first vehicle message is received from a trusted vehicle, wherein the replacing of the source IP address and the transmitting of the adapted vehicle message to the service-providing entity are responsive to determining that the received vehicle message is received from a trusted vehicle. 20. The method of claim 19 wherein the step of determining whether the received first vehicle message is received from a trusted vehicle comprises determining whether the received first vehicle message is signed with a valid certificate. 21. The method of claim 20, wherein if the received first vehicle message is signed with a valid certificate, the certificate is transmitted to the location-collecting entity. 22. The method of claim 17, wherein the method further comprises:
receiving a second vehicle message transmitted by a second vehicle; checking whether a destination IP address contained in data packets of the second vehicle message is known to the privacy gateway as a valid destination IP address for a service-providing entity; and, responsive to determining that the destination IP address contained in the data packets of the second vehicle message is not known to the privacy gateway as a valid destination IP address for a service-providing entity, dropping the data packets of the second vehicle message. 23. The method of claim 22, further comprising, responsive to determining that the destination IP address contained in the data packets of the second vehicle message is not known to the privacy gateway as a valid destination IP address for a service-providing entity, blacklisting the second vehicle message and dropping or ignoring all further vehicle messages and communication from and to the second vehicle. 24. The method of claim 23, where the blacklisting and the resulting message dropping or ignoring are performed by informing an anti-fraud system about the blacklisting. 25. The method of claim 17, wherein the method further comprises:
receiving a second vehicle message transmitted by a second vehicle; determining whether the received second vehicle message is received from a trusted vehicle; and, responsive to determining that the received second vehicle message is not received from a trusted vehicle, dropping the data packets of the second vehicle message. 26. The method of claim 25, further comprising, responsive to determining that the received second vehicle message is not received from a trusted vehicle, blacklisting the second vehicle message and dropping or ignoring all further vehicle messages and communication from and to the second vehicle. 27. The method of claim 23, where the blacklisting and the resulting message dropping or ignoring are performed by informing an anti-fraud system about the blacklisting. 28. A privacy gateway configured to process data packets of vehicle messages received at a privacy gateway from vehicles via a mobile communications network, the privacy gateway comprising:
a receiver configured to receive a first vehicle message sent by a first vehicle; a processor and memory, said memory containing instructions executable by said processor circuit whereby said processor circuit and memory are configured to identify a source IP address in data packets of the first vehicle message and replace the source IP address in the data packets of the first vehicle message with an IP address of a location-collecting entity of the mobile communications network which collects location information of a plurality of vehicles, resulting in an adapted vehicle message with adapted data packets containing the IP address of the location-collecting entity as source IP address; a transmitter configured to transmit the adapted vehicle message to a service-providing entity configured to provide location dependent services for a plurality of vehicles. 29. The privacy gateway of claim 28, further comprising a database containing at least one destination address of at least one service-providing entity, wherein the processor circuit and memory are configured to check whether a destination address contained in the data packets of the first vehicle message is stored in the database as a valid destination IP address for a service-providing entity, and wherein the processing circuit and memory are configured to replace the source IP address in the first vehicle message and transmit the adapted vehicle message to the service-providing entity responsive to determining that the destination address is stored in the database as a valid destination IP address. 30. The privacy gateway of claim 28, wherein the processor circuit and memory are configured to determine whether the received first vehicle message is received from a trusted vehicle, wherein the processing circuit and memory are configured to replace the source IP address in the first vehicle message and transmit the adapted vehicle message to the service-providing entity responsive to determining that the received first vehicle message is received from a trusted vehicle. 31. The privacy gateway of claim 30, wherein the processing circuit and memory are configured to, for determining whether the received first vehicle message is received from a trusted vehicle, determine whether the received first vehicle message is signed with a valid certificate. 32. The privacy gateway of claim 31, wherein the processing circuit and memory are configured to control the transmitter to transmit the certificate to the location-collecting entity in response to determining that the received vehicle message is signed with a valid certificate. 33. The privacy gateway of claim 28, wherein the receiver is configured to receive a second vehicle message transmitted by a second vehicle, and wherein the processing circuit and memory are configured to:
check whether a destination IP address contained in data packets of the second vehicle message is known to the privacy gateway as a valid destination IP address for a service-providing entity; and, responsive to determining that the destination IP address contained in the data packets of the second vehicle message is not known to the privacy gateway as a valid destination IP address for a service-providing entity, drop the data packets of the second vehicle message. 34. The privacy gateway of claim 33, wherein the processing circuit and memory are further configured to, responsive to determining that the destination IP address contained in the data packets of the second vehicle message is not known to the privacy gateway as a valid destination IP address for a service-providing entity, blacklist the second vehicle message and drop or ignore all further vehicle messages and communication from and to the second vehicle. 35. The privacy gateway of claim 34, wherein the processing circuit and memory are configured to inform an anti-fraud system about the blacklisting. 36. The privacy gateway of claim 28, wherein the receiver is configured to receive a second vehicle message transmitted by a second vehicle, and wherein the processing circuit and memory are configured to:
determine whether the received second vehicle message is received from a trusted vehicle; and, responsive to determining that the received second vehicle message is not received from a trusted vehicle, drop the data packets of the second vehicle message. 37. The privacy gateway of claim 36, wherein the processing circuit and memory are further configured to, responsive to determining that the received second vehicle message is not received from a trusted vehicle, blacklist the second vehicle message and drop or ignore all further vehicle messages and communication from and to the second vehicle. 38. The privacy gateway of claim 37, wherein the processing circuit and memory are configured to inform an anti-fraud system about the blacklisting. 39. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising instructions that, when executed by a processor of a privacy gateway, cause the privacy gateway to:
receive a first vehicle message transmitted by a first vehicle via a mobile communications network; identify a source IP address in data packets of the first vehicle message; replace the source IP address in the data packets of the first vehicle message with an IP address of a location-collecting entity of the mobile communications network which collects location information of a plurality of vehicles, resulting in an adapted vehicle message with adapted data packets containing the IP address of the location-collecting entity as source IP address; and transmit the adapted vehicle message to a service-providing entity configured to provide location dependent services for the plurality of vehicles. | The invention relates to a method to process data packets of a vehicle message received by a privacy gateway ( 100 ) from a vehicle ( 10 ) via a mobile communications network ( 20 ). The method comprises the following steps: The vehicle message transmitted by the vehicle ( 10 ) is received. A The source IP address in the data packets of the vehicle message is identified. The source IP address in the data packets of the vehicle message is replaced by an IP address of a location collecting entity ( 50 ) of the mobile communications network ( 20 ). Said mobile communications network collects location information of a plurality of vehicles ( 10 ) resulting in an adapted vehicle message with adapted data packets containing the IP address of the location collecting entity as source IP address. Then, the adapted vehicle message is transmitted to a service providing entity ( 40 ) which is configured to provide location dependent services for the plurality of vehicles.1-16. (canceled) 17. A method of processing data packets of vehicle messages received by a privacy gateway from vehicles via a mobile communications network, the method comprising:
receiving a first vehicle message transmitted by a first vehicle; identifying a source IP address in data packets of the first vehicle message; replacing the source IP address in the data packets of the first vehicle message with an IP address of a location-collecting entity of the mobile communications network which collects location information of a plurality of vehicles, resulting in an adapted vehicle message with adapted data packets containing the IP address of the location-collecting entity as source IP address; transmitting the adapted vehicle message to a service-providing entity configured to provide location dependent services for the plurality of vehicles. 18. The method of claim 17, further comprising the step of checking whether a destination IP address of the service-providing entity contained in the data packets is known to the privacy gateway as a valid destination IP address for a service-providing entity, wherein the replacing of the source IP address and the transmitting of the adapted vehicle message to the service-providing entity are responsive to determining that the destination IP address is known as a valid destination IP address. 19. The method of claim 17, further comprising the step of determining whether the received first vehicle message is received from a trusted vehicle, wherein the replacing of the source IP address and the transmitting of the adapted vehicle message to the service-providing entity are responsive to determining that the received vehicle message is received from a trusted vehicle. 20. The method of claim 19 wherein the step of determining whether the received first vehicle message is received from a trusted vehicle comprises determining whether the received first vehicle message is signed with a valid certificate. 21. The method of claim 20, wherein if the received first vehicle message is signed with a valid certificate, the certificate is transmitted to the location-collecting entity. 22. The method of claim 17, wherein the method further comprises:
receiving a second vehicle message transmitted by a second vehicle; checking whether a destination IP address contained in data packets of the second vehicle message is known to the privacy gateway as a valid destination IP address for a service-providing entity; and, responsive to determining that the destination IP address contained in the data packets of the second vehicle message is not known to the privacy gateway as a valid destination IP address for a service-providing entity, dropping the data packets of the second vehicle message. 23. The method of claim 22, further comprising, responsive to determining that the destination IP address contained in the data packets of the second vehicle message is not known to the privacy gateway as a valid destination IP address for a service-providing entity, blacklisting the second vehicle message and dropping or ignoring all further vehicle messages and communication from and to the second vehicle. 24. The method of claim 23, where the blacklisting and the resulting message dropping or ignoring are performed by informing an anti-fraud system about the blacklisting. 25. The method of claim 17, wherein the method further comprises:
receiving a second vehicle message transmitted by a second vehicle; determining whether the received second vehicle message is received from a trusted vehicle; and, responsive to determining that the received second vehicle message is not received from a trusted vehicle, dropping the data packets of the second vehicle message. 26. The method of claim 25, further comprising, responsive to determining that the received second vehicle message is not received from a trusted vehicle, blacklisting the second vehicle message and dropping or ignoring all further vehicle messages and communication from and to the second vehicle. 27. The method of claim 23, where the blacklisting and the resulting message dropping or ignoring are performed by informing an anti-fraud system about the blacklisting. 28. A privacy gateway configured to process data packets of vehicle messages received at a privacy gateway from vehicles via a mobile communications network, the privacy gateway comprising:
a receiver configured to receive a first vehicle message sent by a first vehicle; a processor and memory, said memory containing instructions executable by said processor circuit whereby said processor circuit and memory are configured to identify a source IP address in data packets of the first vehicle message and replace the source IP address in the data packets of the first vehicle message with an IP address of a location-collecting entity of the mobile communications network which collects location information of a plurality of vehicles, resulting in an adapted vehicle message with adapted data packets containing the IP address of the location-collecting entity as source IP address; a transmitter configured to transmit the adapted vehicle message to a service-providing entity configured to provide location dependent services for a plurality of vehicles. 29. The privacy gateway of claim 28, further comprising a database containing at least one destination address of at least one service-providing entity, wherein the processor circuit and memory are configured to check whether a destination address contained in the data packets of the first vehicle message is stored in the database as a valid destination IP address for a service-providing entity, and wherein the processing circuit and memory are configured to replace the source IP address in the first vehicle message and transmit the adapted vehicle message to the service-providing entity responsive to determining that the destination address is stored in the database as a valid destination IP address. 30. The privacy gateway of claim 28, wherein the processor circuit and memory are configured to determine whether the received first vehicle message is received from a trusted vehicle, wherein the processing circuit and memory are configured to replace the source IP address in the first vehicle message and transmit the adapted vehicle message to the service-providing entity responsive to determining that the received first vehicle message is received from a trusted vehicle. 31. The privacy gateway of claim 30, wherein the processing circuit and memory are configured to, for determining whether the received first vehicle message is received from a trusted vehicle, determine whether the received first vehicle message is signed with a valid certificate. 32. The privacy gateway of claim 31, wherein the processing circuit and memory are configured to control the transmitter to transmit the certificate to the location-collecting entity in response to determining that the received vehicle message is signed with a valid certificate. 33. The privacy gateway of claim 28, wherein the receiver is configured to receive a second vehicle message transmitted by a second vehicle, and wherein the processing circuit and memory are configured to:
check whether a destination IP address contained in data packets of the second vehicle message is known to the privacy gateway as a valid destination IP address for a service-providing entity; and, responsive to determining that the destination IP address contained in the data packets of the second vehicle message is not known to the privacy gateway as a valid destination IP address for a service-providing entity, drop the data packets of the second vehicle message. 34. The privacy gateway of claim 33, wherein the processing circuit and memory are further configured to, responsive to determining that the destination IP address contained in the data packets of the second vehicle message is not known to the privacy gateway as a valid destination IP address for a service-providing entity, blacklist the second vehicle message and drop or ignore all further vehicle messages and communication from and to the second vehicle. 35. The privacy gateway of claim 34, wherein the processing circuit and memory are configured to inform an anti-fraud system about the blacklisting. 36. The privacy gateway of claim 28, wherein the receiver is configured to receive a second vehicle message transmitted by a second vehicle, and wherein the processing circuit and memory are configured to:
determine whether the received second vehicle message is received from a trusted vehicle; and, responsive to determining that the received second vehicle message is not received from a trusted vehicle, drop the data packets of the second vehicle message. 37. The privacy gateway of claim 36, wherein the processing circuit and memory are further configured to, responsive to determining that the received second vehicle message is not received from a trusted vehicle, blacklist the second vehicle message and drop or ignore all further vehicle messages and communication from and to the second vehicle. 38. The privacy gateway of claim 37, wherein the processing circuit and memory are configured to inform an anti-fraud system about the blacklisting. 39. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising instructions that, when executed by a processor of a privacy gateway, cause the privacy gateway to:
receive a first vehicle message transmitted by a first vehicle via a mobile communications network; identify a source IP address in data packets of the first vehicle message; replace the source IP address in the data packets of the first vehicle message with an IP address of a location-collecting entity of the mobile communications network which collects location information of a plurality of vehicles, resulting in an adapted vehicle message with adapted data packets containing the IP address of the location-collecting entity as source IP address; and transmit the adapted vehicle message to a service-providing entity configured to provide location dependent services for the plurality of vehicles. | 2,400 |
8,957 | 8,957 | 14,933,481 | 2,467 | Aspects of the disclosure relate to admission control of a communication session in a network. The admission control can be implemented by a network node at the boundary of the network or a subsystem thereof. In one aspect, the admission control can be implemented during a predetermined period and can be based at least on an admission criterion, which can be specific to an end-point device, e.g., a target device or an origination device. The admission criterion can be configurable and, in certain implementations, it can be obtained from historical performance associated with establishment of communication session. Such historical performance can be assessed within a period of a configurable span. | 1. A method comprising:
receiving, from an originating device, a request for an identifier of the originating device to be stored in an admission control cache of legitimate originating devices, wherein the request comprises the identifier of the originating device and at least one proposed session admission criteria; determining whether the originating device is a legitimate originating device based on the at least one proposed session admission criteria; storing the identifier of the originating device in the admission control cache of legitimate originating devices if the originating device is determined to be a legitimate originating device; and processing a communication request, from the originating device to a target device, based on the identifier of the originating device being stored in the admission control cache of legitimate originating devices and based on a session admission metric derived from the at least one proposed session criteria being satisfied. | Aspects of the disclosure relate to admission control of a communication session in a network. The admission control can be implemented by a network node at the boundary of the network or a subsystem thereof. In one aspect, the admission control can be implemented during a predetermined period and can be based at least on an admission criterion, which can be specific to an end-point device, e.g., a target device or an origination device. The admission criterion can be configurable and, in certain implementations, it can be obtained from historical performance associated with establishment of communication session. Such historical performance can be assessed within a period of a configurable span.1. A method comprising:
receiving, from an originating device, a request for an identifier of the originating device to be stored in an admission control cache of legitimate originating devices, wherein the request comprises the identifier of the originating device and at least one proposed session admission criteria; determining whether the originating device is a legitimate originating device based on the at least one proposed session admission criteria; storing the identifier of the originating device in the admission control cache of legitimate originating devices if the originating device is determined to be a legitimate originating device; and processing a communication request, from the originating device to a target device, based on the identifier of the originating device being stored in the admission control cache of legitimate originating devices and based on a session admission metric derived from the at least one proposed session criteria being satisfied. | 2,400 |
8,958 | 8,958 | 15,839,048 | 2,426 | Disclosed are various embodiments of broadcaster tools configured to manage and control interactive shopping interfaces presented in connection with a live video stream. A broadcaster user interface is generated that includes the live video stream. The broadcaster user interface can be modified to include statistics related to the users consuming the live video stream. The broadcaster user interface can also be modified to include components that when selection cause an action to be performed with respect to the live video stream and/or interactive shopping interfaces rendered on client devices. | 1. A system, comprising:
a first computing device; and at least one application executable in the first computing device, wherein, when executed, the at least one application causes the first computing device to at least:
receive a live video stream from at least one second computing device, the live video stream corresponding to a program that features one or more items being offered for order via an electronic commerce system;
render the live video stream via a user interface, the user interface being configured to facilitate control of a streaming of the live video stream to a plurality of third computing devices;
determine a plurality of actions that can be performed with respect to the live video stream;
modify the user interface to include a plurality of components, individual components of the plurality of components corresponding to a respective action of the plurality of actions;
receive an input associated with a particular component of the plurality of components; and
cause the respective action for the particular component to be performed in response to receiving the input. 2. The system of claim 1, wherein at least one action of the plurality of actions corresponds to the streaming of the live video stream to the plurality of third computing devices. 3. The system of claim 2, wherein the at least one action comprises at least one of: starting the streaming of the live video stream to the plurality of third computing devices, stopping the streaming of the live video stream to the plurality of third computing devices, or causing a graphical overlay to be rendered over the live video stream rendered by the plurality of third computing devices. 4. The system of claim 1, wherein the live video stream is a first live video stream of a plurality of live video streams, and the particular component is configured to facilitate selection of a particular live video stream from at least a subset of the plurality of live video streams to be rendered via the user interface by the first computing device. 5. The system of claim 4, wherein, when executed, the at least one application further causes the first computing device to at least:
determine a popularity of individual ones of the plurality of live video streams based at least in part on a number of viewers consuming a respective live video stream; and select the subset of the plurality of live video streams based at least in part on the popularity, wherein the particular component facilitates selection of the particular live video stream from the subset of live video streams. 6. The system of claim 4, wherein causing the respective action to be performed further comprises:
stopping the rendering of the first live video stream via the user interface; and causing to the particular live video stream to be rendered via the user interface. 7. The system of claim 1, wherein the live video stream is being rendered by the plurality of third computing devices via a second user interface, the second user interface comprises an interactive interface, and at least one action of the plurality of actions comprises at least one of:
editing one or more items presented in the interactive interface, moderating communication between at least two users of the plurality of third computing devices via the interactive interface, injecting item information about the one or more items into the interactive interface, sharing a view of a third user interface rendered by the first computing device via the interactive interface, distributing a communication sent by a particular third computing device to a remainder of the plurality of third computing devices, or polling the users associated with the plurality of third computing devices. 8. The system of claim 1, wherein, when executed, the at least one application further causes the first computing device to at least:
generate a plurality of statistics associated with at least a plurality of users consuming the live video stream being rendered via the plurality of third computing devices; and modify the user interface to include the plurality of statistics. 9. A method, comprising:
rendering, via a first client device, a live video stream via a first user interface, the live video stream being rendered by a plurality of second client devices via a second user interface, and the live video stream depicting a host discussing a plurality of items available for order via an electronic commerce system; generating, via the first client device, a plurality of statistics associated with the plurality of second client devices; modifying, via the first client device, the first user interface to include the plurality of statistics; modifying, via the first client device, the first user interface to include at least one component configured to control a streaming of the live video stream to the plurality of second client devices; receiving, via the first client device, a selection of the at least one component; and causing, via the first client device, an action to be performed in response to the selection of the at least one component. 10. The method of claim 9, further comprising:
updating, via the first client device, the plurality of statistics displayed in the first user interface; and modifying, via the first client device, the first user interface to include the updated plurality of statistics. 11. The method of claim 9, wherein the plurality of statistics comprise at least one of: a number of client devices streaming the live video stream, a number of orders placed for a particular item, a number of times the particular item has been added to a shopping list, a number of units of the particular item that remain in stock, or demographic information associated with a plurality of users consuming the live video stream via the plurality of second client devices. 12. The method of claim 9, wherein at least one statistic is generated according to user profile data associated with the electronic commerce system. 13. The method of claim 9, wherein the action comprises at least one of: starting of the streaming of the live video stream to the plurality of second client devices, stopping of the streaming of the live video stream to the plurality of second client devices, editing at least one item of the plurality of items presented in an interactive interface of the second user interface, moderating communication between at least two users of the plurality of second client devices via the interactive interface, injecting item information about the at least one item into the interactive interface, sharing a view of a third user interface rendered by the first client device with the plurality of second client devices via the interactive interface, distributing a communication sent by a particular second client device to a remaining plurality of second client devices, or sending a poll to the plurality of second client devices. 14. The method of claim 9, wherein the live video stream is a first live video stream of a plurality of live video streams, the first user interface further comprising a switching component configured to facilitate selection of a particular live video stream from the plurality of live video streams. 15. The method of claim 14, further comprising:
updating the first user interface to include the particular live video stream; and updating the first user interface to include a different plurality of statistics associated with the particular live video stream being rendered by a plurality of third client devices. 16. A non-transitory computer-readable medium embodying a program executable in at least one computing device, wherein, when executed, the program causes the at least one computing device to at least:
generate a first user interface including a live video stream depicting a plurality of items available for order via an electronic commerce system, the live video stream being rendered by a plurality of client devices on a second user interface; determine a plurality of statistics associated with the plurality of client devices; modify the first user interface to include the plurality of statistics; determine an action that can be performed with respect to the live video stream; modify the first user interface to include a component associated with the action; and cause the action to be performed in response to receiving a selection of the component. 17. The non-transitory computer-readable medium of claim 16, wherein the plurality of statistics comprise at least one of: a number of client devices streaming the live video stream, a number of orders placed for a particular item, a number of times the particular item has been added to a shopping list, a number of units of the particular item that remain in stock, or demographic information associated with a plurality of users consuming the live video stream. 18. The non-transitory computer-readable medium of claim 16, wherein the action comprises at least one of: starting of a streaming of the live video stream to the plurality of client devices, stopping of the streaming of the live video stream to the plurality of client devices, editing one or more items presented in an interactive interface of the second user interface, moderating communication between at least two users of the plurality of client devices via the interactive interface, injecting item information about the one or more items into the interactive interface, sharing a view of a third user interface rendered by the at least one computing device with the plurality of client devices via the interactive interface, distributing a communication sent by a particular client device to a remainder of the plurality of client devices, or sending a poll to the plurality of client devices. 19. The non-transitory computer-readable medium of claim 16, wherein, when executed, the program further causes the at least one computing device to at least:
receive a video chat request from a particular client device of the plurality of client devices; and modify the first user interface to include additional components in response to the video chat request, the additional components comprising at least one of: an accept component, a put-in-queue component, a reject component, or a communicate component. 20. The non-transitory computer-readable medium of claim 16, wherein, when executed, the program further causes the at least one computing device to at least:
determine that at least one of the plurality of client devices has performed an interactive function with respect to an item featured via the live video stream; update the plurality of statistics in response to determining that the interactive function has been performed; and modify the first user interface to include the updated plurality of statistics. | Disclosed are various embodiments of broadcaster tools configured to manage and control interactive shopping interfaces presented in connection with a live video stream. A broadcaster user interface is generated that includes the live video stream. The broadcaster user interface can be modified to include statistics related to the users consuming the live video stream. The broadcaster user interface can also be modified to include components that when selection cause an action to be performed with respect to the live video stream and/or interactive shopping interfaces rendered on client devices.1. A system, comprising:
a first computing device; and at least one application executable in the first computing device, wherein, when executed, the at least one application causes the first computing device to at least:
receive a live video stream from at least one second computing device, the live video stream corresponding to a program that features one or more items being offered for order via an electronic commerce system;
render the live video stream via a user interface, the user interface being configured to facilitate control of a streaming of the live video stream to a plurality of third computing devices;
determine a plurality of actions that can be performed with respect to the live video stream;
modify the user interface to include a plurality of components, individual components of the plurality of components corresponding to a respective action of the plurality of actions;
receive an input associated with a particular component of the plurality of components; and
cause the respective action for the particular component to be performed in response to receiving the input. 2. The system of claim 1, wherein at least one action of the plurality of actions corresponds to the streaming of the live video stream to the plurality of third computing devices. 3. The system of claim 2, wherein the at least one action comprises at least one of: starting the streaming of the live video stream to the plurality of third computing devices, stopping the streaming of the live video stream to the plurality of third computing devices, or causing a graphical overlay to be rendered over the live video stream rendered by the plurality of third computing devices. 4. The system of claim 1, wherein the live video stream is a first live video stream of a plurality of live video streams, and the particular component is configured to facilitate selection of a particular live video stream from at least a subset of the plurality of live video streams to be rendered via the user interface by the first computing device. 5. The system of claim 4, wherein, when executed, the at least one application further causes the first computing device to at least:
determine a popularity of individual ones of the plurality of live video streams based at least in part on a number of viewers consuming a respective live video stream; and select the subset of the plurality of live video streams based at least in part on the popularity, wherein the particular component facilitates selection of the particular live video stream from the subset of live video streams. 6. The system of claim 4, wherein causing the respective action to be performed further comprises:
stopping the rendering of the first live video stream via the user interface; and causing to the particular live video stream to be rendered via the user interface. 7. The system of claim 1, wherein the live video stream is being rendered by the plurality of third computing devices via a second user interface, the second user interface comprises an interactive interface, and at least one action of the plurality of actions comprises at least one of:
editing one or more items presented in the interactive interface, moderating communication between at least two users of the plurality of third computing devices via the interactive interface, injecting item information about the one or more items into the interactive interface, sharing a view of a third user interface rendered by the first computing device via the interactive interface, distributing a communication sent by a particular third computing device to a remainder of the plurality of third computing devices, or polling the users associated with the plurality of third computing devices. 8. The system of claim 1, wherein, when executed, the at least one application further causes the first computing device to at least:
generate a plurality of statistics associated with at least a plurality of users consuming the live video stream being rendered via the plurality of third computing devices; and modify the user interface to include the plurality of statistics. 9. A method, comprising:
rendering, via a first client device, a live video stream via a first user interface, the live video stream being rendered by a plurality of second client devices via a second user interface, and the live video stream depicting a host discussing a plurality of items available for order via an electronic commerce system; generating, via the first client device, a plurality of statistics associated with the plurality of second client devices; modifying, via the first client device, the first user interface to include the plurality of statistics; modifying, via the first client device, the first user interface to include at least one component configured to control a streaming of the live video stream to the plurality of second client devices; receiving, via the first client device, a selection of the at least one component; and causing, via the first client device, an action to be performed in response to the selection of the at least one component. 10. The method of claim 9, further comprising:
updating, via the first client device, the plurality of statistics displayed in the first user interface; and modifying, via the first client device, the first user interface to include the updated plurality of statistics. 11. The method of claim 9, wherein the plurality of statistics comprise at least one of: a number of client devices streaming the live video stream, a number of orders placed for a particular item, a number of times the particular item has been added to a shopping list, a number of units of the particular item that remain in stock, or demographic information associated with a plurality of users consuming the live video stream via the plurality of second client devices. 12. The method of claim 9, wherein at least one statistic is generated according to user profile data associated with the electronic commerce system. 13. The method of claim 9, wherein the action comprises at least one of: starting of the streaming of the live video stream to the plurality of second client devices, stopping of the streaming of the live video stream to the plurality of second client devices, editing at least one item of the plurality of items presented in an interactive interface of the second user interface, moderating communication between at least two users of the plurality of second client devices via the interactive interface, injecting item information about the at least one item into the interactive interface, sharing a view of a third user interface rendered by the first client device with the plurality of second client devices via the interactive interface, distributing a communication sent by a particular second client device to a remaining plurality of second client devices, or sending a poll to the plurality of second client devices. 14. The method of claim 9, wherein the live video stream is a first live video stream of a plurality of live video streams, the first user interface further comprising a switching component configured to facilitate selection of a particular live video stream from the plurality of live video streams. 15. The method of claim 14, further comprising:
updating the first user interface to include the particular live video stream; and updating the first user interface to include a different plurality of statistics associated with the particular live video stream being rendered by a plurality of third client devices. 16. A non-transitory computer-readable medium embodying a program executable in at least one computing device, wherein, when executed, the program causes the at least one computing device to at least:
generate a first user interface including a live video stream depicting a plurality of items available for order via an electronic commerce system, the live video stream being rendered by a plurality of client devices on a second user interface; determine a plurality of statistics associated with the plurality of client devices; modify the first user interface to include the plurality of statistics; determine an action that can be performed with respect to the live video stream; modify the first user interface to include a component associated with the action; and cause the action to be performed in response to receiving a selection of the component. 17. The non-transitory computer-readable medium of claim 16, wherein the plurality of statistics comprise at least one of: a number of client devices streaming the live video stream, a number of orders placed for a particular item, a number of times the particular item has been added to a shopping list, a number of units of the particular item that remain in stock, or demographic information associated with a plurality of users consuming the live video stream. 18. The non-transitory computer-readable medium of claim 16, wherein the action comprises at least one of: starting of a streaming of the live video stream to the plurality of client devices, stopping of the streaming of the live video stream to the plurality of client devices, editing one or more items presented in an interactive interface of the second user interface, moderating communication between at least two users of the plurality of client devices via the interactive interface, injecting item information about the one or more items into the interactive interface, sharing a view of a third user interface rendered by the at least one computing device with the plurality of client devices via the interactive interface, distributing a communication sent by a particular client device to a remainder of the plurality of client devices, or sending a poll to the plurality of client devices. 19. The non-transitory computer-readable medium of claim 16, wherein, when executed, the program further causes the at least one computing device to at least:
receive a video chat request from a particular client device of the plurality of client devices; and modify the first user interface to include additional components in response to the video chat request, the additional components comprising at least one of: an accept component, a put-in-queue component, a reject component, or a communicate component. 20. The non-transitory computer-readable medium of claim 16, wherein, when executed, the program further causes the at least one computing device to at least:
determine that at least one of the plurality of client devices has performed an interactive function with respect to an item featured via the live video stream; update the plurality of statistics in response to determining that the interactive function has been performed; and modify the first user interface to include the updated plurality of statistics. | 2,400 |
8,959 | 8,959 | 14,400,378 | 2,452 | Method for delivering content comprising the steps of: (i) generating and storing website content experiences, and storing a respective weighting for each experience; (ii) offering the stored website content experiences based on its weighting, and storing a record of the website content experience offerings; (iii) receiving user-initiated website content actions from the computer devices; (iv) storing the user-initiated website content actions from the computer devices in relation to the website content experience offered; (v) analysing the user-initiated website content actions in relation to the record of website content experience offerings to determine a frequency of website content experience actions in relation to a frequency of website content experience offerings, and (vi) adjusting the stored weighting of a website content experience in response to the determined frequency of website content experience actions in relation to the frequency of website content experience offerings satisfying a criterion and an associated statistical significance criterion. | 1. A method of operating a server apparatus for delivering website content to a plurality of computer devices, via a communication network, the server apparatus configured to receive user-initiated website content actions from the plurality of computer devices, the method comprising the steps of:
(i) generating and storing a plurality of website content experiences, and storing a respective weighting for each experience; (ii) offering the stored website content experiences via the communication network, each website content experience being offered in accordance with its respective stored weighting, and storing a record of the website content experience offerings; (iii) receiving at the server apparatus user-initiated website content actions from the plurality of computer devices; (iv) storing a record of the user-initiated website content actions from the plurality of computer devices in relation to the website content experience offered; (v) analysing the record of the user-initiated website content actions from the plurality of computer devices in relation to the record of website content experience offerings to determine a frequency of website content experience actions in relation to a frequency of website content experience offerings, and (vi) adjusting the respective stored weighting of a website content experience in response to the determined frequency of website content experience actions in relation to the frequency of website content experience offerings satisfying a criterion and an associated statistical significance criterion. 2. Method of claim 1, wherein website content includes elements, each element having at least two variants. 3. Method of claim 2, each experience comprising a specific set of variants, over one or more web pages. 4. Method of claim 1, wherein the weightings are set to an equal weight for a predetermined initial period, after which adjustment of the weightings in step (vi) is permitted. 5. Method of claim 1, comprising the further step of: offering the stored website content experience via the communication network, each website content experience being offered in accordance with its adjusted respective stored weighting. 6. Method of claim 1, the method including a predictions step in which the future performance of experiences is predicted, and the method including a sampling rule step in which the predicted performance is transformed into a ‘share of traffic’ figure, that is, based on the prediction of future performance the sampling step decides what relative weights to assign to experiences. 7. Method of claim 1, wherein aggressiveness is applied in the adjustment of a respective stored weighting of a website content experience. 8-11. (canceled) 12. Method of claim 1, wherein the method determines an aggressiveness parameter to be used in adjusting the weightings for website content experiences. 13-14. (canceled) 15. Method of claim 12 applied cyclically, wherein for each cycle of the method with positive uplift, the aggressiveness parameter is increased by a fixed amount, where uplift is given by the relative difference in a report's key metric between a given experience or variant and a default content. 16. Method of claim 12 applied cyclically, wherein for each cycle of the method with negative uplift, the aggressiveness parameter is decreased by a fixed amount, where uplift is given by the relative difference in a report's key metric between a given experience or variant and a default content. 17. Method of claim 1, wherein worst-performing experiences or worst-performing variants are given zero weighting. 18. (canceled) 19. Method of claim 1, wherein every visitor accessing the server apparatus has a visitor cookie, which is received by, and stored on the corresponding computing device, and wherein the method includes performing a generalized method over a number of non-intersecting segments and over a specific set of attributes, wherein visitors are grouped into segments, and running several independent offline models, each using data only from a corresponding segment, while online modules serve incoming visitors with weights which are valid for their segment, where visitor cookies are used to define segments. 20-22. (canceled) 23. Method of claim 1 wherein the criterion is optimizing Conversion Rate, Revenue per Generation, or Multiple Actions per Generation. 24. Method of claim 1 wherein the method includes a step in which it is decided whether to optimize by elements or by experiences. 25. Method of claim 24, wherein if the number of elements is below a predefined threshold then the method optimizes by experiences. 26-30. (canceled) 31. Method of claim 1, wherein steps (ii) to (vi) of the method are applied in cycles so as to provide continuous content optimization. 32. Method of claim 1, the method being applied in cycles, wherein on cycle N the method includes a step of predicting a Metric value for the next cycle, N+1. 33-37. (canceled) 38. Method of claim 1, wherein the method minimizes a campaign's total ‘cost of learning’. 39-41. (canceled) 42. Computer program product stored on a non-transient storage medium, the computer program when running on a server apparatus operable to deliver website content to a plurality of computer devices, via a communication network, the computer program when running on a server apparatus operable to receive user-initiated website content actions from the plurality of computer devices, the computer program when running on a server apparatus operable to:
(i) generate and store a plurality of website content experiences, and store a respective weighting for each experience; (ii) offer the stored website content experiences via the communication network, each website content experience being offered in accordance with its respective stored weighting, and store a record of the website content experience offerings; (iii) receive at the server apparatus user-initiated website content actions from the plurality of computer devices; (iv) store a record of the user-initiated website content actions from the plurality of computer devices in relation to the website content experience offered; (v) analyse the record of the user-initiated website content actions from the plurality of computer devices in relation to the record of website content experience offerings to determine a frequency of website content experience actions in relation to a frequency of website content experience offerings, and (vi) adjust the respective stored weighting of a website content experience in response to the determined frequency of website content experience actions in relation to the frequency of website content experience offerings satisfying a criterion and an associated statistical significance criterion. 43. Server apparatus configured to deliver website content to a plurality of computer devices, via a communication network, the server apparatus configured to receive user-initiated website content actions from the plurality of computer devices, the server apparatus configured to:
(i) generate and store a plurality of website content experiences, and to store a respective weighting for each experience; (ii) offer the stored website content experiences via the communication network, each website content experience being offered in accordance with its respective stored weighting, and to store a record of the website content experience offerings; (iii) receive user-initiated website content actions from the plurality of computer devices; (iv) store a record of the user-initiated website content actions from the plurality of computer devices in relation to the website content experience offered; (v) analyse the record of the user-initiated website content actions from the plurality of computer devices in relation to the record of website content experience offerings to determine a frequency of website content experience actions in relation to a frequency of website content experience offerings; (vi) adjust the respective stored weighting of a website content experience in response to the determined frequency of website content experience actions in relation to the frequency of website content experience offerings satisfying a criterion and an associated statistical significance criterion. 44-49. (canceled) | Method for delivering content comprising the steps of: (i) generating and storing website content experiences, and storing a respective weighting for each experience; (ii) offering the stored website content experiences based on its weighting, and storing a record of the website content experience offerings; (iii) receiving user-initiated website content actions from the computer devices; (iv) storing the user-initiated website content actions from the computer devices in relation to the website content experience offered; (v) analysing the user-initiated website content actions in relation to the record of website content experience offerings to determine a frequency of website content experience actions in relation to a frequency of website content experience offerings, and (vi) adjusting the stored weighting of a website content experience in response to the determined frequency of website content experience actions in relation to the frequency of website content experience offerings satisfying a criterion and an associated statistical significance criterion.1. A method of operating a server apparatus for delivering website content to a plurality of computer devices, via a communication network, the server apparatus configured to receive user-initiated website content actions from the plurality of computer devices, the method comprising the steps of:
(i) generating and storing a plurality of website content experiences, and storing a respective weighting for each experience; (ii) offering the stored website content experiences via the communication network, each website content experience being offered in accordance with its respective stored weighting, and storing a record of the website content experience offerings; (iii) receiving at the server apparatus user-initiated website content actions from the plurality of computer devices; (iv) storing a record of the user-initiated website content actions from the plurality of computer devices in relation to the website content experience offered; (v) analysing the record of the user-initiated website content actions from the plurality of computer devices in relation to the record of website content experience offerings to determine a frequency of website content experience actions in relation to a frequency of website content experience offerings, and (vi) adjusting the respective stored weighting of a website content experience in response to the determined frequency of website content experience actions in relation to the frequency of website content experience offerings satisfying a criterion and an associated statistical significance criterion. 2. Method of claim 1, wherein website content includes elements, each element having at least two variants. 3. Method of claim 2, each experience comprising a specific set of variants, over one or more web pages. 4. Method of claim 1, wherein the weightings are set to an equal weight for a predetermined initial period, after which adjustment of the weightings in step (vi) is permitted. 5. Method of claim 1, comprising the further step of: offering the stored website content experience via the communication network, each website content experience being offered in accordance with its adjusted respective stored weighting. 6. Method of claim 1, the method including a predictions step in which the future performance of experiences is predicted, and the method including a sampling rule step in which the predicted performance is transformed into a ‘share of traffic’ figure, that is, based on the prediction of future performance the sampling step decides what relative weights to assign to experiences. 7. Method of claim 1, wherein aggressiveness is applied in the adjustment of a respective stored weighting of a website content experience. 8-11. (canceled) 12. Method of claim 1, wherein the method determines an aggressiveness parameter to be used in adjusting the weightings for website content experiences. 13-14. (canceled) 15. Method of claim 12 applied cyclically, wherein for each cycle of the method with positive uplift, the aggressiveness parameter is increased by a fixed amount, where uplift is given by the relative difference in a report's key metric between a given experience or variant and a default content. 16. Method of claim 12 applied cyclically, wherein for each cycle of the method with negative uplift, the aggressiveness parameter is decreased by a fixed amount, where uplift is given by the relative difference in a report's key metric between a given experience or variant and a default content. 17. Method of claim 1, wherein worst-performing experiences or worst-performing variants are given zero weighting. 18. (canceled) 19. Method of claim 1, wherein every visitor accessing the server apparatus has a visitor cookie, which is received by, and stored on the corresponding computing device, and wherein the method includes performing a generalized method over a number of non-intersecting segments and over a specific set of attributes, wherein visitors are grouped into segments, and running several independent offline models, each using data only from a corresponding segment, while online modules serve incoming visitors with weights which are valid for their segment, where visitor cookies are used to define segments. 20-22. (canceled) 23. Method of claim 1 wherein the criterion is optimizing Conversion Rate, Revenue per Generation, or Multiple Actions per Generation. 24. Method of claim 1 wherein the method includes a step in which it is decided whether to optimize by elements or by experiences. 25. Method of claim 24, wherein if the number of elements is below a predefined threshold then the method optimizes by experiences. 26-30. (canceled) 31. Method of claim 1, wherein steps (ii) to (vi) of the method are applied in cycles so as to provide continuous content optimization. 32. Method of claim 1, the method being applied in cycles, wherein on cycle N the method includes a step of predicting a Metric value for the next cycle, N+1. 33-37. (canceled) 38. Method of claim 1, wherein the method minimizes a campaign's total ‘cost of learning’. 39-41. (canceled) 42. Computer program product stored on a non-transient storage medium, the computer program when running on a server apparatus operable to deliver website content to a plurality of computer devices, via a communication network, the computer program when running on a server apparatus operable to receive user-initiated website content actions from the plurality of computer devices, the computer program when running on a server apparatus operable to:
(i) generate and store a plurality of website content experiences, and store a respective weighting for each experience; (ii) offer the stored website content experiences via the communication network, each website content experience being offered in accordance with its respective stored weighting, and store a record of the website content experience offerings; (iii) receive at the server apparatus user-initiated website content actions from the plurality of computer devices; (iv) store a record of the user-initiated website content actions from the plurality of computer devices in relation to the website content experience offered; (v) analyse the record of the user-initiated website content actions from the plurality of computer devices in relation to the record of website content experience offerings to determine a frequency of website content experience actions in relation to a frequency of website content experience offerings, and (vi) adjust the respective stored weighting of a website content experience in response to the determined frequency of website content experience actions in relation to the frequency of website content experience offerings satisfying a criterion and an associated statistical significance criterion. 43. Server apparatus configured to deliver website content to a plurality of computer devices, via a communication network, the server apparatus configured to receive user-initiated website content actions from the plurality of computer devices, the server apparatus configured to:
(i) generate and store a plurality of website content experiences, and to store a respective weighting for each experience; (ii) offer the stored website content experiences via the communication network, each website content experience being offered in accordance with its respective stored weighting, and to store a record of the website content experience offerings; (iii) receive user-initiated website content actions from the plurality of computer devices; (iv) store a record of the user-initiated website content actions from the plurality of computer devices in relation to the website content experience offered; (v) analyse the record of the user-initiated website content actions from the plurality of computer devices in relation to the record of website content experience offerings to determine a frequency of website content experience actions in relation to a frequency of website content experience offerings; (vi) adjust the respective stored weighting of a website content experience in response to the determined frequency of website content experience actions in relation to the frequency of website content experience offerings satisfying a criterion and an associated statistical significance criterion. 44-49. (canceled) | 2,400 |
8,960 | 8,960 | 14,309,867 | 2,483 | A device for coding video data includes a memory and at least one processor configured to determine a cost associated with a plurality of color transforms associated with a coding unit, determine a cost associated with a plurality of color transforms associated with a coding unit, select a color transform of the plurality of color transforms having a lowest associated cost, transform a first block of video data having a first, Red, Green, Blue (RGB) color space to produce a second block of video data having a second color space using the selected color transform of the plurality of color transforms, and encode the second video block having the second color space. | 1. A method of encoding video data, the method comprising:
determining a cost associated with a plurality of color transforms associated with a coding unit; selecting a color transform of the plurality of color transforms having a lowest associated cost; transforming a first block of video data having a first, Red, Green, Blue (RGB) color space to produce a second block of video data having a second color space using the selected color transform of the plurality of color transforms; and encoding the second video block having the second color space. 2. The method of claim 1, wherein the plurality of color transforms comprise a plurality of transforms of a group consisting of: an identity transform, a differential transform, a weighted differential transform, a discrete cosine transform (DCT), a YCbCr transform, a YCgCo transform, and a YCgCo—R transform. 3. The method of claim 2, wherein the identity transform comprises:
[
1
0
0
0
1
0
0
0
1
]
. 4. The method of claim 2, wherein the differential transform comprises:
[
0
1
0
0
-
1
1
1
-
1
0
]
. 5. The method of claim 2, wherein the DCT transform comprises:
[
0.5774
0.5774
0.5774
0.7071
0
-
0.7071
0.4082
-
0.8156
0.4082
]
. 6. The method of claim 2, wherein the YCbCr transform comprises:
[
0.2126
0.7152
0.0722
-
0.1172
-
0.3942
0.5114
0.5114
-
0.4645
-
0.0469
]
. 7. The method of claim 2, wherein the YCgCo transform comprises:
[
1
/
4
1
/
2
1
/
4
1
/
2
0
-
1
/
2
-
1
/
4
1
/
2
-
1
/
4
]
. 8. The method of claim 1, wherein the selected color transform comprises a YCgCo—R transform comprising:
Co=R−B
t=B+└Co/2┘
Cg=G−t
Y=t+└C/2┘. 9. The method of claim 1, wherein the selected color transform is derived using a lifting scheme corresponding to:
R′=R+└aB┘ B′=B+└bR′┘ G′=G+└cB′┘ R″=R′+└dG′┘,
wherein a, b, c, and d are parameters. 10. The method of claim 9, wherein the lifting scheme further comprises:
R′″=└eR″+f┘ B″=└gB′+h┘ G″=└iG′+j┘
wherein e, f, g, h, i, and j are parameters. 11. The method of claim 9, further comprising:
normalizing a bit depth of each color channel of the lifting scheme. 12. The method of claim 1, wherein the selected color transform comprises a weighted differential transform comprising:
[
0
1
0
0
-
α
1
1
1
-
α
2
0
]
,
wherein α1=cov(G, B)/var(G),
wherein α2=cov(G, R)/var(G),
wherein R corresponds to a red color channel of the RGB color space,
wherein G corresponds to a green color channel of the RGB color space,
wherein B corresponds to a blue color channel of the RGB color space,
wherein cov( ) is the covariance function, and
wherein var( ) is the variance function. 13. The method of claim 12, wherein the covariance function and the variance functions are calculated using a set of reference pixels. 14. The method of claim 12, further comprising encoding values of α1 and α2. 15. The method of claim 12, wherein the values of α1 and α2 are constrained to a set of values comprising at least one of a group consisting of:
a set of integers, a set of dyadic numbers, and a set of fractions with a dyadic number. 16. The method of claim 1, further comprising:
signaling data that indicates the selected, second color transform of the plurality of color transforms has been applied to the second video block having the second color space. 17. The method of claim 1, the method further comprising:
determining whether to apply a single transform of the plurality of color transforms to the first block; responsive to determining to apply the single transform to the plurality of blocks, signaling, for the coded unit, a flag syntax element, wherein a first value of the flag indicates that the single transform has been applied, and wherein a second value of the flag indicates that the single transform has not been applied. 18. The method of claim 1, wherein the first block comprises at least one of a group consisting of:
a coding tree unit (CTU), coding unit (CU), prediction unit (PU), and a transform unit (TU). 19. The method of claim 1, wherein the first block comprises a plurality of blocks, the method further comprising:
determining whether to apply a pre-defined color transform of the plurality of color transforms to each one of the plurality of blocks; and responsive to determining to apply the pre-defined color transform to each one of the plurality of blocks, transforming each of the plurality of blocks using the pre-defined color transform without signaling data indicating that the pre-defined color transform has been applied to each one of the plurality blocks of video data. 20. The method of claim 1, wherein the selected color transform of the plurality of color transforms comprises the color transform of the plurality of color transforms that minimizes a Lagrangian cost corresponding to: L=D+λR,
wherein L is the Lagrange cost, D is a distortion value, λ is a Lagrange multiplier, and R is a bitrate value; and
encoding an index syntax element that indicates the selected color transform. 21. The method of claim 1, wherein the selected color transform is a color transform of the plurality of color transforms that has a lowest associated distortion cost, the method further comprising:
encoding an index syntax element that indicates the selected color transform. 22. The method of claim 1, the method further comprising:
determining a correlation between color components of the RGB color space of the first video block and each color space associated with each of the plurality of color transforms; and signaling an index syntax element that indicates the selected color transform, wherein the selected is a color transform of the plurality of color transforms that is associated with the color space having a highest associated correlation between the color components. 23. The method of claim 22, further comprising: determining the highest associated correlation based on reconstructed neighboring blocks relative to at least one of the first block and the second block. 24. The method of claim 1, wherein the first block of data comprises a block of an original signal. 25. The method of claim 1, wherein the first block comprises a block of a residual signal, and
wherein the first block comprises at least one of a group consisting of: a predictive block and a residual block. 26. A method of decoding video data, the method comprising:
receiving syntax data associated with a coded unit in a bitstream, the syntax data indicative of one of a plurality of inverse color transforms; selecting an inverse color transform of the plurality of inverse color transforms based on the received syntax data; inversely transforming a first block of video data having a first color space to a second block of video having a second, red, green, blue (RGB) color space using the selected inverse color transform of the plurality of inverse color transforms; and decoding the second video block having the second, RGB color space. 27. The method of claim 26, wherein the plurality of inverse color transforms comprises a plurality of inverse color transforms of a group consisting of: an identity transform, an inverse differential transform, an inverse weighted differential transform, an inverse discrete cosine transform (DCT), an inverse YCbCr transform, an inverse YCgCo transform, and an inverse YCgCo—R transform. 28. The method of claim 27, wherein the identity transform comprises:
[
1
0
0
0
1
0
0
0
1
]
. 29. The method of claim 27, wherein the inverse differential transform comprises:
[
1
0
1
1
0
0
1
1
0
]
. 30. The method of claim 27, wherein the inverse DCT transform comp rises:
[
0.5774
0.7071
0.4082
0.5774
0
-
0.8156
0.5774
-
0.7071
0.4082
]
. 31. The method of claim 27, wherein the inverse YCbCr transform comprises:
[
1
0
1.5397
1
-
0.1831
-
0.4577
1
1.8142
0
]
. 32. The method of claim 27, wherein the inverse YCgCo transform comprises:
[
1
1
-
1
1
0
1
1
-
1
-
1
]
. 33. The method of claim 26, wherein the selected inverse color transform comprises a YCgCo—R transform comprising:
t=Y−└Cg/2┘
G=Cg+t
B=t−└Co/2┘
R=B+Co. 34. The method of claim 26, wherein the selected inverse color transform is derived using a lifting scheme corresponding to:
R′=R+└aB┘ B′=B+└bR′┘ G′=G+└cB′┘ R″=R′+└dG′┘,
wherein a, b, c, and d are parameters. 35. The method of claim 34, wherein the lifting scheme further comprises:
R′″=└eR″+f┘ B″=└gB′+h┘, G″=└iG′+i┘
wherein e, f, g, h, i, and j are parameters. 36. The method of claim 34, further comprising normalizing a bit depth of each color channel of the lifting scheme. 37. The method of claim 26, wherein the selected inverse color transform comprises a weighted differential transform comprising:
[
α
2
0
1
1
0
0
α
1
1
0
]
,
wherein α1=cov(G, B)/var(G),
wherein α2=cov(G, R)/var(G),
wherein R corresponds to a red color channel of the RGB color space,
wherein G corresponds to a green color channel of the RGB space,
wherein B corresponds to a blue color channel of the RGB color space,
wherein cov( ) is the covariance function, and
wherein var( ) is the variance function. 38. The method of claim 37, wherein the covariance function and the variance functions are calculated using a set of reference pixels. 39. The method of claim 37, further comprising decoding values of α1 and α2. 40. The method of claim 37, wherein the values of α1 and α2 are constrained to a set values comprising at least one of a group consisting of:
a set of integers, a set of dyadic numbers, and a set of fractions with a dyadic number. 41. The method of claim 26, further comprising:
decoding data that indicates the selected inverse color transform of the plurality of color inverse transforms to apply to the first video block having the first color space. 42. The method of claim 26, the method further comprising:
decoding a value of a flag syntax element for the coded unit; and determining whether to apply a single inverse transform of the plurality of inverse color transforms to the first block based on the value of the flag syntax element, wherein a first value of the flag indicates to apply the single inverse transform; and wherein a second value of the flag indicates not to apply the single inverse transform. 43. The method of claim 26, wherein the first block of video data comprises at least one of a group consisting of:
a coding tree unit (CTU), coding unit (CU), prediction unit (PU), and a transform unit (TU). 44. The method of claim 26, wherein the first block comprises a plurality of blocks, the method further comprising:
determining whether to apply a pre-defined inverse color transform of the plurality of inverse color transforms to each one of the plurality of blocks; and responsive to determining to apply the pre-defined inverse color transform to each one of the plurality of blocks, inversely transforming each of the plurality of blocks using the pre-defined color transform without decoding data indicating that the pre-defined color transform has been applied to each one of the plurality blocks of video data. 45. The method of claim 26, further comprising: decoding an index syntax element that indicates the selected inverse color transform,
wherein the selected inverse color transform of the plurality of color transforms comprises the inverse color transform of the plurality of color transforms that minimizes a Lagrangian cost corresponding to: L=D+λR, wherein L is the Lagrange cost, D is a distortion value, λ is a Lagrange multiplier, and R is a bitrate value. 46. The method of claim 26, further comprising:
decoding an index syntax element that indicates the selected inverse color transform, wherein the selected inverse color transform is the inverse color transform of the plurality of color transforms that has a lowest associated distortion cost. 47. The method of claim 26,
wherein the selected inverse color transform is an inverse color transform of the plurality of color transforms that is associated with a color space having a highest associated correlation between color components of the RGB color space and each of a plurality of color components associated with each of the plurality of color transforms. 48. The method of claim 46, wherein the received syntax data comprises syntax data of reconstructed neighboring blocks relative to at least one of the first block and the second block,
the method further comprising: determining the highest associated correlation based on the syntax data of the reconstructed neighboring blocks. 49. The method of claim 46, further comprising decoding an index syntax element that indicates the selected inverse color transform that has the highest associated correlation. 50. The method of claim 26, wherein the first block of data comprises a block of a reconstructed signal. 51. The method of claim 26, wherein the first block of video data comprises a block of a reconstructed residual signal,
wherein the first block comprises at least one of a group consisting of: a predictive block and a residual block. 52. A device for encoding video data, the device comprising:
a memory configured to store video data; and at least one processor configured to: determine a cost associated with a plurality of color transforms associated with a coding unit; select a color transform of the plurality of color transforms having a lowest associated cost; transform a first block of video data having a first, Red, Green, Blue (RGB) color space to produce a second block of video data having a second color space using the selected color transform of the plurality of color transforms; and encode the second video block having the second color space. 53. The device of claim 52, wherein the device comprises at least one of:
an integrated circuit; a microprocessor; and a wireless communication device. 54. The device of claim 52, wherein the plurality of color transforms comprises a plurality of a group consisting of: an identity transform, a differential transform, a weighted differential transform, a discrete cosine transform (DCT), a YCbCr transform, a YCgCo transform, and a YCgCo—R transform. 55. The device of claim 52, wherein the identity transform comprises:
[
1
0
0
0
1
0
0
0
1
]
. 56. The device of claim 52, wherein the differential transform comprises:
[
0
1
0
0
-
1
1
1
-
1
0
]
. 57. The device of claim 52, wherein the DCT transform comprises:
[
0.5774
0.5774
0.5774
0.7071
0
-
0.7071
0.4082
-
0.8156
0.4082
]
. 58. The device of claim 52, wherein the YCbCr transform comprises:
[
0.2126
0.7152
0.0722
-
0.1172
-
0.3942
0.5114
0.5114
-
0.4645
-
0.0469
]
. 59. The device of claim 52, wherein the YCgCo transform comprises:
[
1
/
4
1
/
2
1
/
4
1
/
2
0
-
1
/
2
-
1
/
4
1
/
2
-
1
/
4
]
. 60. The device of claim 52, wherein the selected color transform comprises a YCgCo—R transform comprising:
Co=R−B
t=B+└Co/2┘
Cg=G−t
Y=t+└C/2┘. 61. The device of claim 52, wherein the selected color transform is derived using a lifting scheme corresponding to:
R′=R+└aB┘ B′=B+└bR′┘ G′=G+└cB′┘ R″=R′+└dG′┘,
wherein a, b, c, and d are parameters. 62. The device of claim 61, wherein the lifting scheme further comprises:
R′″=└eR″+f┘ B″=└B′+h┘ G″=└iG′+j┘
wherein e, f, g, h, i, and j are parameters. 63. The device of claim 61, wherein the at least one processor is further configured to:
normalize a bit depth of each color channel of the lifting scheme. 64. The device of claim 52, wherein the selected color transform comprises a weighted differential transform comprising:
[
0
1
0
0
-
α
1
1
1
-
α
2
0
]
,
wherein α1=cov(G, B)/var(G),
wherein α2=cov(G, R)/var(G),
wherein R corresponds to a red color channel of the RGB color space,
wherein G corresponds to a green color channel of the RGB color space,
wherein B corresponds to a blue color channel of the RGB color space,
wherein cov( ) is the covariance function, and
wherein var( ) is the variance function. 65. The device of claim 64, wherein the covariance function and the variance functions are calculated using a set of reference pixels. 66. The device of claim 64, further comprising encoding values of α1 and α2. 67. The device of claim 64, wherein the values of α1 and α2 are constrained to a set of values comprising at least one of a group consisting of:
a set of integers, a set of dyadic numbers, and a set of fractions with a dyadic number. 68. The device of claim 52, wherein the at least one processor is further configured to:
signal data that indicates the selected, second color transform of the plurality of color transforms has been applied to the second video block having the second color space. 69. The device of claim 52, wherein the at least one processor is further configured to:
determine whether to apply a single transform of the plurality of color transforms to the first block; responsive to determining to apply the single transform to the plurality of blocks, signal, for the coded unit, a flag syntax element, wherein a first value of the flag indicates that the single transform has been applied, and wherein a second value of the flag indicates that the single transform has not been applied. 70. The device of claim 52, wherein the first block comprises at least one of a group consisting of:
a coding tree unit (CTU), coding unit (CU), prediction unit (PU), and a transform unit (TU). 71. The device of claim 52, wherein the first block comprises a plurality of blocks, wherein the at least one processor is further configured to:
determine whether to apply a pre-defined color transform of the plurality of color transforms to each one of the plurality of blocks; and responsive to determining to apply the pre-defined color transform to each one of the plurality of blocks, transform each of the plurality of blocks using the pre-defined color transform without signaling data indicating that the pre-defined color transform has been applied to each one of the plurality blocks of video data. 72. The device of claim 52, wherein the selected color transform of the plurality of color transforms comprises the color transform of the plurality of color transforms that minimizes a Lagrangian cost corresponding to: L=D+λR,
wherein L is the Lagrange cost, D is a distortion value, λ is a Lagrange multiplier, and R is a bitrate value; and
encode an index syntax element that indicates the selected color transform. 73. The device of claim 52, wherein the selected color transform is a color transform of the plurality of color transforms that has a lowest associated distortion cost, wherein the at least one processor is further configured to:
encode an index syntax element that indicates the selected color transform. 74. The device of claim 52, wherein the at least one processor is further configured to:
determine a correlation between color components of the RGB color space of the first video block and each color space associated with each of the plurality of color transforms; and signal an index syntax element that indicates the selected color transform, wherein the selected is a color transform of the plurality of color transforms that is associated with the color space having a highest associated correlation between the color components. 75. The device of claim 74, wherein the at least one processor is further configured to:
determine the highest associated correlation based on reconstructed neighboring blocks relative to at least one of the first block and the second block. 76. The device of claim 52, wherein the first block of data comprises a block of an original signal. 77. The device of claim 52, wherein the first block comprises a block of a residual signal, and
wherein the first block comprises at least one of a group consisting of: a predictive block and a residual block. 78. A device for decoding video data, the device comprising:
a memory configured to store video data; and at least one processor configured to: receive syntax data associated with a coded unit in a bitstream, the syntax data indicative of one of a plurality of inverse color transforms: select an inverse color transform of the plurality of inverse color transforms based on the received syntax data; inversely transform a first block of video data having a first color space to a second block of video having a second, red, green, blue (RGB) color space using the selected inverse color transform of the plurality of inverse color transforms; and decode the second video block having the second, RGB color space. 79. The device of claim 78, wherein the device comprises at least one of:
an integrated circuit; a microprocessor; and a wireless communication device. 80. The device of claim 78, wherein the plurality of inverse color transforms comprises a plurality of inverse color transforms of a group consisting of: an identity transform, an inverse differential transform, an inverse weighted differential transform, an inverse discrete cosine transform (DCT), an inverse YCbCr transform, an inverse YCgCo transform, and an inverse YCgCo—R transform. 81. The device of claim 80, wherein the identity transform comprises:
[
1
0
0
0
1
0
0
0
1
]
. 82. The device of claim 80, wherein the inverse differential transform comprises:
[
1
0
1
1
0
0
1
1
0
]
. 83. The device of claim 80, wherein the inverse DCT transform comprises:
[
0.5774
0.7071
0.4082
0.5774
0
-
0.8156
0.5774
-
0.7071
0.4082
]
. 84. The device of claim 80, wherein the inverse YCbCr transform comprises:
[
1
0
1.5397
1
-
0.1831
-
0.4577
1
1.8142
0
]
. 85. The device of claim 80, wherein the inverse YCgCo transform comprises:
[
1
1
-
1
1
0
1
1
-
1
-
1
]
. 86. The device of claim 80, wherein the selected inverse color transform comprises a YCgCo—R transform comprising:
t=Y−└Cg/2┘
G=Cg+t
B=t−└Co/2┘
R=B+Co. 87. The device of claim 78, wherein the selected inverse color transform is derived using a lifting scheme corresponding to:
R′=R+└aB┘ B′=B+└bR′┘ G′=G+└cB′┘ R″=R′+└dG′┘,
wherein a, b, c, and d are parameters. 88. The device of claim 87, wherein the lifting scheme further comprises:
R′″=└eR″+f┘ B″=└gB′+h┘, G″=└iG′+j┘
wherein e, f, g, h, i, and j are parameters. 89. The device of claim 87, wherein the at least one processor is further configured to normalize a bit depth of each color channel of the lifting scheme. 90. The device of claim 78, wherein the selected inverse color transform comprises a weighted differential transform comprising:
[
α
2
0
1
1
0
0
α
1
1
0
]
,
wherein α1=cov(G, B)/var(G),
wherein α2=cov(G, R)/var(G),
wherein R corresponds to a red color channel of the RGB color space,
wherein G corresponds to a green color channel of the RGB space,
wherein B corresponds to a blue color channel of the RGB color space,
wherein cov( ) is the covariance function, and
wherein var( ) is the variance function. 91. The device of claim 90, wherein the covariance function and the variance functions are calculated using a set of reference pixels. 92. The device of claim 90, further comprising decoding values of α1 and α2. 93. The device of claim 90, wherein the values of α1 and α2 are constrained to a set values comprising at least one of a group consisting of:
a set of integers, a set of dyadic numbers, and a set of fractions with a dyadic number. 94. The device of claim 78, wherein the at least one processor is further configured to:
decode data that indicates the selected inverse color transform of the plurality of color inverse transforms to apply to the first video block having the first color space. 95. The device of claim 78, wherein the at least one processor is further configured to:
decode a value of a flag syntax element for the coded unit; and determine whether to apply a single inverse transform of the plurality of inverse color transforms to the first block based on the value of the flag syntax element, wherein a first value of the flag indicates to apply the single inverse transform; and wherein a second value of the flag indicates not to apply the single inverse transform. 96. The device of claim 78, wherein the first block of video data comprises at least one of a group consisting of:
a coding tree unit (CTU), coding unit (CU), prediction unit (PU), and a transform unit (TU). 97. The device of claim 78, wherein the first block comprises a plurality of blocks, wherein the at least one processor is further configured to:
determine whether to apply a pre-defined inverse color transform of the plurality of inverse color transforms to each one of the plurality of blocks; and responsive to determining to apply the pre-defined inverse color transform to each one of the plurality of blocks, inversely transform each of the plurality of blocks using the pre-defined color transform without decoding data indicating that the pre-defined color transform has been applied to each one of the plurality blocks of video data. 98. The device of claim 78, wherein the at least one processor is further configured to: decode an index syntax element that indicates the selected inverse color transform,
wherein the selected inverse color transform of the plurality of color transforms comprises the inverse color transform of the plurality of color transforms that minimizes a Lagrangian cost corresponding to: L=D+λR, wherein L is the Lagrange cost, D is a distortion value, λ is a Lagrange multiplier, and R is a bitrate value. 99. The device of claim 78, wherein the at least one processor is further configured to:
decode an index syntax element that indicates the selected inverse color transform, wherein the selected inverse color transform is the inverse color transform of the plurality of color transforms that has a lowest associated distortion cost. 100. The device of claim 78,
wherein the selected inverse color transform is an inverse color transform of the plurality of color transforms that is associated with a color space having a highest associated correlation between color components of the RGB color space and each of a plurality of color components associated with each of the plurality of color transforms. 101. The device of claim 100, wherein the received syntax data comprises syntax data of reconstructed neighboring blocks relative to at least one of the first block and the second block,
wherein the at least one processor is further configured to: determining the highest associated correlation based on the syntax data of the reconstructed neighboring blocks. 102. The device of claim 100, wherein the at least one processor is further configured to: decode an index syntax element that indicates the selected inverse color transform that has the highest associated correlation. 103. The device of claim 78, wherein the first block of data comprises a block of a reconstructed signal. 104. The device of claim 78, wherein the first block of video data comprises a block of a reconstructed residual signal,
wherein the first block comprises at least one of a group consisting of: a predictive block and a residual block. 105. A device for decoding video, the device comprising:
means for receiving syntax data associated with a coded unit in a bitstream, the syntax data indicative of one of a plurality of inverse color transforms; means for selecting an inverse color transform of the plurality of inverse color transforms based on the received syntax data; means for inversely transforming a first block of video data having a first color space to a second block of video having a second, red, green, blue (RGB) color space using the selected inverse color transform of the plurality of inverse color transforms; and means for decoding the second video block having the second, RGB color space. 106. A non-transitory computer-readable storage medium having instructions stored thereon that, when executed, cause at least one processor to:
receive syntax data associated with a coded unit in a bitstream, the syntax data indicative of one of a plurality of inverse color transforms; select an inverse color transform of the plurality of inverse color transforms based on the received syntax data; inversely transforming a first block of video data having a first color space to a second block of video having a second, red, green, blue (RGB) color space using the selected inverse color transform of the plurality of inverse color transforms; and decode the second video block having the second, RGB color space. | A device for coding video data includes a memory and at least one processor configured to determine a cost associated with a plurality of color transforms associated with a coding unit, determine a cost associated with a plurality of color transforms associated with a coding unit, select a color transform of the plurality of color transforms having a lowest associated cost, transform a first block of video data having a first, Red, Green, Blue (RGB) color space to produce a second block of video data having a second color space using the selected color transform of the plurality of color transforms, and encode the second video block having the second color space.1. A method of encoding video data, the method comprising:
determining a cost associated with a plurality of color transforms associated with a coding unit; selecting a color transform of the plurality of color transforms having a lowest associated cost; transforming a first block of video data having a first, Red, Green, Blue (RGB) color space to produce a second block of video data having a second color space using the selected color transform of the plurality of color transforms; and encoding the second video block having the second color space. 2. The method of claim 1, wherein the plurality of color transforms comprise a plurality of transforms of a group consisting of: an identity transform, a differential transform, a weighted differential transform, a discrete cosine transform (DCT), a YCbCr transform, a YCgCo transform, and a YCgCo—R transform. 3. The method of claim 2, wherein the identity transform comprises:
[
1
0
0
0
1
0
0
0
1
]
. 4. The method of claim 2, wherein the differential transform comprises:
[
0
1
0
0
-
1
1
1
-
1
0
]
. 5. The method of claim 2, wherein the DCT transform comprises:
[
0.5774
0.5774
0.5774
0.7071
0
-
0.7071
0.4082
-
0.8156
0.4082
]
. 6. The method of claim 2, wherein the YCbCr transform comprises:
[
0.2126
0.7152
0.0722
-
0.1172
-
0.3942
0.5114
0.5114
-
0.4645
-
0.0469
]
. 7. The method of claim 2, wherein the YCgCo transform comprises:
[
1
/
4
1
/
2
1
/
4
1
/
2
0
-
1
/
2
-
1
/
4
1
/
2
-
1
/
4
]
. 8. The method of claim 1, wherein the selected color transform comprises a YCgCo—R transform comprising:
Co=R−B
t=B+└Co/2┘
Cg=G−t
Y=t+└C/2┘. 9. The method of claim 1, wherein the selected color transform is derived using a lifting scheme corresponding to:
R′=R+└aB┘ B′=B+└bR′┘ G′=G+└cB′┘ R″=R′+└dG′┘,
wherein a, b, c, and d are parameters. 10. The method of claim 9, wherein the lifting scheme further comprises:
R′″=└eR″+f┘ B″=└gB′+h┘ G″=└iG′+j┘
wherein e, f, g, h, i, and j are parameters. 11. The method of claim 9, further comprising:
normalizing a bit depth of each color channel of the lifting scheme. 12. The method of claim 1, wherein the selected color transform comprises a weighted differential transform comprising:
[
0
1
0
0
-
α
1
1
1
-
α
2
0
]
,
wherein α1=cov(G, B)/var(G),
wherein α2=cov(G, R)/var(G),
wherein R corresponds to a red color channel of the RGB color space,
wherein G corresponds to a green color channel of the RGB color space,
wherein B corresponds to a blue color channel of the RGB color space,
wherein cov( ) is the covariance function, and
wherein var( ) is the variance function. 13. The method of claim 12, wherein the covariance function and the variance functions are calculated using a set of reference pixels. 14. The method of claim 12, further comprising encoding values of α1 and α2. 15. The method of claim 12, wherein the values of α1 and α2 are constrained to a set of values comprising at least one of a group consisting of:
a set of integers, a set of dyadic numbers, and a set of fractions with a dyadic number. 16. The method of claim 1, further comprising:
signaling data that indicates the selected, second color transform of the plurality of color transforms has been applied to the second video block having the second color space. 17. The method of claim 1, the method further comprising:
determining whether to apply a single transform of the plurality of color transforms to the first block; responsive to determining to apply the single transform to the plurality of blocks, signaling, for the coded unit, a flag syntax element, wherein a first value of the flag indicates that the single transform has been applied, and wherein a second value of the flag indicates that the single transform has not been applied. 18. The method of claim 1, wherein the first block comprises at least one of a group consisting of:
a coding tree unit (CTU), coding unit (CU), prediction unit (PU), and a transform unit (TU). 19. The method of claim 1, wherein the first block comprises a plurality of blocks, the method further comprising:
determining whether to apply a pre-defined color transform of the plurality of color transforms to each one of the plurality of blocks; and responsive to determining to apply the pre-defined color transform to each one of the plurality of blocks, transforming each of the plurality of blocks using the pre-defined color transform without signaling data indicating that the pre-defined color transform has been applied to each one of the plurality blocks of video data. 20. The method of claim 1, wherein the selected color transform of the plurality of color transforms comprises the color transform of the plurality of color transforms that minimizes a Lagrangian cost corresponding to: L=D+λR,
wherein L is the Lagrange cost, D is a distortion value, λ is a Lagrange multiplier, and R is a bitrate value; and
encoding an index syntax element that indicates the selected color transform. 21. The method of claim 1, wherein the selected color transform is a color transform of the plurality of color transforms that has a lowest associated distortion cost, the method further comprising:
encoding an index syntax element that indicates the selected color transform. 22. The method of claim 1, the method further comprising:
determining a correlation between color components of the RGB color space of the first video block and each color space associated with each of the plurality of color transforms; and signaling an index syntax element that indicates the selected color transform, wherein the selected is a color transform of the plurality of color transforms that is associated with the color space having a highest associated correlation between the color components. 23. The method of claim 22, further comprising: determining the highest associated correlation based on reconstructed neighboring blocks relative to at least one of the first block and the second block. 24. The method of claim 1, wherein the first block of data comprises a block of an original signal. 25. The method of claim 1, wherein the first block comprises a block of a residual signal, and
wherein the first block comprises at least one of a group consisting of: a predictive block and a residual block. 26. A method of decoding video data, the method comprising:
receiving syntax data associated with a coded unit in a bitstream, the syntax data indicative of one of a plurality of inverse color transforms; selecting an inverse color transform of the plurality of inverse color transforms based on the received syntax data; inversely transforming a first block of video data having a first color space to a second block of video having a second, red, green, blue (RGB) color space using the selected inverse color transform of the plurality of inverse color transforms; and decoding the second video block having the second, RGB color space. 27. The method of claim 26, wherein the plurality of inverse color transforms comprises a plurality of inverse color transforms of a group consisting of: an identity transform, an inverse differential transform, an inverse weighted differential transform, an inverse discrete cosine transform (DCT), an inverse YCbCr transform, an inverse YCgCo transform, and an inverse YCgCo—R transform. 28. The method of claim 27, wherein the identity transform comprises:
[
1
0
0
0
1
0
0
0
1
]
. 29. The method of claim 27, wherein the inverse differential transform comprises:
[
1
0
1
1
0
0
1
1
0
]
. 30. The method of claim 27, wherein the inverse DCT transform comp rises:
[
0.5774
0.7071
0.4082
0.5774
0
-
0.8156
0.5774
-
0.7071
0.4082
]
. 31. The method of claim 27, wherein the inverse YCbCr transform comprises:
[
1
0
1.5397
1
-
0.1831
-
0.4577
1
1.8142
0
]
. 32. The method of claim 27, wherein the inverse YCgCo transform comprises:
[
1
1
-
1
1
0
1
1
-
1
-
1
]
. 33. The method of claim 26, wherein the selected inverse color transform comprises a YCgCo—R transform comprising:
t=Y−└Cg/2┘
G=Cg+t
B=t−└Co/2┘
R=B+Co. 34. The method of claim 26, wherein the selected inverse color transform is derived using a lifting scheme corresponding to:
R′=R+└aB┘ B′=B+└bR′┘ G′=G+└cB′┘ R″=R′+└dG′┘,
wherein a, b, c, and d are parameters. 35. The method of claim 34, wherein the lifting scheme further comprises:
R′″=└eR″+f┘ B″=└gB′+h┘, G″=└iG′+i┘
wherein e, f, g, h, i, and j are parameters. 36. The method of claim 34, further comprising normalizing a bit depth of each color channel of the lifting scheme. 37. The method of claim 26, wherein the selected inverse color transform comprises a weighted differential transform comprising:
[
α
2
0
1
1
0
0
α
1
1
0
]
,
wherein α1=cov(G, B)/var(G),
wherein α2=cov(G, R)/var(G),
wherein R corresponds to a red color channel of the RGB color space,
wherein G corresponds to a green color channel of the RGB space,
wherein B corresponds to a blue color channel of the RGB color space,
wherein cov( ) is the covariance function, and
wherein var( ) is the variance function. 38. The method of claim 37, wherein the covariance function and the variance functions are calculated using a set of reference pixels. 39. The method of claim 37, further comprising decoding values of α1 and α2. 40. The method of claim 37, wherein the values of α1 and α2 are constrained to a set values comprising at least one of a group consisting of:
a set of integers, a set of dyadic numbers, and a set of fractions with a dyadic number. 41. The method of claim 26, further comprising:
decoding data that indicates the selected inverse color transform of the plurality of color inverse transforms to apply to the first video block having the first color space. 42. The method of claim 26, the method further comprising:
decoding a value of a flag syntax element for the coded unit; and determining whether to apply a single inverse transform of the plurality of inverse color transforms to the first block based on the value of the flag syntax element, wherein a first value of the flag indicates to apply the single inverse transform; and wherein a second value of the flag indicates not to apply the single inverse transform. 43. The method of claim 26, wherein the first block of video data comprises at least one of a group consisting of:
a coding tree unit (CTU), coding unit (CU), prediction unit (PU), and a transform unit (TU). 44. The method of claim 26, wherein the first block comprises a plurality of blocks, the method further comprising:
determining whether to apply a pre-defined inverse color transform of the plurality of inverse color transforms to each one of the plurality of blocks; and responsive to determining to apply the pre-defined inverse color transform to each one of the plurality of blocks, inversely transforming each of the plurality of blocks using the pre-defined color transform without decoding data indicating that the pre-defined color transform has been applied to each one of the plurality blocks of video data. 45. The method of claim 26, further comprising: decoding an index syntax element that indicates the selected inverse color transform,
wherein the selected inverse color transform of the plurality of color transforms comprises the inverse color transform of the plurality of color transforms that minimizes a Lagrangian cost corresponding to: L=D+λR, wherein L is the Lagrange cost, D is a distortion value, λ is a Lagrange multiplier, and R is a bitrate value. 46. The method of claim 26, further comprising:
decoding an index syntax element that indicates the selected inverse color transform, wherein the selected inverse color transform is the inverse color transform of the plurality of color transforms that has a lowest associated distortion cost. 47. The method of claim 26,
wherein the selected inverse color transform is an inverse color transform of the plurality of color transforms that is associated with a color space having a highest associated correlation between color components of the RGB color space and each of a plurality of color components associated with each of the plurality of color transforms. 48. The method of claim 46, wherein the received syntax data comprises syntax data of reconstructed neighboring blocks relative to at least one of the first block and the second block,
the method further comprising: determining the highest associated correlation based on the syntax data of the reconstructed neighboring blocks. 49. The method of claim 46, further comprising decoding an index syntax element that indicates the selected inverse color transform that has the highest associated correlation. 50. The method of claim 26, wherein the first block of data comprises a block of a reconstructed signal. 51. The method of claim 26, wherein the first block of video data comprises a block of a reconstructed residual signal,
wherein the first block comprises at least one of a group consisting of: a predictive block and a residual block. 52. A device for encoding video data, the device comprising:
a memory configured to store video data; and at least one processor configured to: determine a cost associated with a plurality of color transforms associated with a coding unit; select a color transform of the plurality of color transforms having a lowest associated cost; transform a first block of video data having a first, Red, Green, Blue (RGB) color space to produce a second block of video data having a second color space using the selected color transform of the plurality of color transforms; and encode the second video block having the second color space. 53. The device of claim 52, wherein the device comprises at least one of:
an integrated circuit; a microprocessor; and a wireless communication device. 54. The device of claim 52, wherein the plurality of color transforms comprises a plurality of a group consisting of: an identity transform, a differential transform, a weighted differential transform, a discrete cosine transform (DCT), a YCbCr transform, a YCgCo transform, and a YCgCo—R transform. 55. The device of claim 52, wherein the identity transform comprises:
[
1
0
0
0
1
0
0
0
1
]
. 56. The device of claim 52, wherein the differential transform comprises:
[
0
1
0
0
-
1
1
1
-
1
0
]
. 57. The device of claim 52, wherein the DCT transform comprises:
[
0.5774
0.5774
0.5774
0.7071
0
-
0.7071
0.4082
-
0.8156
0.4082
]
. 58. The device of claim 52, wherein the YCbCr transform comprises:
[
0.2126
0.7152
0.0722
-
0.1172
-
0.3942
0.5114
0.5114
-
0.4645
-
0.0469
]
. 59. The device of claim 52, wherein the YCgCo transform comprises:
[
1
/
4
1
/
2
1
/
4
1
/
2
0
-
1
/
2
-
1
/
4
1
/
2
-
1
/
4
]
. 60. The device of claim 52, wherein the selected color transform comprises a YCgCo—R transform comprising:
Co=R−B
t=B+└Co/2┘
Cg=G−t
Y=t+└C/2┘. 61. The device of claim 52, wherein the selected color transform is derived using a lifting scheme corresponding to:
R′=R+└aB┘ B′=B+└bR′┘ G′=G+└cB′┘ R″=R′+└dG′┘,
wherein a, b, c, and d are parameters. 62. The device of claim 61, wherein the lifting scheme further comprises:
R′″=└eR″+f┘ B″=└B′+h┘ G″=└iG′+j┘
wherein e, f, g, h, i, and j are parameters. 63. The device of claim 61, wherein the at least one processor is further configured to:
normalize a bit depth of each color channel of the lifting scheme. 64. The device of claim 52, wherein the selected color transform comprises a weighted differential transform comprising:
[
0
1
0
0
-
α
1
1
1
-
α
2
0
]
,
wherein α1=cov(G, B)/var(G),
wherein α2=cov(G, R)/var(G),
wherein R corresponds to a red color channel of the RGB color space,
wherein G corresponds to a green color channel of the RGB color space,
wherein B corresponds to a blue color channel of the RGB color space,
wherein cov( ) is the covariance function, and
wherein var( ) is the variance function. 65. The device of claim 64, wherein the covariance function and the variance functions are calculated using a set of reference pixels. 66. The device of claim 64, further comprising encoding values of α1 and α2. 67. The device of claim 64, wherein the values of α1 and α2 are constrained to a set of values comprising at least one of a group consisting of:
a set of integers, a set of dyadic numbers, and a set of fractions with a dyadic number. 68. The device of claim 52, wherein the at least one processor is further configured to:
signal data that indicates the selected, second color transform of the plurality of color transforms has been applied to the second video block having the second color space. 69. The device of claim 52, wherein the at least one processor is further configured to:
determine whether to apply a single transform of the plurality of color transforms to the first block; responsive to determining to apply the single transform to the plurality of blocks, signal, for the coded unit, a flag syntax element, wherein a first value of the flag indicates that the single transform has been applied, and wherein a second value of the flag indicates that the single transform has not been applied. 70. The device of claim 52, wherein the first block comprises at least one of a group consisting of:
a coding tree unit (CTU), coding unit (CU), prediction unit (PU), and a transform unit (TU). 71. The device of claim 52, wherein the first block comprises a plurality of blocks, wherein the at least one processor is further configured to:
determine whether to apply a pre-defined color transform of the plurality of color transforms to each one of the plurality of blocks; and responsive to determining to apply the pre-defined color transform to each one of the plurality of blocks, transform each of the plurality of blocks using the pre-defined color transform without signaling data indicating that the pre-defined color transform has been applied to each one of the plurality blocks of video data. 72. The device of claim 52, wherein the selected color transform of the plurality of color transforms comprises the color transform of the plurality of color transforms that minimizes a Lagrangian cost corresponding to: L=D+λR,
wherein L is the Lagrange cost, D is a distortion value, λ is a Lagrange multiplier, and R is a bitrate value; and
encode an index syntax element that indicates the selected color transform. 73. The device of claim 52, wherein the selected color transform is a color transform of the plurality of color transforms that has a lowest associated distortion cost, wherein the at least one processor is further configured to:
encode an index syntax element that indicates the selected color transform. 74. The device of claim 52, wherein the at least one processor is further configured to:
determine a correlation between color components of the RGB color space of the first video block and each color space associated with each of the plurality of color transforms; and signal an index syntax element that indicates the selected color transform, wherein the selected is a color transform of the plurality of color transforms that is associated with the color space having a highest associated correlation between the color components. 75. The device of claim 74, wherein the at least one processor is further configured to:
determine the highest associated correlation based on reconstructed neighboring blocks relative to at least one of the first block and the second block. 76. The device of claim 52, wherein the first block of data comprises a block of an original signal. 77. The device of claim 52, wherein the first block comprises a block of a residual signal, and
wherein the first block comprises at least one of a group consisting of: a predictive block and a residual block. 78. A device for decoding video data, the device comprising:
a memory configured to store video data; and at least one processor configured to: receive syntax data associated with a coded unit in a bitstream, the syntax data indicative of one of a plurality of inverse color transforms: select an inverse color transform of the plurality of inverse color transforms based on the received syntax data; inversely transform a first block of video data having a first color space to a second block of video having a second, red, green, blue (RGB) color space using the selected inverse color transform of the plurality of inverse color transforms; and decode the second video block having the second, RGB color space. 79. The device of claim 78, wherein the device comprises at least one of:
an integrated circuit; a microprocessor; and a wireless communication device. 80. The device of claim 78, wherein the plurality of inverse color transforms comprises a plurality of inverse color transforms of a group consisting of: an identity transform, an inverse differential transform, an inverse weighted differential transform, an inverse discrete cosine transform (DCT), an inverse YCbCr transform, an inverse YCgCo transform, and an inverse YCgCo—R transform. 81. The device of claim 80, wherein the identity transform comprises:
[
1
0
0
0
1
0
0
0
1
]
. 82. The device of claim 80, wherein the inverse differential transform comprises:
[
1
0
1
1
0
0
1
1
0
]
. 83. The device of claim 80, wherein the inverse DCT transform comprises:
[
0.5774
0.7071
0.4082
0.5774
0
-
0.8156
0.5774
-
0.7071
0.4082
]
. 84. The device of claim 80, wherein the inverse YCbCr transform comprises:
[
1
0
1.5397
1
-
0.1831
-
0.4577
1
1.8142
0
]
. 85. The device of claim 80, wherein the inverse YCgCo transform comprises:
[
1
1
-
1
1
0
1
1
-
1
-
1
]
. 86. The device of claim 80, wherein the selected inverse color transform comprises a YCgCo—R transform comprising:
t=Y−└Cg/2┘
G=Cg+t
B=t−└Co/2┘
R=B+Co. 87. The device of claim 78, wherein the selected inverse color transform is derived using a lifting scheme corresponding to:
R′=R+└aB┘ B′=B+└bR′┘ G′=G+└cB′┘ R″=R′+└dG′┘,
wherein a, b, c, and d are parameters. 88. The device of claim 87, wherein the lifting scheme further comprises:
R′″=└eR″+f┘ B″=└gB′+h┘, G″=└iG′+j┘
wherein e, f, g, h, i, and j are parameters. 89. The device of claim 87, wherein the at least one processor is further configured to normalize a bit depth of each color channel of the lifting scheme. 90. The device of claim 78, wherein the selected inverse color transform comprises a weighted differential transform comprising:
[
α
2
0
1
1
0
0
α
1
1
0
]
,
wherein α1=cov(G, B)/var(G),
wherein α2=cov(G, R)/var(G),
wherein R corresponds to a red color channel of the RGB color space,
wherein G corresponds to a green color channel of the RGB space,
wherein B corresponds to a blue color channel of the RGB color space,
wherein cov( ) is the covariance function, and
wherein var( ) is the variance function. 91. The device of claim 90, wherein the covariance function and the variance functions are calculated using a set of reference pixels. 92. The device of claim 90, further comprising decoding values of α1 and α2. 93. The device of claim 90, wherein the values of α1 and α2 are constrained to a set values comprising at least one of a group consisting of:
a set of integers, a set of dyadic numbers, and a set of fractions with a dyadic number. 94. The device of claim 78, wherein the at least one processor is further configured to:
decode data that indicates the selected inverse color transform of the plurality of color inverse transforms to apply to the first video block having the first color space. 95. The device of claim 78, wherein the at least one processor is further configured to:
decode a value of a flag syntax element for the coded unit; and determine whether to apply a single inverse transform of the plurality of inverse color transforms to the first block based on the value of the flag syntax element, wherein a first value of the flag indicates to apply the single inverse transform; and wherein a second value of the flag indicates not to apply the single inverse transform. 96. The device of claim 78, wherein the first block of video data comprises at least one of a group consisting of:
a coding tree unit (CTU), coding unit (CU), prediction unit (PU), and a transform unit (TU). 97. The device of claim 78, wherein the first block comprises a plurality of blocks, wherein the at least one processor is further configured to:
determine whether to apply a pre-defined inverse color transform of the plurality of inverse color transforms to each one of the plurality of blocks; and responsive to determining to apply the pre-defined inverse color transform to each one of the plurality of blocks, inversely transform each of the plurality of blocks using the pre-defined color transform without decoding data indicating that the pre-defined color transform has been applied to each one of the plurality blocks of video data. 98. The device of claim 78, wherein the at least one processor is further configured to: decode an index syntax element that indicates the selected inverse color transform,
wherein the selected inverse color transform of the plurality of color transforms comprises the inverse color transform of the plurality of color transforms that minimizes a Lagrangian cost corresponding to: L=D+λR, wherein L is the Lagrange cost, D is a distortion value, λ is a Lagrange multiplier, and R is a bitrate value. 99. The device of claim 78, wherein the at least one processor is further configured to:
decode an index syntax element that indicates the selected inverse color transform, wherein the selected inverse color transform is the inverse color transform of the plurality of color transforms that has a lowest associated distortion cost. 100. The device of claim 78,
wherein the selected inverse color transform is an inverse color transform of the plurality of color transforms that is associated with a color space having a highest associated correlation between color components of the RGB color space and each of a plurality of color components associated with each of the plurality of color transforms. 101. The device of claim 100, wherein the received syntax data comprises syntax data of reconstructed neighboring blocks relative to at least one of the first block and the second block,
wherein the at least one processor is further configured to: determining the highest associated correlation based on the syntax data of the reconstructed neighboring blocks. 102. The device of claim 100, wherein the at least one processor is further configured to: decode an index syntax element that indicates the selected inverse color transform that has the highest associated correlation. 103. The device of claim 78, wherein the first block of data comprises a block of a reconstructed signal. 104. The device of claim 78, wherein the first block of video data comprises a block of a reconstructed residual signal,
wherein the first block comprises at least one of a group consisting of: a predictive block and a residual block. 105. A device for decoding video, the device comprising:
means for receiving syntax data associated with a coded unit in a bitstream, the syntax data indicative of one of a plurality of inverse color transforms; means for selecting an inverse color transform of the plurality of inverse color transforms based on the received syntax data; means for inversely transforming a first block of video data having a first color space to a second block of video having a second, red, green, blue (RGB) color space using the selected inverse color transform of the plurality of inverse color transforms; and means for decoding the second video block having the second, RGB color space. 106. A non-transitory computer-readable storage medium having instructions stored thereon that, when executed, cause at least one processor to:
receive syntax data associated with a coded unit in a bitstream, the syntax data indicative of one of a plurality of inverse color transforms; select an inverse color transform of the plurality of inverse color transforms based on the received syntax data; inversely transforming a first block of video data having a first color space to a second block of video having a second, red, green, blue (RGB) color space using the selected inverse color transform of the plurality of inverse color transforms; and decode the second video block having the second, RGB color space. | 2,400 |
8,961 | 8,961 | 14,958,130 | 2,483 | Certain configurations are described herein of a fluid handling apparatus that comprises a projector configured to provide an image of labware onto a support. The provided image can be used to assist a user in proper placement of the labware onto the support. The system can be configured to determine if the labware has been properly placed prior to beginning any fluid handling operations. | 1. A fluid handling system comprising:
a support configured to receive at least one labware components at a labware site on the support; and a projector configured to provide an image of the at least one labware component onto the support to assist in placing the at least one labware component at the labware site. 2. The fluid handling system of claim 1, in which the projector is positioned above the support. 3. The fluid handling system of claim 1, in which the projector is configured to provide a second image of a second labware component onto the support. 4. The fluid handling system of claim 1, in which the projector is positioned below the support. 5. The fluid handling system of claim 1, in which the projector is configured to project the image that is less than the entire labware component. 6. The fluid handling system of claim 1, in which the support is configured to receive a microwell plate comprising a plurality of individual wells and in which the projector is configured to project an image of the microwell plate that is less than an entire image of the microwell plate. 7. The fluid handling system of claim 1, in which the support is configured to receive a microwell plate comprising a plurality of individual wells and in which the projector is configured to project an image of the microwell plate that is an entire image of the microwell plate. 8. The fluid handling system of claim 1, in which the projector is configured to project the image using visible light. 9. The fluid handling system of claim 1, in which the projector is configured to project the image using non-visible light. 10. The fluid handling system of claim 1, in which the projector comprises a DLP chip and a light source. 11. The fluid handling system of claim 1, in which the projector comprises a liquid crystal panel and a light source. 12. The fluid handling system of claim 1, in which the fluid handling system comprises a common light source that is used as a light source of the projector and as a light source of a detector of the fluid handling system. 13. The fluid handling system of claim 12, in which the light source comprises a lamp, a light emitting diode, a laser, or a device that emits light. 14. The fluid handling system of claim 1, in which the projector is further configured to project user instructions. 15. The fluid handling system of claim 1, further comprising at least one camera. 16. The fluid handling system of claim 15, further comprising a processor configured to determine if the labware component is properly placed on the support from one or more pixels received by the camera. 17. The fluid handling system of claim 1, in which the image of the labware component provided by the projector is at least 5% smaller than the labware component. 18. The fluid handling system of claim 1, in which the support comprises a reflective material. 19. The fluid handling system of claim 1, in which the support comprises a material effective to diffuse light received from the projector. 20. The fluid handling system of claim 1, further comprising a second projector configured to provide an image different from the image of the labware component. 21-121. (canceled) | Certain configurations are described herein of a fluid handling apparatus that comprises a projector configured to provide an image of labware onto a support. The provided image can be used to assist a user in proper placement of the labware onto the support. The system can be configured to determine if the labware has been properly placed prior to beginning any fluid handling operations.1. A fluid handling system comprising:
a support configured to receive at least one labware components at a labware site on the support; and a projector configured to provide an image of the at least one labware component onto the support to assist in placing the at least one labware component at the labware site. 2. The fluid handling system of claim 1, in which the projector is positioned above the support. 3. The fluid handling system of claim 1, in which the projector is configured to provide a second image of a second labware component onto the support. 4. The fluid handling system of claim 1, in which the projector is positioned below the support. 5. The fluid handling system of claim 1, in which the projector is configured to project the image that is less than the entire labware component. 6. The fluid handling system of claim 1, in which the support is configured to receive a microwell plate comprising a plurality of individual wells and in which the projector is configured to project an image of the microwell plate that is less than an entire image of the microwell plate. 7. The fluid handling system of claim 1, in which the support is configured to receive a microwell plate comprising a plurality of individual wells and in which the projector is configured to project an image of the microwell plate that is an entire image of the microwell plate. 8. The fluid handling system of claim 1, in which the projector is configured to project the image using visible light. 9. The fluid handling system of claim 1, in which the projector is configured to project the image using non-visible light. 10. The fluid handling system of claim 1, in which the projector comprises a DLP chip and a light source. 11. The fluid handling system of claim 1, in which the projector comprises a liquid crystal panel and a light source. 12. The fluid handling system of claim 1, in which the fluid handling system comprises a common light source that is used as a light source of the projector and as a light source of a detector of the fluid handling system. 13. The fluid handling system of claim 12, in which the light source comprises a lamp, a light emitting diode, a laser, or a device that emits light. 14. The fluid handling system of claim 1, in which the projector is further configured to project user instructions. 15. The fluid handling system of claim 1, further comprising at least one camera. 16. The fluid handling system of claim 15, further comprising a processor configured to determine if the labware component is properly placed on the support from one or more pixels received by the camera. 17. The fluid handling system of claim 1, in which the image of the labware component provided by the projector is at least 5% smaller than the labware component. 18. The fluid handling system of claim 1, in which the support comprises a reflective material. 19. The fluid handling system of claim 1, in which the support comprises a material effective to diffuse light received from the projector. 20. The fluid handling system of claim 1, further comprising a second projector configured to provide an image different from the image of the labware component. 21-121. (canceled) | 2,400 |
8,962 | 8,962 | 15,089,169 | 2,495 | Systems, apparatuses and methods may provide for detecting an identifier communication from a writing implement and transitioning a previously modified interior page of an electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to one or more stored identifiers. Moreover, a plurality of additional interior pages of the electronic notepad may be maintained in the locked state while the previously modified interior page is in the unlocked state. | 1. A system comprising:
a writing implement; a display to present an electronic notepad; a memory subsystem to store one or more identifiers; and a notepad management apparatus comprising,
an implement monitor to detect an identifier communication originating from the writing implement;
a current page access controller to transition a previously modified interior page of the electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to the stored one or more identifiers; and
a security manager to maintain a plurality of additional interior pages of the electronic notepad in the locked state while the previously modified interior page is in the unlocked state. 2. The system of claim 1, wherein the memory is to store one or more writing patterns and the notepad access subsystem further includes:
a handwriting monitor to detect writing activity with respect to the writing implement and the previously modified interior page, wherein the plurality of additional interior pages include one or more private pages and one or more non-private pages; a non-private access controller to transition the one or more non-private pages from the locked state to the unlocked state if the writing activity corresponds to the stored one or more writing patterns, wherein the security manager is to maintain the one or more private pages in the locked state while the one or more non-private pages are in the unlocked state. 3. The system of claim 2, wherein the security manager is to maintain the one or more non-private pages in the locked state if the writing activity does not correspond to at least one of the one or more stored writing patterns. 4. The system of claim 2, wherein the memory subsystem is to store login information and the notepad access subsystem further includes:
an authentication monitor to detect a login request; and a private access controller to transition the one or more private pages from the locked state to the unlocked state if the login request corresponds to the stored login information. 5. The system of claim 4, wherein the security manager is to maintain the one or more private pages in the locked state if the login request does not correspond to the stored login information. 6. The system of claim 1, wherein the security manager is to maintain the previously modified interior page in the locked state if the identifier communication does not correspond to at least one of the one or more stored identifiers. 7. An apparatus comprising:
an implement monitor to detect an identifier communication originating from a writing implement; a current page access controller to transition a previously modified interior page of an electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to one or more stored identifiers; and a security manager to maintain a plurality of additional interior pages of the electronic notepad in the locked state while the previously modified interior page is in the unlocked state. 8. The apparatus of claim 7, further including:
a handwriting monitor to detect writing activity with respect to the writing implement and the previously modified interior page, wherein the plurality of additional interior pages include one or more private pages and one or more non-private pages; a non-private access controller to transition the one or more non-private pages from the locked state to the unlocked state if the writing activity corresponds to one or more stored writing patterns, wherein the security manager is to maintain the one or more private pages in the locked state while the one or more non-private pages are in the unlocked state. 9. The apparatus of claim 8, wherein the security manager is to maintain the one or more non-private pages in the locked state if the writing activity does not correspond to at least one of the one or more stored writing patterns. 10. The apparatus of claim 8, further including:
an authentication monitor to detect a login request; and a private access controller to transition the one or more private pages from the locked state to the unlocked state if the login request corresponds to stored login information. 11. The apparatus of claim 10, wherein the security manager is to maintain the one or more private pages in the locked state if the login request does not correspond to the stored login information. 12. The apparatus of claim 7, wherein the security manager is to maintain the previously modified interior page in the locked state if the identifier communication does not correspond to at least one of the one or more stored identifiers. 13. A method comprising:
detecting an identifier communication originating from a writing implement; transitioning a previously modified interior page of an electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to one or more stored identifiers; and maintaining a plurality of additional interior pages of the electronic notepad in the locked state while the previously modified interior page is in the unlocked state. 14. The method of claim 13, further including:
detecting writing activity with respect to the writing implement and the previously modified interior page, wherein the plurality of additional interior pages include one or more private pages and one or more non-private pages; transitioning the one or more non-private pages from the locked state to the unlocked state if the writing activity corresponds to one or more stored writing patterns; and maintaining the one or more private pages in the locked state while the one or more non-private pages are in the unlocked state. 15. The method of claim 14, further including maintaining the one or more non-private pages in the locked state if the writing activity does not correspond to at least one of the one or more stored writing patterns. 16. The method of claim 14, further including:
detecting a login request; and transitioning the one or more private pages from the locked state to the unlocked state if the login request corresponds to stored login information. 17. The method of claim 16, further including maintaining the one or more private pages in the locked state if the login request does not correspond to the stored login information. 18. The method of claim 13, further including maintaining the previously modified interior page in the locked state if the identifier communication does not correspond to at least one of the one or more stored identifiers. 19. At least one computer readable storage medium comprising a set of instructions, which when executed by a computing device, cause the computing device to:
detect an identifier communication originating from a writing implement; transition a previously modified interior page of an electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to one or more stored identifiers; and maintain a plurality of additional interior pages of the electronic notepad in the locked state while the previously modified interior page is in the unlocked state. 20. The at least one computer readable storage medium of claim 19, wherein the instructions, when executed, cause a computing device to:
detect writing activity with respect to the writing implement and the previously modified interior page, wherein the plurality of additional interior pages include one or more private pages and one or more non-private pages; transition the one or more non-private pages from the locked state to the unlocked state if the writing activity corresponds to one or more stored writing patterns; and maintain the one or more private pages in the locked state while the one or more non-private pages are in the unlocked state. 21. The at least one computer readable storage medium of claim 20, wherein the instructions, when executed, cause a computing device to maintain the one or more non-private pages in the locked state if the writing activity does not correspond to at least one of the one or more stored writing patterns. 22. The at least one computer readable storage medium of claim 20, wherein the instructions, when executed, cause a computing device to:
detect a login request; and transition the one or more private pages from the locked state to the unlocked state if the login request corresponds to stored login information. 23. The at least one computer readable storage medium of claim 22, wherein the instructions, when executed, cause a computing device to maintain the one or more private pages in the locked state if the login request does not correspond to the stored login information. 24. The at least one computer readable storage medium of claim 19, wherein the instructions, when executed, cause a computing device to maintain the previously modified interior page in the locked state if the identifier communication does not correspond to at least one of the one or more stored identifiers. | Systems, apparatuses and methods may provide for detecting an identifier communication from a writing implement and transitioning a previously modified interior page of an electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to one or more stored identifiers. Moreover, a plurality of additional interior pages of the electronic notepad may be maintained in the locked state while the previously modified interior page is in the unlocked state.1. A system comprising:
a writing implement; a display to present an electronic notepad; a memory subsystem to store one or more identifiers; and a notepad management apparatus comprising,
an implement monitor to detect an identifier communication originating from the writing implement;
a current page access controller to transition a previously modified interior page of the electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to the stored one or more identifiers; and
a security manager to maintain a plurality of additional interior pages of the electronic notepad in the locked state while the previously modified interior page is in the unlocked state. 2. The system of claim 1, wherein the memory is to store one or more writing patterns and the notepad access subsystem further includes:
a handwriting monitor to detect writing activity with respect to the writing implement and the previously modified interior page, wherein the plurality of additional interior pages include one or more private pages and one or more non-private pages; a non-private access controller to transition the one or more non-private pages from the locked state to the unlocked state if the writing activity corresponds to the stored one or more writing patterns, wherein the security manager is to maintain the one or more private pages in the locked state while the one or more non-private pages are in the unlocked state. 3. The system of claim 2, wherein the security manager is to maintain the one or more non-private pages in the locked state if the writing activity does not correspond to at least one of the one or more stored writing patterns. 4. The system of claim 2, wherein the memory subsystem is to store login information and the notepad access subsystem further includes:
an authentication monitor to detect a login request; and a private access controller to transition the one or more private pages from the locked state to the unlocked state if the login request corresponds to the stored login information. 5. The system of claim 4, wherein the security manager is to maintain the one or more private pages in the locked state if the login request does not correspond to the stored login information. 6. The system of claim 1, wherein the security manager is to maintain the previously modified interior page in the locked state if the identifier communication does not correspond to at least one of the one or more stored identifiers. 7. An apparatus comprising:
an implement monitor to detect an identifier communication originating from a writing implement; a current page access controller to transition a previously modified interior page of an electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to one or more stored identifiers; and a security manager to maintain a plurality of additional interior pages of the electronic notepad in the locked state while the previously modified interior page is in the unlocked state. 8. The apparatus of claim 7, further including:
a handwriting monitor to detect writing activity with respect to the writing implement and the previously modified interior page, wherein the plurality of additional interior pages include one or more private pages and one or more non-private pages; a non-private access controller to transition the one or more non-private pages from the locked state to the unlocked state if the writing activity corresponds to one or more stored writing patterns, wherein the security manager is to maintain the one or more private pages in the locked state while the one or more non-private pages are in the unlocked state. 9. The apparatus of claim 8, wherein the security manager is to maintain the one or more non-private pages in the locked state if the writing activity does not correspond to at least one of the one or more stored writing patterns. 10. The apparatus of claim 8, further including:
an authentication monitor to detect a login request; and a private access controller to transition the one or more private pages from the locked state to the unlocked state if the login request corresponds to stored login information. 11. The apparatus of claim 10, wherein the security manager is to maintain the one or more private pages in the locked state if the login request does not correspond to the stored login information. 12. The apparatus of claim 7, wherein the security manager is to maintain the previously modified interior page in the locked state if the identifier communication does not correspond to at least one of the one or more stored identifiers. 13. A method comprising:
detecting an identifier communication originating from a writing implement; transitioning a previously modified interior page of an electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to one or more stored identifiers; and maintaining a plurality of additional interior pages of the electronic notepad in the locked state while the previously modified interior page is in the unlocked state. 14. The method of claim 13, further including:
detecting writing activity with respect to the writing implement and the previously modified interior page, wherein the plurality of additional interior pages include one or more private pages and one or more non-private pages; transitioning the one or more non-private pages from the locked state to the unlocked state if the writing activity corresponds to one or more stored writing patterns; and maintaining the one or more private pages in the locked state while the one or more non-private pages are in the unlocked state. 15. The method of claim 14, further including maintaining the one or more non-private pages in the locked state if the writing activity does not correspond to at least one of the one or more stored writing patterns. 16. The method of claim 14, further including:
detecting a login request; and transitioning the one or more private pages from the locked state to the unlocked state if the login request corresponds to stored login information. 17. The method of claim 16, further including maintaining the one or more private pages in the locked state if the login request does not correspond to the stored login information. 18. The method of claim 13, further including maintaining the previously modified interior page in the locked state if the identifier communication does not correspond to at least one of the one or more stored identifiers. 19. At least one computer readable storage medium comprising a set of instructions, which when executed by a computing device, cause the computing device to:
detect an identifier communication originating from a writing implement; transition a previously modified interior page of an electronic notepad from a locked state to an unlocked state if the identifier communication corresponds to one or more stored identifiers; and maintain a plurality of additional interior pages of the electronic notepad in the locked state while the previously modified interior page is in the unlocked state. 20. The at least one computer readable storage medium of claim 19, wherein the instructions, when executed, cause a computing device to:
detect writing activity with respect to the writing implement and the previously modified interior page, wherein the plurality of additional interior pages include one or more private pages and one or more non-private pages; transition the one or more non-private pages from the locked state to the unlocked state if the writing activity corresponds to one or more stored writing patterns; and maintain the one or more private pages in the locked state while the one or more non-private pages are in the unlocked state. 21. The at least one computer readable storage medium of claim 20, wherein the instructions, when executed, cause a computing device to maintain the one or more non-private pages in the locked state if the writing activity does not correspond to at least one of the one or more stored writing patterns. 22. The at least one computer readable storage medium of claim 20, wherein the instructions, when executed, cause a computing device to:
detect a login request; and transition the one or more private pages from the locked state to the unlocked state if the login request corresponds to stored login information. 23. The at least one computer readable storage medium of claim 22, wherein the instructions, when executed, cause a computing device to maintain the one or more private pages in the locked state if the login request does not correspond to the stored login information. 24. The at least one computer readable storage medium of claim 19, wherein the instructions, when executed, cause a computing device to maintain the previously modified interior page in the locked state if the identifier communication does not correspond to at least one of the one or more stored identifiers. | 2,400 |
8,963 | 8,963 | 14,713,792 | 2,433 | A secure data parser is provided that may be integrated into any suitable system for securely storing data in and communicating data with cloud computing resources. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. | 1. (canceled) 2. A method of securing a virtual machine, the method comprising:
providing a security module, in a first computing environment, accessible to applications running in a client computing environment, the security module configured to perform one or more security operations in response to receiving a request from an application; receiving by a computing system a security operation request from an application running in a first virtual machine operating in the client computing environment; and performing the security operation in response to receiving the request from the application running in the virtual machine. 3. The method of claim 2, wherein the security operation request is received from a user level of the first virtual machine. 4. The method of claim 2, wherein the first computing environment is a virtual machine operating in the client computing environment, different from the first virtual machine. 5. The method of claim 2, wherein the first computing environment includes a processing device remote from the client computing environment. 6. The method of claim 2, wherein the first virtual machine includes the first computing environment. 7. The method of claim 2, wherein the client computing environment includes the first computing environment. 8. The method of claim 2, wherein the security operation comprises integrity-checking data read in from a disk in the client computing environment. 9. The method of claim 2, wherein the security operation comprises securing communications between the first virtual machine and at least one other virtual machine operating in the client computing environment. 10. The method of claim 2, wherein performing the security operation comprises encrypting a data set indicated by the application running in the virtual machine. 11. The method of claim 10, wherein performing the security operation further comprises generating a plurality of shares, each share comprising a distribution of data from the encrypted data set. 12. The method of claim 11, wherein encrypting the data set and generating a plurality of shares comprise performing a two-factored secret sharing operation. 13. The method of claim 11, further comprising:
storing the plurality of shares in a file system of the first virtual machine. 14. The method of claim 13, wherein storing the plurality of shares comprises storing a first number of shares, the first number of shares greater than a number of shares needed to reconstruct the data set. 15. A system for securing a virtual machine, the system comprising:
a security module running on a computing system in a first computing environment, accessible to applications running in a client computing environment, the security module configured to:
perform one or more security operations in response to receiving a request from an application;
receive a security operation request from an application running in a first virtual machine operating in the client computing environment; and
perform the security operation in response to receiving the request from the application running in the virtual machine. 16. The system of claim 15, wherein the security operation request is received from a user level of the first virtual machine. 17. The system of claim 15, wherein the first computing environment is a virtual machine operating in the client computing environment, different from the first virtual machine. 18. The system of claim 15, wherein the first computing environment includes a processing device remote from the client computing environment. 19. The system of claim 15, wherein the first virtual machine includes the first computing environment. 20. The system of claim 15, wherein the client computing environment includes the first computing environment. 21. The system of claim 15, wherein the security operation comprises integrity-checking data read in from a disk in the client computing environment. 22. The system of claim 15, wherein the security operation comprises securing communications between the first virtual machine and at least one other virtual machine operating in the client computing environment. 23. The system of claim 15, wherein the security module performs the security operation by encrypting a data set indicated by the application running in the virtual machine. 24. The system of claim 23, wherein the security module performs the security operation by generating a plurality of shares, each share comprising a distribution of data from the encrypted data set. 25. The system of claim 24, wherein encrypting the data set and generating a plurality of shares comprise performing a two-factored secret sharing operation. 26. The system of claim 24, wherein the computing system is further configured to store the plurality of shares in a file system of the first virtual machine. 27. The system of claim 26, wherein storing the plurality of shares comprises storing a first number of shares, the first number of shares greater than a number of shares needed to reconstruct the data set. 28. A machine-readable non-transitory medium comprising machine program logic recorded thereon which, when executed by a processor, causes a computing system to carry out the steps of:
providing a security module, in a first computing environment, accessible to applications running in a client computing environment, the security module configured to perform one or more security operations in response to receiving a request from an application; receiving by a computing system a security operation request from an application running in a first virtual machine operating in the client computing environment; and performing the security operation in response to receiving the request from the application running in the virtual machine. 29. The machine-readable non-transitory medium of claim 28, wherein the security operation request is received from a user level of the first virtual machine. 30. The machine-readable non-transitory medium of claim 28, wherein the first computing environment is a virtual machine operating in the client computing environment, different from the first virtual machine. 31. The machine-readable non-transitory medium of claim 28, wherein the first computing environment includes a processing device remote from the client computing environment. 32. The machine-readable non-transitory medium of claim 28, wherein the first virtual machine includes the first computing environment. 33. The machine-readable non-transitory medium of claim 28, wherein the client computing environment includes the first computing environment. 34. The machine-readable non-transitory medium of claim 28, wherein the security operation comprises integrity-checking data read in from a disk in the client computing environment. | A secure data parser is provided that may be integrated into any suitable system for securely storing data in and communicating data with cloud computing resources. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security.1. (canceled) 2. A method of securing a virtual machine, the method comprising:
providing a security module, in a first computing environment, accessible to applications running in a client computing environment, the security module configured to perform one or more security operations in response to receiving a request from an application; receiving by a computing system a security operation request from an application running in a first virtual machine operating in the client computing environment; and performing the security operation in response to receiving the request from the application running in the virtual machine. 3. The method of claim 2, wherein the security operation request is received from a user level of the first virtual machine. 4. The method of claim 2, wherein the first computing environment is a virtual machine operating in the client computing environment, different from the first virtual machine. 5. The method of claim 2, wherein the first computing environment includes a processing device remote from the client computing environment. 6. The method of claim 2, wherein the first virtual machine includes the first computing environment. 7. The method of claim 2, wherein the client computing environment includes the first computing environment. 8. The method of claim 2, wherein the security operation comprises integrity-checking data read in from a disk in the client computing environment. 9. The method of claim 2, wherein the security operation comprises securing communications between the first virtual machine and at least one other virtual machine operating in the client computing environment. 10. The method of claim 2, wherein performing the security operation comprises encrypting a data set indicated by the application running in the virtual machine. 11. The method of claim 10, wherein performing the security operation further comprises generating a plurality of shares, each share comprising a distribution of data from the encrypted data set. 12. The method of claim 11, wherein encrypting the data set and generating a plurality of shares comprise performing a two-factored secret sharing operation. 13. The method of claim 11, further comprising:
storing the plurality of shares in a file system of the first virtual machine. 14. The method of claim 13, wherein storing the plurality of shares comprises storing a first number of shares, the first number of shares greater than a number of shares needed to reconstruct the data set. 15. A system for securing a virtual machine, the system comprising:
a security module running on a computing system in a first computing environment, accessible to applications running in a client computing environment, the security module configured to:
perform one or more security operations in response to receiving a request from an application;
receive a security operation request from an application running in a first virtual machine operating in the client computing environment; and
perform the security operation in response to receiving the request from the application running in the virtual machine. 16. The system of claim 15, wherein the security operation request is received from a user level of the first virtual machine. 17. The system of claim 15, wherein the first computing environment is a virtual machine operating in the client computing environment, different from the first virtual machine. 18. The system of claim 15, wherein the first computing environment includes a processing device remote from the client computing environment. 19. The system of claim 15, wherein the first virtual machine includes the first computing environment. 20. The system of claim 15, wherein the client computing environment includes the first computing environment. 21. The system of claim 15, wherein the security operation comprises integrity-checking data read in from a disk in the client computing environment. 22. The system of claim 15, wherein the security operation comprises securing communications between the first virtual machine and at least one other virtual machine operating in the client computing environment. 23. The system of claim 15, wherein the security module performs the security operation by encrypting a data set indicated by the application running in the virtual machine. 24. The system of claim 23, wherein the security module performs the security operation by generating a plurality of shares, each share comprising a distribution of data from the encrypted data set. 25. The system of claim 24, wherein encrypting the data set and generating a plurality of shares comprise performing a two-factored secret sharing operation. 26. The system of claim 24, wherein the computing system is further configured to store the plurality of shares in a file system of the first virtual machine. 27. The system of claim 26, wherein storing the plurality of shares comprises storing a first number of shares, the first number of shares greater than a number of shares needed to reconstruct the data set. 28. A machine-readable non-transitory medium comprising machine program logic recorded thereon which, when executed by a processor, causes a computing system to carry out the steps of:
providing a security module, in a first computing environment, accessible to applications running in a client computing environment, the security module configured to perform one or more security operations in response to receiving a request from an application; receiving by a computing system a security operation request from an application running in a first virtual machine operating in the client computing environment; and performing the security operation in response to receiving the request from the application running in the virtual machine. 29. The machine-readable non-transitory medium of claim 28, wherein the security operation request is received from a user level of the first virtual machine. 30. The machine-readable non-transitory medium of claim 28, wherein the first computing environment is a virtual machine operating in the client computing environment, different from the first virtual machine. 31. The machine-readable non-transitory medium of claim 28, wherein the first computing environment includes a processing device remote from the client computing environment. 32. The machine-readable non-transitory medium of claim 28, wherein the first virtual machine includes the first computing environment. 33. The machine-readable non-transitory medium of claim 28, wherein the client computing environment includes the first computing environment. 34. The machine-readable non-transitory medium of claim 28, wherein the security operation comprises integrity-checking data read in from a disk in the client computing environment. | 2,400 |
8,964 | 8,964 | 15,261,834 | 2,421 | The present disclosure relates to verifying that a content asset is present at a user level. The present disclosure provides video hosting and service (VHS) management systems and methods that can both accurately and timely verify availability of VHS content from multiple content providers using multiple distribution systems. | 1. A method comprising:
receiving, from a user device, a video output; processing the video output to generate a user interface; determining a command file comprising a plurality of commands for navigating the user interface; transmitting, to the user device, via a remote controller, one or more commands of the plurality of commands, wherein the one or more commands are based on the command file and the one or more commands locate a content asset via the user interface; transmitting, to the user device, via the remote controller, an access command to verify the content asset within the video output; determining that the content asset was successfully verified within the video output; generating, based on the verifying of the content asset, verification data for the content asset; and transmitting the verification data. 2. The method of claim 1, wherein the receiving, from the user device, the video output comprises receiving the video output from a High-Definition Multimedia Interface (HDMI) port of the user device. 3. The method of claim 2, wherein the processing the video output to generate the user interface comprises decoding the video output from the HDMI port and processing the video output in a memory of a computing device. 4. The method of claim 1, wherein the determining the command file comprising one or more commands for navigating the user interface comprises:
determining a service provider of the content asset; and determining the command file from a plurality of command files based on the service provider. 5. The method of claim 1, wherein the transmitting, to the user device, via a remote controller, one or more commands of the plurality of commands, wherein the one or more commands are based on the command file and the one or more commands locate a content asset via the user interface comprises:
determining a first series of the one or more commands to navigate the user interface to a video host and stream (VHS) search function; transmitting, to the user device, via the remote controller, the first series of the one or more commands; transmitting a character command set corresponding to the title of the content asset; and transmitting a search command to cause the VHS search function to search for the title of the content asset. 6. The method of claim 1, wherein the transmitting, to the user device, via the remote controller, an access command to verify the content asset within the video output comprises determining the access command based on the command file, wherein the access command navigates the user interface to request that the content asset be read. 7. The method of claim 1, wherein the determining that the content asset was successfully verified within the video output comprises determining that the content asset was read for a predetermined amount of time. 8. The method of claim 1, wherein the generating, based on the successful verifying of the content asset, verification data for the content asset comprises generating a log comprising the service provider, the title of the content asset, and a timestamp that the content asset was successfully verified. 9. A method comprising:
determining a service provider and a title of a content asset associated with the service provider; determining a command file associated with the service provider; navigating, based on the command file, to a video host and stream (VHS) search function of a menu of a client device; querying the VHS search function with the title to generate a search result; scanning the search result to determine that the title of the content asset is present in the search result; generating verification data for the content asset based on the presence of the title of the content asset in the search result; and transmitting the verification data. 10. The method of claim 9, wherein the determining the command file associated with the service provider comprises determining the command file from a plurality of command files based on the service provider. 11. The method of claim 9, wherein the navigating, based on the command file, to the VHS search function of the menu of the client device comprises receiving a video output from a High-Definition Multimedia Interface (HDMI) port of the user device. 12. The method of claim 11, further comprising processing the video output to generate the menu by decoding the video output from the HDMI port and processing the video output in a memory of a computing device. 13. The method of claim 9, wherein the navigating, based on the command file, to the VHS search function of the menu of the client device comprises:
determining a first series of one or more commands from the command file to navigate the menu to the VHS search function; and transmitting, to the user device, via a remote controller, the first series of one or more commands. 14. The method of claim 9, wherein the querying the VHS search function with the title to generate a search result comprises:
transmitting a character command set corresponding to the title of the content asset; and transmitting a search command to cause the VHS search function to search for the title of the content asset. 15. The method of claim 9, wherein the scanning the search result to determine that the title of the content asset is present in the search result comprises analyzing the search result with an optical character recognition (OCR) module to determine whether the title of the content asset is present in the search result. 16. The method of claim 9, further comprising transmitting, to the user device, via a remote controller, an access command to verify the content asset. 17. The method of claim 16, wherein the transmitting, to the user device, via a remote controller, an access command to verify the content asset comprises determining the access command based on the command file, wherein the access command navigates the menu to request that the content asset be read. 18. The method of claim 17, further comprising determining that the content asset was successfully read for a predetermined amount of time. 19. The method of claim 1, wherein the generating, based on the successful verifying of the content asset, verification data for the content asset comprises generating a log comprising the service provider, the title of the content asset, and a timestamp that the title of the content asset was present in the search result. 20. A system comprising:
a user device configured for generating a user interface to interact with a video host and stream (VHS) system; and a remote controller, coupled to a network device, configured to:
transmit one or more commands to the user device, wherein the one or more commands are based on a command file and the one or more commands locate a content asset in the VHS system via the user interface, and
transmit, to the user device, an access command to verify the content asset from the VHS system,
the network device configured to:
receive a video output from the user device,
process the video output to generate a user interface, and
generate verification data for the content asset based on a successful verifying of the content asset. | The present disclosure relates to verifying that a content asset is present at a user level. The present disclosure provides video hosting and service (VHS) management systems and methods that can both accurately and timely verify availability of VHS content from multiple content providers using multiple distribution systems.1. A method comprising:
receiving, from a user device, a video output; processing the video output to generate a user interface; determining a command file comprising a plurality of commands for navigating the user interface; transmitting, to the user device, via a remote controller, one or more commands of the plurality of commands, wherein the one or more commands are based on the command file and the one or more commands locate a content asset via the user interface; transmitting, to the user device, via the remote controller, an access command to verify the content asset within the video output; determining that the content asset was successfully verified within the video output; generating, based on the verifying of the content asset, verification data for the content asset; and transmitting the verification data. 2. The method of claim 1, wherein the receiving, from the user device, the video output comprises receiving the video output from a High-Definition Multimedia Interface (HDMI) port of the user device. 3. The method of claim 2, wherein the processing the video output to generate the user interface comprises decoding the video output from the HDMI port and processing the video output in a memory of a computing device. 4. The method of claim 1, wherein the determining the command file comprising one or more commands for navigating the user interface comprises:
determining a service provider of the content asset; and determining the command file from a plurality of command files based on the service provider. 5. The method of claim 1, wherein the transmitting, to the user device, via a remote controller, one or more commands of the plurality of commands, wherein the one or more commands are based on the command file and the one or more commands locate a content asset via the user interface comprises:
determining a first series of the one or more commands to navigate the user interface to a video host and stream (VHS) search function; transmitting, to the user device, via the remote controller, the first series of the one or more commands; transmitting a character command set corresponding to the title of the content asset; and transmitting a search command to cause the VHS search function to search for the title of the content asset. 6. The method of claim 1, wherein the transmitting, to the user device, via the remote controller, an access command to verify the content asset within the video output comprises determining the access command based on the command file, wherein the access command navigates the user interface to request that the content asset be read. 7. The method of claim 1, wherein the determining that the content asset was successfully verified within the video output comprises determining that the content asset was read for a predetermined amount of time. 8. The method of claim 1, wherein the generating, based on the successful verifying of the content asset, verification data for the content asset comprises generating a log comprising the service provider, the title of the content asset, and a timestamp that the content asset was successfully verified. 9. A method comprising:
determining a service provider and a title of a content asset associated with the service provider; determining a command file associated with the service provider; navigating, based on the command file, to a video host and stream (VHS) search function of a menu of a client device; querying the VHS search function with the title to generate a search result; scanning the search result to determine that the title of the content asset is present in the search result; generating verification data for the content asset based on the presence of the title of the content asset in the search result; and transmitting the verification data. 10. The method of claim 9, wherein the determining the command file associated with the service provider comprises determining the command file from a plurality of command files based on the service provider. 11. The method of claim 9, wherein the navigating, based on the command file, to the VHS search function of the menu of the client device comprises receiving a video output from a High-Definition Multimedia Interface (HDMI) port of the user device. 12. The method of claim 11, further comprising processing the video output to generate the menu by decoding the video output from the HDMI port and processing the video output in a memory of a computing device. 13. The method of claim 9, wherein the navigating, based on the command file, to the VHS search function of the menu of the client device comprises:
determining a first series of one or more commands from the command file to navigate the menu to the VHS search function; and transmitting, to the user device, via a remote controller, the first series of one or more commands. 14. The method of claim 9, wherein the querying the VHS search function with the title to generate a search result comprises:
transmitting a character command set corresponding to the title of the content asset; and transmitting a search command to cause the VHS search function to search for the title of the content asset. 15. The method of claim 9, wherein the scanning the search result to determine that the title of the content asset is present in the search result comprises analyzing the search result with an optical character recognition (OCR) module to determine whether the title of the content asset is present in the search result. 16. The method of claim 9, further comprising transmitting, to the user device, via a remote controller, an access command to verify the content asset. 17. The method of claim 16, wherein the transmitting, to the user device, via a remote controller, an access command to verify the content asset comprises determining the access command based on the command file, wherein the access command navigates the menu to request that the content asset be read. 18. The method of claim 17, further comprising determining that the content asset was successfully read for a predetermined amount of time. 19. The method of claim 1, wherein the generating, based on the successful verifying of the content asset, verification data for the content asset comprises generating a log comprising the service provider, the title of the content asset, and a timestamp that the title of the content asset was present in the search result. 20. A system comprising:
a user device configured for generating a user interface to interact with a video host and stream (VHS) system; and a remote controller, coupled to a network device, configured to:
transmit one or more commands to the user device, wherein the one or more commands are based on a command file and the one or more commands locate a content asset in the VHS system via the user interface, and
transmit, to the user device, an access command to verify the content asset from the VHS system,
the network device configured to:
receive a video output from the user device,
process the video output to generate a user interface, and
generate verification data for the content asset based on a successful verifying of the content asset. | 2,400 |
8,965 | 8,965 | 14,697,868 | 2,496 | Process, equipment, and computer program product code for configuration of and/or performing diagnostics on a network security device using a hand-held computing device are provided. According to one embodiment, a hand-held computing device is connected to a network security device via a connecting cable that is coupled to a management interface of the hand-held computing device. A mobile application running on the hand-held computing device sends a diagnostic command via the connecting cable to the network security device to initiate performance of one or more diagnostic tests on the network security device. Results of the one or more diagnostic tests are received from the network security device via the connecting cable. The results of the one or more diagnostic tests are displayed via a display of the hand-held computing device. | 1. A method comprising:
connecting a hand-held computing device to a network security device via a connecting cable that is coupled to a management interface of the hand-held computing device; sending, by a mobile application running on the hand-held computing device, a diagnostic command via the connecting cable to the network security device to initiate performance of one or more diagnostic tests on the network security device; receiving, by the mobile application, results of the one or more diagnostic tests from the network security device via the connecting cable; and displaying, by the mobile application, the results of the one or more diagnostic tests via a display of the hand-held computing device. 2. The method of claim 1, wherein the diagnostic command directs the network security device to perform all diagnostic tests that are available on the network security device. 3. The method of claim 1, wherein the diagnostic command directs the network security device to perform an individual diagnostic test available on the network security device. 4. The method of claim 1, wherein the diagnostic command directs the network security device to perform a diagnostic test suite available on the network security device, wherein the diagnostic test suite is pre-defined and includes multiple individual diagnostic tests. 5. The method of claim 1, wherein the hand-held computing device comprises a smartphone. 6. The method of claim 1, wherein the management interface comprises a universal serial bus (USB) port. 7. The method of claim 1, wherein the display comprises a touch-screen display. 8. A hand-held computing device comprising:
a display; a non-transitory storage device having tangibly embodied therein instructions representing a mobile application; and one or more processors coupled to the non-transitory storage device and operable to execute the mobile application to perform a method comprising:
connecting the hand-held computing device to a network security device via a connecting cable that is coupled to a management interface of the hand-held computing device;
sending, by a mobile application running on the hand-held computing device, a diagnostic command via the connecting cable to the network security device to initiate performance of one or more diagnostic tests on the network security device;
receiving, by the mobile application, results of the one or more diagnostic tests from the network security device via the connecting cable; and
displaying, by the mobile application, the results of the one or more diagnostic tests via a display of the hand-held computing device. 9. The hand-held computing device of claim 8, wherein the diagnostic command directs the network security device to perform all diagnostic tests that are available on the network security device. 10. The hand-held computing device of claim 8, wherein the diagnostic command directs the network security device to perform an individual diagnostic test available on the network security device. 11. The hand-held computing device of claim 8, wherein the diagnostic command directs the network security device to perform a diagnostic test suite available on the network security device, wherein the diagnostic test suite is pre-defined and includes multiple individual diagnostic tests. 12. The hand-held computing device of claim 8, wherein the hand-held computing device comprises a smartphone. 13. The hand-held computing device of claim 8, wherein the management interface comprises a universal serial bus (USB) port. 14. The hand-held computing device of claim 8, wherein the display comprises a touch-screen display. | Process, equipment, and computer program product code for configuration of and/or performing diagnostics on a network security device using a hand-held computing device are provided. According to one embodiment, a hand-held computing device is connected to a network security device via a connecting cable that is coupled to a management interface of the hand-held computing device. A mobile application running on the hand-held computing device sends a diagnostic command via the connecting cable to the network security device to initiate performance of one or more diagnostic tests on the network security device. Results of the one or more diagnostic tests are received from the network security device via the connecting cable. The results of the one or more diagnostic tests are displayed via a display of the hand-held computing device.1. A method comprising:
connecting a hand-held computing device to a network security device via a connecting cable that is coupled to a management interface of the hand-held computing device; sending, by a mobile application running on the hand-held computing device, a diagnostic command via the connecting cable to the network security device to initiate performance of one or more diagnostic tests on the network security device; receiving, by the mobile application, results of the one or more diagnostic tests from the network security device via the connecting cable; and displaying, by the mobile application, the results of the one or more diagnostic tests via a display of the hand-held computing device. 2. The method of claim 1, wherein the diagnostic command directs the network security device to perform all diagnostic tests that are available on the network security device. 3. The method of claim 1, wherein the diagnostic command directs the network security device to perform an individual diagnostic test available on the network security device. 4. The method of claim 1, wherein the diagnostic command directs the network security device to perform a diagnostic test suite available on the network security device, wherein the diagnostic test suite is pre-defined and includes multiple individual diagnostic tests. 5. The method of claim 1, wherein the hand-held computing device comprises a smartphone. 6. The method of claim 1, wherein the management interface comprises a universal serial bus (USB) port. 7. The method of claim 1, wherein the display comprises a touch-screen display. 8. A hand-held computing device comprising:
a display; a non-transitory storage device having tangibly embodied therein instructions representing a mobile application; and one or more processors coupled to the non-transitory storage device and operable to execute the mobile application to perform a method comprising:
connecting the hand-held computing device to a network security device via a connecting cable that is coupled to a management interface of the hand-held computing device;
sending, by a mobile application running on the hand-held computing device, a diagnostic command via the connecting cable to the network security device to initiate performance of one or more diagnostic tests on the network security device;
receiving, by the mobile application, results of the one or more diagnostic tests from the network security device via the connecting cable; and
displaying, by the mobile application, the results of the one or more diagnostic tests via a display of the hand-held computing device. 9. The hand-held computing device of claim 8, wherein the diagnostic command directs the network security device to perform all diagnostic tests that are available on the network security device. 10. The hand-held computing device of claim 8, wherein the diagnostic command directs the network security device to perform an individual diagnostic test available on the network security device. 11. The hand-held computing device of claim 8, wherein the diagnostic command directs the network security device to perform a diagnostic test suite available on the network security device, wherein the diagnostic test suite is pre-defined and includes multiple individual diagnostic tests. 12. The hand-held computing device of claim 8, wherein the hand-held computing device comprises a smartphone. 13. The hand-held computing device of claim 8, wherein the management interface comprises a universal serial bus (USB) port. 14. The hand-held computing device of claim 8, wherein the display comprises a touch-screen display. | 2,400 |
8,966 | 8,966 | 16,335,863 | 2,466 | This disclosure provides a base station, and a method of operating a base station, in a cellular telecommunications network, the method including the first base station operating in energy saving mode; the first base station receiving a first message, the first message instructing the first base station to exit energy saving mode and to compensate for a second base station; and the first base station exiting energy saving mode and compensating for the second base station. | 1. A method of operating a base station in a cellular telecommunications network, the method comprising:
the first base station operating in an energy saving mode; the first base station receiving a first message, the first message instructing the first base station to exit the energy saving mode and to compensate for a second base station; and the first base station exiting the energy saving mode and compensating for the second base station. 2. A method of operating a base station in a cellular telecommunications network, the method comprising:
the first base station sending a first message to a second base station, the first message instructing the second base station to exit an energy saving mode and to compensate for a third base station. 3. A non-transitory computer-readable storage medium storing a computer program comprising instructions which, when the computer program is executed by a computer, cause the computer to carry out the method of claim 1. 4. A base station comprising a transceiver, a processor and memory, wherein the processor is configured to perform the method of claim 1. 5. A cellular telecommunications network comprising the base station of claim 4. | This disclosure provides a base station, and a method of operating a base station, in a cellular telecommunications network, the method including the first base station operating in energy saving mode; the first base station receiving a first message, the first message instructing the first base station to exit energy saving mode and to compensate for a second base station; and the first base station exiting energy saving mode and compensating for the second base station.1. A method of operating a base station in a cellular telecommunications network, the method comprising:
the first base station operating in an energy saving mode; the first base station receiving a first message, the first message instructing the first base station to exit the energy saving mode and to compensate for a second base station; and the first base station exiting the energy saving mode and compensating for the second base station. 2. A method of operating a base station in a cellular telecommunications network, the method comprising:
the first base station sending a first message to a second base station, the first message instructing the second base station to exit an energy saving mode and to compensate for a third base station. 3. A non-transitory computer-readable storage medium storing a computer program comprising instructions which, when the computer program is executed by a computer, cause the computer to carry out the method of claim 1. 4. A base station comprising a transceiver, a processor and memory, wherein the processor is configured to perform the method of claim 1. 5. A cellular telecommunications network comprising the base station of claim 4. | 2,400 |
8,967 | 8,967 | 15,843,460 | 2,454 | In various embodiments, the predicted location of a user within an institutional space is associated with a node at or near that location, and a virtual desktop is prepared before a user has actually logged on and authenticated. Although users are not accorded access to applications and sensitive data until they have properly authenticated themselves, the virtual desktop and associated data are assembled and retrieved in the background in order to eliminate delay following log-on. | 1. A method of anticipatory provisioning of resources for a mobile user in an institutional space, the method comprising the steps of:
providing a database storing records for a plurality of users, each of the records specifying information about one of the users; acquiring a current location of a user having a record in the database; based on the acquired location and the information about the user in the corresponding database record, predicting (i) a future location of the user and (ii) stored data required by the user at the future location; causing a device at the predicted location to electronically retrieve the stored data but suppress display thereof; and following detection of the user's presence at the predicted location, displaying the retrieved data on the device at the predicted location. 2. The method of claim 1, wherein the retrieved data is displayed only following authentication of the user at the device at the predicted location. 3. The method of claim 1, wherein authentication comprises communication of data to an authentication server. 4. The method of claim 3, wherein authentication satisfies a security policy specific to the retrieved data. 5. The method of claim 1, further comprising the step of causing the device at the predicted location to launch an application to display the retrieved data. 6. The method of claim 1, further comprising, following detection of the user's presence at the predicted location:
predicting (i) a second future location of the user different from the predicted location and (ii) stored data required by the user at the second future location; causing a device at the second predicted location to electronically retrieve the stored data but suppress display thereof; and following detection of the user's presence at the second predicted location, displaying the retrieved data on the device at the second future location. 7. The method of claim 1, wherein the stored data is determined by the predicted location and an individual currently at the predicted location. 8. The method of claim 1, wherein information about the user comprises information relevant to a security policy. 9. The method of claim 8, wherein the information comprises a clinical role of the user and a list of patients assigned to the user. 10. A system for anticipatory provisioning of resources for a mobile user in an institutional space, the system comprising:
a plurality of devices at different locations in the institutional space; a location server in operative communication with the devices via a network and including:
computer storage defining a user location database that itself includes records for a plurality of users, each of the records including data indicative of a current location of the user and information about the user; and
a prediction module for predicting, based on a location and the information about the user in the corresponding database record, (i) a future location of the user and (ii) stored data required by the user at the future location; and
a desktop server in operative communication with the devices and the location server via the network, the desktop server being configured to cause a device at the predicted location to electronically retrieve the stored data but suppress display thereof and, following detection of the user's presence at the predicted location, to display the retrieved data. 11. The system of claim 10, further comprising an authentication server for receiving user log-on credentials and thereupon signaling the device at the predicted location display the retrieved data. 12. The system of claim 11, wherein the user log-on credentials satisfy a security policy specific to the retrieved data. 13. The system of claim 10, wherein the stored data is determined by the predicted location and an individual currently at the predicted location. 14. The system of claim 10, wherein information about the user comprises information relevant to a security policy. 15. The system of claim 14, wherein the information comprises a clinical role of the user and a list of patients assigned to the user. 16. A system for managing location-based events in an institutional space, the system comprising:
a plurality of tracking sensors at different locations in the institutional space, each of the tracking sensors being configured to detect a proximate presence of an individual or a device and to produce signals indicative thereof; a plurality of application host devices distributed within the institutional space, each of the application host devices running an application; and a location server in operative communication with the tracking sensors and the application host devices via a network, the location server further including computer storage defining:
(i) a user location database that stores records for a plurality of users, each of the records including a current location of the user based on signals from the tracking sensors;
(ii) a device location database that stores records for a plurality of devices, each of the records including a current location of the device; and
(iii) a subscription database that stores records for a plurality of applications each running on a different device, each of the records specifying an application and one or more location events to which the application has subscribed,
wherein the location server is configured to receive signals from the tracking sensors, interpret the received signals as events, and notify applications upon occurrence of events to which they subscribe. 17. The system of claim 16, further comprising an authentication server including a stored security policy accessible thereto, the security policy specifying authentication events required to access at least some of the applications, wherein the authentication server is in communication with the application host devices to control access to applications running thereon. 18. The system of claim 17, wherein at least some of the required authentication events are based on a location of the associated application host device. 19. The system of claim 17, wherein the security policy specifies actions to be taken in response to walk-up events consisting of an individual's entry within a monitored geospatial zone and walk-away events consisting of an individual's departure from a monitored geospatial zone. 20. The system of claim 19, wherein the authentication server is configured to receive notifications of the walk-away events from applications subscribing thereto and responsively take action based on the security policy. 21. The system of claim 20, wherein the action is closing or prevent access to the applications. 22. The system of claim 18, wherein the security policy relaxes authentication requirements based on the location of the associated application host device. | In various embodiments, the predicted location of a user within an institutional space is associated with a node at or near that location, and a virtual desktop is prepared before a user has actually logged on and authenticated. Although users are not accorded access to applications and sensitive data until they have properly authenticated themselves, the virtual desktop and associated data are assembled and retrieved in the background in order to eliminate delay following log-on.1. A method of anticipatory provisioning of resources for a mobile user in an institutional space, the method comprising the steps of:
providing a database storing records for a plurality of users, each of the records specifying information about one of the users; acquiring a current location of a user having a record in the database; based on the acquired location and the information about the user in the corresponding database record, predicting (i) a future location of the user and (ii) stored data required by the user at the future location; causing a device at the predicted location to electronically retrieve the stored data but suppress display thereof; and following detection of the user's presence at the predicted location, displaying the retrieved data on the device at the predicted location. 2. The method of claim 1, wherein the retrieved data is displayed only following authentication of the user at the device at the predicted location. 3. The method of claim 1, wherein authentication comprises communication of data to an authentication server. 4. The method of claim 3, wherein authentication satisfies a security policy specific to the retrieved data. 5. The method of claim 1, further comprising the step of causing the device at the predicted location to launch an application to display the retrieved data. 6. The method of claim 1, further comprising, following detection of the user's presence at the predicted location:
predicting (i) a second future location of the user different from the predicted location and (ii) stored data required by the user at the second future location; causing a device at the second predicted location to electronically retrieve the stored data but suppress display thereof; and following detection of the user's presence at the second predicted location, displaying the retrieved data on the device at the second future location. 7. The method of claim 1, wherein the stored data is determined by the predicted location and an individual currently at the predicted location. 8. The method of claim 1, wherein information about the user comprises information relevant to a security policy. 9. The method of claim 8, wherein the information comprises a clinical role of the user and a list of patients assigned to the user. 10. A system for anticipatory provisioning of resources for a mobile user in an institutional space, the system comprising:
a plurality of devices at different locations in the institutional space; a location server in operative communication with the devices via a network and including:
computer storage defining a user location database that itself includes records for a plurality of users, each of the records including data indicative of a current location of the user and information about the user; and
a prediction module for predicting, based on a location and the information about the user in the corresponding database record, (i) a future location of the user and (ii) stored data required by the user at the future location; and
a desktop server in operative communication with the devices and the location server via the network, the desktop server being configured to cause a device at the predicted location to electronically retrieve the stored data but suppress display thereof and, following detection of the user's presence at the predicted location, to display the retrieved data. 11. The system of claim 10, further comprising an authentication server for receiving user log-on credentials and thereupon signaling the device at the predicted location display the retrieved data. 12. The system of claim 11, wherein the user log-on credentials satisfy a security policy specific to the retrieved data. 13. The system of claim 10, wherein the stored data is determined by the predicted location and an individual currently at the predicted location. 14. The system of claim 10, wherein information about the user comprises information relevant to a security policy. 15. The system of claim 14, wherein the information comprises a clinical role of the user and a list of patients assigned to the user. 16. A system for managing location-based events in an institutional space, the system comprising:
a plurality of tracking sensors at different locations in the institutional space, each of the tracking sensors being configured to detect a proximate presence of an individual or a device and to produce signals indicative thereof; a plurality of application host devices distributed within the institutional space, each of the application host devices running an application; and a location server in operative communication with the tracking sensors and the application host devices via a network, the location server further including computer storage defining:
(i) a user location database that stores records for a plurality of users, each of the records including a current location of the user based on signals from the tracking sensors;
(ii) a device location database that stores records for a plurality of devices, each of the records including a current location of the device; and
(iii) a subscription database that stores records for a plurality of applications each running on a different device, each of the records specifying an application and one or more location events to which the application has subscribed,
wherein the location server is configured to receive signals from the tracking sensors, interpret the received signals as events, and notify applications upon occurrence of events to which they subscribe. 17. The system of claim 16, further comprising an authentication server including a stored security policy accessible thereto, the security policy specifying authentication events required to access at least some of the applications, wherein the authentication server is in communication with the application host devices to control access to applications running thereon. 18. The system of claim 17, wherein at least some of the required authentication events are based on a location of the associated application host device. 19. The system of claim 17, wherein the security policy specifies actions to be taken in response to walk-up events consisting of an individual's entry within a monitored geospatial zone and walk-away events consisting of an individual's departure from a monitored geospatial zone. 20. The system of claim 19, wherein the authentication server is configured to receive notifications of the walk-away events from applications subscribing thereto and responsively take action based on the security policy. 21. The system of claim 20, wherein the action is closing or prevent access to the applications. 22. The system of claim 18, wherein the security policy relaxes authentication requirements based on the location of the associated application host device. | 2,400 |
8,968 | 8,968 | 15,961,105 | 2,486 | A system for a vehicle comprises a medium arranged in front of a target in the vehicle, a target monitoring system arranged in front of the target in the vehicle capturing an image or a profile of the target, and a processing unit communicatively coupled the target monitoring camera to the medium, analyzed the captured image or profile of the target, wherein the processing unit arranged to analyze the obtained images or profile of the target and cause the medium to switch from a transparent mode to an opaque mode. | 1. A system for a vehicle comprising:
a medium arranged in front of a target in the vehicle; a target monitoring system arranged in front of the target in the vehicle capturing an image or a profile of the target; and a processing unit communicatively coupled the target monitoring camera to the medium, analyzed the captured image or profile of the target; wherein the processing unit arranged to analyze the obtained images or profile of the target and cause the medium to switch from a transparent mode to an opaque mode. 2. The system of claim 1 wherein the images or profile of the target captured by target monitoring system is at least one of an upper body of the target or a facial profile of the target. 3. The system of claim 2 wherein the target monitoring system is a camera. 4. The system of claim 1 wherein the processing unit further determined a path of a target's eye view. 5. The system of claim 4 wherein the processing unit further configured to selectively block out light sources in the path of the target's eye view and switch the medium to a substantially opaque optical characteristic. 6. The system of claim 5 wherein the medium is at least one of a LCD screen, glass, or plastic. 7. The system of claim 5 wherein the path of the target's eye view is a line of sight to the medium. 8. A non-transitory computer readable medium having stored thereon a computer program for controlling an optical characteristics of a LCD screen, the computer program comprising a routine of set instructions for causing the machine to perform:
determining face location and pose estimation within an image captured by a camera; determining changes in an illumination level on the face location; and changing an optical characteristic of the LCD screen overlapping the face location. 9. The non-transitory computer readable medium of claim 8 wherein determining changes in the illumination level on the face location further comprising:
determining changing lighting from an environment and an optical characteristic of the LCD screen. 10. The non-transitory computer readable medium of claim 9 further comprising:
projecting an array of patterns on the LCD screen;
detecting further changes in the illumination level on a target's eye;
identifying the patterns projected on the target's eye; and
changing the optical characteristic of the projected patterns on the LCD screen overlapping the target's eye. 10. The non-transitory computer readable medium of claim 9 further comprising:
selectively changing a portion of the LCD screen including an opaque characteristic overlapping the target's eye. 11. The non-transitory computer readable medium of claim 10 wherein the portion of the LCD screen comprises the projected patterns. 12. The non-transitory computer readable medium of claim 11 further comprising:
continuously updating projection mapping and facial illumination estimation in real-time when detecting changes of face location and pose estimation. 13. A computer program product embodying the non-transitory computer readable medium as claimed in claim 12. 14. Apparatus comprising:
a processor; and memory including computer program instructions, the memory and the computer program instructions configured to, with the processor, cause the apparatus at least to perform: capture an image or a profile of the target; detect changes in an illumination level on captured image or the profile of the target; and change a LCD screen from a transparent characteristics mode to an optical characteristics mode when the detected changes in the illumination level exceeding a threshold. 15. The apparatus of claim 14 wherein the image or the profile of the target is captured by a camera. 16. The apparatus of claim 14 wherein the LCD screen arranged in front of the target in a vehicle configured to change from the transparent characteristics mode to the optical characteristics mode when the detected changes in the illumination level exceeding a threshold. 17. A method for controlling an optical characteristics of a LCD screen positioned in front of a target in a vehicle, the method comprising:
determining face location and pose estimation of the target within an image captured by a camera; determining changes in an illumination level on the face location; and changing an optical characteristic of the LCD screen overlapping the face location. 18. The method of claim 17 wherein determining changes in the illumination level on the face location further comprising:
determining changing lighting from an environment and an optical characteristic of the LCD screen. 19. The method of claim 18 further comprising:
projecting an array of patterns on the LCD screen;
detecting further changes in the illumination level on a target's eye;
identifying the patterns projected on the target's eye; and
changing the optical characteristic of the projected patterns on the LCD screen overlapping the target's eye. | A system for a vehicle comprises a medium arranged in front of a target in the vehicle, a target monitoring system arranged in front of the target in the vehicle capturing an image or a profile of the target, and a processing unit communicatively coupled the target monitoring camera to the medium, analyzed the captured image or profile of the target, wherein the processing unit arranged to analyze the obtained images or profile of the target and cause the medium to switch from a transparent mode to an opaque mode.1. A system for a vehicle comprising:
a medium arranged in front of a target in the vehicle; a target monitoring system arranged in front of the target in the vehicle capturing an image or a profile of the target; and a processing unit communicatively coupled the target monitoring camera to the medium, analyzed the captured image or profile of the target; wherein the processing unit arranged to analyze the obtained images or profile of the target and cause the medium to switch from a transparent mode to an opaque mode. 2. The system of claim 1 wherein the images or profile of the target captured by target monitoring system is at least one of an upper body of the target or a facial profile of the target. 3. The system of claim 2 wherein the target monitoring system is a camera. 4. The system of claim 1 wherein the processing unit further determined a path of a target's eye view. 5. The system of claim 4 wherein the processing unit further configured to selectively block out light sources in the path of the target's eye view and switch the medium to a substantially opaque optical characteristic. 6. The system of claim 5 wherein the medium is at least one of a LCD screen, glass, or plastic. 7. The system of claim 5 wherein the path of the target's eye view is a line of sight to the medium. 8. A non-transitory computer readable medium having stored thereon a computer program for controlling an optical characteristics of a LCD screen, the computer program comprising a routine of set instructions for causing the machine to perform:
determining face location and pose estimation within an image captured by a camera; determining changes in an illumination level on the face location; and changing an optical characteristic of the LCD screen overlapping the face location. 9. The non-transitory computer readable medium of claim 8 wherein determining changes in the illumination level on the face location further comprising:
determining changing lighting from an environment and an optical characteristic of the LCD screen. 10. The non-transitory computer readable medium of claim 9 further comprising:
projecting an array of patterns on the LCD screen;
detecting further changes in the illumination level on a target's eye;
identifying the patterns projected on the target's eye; and
changing the optical characteristic of the projected patterns on the LCD screen overlapping the target's eye. 10. The non-transitory computer readable medium of claim 9 further comprising:
selectively changing a portion of the LCD screen including an opaque characteristic overlapping the target's eye. 11. The non-transitory computer readable medium of claim 10 wherein the portion of the LCD screen comprises the projected patterns. 12. The non-transitory computer readable medium of claim 11 further comprising:
continuously updating projection mapping and facial illumination estimation in real-time when detecting changes of face location and pose estimation. 13. A computer program product embodying the non-transitory computer readable medium as claimed in claim 12. 14. Apparatus comprising:
a processor; and memory including computer program instructions, the memory and the computer program instructions configured to, with the processor, cause the apparatus at least to perform: capture an image or a profile of the target; detect changes in an illumination level on captured image or the profile of the target; and change a LCD screen from a transparent characteristics mode to an optical characteristics mode when the detected changes in the illumination level exceeding a threshold. 15. The apparatus of claim 14 wherein the image or the profile of the target is captured by a camera. 16. The apparatus of claim 14 wherein the LCD screen arranged in front of the target in a vehicle configured to change from the transparent characteristics mode to the optical characteristics mode when the detected changes in the illumination level exceeding a threshold. 17. A method for controlling an optical characteristics of a LCD screen positioned in front of a target in a vehicle, the method comprising:
determining face location and pose estimation of the target within an image captured by a camera; determining changes in an illumination level on the face location; and changing an optical characteristic of the LCD screen overlapping the face location. 18. The method of claim 17 wherein determining changes in the illumination level on the face location further comprising:
determining changing lighting from an environment and an optical characteristic of the LCD screen. 19. The method of claim 18 further comprising:
projecting an array of patterns on the LCD screen;
detecting further changes in the illumination level on a target's eye;
identifying the patterns projected on the target's eye; and
changing the optical characteristic of the projected patterns on the LCD screen overlapping the target's eye. | 2,400 |
8,969 | 8,969 | 15,628,333 | 2,449 | Methods and systems automatically adjusting resources and monitoring configurations of objects of a distributed computing system in response to changes to application programs. Methods search event messages for information indicating a change in execution of an object. The information is used to determine resource allocation rules of infrastructure resources by and a monitoring configuration for the object. Expected impacts on the infrastructure resource are determined from the rules. When an expected impact is greater than an associated impact threshold, use of the infrastructure resources may be adjusted to accommodate the changes. The adjustments include scaling up or down the infrastructure resources. When the object is a virtual object, the virtual object may be migrated from one server computer to another server computer within the distributed computer system. The monitoring configuration is used to adjust tools that monitor the objects of the distributed computing system. | 1. A method stored in one or more data-storage devices and executed using one or more processors of a management server computer of a distributed computing system to adjust resources and monitoring configuration of objects in the distributed computing system, the method comprising:
identifying information at a monitoring tool of the distributed computing system, the information indicating a change to an object of the distributed computing system; determining an expected impact on infrastructure resources of the distributed computing system based on the information; determining an expected monitoring configuration for the object and the monitoring tool based on the information; adjusting use of infrastructure resources of the distributed computing system to accommodate the change to the object based on the expected impact; and adjusting a monitoring configuration of the monitoring tool and the object based on the expected monitoring configuration. 2. The method of claim 1, wherein identifying the information comprises identifying non-parametric text, phrases or event types of event messages generated by event sources of the object that indicate one of installation of an application program at the object, enable services provided by an application program located at the object, removal of an application program from the object, disable services provided by an application program located on the object, and restructure an application program running in the object. 3. The method of claim 1, wherein determining the expected impact on infrastructure resources of the distributed computing system comprises searching a database of application resource allocation rules for a rule of expected use of infrastructure resources in based on the information. 4. The method of claim 1, wherein determining the expected monitoring configuration comprises searching a database of monitoring configuration rules for an expected monitoring configuration based on the information. 5. The method of claim 1, wherein determining the expected impact on the infrastructure resources comprises:
when rules are not available for the application program,
collecting metric data of infrastructure resources used by the virtual object before the change in the application program;
collecting metric data of the infrastructure resources used by the virtual object after the change in the application program;
compute rules as a difference between the metric data collected before and after the change in the virtual object; and
storing the rule in a database of resource allocation rules. 6. The method of claim 1, wherein determining an expected impact on the infrastructure resource based on the rule comprises computing an expected impact on the infrastructure resources of the distributed computing system based on current use of the infrastructure resource and the expected use of the infrastructure resource. 7. The method of claim 1, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; scaling up infrastructure resources available to the object, when the object is a virtual object and an application program or service supported by the object is installed or enabled; and scaling down infrastructure resource available to the object, when the object is a virtual object and an application program or service supported by the object is removed, disabled or stopped. 8. The method of claim 1, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; and migrating the object from one server computer to another server computer of distributed computing system, when the object is a virtual resource. 9. The method of claim 1, adjusting the monitoring configuration of the monitoring tool and the object comprises:
plugging in a content pack to the monitoring tool, the content pack associated with change to the virtual object; and reconfiguring a log monitoring agent to include a log path and a log parse associated with the change to the object. 10. A system to adjust resources and monitoring configuration of objects in the distributed computing system in a distributed computing system, the system comprising:
one or more processors; one or more data-storage devices; and machine-readable instructions stored in the one or more data-storage devices that when executed using the one or more processors controls the system to carry out
identifying information at a monitoring tool of the distributed computing system, the information indicating a change to an object of the distributed computing system;
determining an expected impact on infrastructure resources of the distributed computing system based on the information;
determining an expected monitoring configuration for the object and the monitoring tool based on the information;
adjusting use of infrastructure resources of the distributed computing system to accommodate the change to the object based on the expected impact; and
adjusting a monitoring configuration of the monitoring tool and the object based on the expected monitoring configuration. 11. The system of claim 10, wherein identifying the information comprises identifying non-parametric text, phrases or event types of event messages generated by event sources of the object that indicate one of installation of an application program at the object, enable services provided by an application program located at the object, removal of an application program from the object, disable services provided by an application program located on the object, and restructure an application program running in the object. 12. The system of claim 10, wherein determining the expected impact on infrastructure resources of the distributed computing system comprises searching a database of application resource allocation rules for a rule of expected use of infrastructure resources in based on the information. 13. The system of claim 10, wherein determining the expected monitoring configuration comprises searching a database of monitoring configuration rules for an expected monitoring configuration based on the information. 14. The system of claim 10, wherein determining the expected impact on the infrastructure resources comprises:
when rules are not available for the application program,
collecting metric data of infrastructure resources used by the virtual object before the change in the application program;
collecting metric data of the infrastructure resources used by the virtual object after the change in the application program;
compute rules as a difference between the metric data collected before and after the change in the virtual object; and
storing the rule in a database of resource allocation rules. 15. The system of claim 10, wherein determining an expected impact on the infrastructure resource based on the rule comprises computing an expected impact on the infrastructure resources of the distributed computing system based on current use of the infrastructure resource and the expected use of the infrastructure resource. 16. The system of claim 10, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; scaling up infrastructure resources available to the object, when the object is a virtual object and an application program or service supported by the object is installed or enabled; and scaling down infrastructure resource available to the object, when the object is a virtual object and an application program or service supported by the object is removed, disabled or stopped. 17. The system of claim 10, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; and migrating the object from one server computer to another server computer of distributed computing system, when the object is a virtual resource. 18. The system of claim 10, adjusting the monitoring configuration of the monitoring tool and the object comprises:
plugging in a content pack to the monitoring tool, the content pack associated with change to the virtual object; and reconfiguring a log monitoring agent to include a log path and a log parse associated with the change to the object. 19. A non-transitory computer-readable medium encoded with machine-readable instructions that implement a method carried out by one or more processors of a computer system to perform the operations of identifying information at a monitoring tool of the distributed computing system, the information indicating a change to an object of the distributed computing system;
determining an expected impact on infrastructure resources of the distributed computing system based on the information; determining an expected monitoring configuration for the object and the monitoring tool based on the information; adjusting use of infrastructure resources of the distributed computing system to accommodate the change to the object based on the expected impact; and adjusting a monitoring configuration of the monitoring tool and the object based on the expected monitoring configuration. 20. The medium of claim 19, wherein identifying the information comprises identifying non-parametric text, phrases or event types of event messages generated by event sources of the object that indicate one of installation of an application program at the object, enable services provided by an application program located at the object, removal of an application program from the object, disable services provided by an application program located on the object, and restructure an application program running in the object. 21. The medium of claim 19, wherein determining the expected impact on infrastructure resources of the distributed computing system comprises searching a database of application resource allocation rules for a rule of expected use of infrastructure resources in based on the information. 22. The medium of claim 19, wherein determining the expected monitoring configuration comprises searching a database of monitoring configuration rules for an expected monitoring configuration based on the information. 23. The medium of claim 19, wherein determining the expected impact on the infrastructure resources comprises:
when rules are not available for the application program,
collecting metric data of infrastructure resources used by the virtual object before the change in the application program;
collecting metric data of the infrastructure resources used by the virtual object after the change in the application program;
compute rules as a difference between the metric data collected before and after the change in the virtual object; and
storing the rule in a database of resource allocation rules. 24. The medium of claim 19, wherein determining an expected impact on the infrastructure resource based on the rule comprises computing an expected impact on the infrastructure resources of the distributed computing system based on current use of the infrastructure resource and the expected use of the infrastructure resource. 25. The medium of claim 19, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; scaling up infrastructure resources available to the object, when the object is a virtual object and an application program or service supported by the object is installed or enabled; and scaling down infrastructure resource available to the object, when the object is a virtual object and an application program or service supported by the object is removed, disabled or stopped. 26. The medium of claim 19, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; and migrating the object from one server computer to another server computer of distributed computing system, when the object is a virtual resource. 27. The medium of claim 19, adjusting the monitoring configuration of the monitoring tool and the object comprises:
plugging in a content pack to the monitoring tool, the content pack associated with change to the virtual object; and reconfiguring a log monitoring agent to include a log path and a log parse associated with the change to the object. | Methods and systems automatically adjusting resources and monitoring configurations of objects of a distributed computing system in response to changes to application programs. Methods search event messages for information indicating a change in execution of an object. The information is used to determine resource allocation rules of infrastructure resources by and a monitoring configuration for the object. Expected impacts on the infrastructure resource are determined from the rules. When an expected impact is greater than an associated impact threshold, use of the infrastructure resources may be adjusted to accommodate the changes. The adjustments include scaling up or down the infrastructure resources. When the object is a virtual object, the virtual object may be migrated from one server computer to another server computer within the distributed computer system. The monitoring configuration is used to adjust tools that monitor the objects of the distributed computing system.1. A method stored in one or more data-storage devices and executed using one or more processors of a management server computer of a distributed computing system to adjust resources and monitoring configuration of objects in the distributed computing system, the method comprising:
identifying information at a monitoring tool of the distributed computing system, the information indicating a change to an object of the distributed computing system; determining an expected impact on infrastructure resources of the distributed computing system based on the information; determining an expected monitoring configuration for the object and the monitoring tool based on the information; adjusting use of infrastructure resources of the distributed computing system to accommodate the change to the object based on the expected impact; and adjusting a monitoring configuration of the monitoring tool and the object based on the expected monitoring configuration. 2. The method of claim 1, wherein identifying the information comprises identifying non-parametric text, phrases or event types of event messages generated by event sources of the object that indicate one of installation of an application program at the object, enable services provided by an application program located at the object, removal of an application program from the object, disable services provided by an application program located on the object, and restructure an application program running in the object. 3. The method of claim 1, wherein determining the expected impact on infrastructure resources of the distributed computing system comprises searching a database of application resource allocation rules for a rule of expected use of infrastructure resources in based on the information. 4. The method of claim 1, wherein determining the expected monitoring configuration comprises searching a database of monitoring configuration rules for an expected monitoring configuration based on the information. 5. The method of claim 1, wherein determining the expected impact on the infrastructure resources comprises:
when rules are not available for the application program,
collecting metric data of infrastructure resources used by the virtual object before the change in the application program;
collecting metric data of the infrastructure resources used by the virtual object after the change in the application program;
compute rules as a difference between the metric data collected before and after the change in the virtual object; and
storing the rule in a database of resource allocation rules. 6. The method of claim 1, wherein determining an expected impact on the infrastructure resource based on the rule comprises computing an expected impact on the infrastructure resources of the distributed computing system based on current use of the infrastructure resource and the expected use of the infrastructure resource. 7. The method of claim 1, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; scaling up infrastructure resources available to the object, when the object is a virtual object and an application program or service supported by the object is installed or enabled; and scaling down infrastructure resource available to the object, when the object is a virtual object and an application program or service supported by the object is removed, disabled or stopped. 8. The method of claim 1, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; and migrating the object from one server computer to another server computer of distributed computing system, when the object is a virtual resource. 9. The method of claim 1, adjusting the monitoring configuration of the monitoring tool and the object comprises:
plugging in a content pack to the monitoring tool, the content pack associated with change to the virtual object; and reconfiguring a log monitoring agent to include a log path and a log parse associated with the change to the object. 10. A system to adjust resources and monitoring configuration of objects in the distributed computing system in a distributed computing system, the system comprising:
one or more processors; one or more data-storage devices; and machine-readable instructions stored in the one or more data-storage devices that when executed using the one or more processors controls the system to carry out
identifying information at a monitoring tool of the distributed computing system, the information indicating a change to an object of the distributed computing system;
determining an expected impact on infrastructure resources of the distributed computing system based on the information;
determining an expected monitoring configuration for the object and the monitoring tool based on the information;
adjusting use of infrastructure resources of the distributed computing system to accommodate the change to the object based on the expected impact; and
adjusting a monitoring configuration of the monitoring tool and the object based on the expected monitoring configuration. 11. The system of claim 10, wherein identifying the information comprises identifying non-parametric text, phrases or event types of event messages generated by event sources of the object that indicate one of installation of an application program at the object, enable services provided by an application program located at the object, removal of an application program from the object, disable services provided by an application program located on the object, and restructure an application program running in the object. 12. The system of claim 10, wherein determining the expected impact on infrastructure resources of the distributed computing system comprises searching a database of application resource allocation rules for a rule of expected use of infrastructure resources in based on the information. 13. The system of claim 10, wherein determining the expected monitoring configuration comprises searching a database of monitoring configuration rules for an expected monitoring configuration based on the information. 14. The system of claim 10, wherein determining the expected impact on the infrastructure resources comprises:
when rules are not available for the application program,
collecting metric data of infrastructure resources used by the virtual object before the change in the application program;
collecting metric data of the infrastructure resources used by the virtual object after the change in the application program;
compute rules as a difference between the metric data collected before and after the change in the virtual object; and
storing the rule in a database of resource allocation rules. 15. The system of claim 10, wherein determining an expected impact on the infrastructure resource based on the rule comprises computing an expected impact on the infrastructure resources of the distributed computing system based on current use of the infrastructure resource and the expected use of the infrastructure resource. 16. The system of claim 10, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; scaling up infrastructure resources available to the object, when the object is a virtual object and an application program or service supported by the object is installed or enabled; and scaling down infrastructure resource available to the object, when the object is a virtual object and an application program or service supported by the object is removed, disabled or stopped. 17. The system of claim 10, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; and migrating the object from one server computer to another server computer of distributed computing system, when the object is a virtual resource. 18. The system of claim 10, adjusting the monitoring configuration of the monitoring tool and the object comprises:
plugging in a content pack to the monitoring tool, the content pack associated with change to the virtual object; and reconfiguring a log monitoring agent to include a log path and a log parse associated with the change to the object. 19. A non-transitory computer-readable medium encoded with machine-readable instructions that implement a method carried out by one or more processors of a computer system to perform the operations of identifying information at a monitoring tool of the distributed computing system, the information indicating a change to an object of the distributed computing system;
determining an expected impact on infrastructure resources of the distributed computing system based on the information; determining an expected monitoring configuration for the object and the monitoring tool based on the information; adjusting use of infrastructure resources of the distributed computing system to accommodate the change to the object based on the expected impact; and adjusting a monitoring configuration of the monitoring tool and the object based on the expected monitoring configuration. 20. The medium of claim 19, wherein identifying the information comprises identifying non-parametric text, phrases or event types of event messages generated by event sources of the object that indicate one of installation of an application program at the object, enable services provided by an application program located at the object, removal of an application program from the object, disable services provided by an application program located on the object, and restructure an application program running in the object. 21. The medium of claim 19, wherein determining the expected impact on infrastructure resources of the distributed computing system comprises searching a database of application resource allocation rules for a rule of expected use of infrastructure resources in based on the information. 22. The medium of claim 19, wherein determining the expected monitoring configuration comprises searching a database of monitoring configuration rules for an expected monitoring configuration based on the information. 23. The medium of claim 19, wherein determining the expected impact on the infrastructure resources comprises:
when rules are not available for the application program,
collecting metric data of infrastructure resources used by the virtual object before the change in the application program;
collecting metric data of the infrastructure resources used by the virtual object after the change in the application program;
compute rules as a difference between the metric data collected before and after the change in the virtual object; and
storing the rule in a database of resource allocation rules. 24. The medium of claim 19, wherein determining an expected impact on the infrastructure resource based on the rule comprises computing an expected impact on the infrastructure resources of the distributed computing system based on current use of the infrastructure resource and the expected use of the infrastructure resource. 25. The medium of claim 19, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; scaling up infrastructure resources available to the object, when the object is a virtual object and an application program or service supported by the object is installed or enabled; and scaling down infrastructure resource available to the object, when the object is a virtual object and an application program or service supported by the object is removed, disabled or stopped. 26. The medium of claim 19, wherein adjusting the infrastructure resources of the distributed computing system comprises:
generating an alert identifying the infrastructure resource as expected to be impacted by the change; and migrating the object from one server computer to another server computer of distributed computing system, when the object is a virtual resource. 27. The medium of claim 19, adjusting the monitoring configuration of the monitoring tool and the object comprises:
plugging in a content pack to the monitoring tool, the content pack associated with change to the virtual object; and reconfiguring a log monitoring agent to include a log path and a log parse associated with the change to the object. | 2,400 |
8,970 | 8,970 | 16,408,731 | 2,446 | The present invention broadly comprises crowd-sourced computer-implemented methods and systems of collecting and transforming portable device data. One embodiment of the invention may be implemented as a system including an electronic device including a sensor configured to collect data, the device configured to begin collection of data based on a command from a user of the electronic device; and a server configured to issue a command to the electronic device to turn on the sensor and transmit data collected by the sensor to the server without any input by the user of the electronic device when a condition is met. | 1. (canceled) 2. A system comprising at least one processor and memory, the system configured to:
generate, based on event information, alert information for an event at a physical location, the alert information including location information for a plurality of mobile devices located in vicinity of the physical location; transmit the alert information to one or more mobile devices located in the vicinity of the physical location; receive, from at least one of the one or more mobile devices, sensor data collected by a sensor of the mobile device and/or data input by a user to the mobile device; and update the event information based on the received sensor data and/or the received input data. 3. The system of claim 2, the system is further configured to: identify one or more mobile devices (1) associated with a user having competencies needed for the event and (2) located in the vicinity of the event; and automatically transmit information about the event to the identified one or more mobile devices. 4. The system of claim 2, wherein the input data includes a skillset or competency of a user associated with the mobile device. 5. The system of claim 4, further configured to, based on the skillset or competency, identify mobile devices associated with users having competencies relevant to the event and located in the vicinity of the event, and transmit, to the identified mobile devices, information about the event so that the user can utilize their competencies to ameliorate negative consequences caused by the event. 6. The system of claim 2, wherein the alert information includes a description and the location of the event. 7. The system of claim 2, further configured to analyze the sensor data and/or the input data to determine a further event or a next likely scenario. 8. The system of claim 2, wherein the mobile device is a smartphone or a tablet. 9. The system of claim 2, wherein the sensor of the mobile device is a video camera, a microphone, a thermometer, motion sensor, or a position sensor. 10. The system of claim 2, wherein the alert information is transmitted to one or more mobile devices located in the vicinity of the physical location when a determination is made that the event information satisfies one or more conditions relating to location, time, key words, weather, and/or temperature. 11. The system of claim 2, wherein the input data includes a health condition of a user associated with the mobile device. 12. The system of claim 2, further configured to transmit, to the one or more mobile devices, a command to record video, audio and/or imagery data. 13. A mobile device comprising:
a display; a sensor; and a processing system including at least one processor and coupled to the display and the sensor, the processing system configured to:
receive, from a server, event information for an event at a physical location within vicinity of the mobile device;
display at least a portion of the event information on the display, the displayed event information including locations for a plurality of mobile devices located in the vicinity of the physical location;
in response to a command, record video, audio and/or imagery data using the sensor; and
transmit, to the server, the recorded video, audio and/or imagery data. 14. The mobile device of claim 13, wherein the event information is displayed in a web-based software application. 15. The mobile device of claim 13, wherein the processing system is further configured to: receive a user input indicating a skillset or competency of a user associated with the mobile device, and transmitting data indicating the user's skillset or competency to the server. 16. The mobile device of claim 15, receiving, from the server, additional information about the event for the user to utilize the indicated skillset or competency to ameliorate negative consequences caused by the event. 17. The mobile device of claim 13, wherein the displayed event information includes a description of the event and a map with an event maker indicating location of the event and user markers indicating locations of users associated with the plurality of mobile devices. 18. A computer implemented method comprising:
generating, based on event information, alert information for an event at a physical location, the alert information including location information for a plurality of mobile devices located in vicinity of the physical location; transmitting, the alert information to one or more mobile devices located in vicinity of the physical location; receiving, from at least one of the one or more mobile devices, sensor data collected by a sensor of the mobile device and/or data input b a user to the mobile device; and updating the event information based on the received sensor data and/or the received input data. 19. The method of claim 18, wherein the alert information is generated based on data received from a plurality of mobile device satisfying one or more conditions relating to location, time, key words, weather, and/or temperature. 20. The method of claim 18, further comprises transmitting, to the one or more mobile devices, a command to record video, audio and/or imagery data. 21. A server for integrating data collected by mobile devices, the server comprising a processing system configured to:
receive, from a mobile device, data collected by a sensor of the mobile device; integrate data received from the mobile device with data received from other mobile devices to create event information for an event at a physical location; generate an alert for the event based on the event information, the alert including location information for a plurality of mobile devices located in a vicinity of the physical location; transmit the alert to at least one mobile device located in the vicinity of the physical location; receive, from the at least one mobile device located in the vicinity of the physical location, sensor data collected by a sensor of the mobile device located in the vicinity of the physical location and data input by a user to the mobile device; and update the event information based on the received sensor data and the received input data. 22. The mobile device of claim 13, wherein the displayed event information includes a map indicating the physical location of the event and locations of users associated with the plurality of mobile devices located in the vicinity of the physical location, and the processing system is configured to display an option to switch between displaying and hiding the locations of the users associated with the plurality of mobile devices located in the vicinity of the physical location. | The present invention broadly comprises crowd-sourced computer-implemented methods and systems of collecting and transforming portable device data. One embodiment of the invention may be implemented as a system including an electronic device including a sensor configured to collect data, the device configured to begin collection of data based on a command from a user of the electronic device; and a server configured to issue a command to the electronic device to turn on the sensor and transmit data collected by the sensor to the server without any input by the user of the electronic device when a condition is met.1. (canceled) 2. A system comprising at least one processor and memory, the system configured to:
generate, based on event information, alert information for an event at a physical location, the alert information including location information for a plurality of mobile devices located in vicinity of the physical location; transmit the alert information to one or more mobile devices located in the vicinity of the physical location; receive, from at least one of the one or more mobile devices, sensor data collected by a sensor of the mobile device and/or data input by a user to the mobile device; and update the event information based on the received sensor data and/or the received input data. 3. The system of claim 2, the system is further configured to: identify one or more mobile devices (1) associated with a user having competencies needed for the event and (2) located in the vicinity of the event; and automatically transmit information about the event to the identified one or more mobile devices. 4. The system of claim 2, wherein the input data includes a skillset or competency of a user associated with the mobile device. 5. The system of claim 4, further configured to, based on the skillset or competency, identify mobile devices associated with users having competencies relevant to the event and located in the vicinity of the event, and transmit, to the identified mobile devices, information about the event so that the user can utilize their competencies to ameliorate negative consequences caused by the event. 6. The system of claim 2, wherein the alert information includes a description and the location of the event. 7. The system of claim 2, further configured to analyze the sensor data and/or the input data to determine a further event or a next likely scenario. 8. The system of claim 2, wherein the mobile device is a smartphone or a tablet. 9. The system of claim 2, wherein the sensor of the mobile device is a video camera, a microphone, a thermometer, motion sensor, or a position sensor. 10. The system of claim 2, wherein the alert information is transmitted to one or more mobile devices located in the vicinity of the physical location when a determination is made that the event information satisfies one or more conditions relating to location, time, key words, weather, and/or temperature. 11. The system of claim 2, wherein the input data includes a health condition of a user associated with the mobile device. 12. The system of claim 2, further configured to transmit, to the one or more mobile devices, a command to record video, audio and/or imagery data. 13. A mobile device comprising:
a display; a sensor; and a processing system including at least one processor and coupled to the display and the sensor, the processing system configured to:
receive, from a server, event information for an event at a physical location within vicinity of the mobile device;
display at least a portion of the event information on the display, the displayed event information including locations for a plurality of mobile devices located in the vicinity of the physical location;
in response to a command, record video, audio and/or imagery data using the sensor; and
transmit, to the server, the recorded video, audio and/or imagery data. 14. The mobile device of claim 13, wherein the event information is displayed in a web-based software application. 15. The mobile device of claim 13, wherein the processing system is further configured to: receive a user input indicating a skillset or competency of a user associated with the mobile device, and transmitting data indicating the user's skillset or competency to the server. 16. The mobile device of claim 15, receiving, from the server, additional information about the event for the user to utilize the indicated skillset or competency to ameliorate negative consequences caused by the event. 17. The mobile device of claim 13, wherein the displayed event information includes a description of the event and a map with an event maker indicating location of the event and user markers indicating locations of users associated with the plurality of mobile devices. 18. A computer implemented method comprising:
generating, based on event information, alert information for an event at a physical location, the alert information including location information for a plurality of mobile devices located in vicinity of the physical location; transmitting, the alert information to one or more mobile devices located in vicinity of the physical location; receiving, from at least one of the one or more mobile devices, sensor data collected by a sensor of the mobile device and/or data input b a user to the mobile device; and updating the event information based on the received sensor data and/or the received input data. 19. The method of claim 18, wherein the alert information is generated based on data received from a plurality of mobile device satisfying one or more conditions relating to location, time, key words, weather, and/or temperature. 20. The method of claim 18, further comprises transmitting, to the one or more mobile devices, a command to record video, audio and/or imagery data. 21. A server for integrating data collected by mobile devices, the server comprising a processing system configured to:
receive, from a mobile device, data collected by a sensor of the mobile device; integrate data received from the mobile device with data received from other mobile devices to create event information for an event at a physical location; generate an alert for the event based on the event information, the alert including location information for a plurality of mobile devices located in a vicinity of the physical location; transmit the alert to at least one mobile device located in the vicinity of the physical location; receive, from the at least one mobile device located in the vicinity of the physical location, sensor data collected by a sensor of the mobile device located in the vicinity of the physical location and data input by a user to the mobile device; and update the event information based on the received sensor data and the received input data. 22. The mobile device of claim 13, wherein the displayed event information includes a map indicating the physical location of the event and locations of users associated with the plurality of mobile devices located in the vicinity of the physical location, and the processing system is configured to display an option to switch between displaying and hiding the locations of the users associated with the plurality of mobile devices located in the vicinity of the physical location. | 2,400 |
8,971 | 8,971 | 15,364,872 | 2,481 | A method and system for detecting a fall risk condition, the system comprising a surveillance camera configured to generate a plurality of frames showing a surveillance viewport of an area including a patient area, and a computer system comprising memory and logic circuitry configured to identify a first set of frames from the plurality of frames, generate motion images for the first set of frames, determine features from the motion images, the features including at least one of a centroid, centroid area, connected components ratio, bed motion percentage, and unconnected motion, train a classifier based on the determined features from the motion images, receive a second set of frames from the plurality of frames, detect a fall risk event associated with the second set of frames using the classifier, and issue a fall alert based on the detection of the fall risk event, the fall alert comprising one or both of a visual indication and an audible indication. | 1. A surveillance system for detecting a fall risk condition, the system comprising:
a surveillance camera configured to generate a plurality of frames showing a surveillance viewport of an area including a patient area; and a computer system comprising memory and logic circuitry configured to: identify a first set of frames from the plurality of frames; generate motion images for the first set of frames; determine features from the motion images, the features selected from the group consisting of a centroid, centroid area, connected components ratio, bed motion percentage, and unconnected motion; train a classifier based on the determined features from the motion images; receive a second set of frames from the plurality of frames; detect a fall risk event associated with the second set of frames using the classifier; and issue a fall alert based on the detection of the fall risk event, the fall alert comprising one or both of a visual indication and an audible indication. 2. The system of claim 1 wherein the computer system analyzes the plurality of frames for bed fall events. 3. The system of claim 1 wherein the computer system examines and labels the plurality of frames as the alarm cases or no-alarm cases. 4. The system of claim 1 wherein the computer system identifies a number and sequence of frames that trigger an alarm. 5. The system of claim 1 wherein the computer system:
detects motion of pixels by comparing pixels of a current frame with at least one previous frame; and
marks pixels that have changed as a motion pixel in a given motion image. 6. The system of claim 1 wherein the computer system locates the centroid by computing a weighted average x and y coordinates of all motion pixels in a given motion image. 7. The system of claim 1 wherein the bed motion percentage is a ratio of motion pixels from a given motion image within a virtual bed zone to a total pixel count in the virtual bed zone. 8. The system of claim 1 wherein the computer system:
groups motion pixels that are connected in a given motion image into clusters; and
prunes motion pixels from the given motion image that do not have at least one pixel within a threshold distance of a virtual bed zone. 9. The system of claim 8 wherein the computer system determines the connected components ratio based on a ratio of motion pixels outside the virtual bed zone to motion pixels inside the virtual bed zone. 10. The system of claim 8 wherein the computer system determines the unconnected motion by calculating an amount of motion pixels in the area of the centroid that is unrelated to connected motion pixels within and near the virtual bed zone. 11. A method for predicting a condition of elevated risk of a fall with a computer system comprising:
receiving a plurality of frames from a surveillance camera showing a surveillance viewport of an area including a patient area; identifying a first set of frames from the plurality of frames; generating motion images for the first set of frames; determining features from the motion images, the features selected from the group consisting of a centroid, centroid area, connected components ratio, bed motion percentage, and unconnected motion; training a classifier based on the determined features from the motion images; receiving a second set of frames from the plurality of frames; detecting a fall risk event associated with the second set of frames using the classifier; and issuing a fall alert based on the detection of the fall risk event, the fall alert comprising one or both of a visual indication and an audible indication. 12. The method of claim 11 further comprising analyzing the plurality of frames for bed fall events. 13. The method of claim 11 further comprising examining and labeling the plurality of frames as the alarm cases or no-alarm cases. 14. The method of claim 11 further comprising identifying a number and sequence of frames that trigger an alarm. 15. The method of claim 11 further comprising:
detecting motion of pixels by comparing pixels of a current frame with at least one previous frame; and
marking pixels that have changed as a motion pixel in a given motion image. 16. The method of claim 11 further comprising locating the centroid by computing a weighted average x and y coordinates of all motion pixels in a given motion image. 17. The method of claim 11 wherein the bed motion percentage is a ratio of motion pixels from a given motion image within a virtual bed zone to a total pixel count in the virtual bed zone. 18. The method of claim 11 further comprising:
grouping motion pixels that are connected in a given motion image into clusters; and
pruning motion pixels from the given motion image that don't have at least one pixel within a threshold distance of the virtual bed zone. 19. The method of claim 18 further comprising determining the connected components ratio based on a ratio of motion pixels outside the virtual bed zone to motion pixels inside the virtual bed zone. 20. The method of claim 18 further comprising determining the unconnected motion by calculating an amount of motion pixels in the area of the centroid that is unrelated to connected motion pixels within and near the virtual bed zone. | A method and system for detecting a fall risk condition, the system comprising a surveillance camera configured to generate a plurality of frames showing a surveillance viewport of an area including a patient area, and a computer system comprising memory and logic circuitry configured to identify a first set of frames from the plurality of frames, generate motion images for the first set of frames, determine features from the motion images, the features including at least one of a centroid, centroid area, connected components ratio, bed motion percentage, and unconnected motion, train a classifier based on the determined features from the motion images, receive a second set of frames from the plurality of frames, detect a fall risk event associated with the second set of frames using the classifier, and issue a fall alert based on the detection of the fall risk event, the fall alert comprising one or both of a visual indication and an audible indication.1. A surveillance system for detecting a fall risk condition, the system comprising:
a surveillance camera configured to generate a plurality of frames showing a surveillance viewport of an area including a patient area; and a computer system comprising memory and logic circuitry configured to: identify a first set of frames from the plurality of frames; generate motion images for the first set of frames; determine features from the motion images, the features selected from the group consisting of a centroid, centroid area, connected components ratio, bed motion percentage, and unconnected motion; train a classifier based on the determined features from the motion images; receive a second set of frames from the plurality of frames; detect a fall risk event associated with the second set of frames using the classifier; and issue a fall alert based on the detection of the fall risk event, the fall alert comprising one or both of a visual indication and an audible indication. 2. The system of claim 1 wherein the computer system analyzes the plurality of frames for bed fall events. 3. The system of claim 1 wherein the computer system examines and labels the plurality of frames as the alarm cases or no-alarm cases. 4. The system of claim 1 wherein the computer system identifies a number and sequence of frames that trigger an alarm. 5. The system of claim 1 wherein the computer system:
detects motion of pixels by comparing pixels of a current frame with at least one previous frame; and
marks pixels that have changed as a motion pixel in a given motion image. 6. The system of claim 1 wherein the computer system locates the centroid by computing a weighted average x and y coordinates of all motion pixels in a given motion image. 7. The system of claim 1 wherein the bed motion percentage is a ratio of motion pixels from a given motion image within a virtual bed zone to a total pixel count in the virtual bed zone. 8. The system of claim 1 wherein the computer system:
groups motion pixels that are connected in a given motion image into clusters; and
prunes motion pixels from the given motion image that do not have at least one pixel within a threshold distance of a virtual bed zone. 9. The system of claim 8 wherein the computer system determines the connected components ratio based on a ratio of motion pixels outside the virtual bed zone to motion pixels inside the virtual bed zone. 10. The system of claim 8 wherein the computer system determines the unconnected motion by calculating an amount of motion pixels in the area of the centroid that is unrelated to connected motion pixels within and near the virtual bed zone. 11. A method for predicting a condition of elevated risk of a fall with a computer system comprising:
receiving a plurality of frames from a surveillance camera showing a surveillance viewport of an area including a patient area; identifying a first set of frames from the plurality of frames; generating motion images for the first set of frames; determining features from the motion images, the features selected from the group consisting of a centroid, centroid area, connected components ratio, bed motion percentage, and unconnected motion; training a classifier based on the determined features from the motion images; receiving a second set of frames from the plurality of frames; detecting a fall risk event associated with the second set of frames using the classifier; and issuing a fall alert based on the detection of the fall risk event, the fall alert comprising one or both of a visual indication and an audible indication. 12. The method of claim 11 further comprising analyzing the plurality of frames for bed fall events. 13. The method of claim 11 further comprising examining and labeling the plurality of frames as the alarm cases or no-alarm cases. 14. The method of claim 11 further comprising identifying a number and sequence of frames that trigger an alarm. 15. The method of claim 11 further comprising:
detecting motion of pixels by comparing pixels of a current frame with at least one previous frame; and
marking pixels that have changed as a motion pixel in a given motion image. 16. The method of claim 11 further comprising locating the centroid by computing a weighted average x and y coordinates of all motion pixels in a given motion image. 17. The method of claim 11 wherein the bed motion percentage is a ratio of motion pixels from a given motion image within a virtual bed zone to a total pixel count in the virtual bed zone. 18. The method of claim 11 further comprising:
grouping motion pixels that are connected in a given motion image into clusters; and
pruning motion pixels from the given motion image that don't have at least one pixel within a threshold distance of the virtual bed zone. 19. The method of claim 18 further comprising determining the connected components ratio based on a ratio of motion pixels outside the virtual bed zone to motion pixels inside the virtual bed zone. 20. The method of claim 18 further comprising determining the unconnected motion by calculating an amount of motion pixels in the area of the centroid that is unrelated to connected motion pixels within and near the virtual bed zone. | 2,400 |
8,972 | 8,972 | 15,500,463 | 2,425 | According to one example for capturing three-dimensional data of an object, illumination of an object is initiated, the object is scanned with a sensor, and a 3D representation of the object is created. Illumination of the object may comprise illumination of a surface of the object within a field of view of the sensor. | 1. A method of capturing three-dimensional data of an object, comprising:
initiating illumination of the object; scanning the object with a sensor; and creating a 3D representation of the object, wherein initiating illumination of the object comprises illuminating a surface of the object within a field of view of the sensor. 2. The method according to claim 1, wherein illuminating a surface of the object within a field of view of the sensor provides visual guidance as to whether an object surface is within a scanning region. 3. The method according to claim 1, wherein scanning the object with a sensor comprises scanning the illuminated surface. 4. The method according to claim 1, wherein scanning the object with a sensor comprises rotating the object within a field of view of the sensor. 5. The method according to claim 1, wherein the 3D representation of the object is output to a digital display. 6. The method according to claim 1, wherein the 3D representation of the object is output to a 3D printer. 7. The method according to claim 1, wherein scanning the object with the sensor comprises scanning an area of the object proximate to the location of a pointer device. 8. The method according to claim 7, wherein the pointer device is a stylus. 9. A system, comprising:
a support structure including a base; a 3D sensor attachable to the support structure; an illumination source attachable to the support structure; a computer communicatively coupled to the 3D sensor and the illumination source; and a monitor communicatively coupled to the computer, wherein the illumination source is to project light onto an object to represent a field of view of the 3D sensor, and wherein the monitor is to display a 3D representation of the object within the field of view. 10. The system according to claim 9, wherein the illumination is to provide visual guidance as to whether an object surface is within a scanning region. 11. The system according to claim 9, wherein the illumination source is a projector and mirror assembly. 12. The system according to claim 9 further comprising a pointer device, wherein the pointer device is to indicate an area to be scanned by the 3D sensor within a field of view of the 3D sensor. 13. The system according to claim 12, wherein the 3D sensor tracks the pointer device. 14. The system according to claim 12, wherein the pointer device is a 3D stylus. 15. A non-transitory computer readable storage medium on which is embedded a computer program, said computer program to capture three-dimensional data of an object, said computer program comprising a set of instructions to:
initiate illumination of the object; scan the object with a sensor; and create a 3D representation of the object, wherein the instructions are to initiate illumination of the object within a field of view of the sensor. | According to one example for capturing three-dimensional data of an object, illumination of an object is initiated, the object is scanned with a sensor, and a 3D representation of the object is created. Illumination of the object may comprise illumination of a surface of the object within a field of view of the sensor.1. A method of capturing three-dimensional data of an object, comprising:
initiating illumination of the object; scanning the object with a sensor; and creating a 3D representation of the object, wherein initiating illumination of the object comprises illuminating a surface of the object within a field of view of the sensor. 2. The method according to claim 1, wherein illuminating a surface of the object within a field of view of the sensor provides visual guidance as to whether an object surface is within a scanning region. 3. The method according to claim 1, wherein scanning the object with a sensor comprises scanning the illuminated surface. 4. The method according to claim 1, wherein scanning the object with a sensor comprises rotating the object within a field of view of the sensor. 5. The method according to claim 1, wherein the 3D representation of the object is output to a digital display. 6. The method according to claim 1, wherein the 3D representation of the object is output to a 3D printer. 7. The method according to claim 1, wherein scanning the object with the sensor comprises scanning an area of the object proximate to the location of a pointer device. 8. The method according to claim 7, wherein the pointer device is a stylus. 9. A system, comprising:
a support structure including a base; a 3D sensor attachable to the support structure; an illumination source attachable to the support structure; a computer communicatively coupled to the 3D sensor and the illumination source; and a monitor communicatively coupled to the computer, wherein the illumination source is to project light onto an object to represent a field of view of the 3D sensor, and wherein the monitor is to display a 3D representation of the object within the field of view. 10. The system according to claim 9, wherein the illumination is to provide visual guidance as to whether an object surface is within a scanning region. 11. The system according to claim 9, wherein the illumination source is a projector and mirror assembly. 12. The system according to claim 9 further comprising a pointer device, wherein the pointer device is to indicate an area to be scanned by the 3D sensor within a field of view of the 3D sensor. 13. The system according to claim 12, wherein the 3D sensor tracks the pointer device. 14. The system according to claim 12, wherein the pointer device is a 3D stylus. 15. A non-transitory computer readable storage medium on which is embedded a computer program, said computer program to capture three-dimensional data of an object, said computer program comprising a set of instructions to:
initiate illumination of the object; scan the object with a sensor; and create a 3D representation of the object, wherein the instructions are to initiate illumination of the object within a field of view of the sensor. | 2,400 |
8,973 | 8,973 | 14,951,689 | 2,419 | Distributing communications to users within a network computing system may include monitoring, using a processor, communications between users exchanged within the network computing system, detecting, using the processor, a question within a first communication from a client device of a first user directed to a client device of a second user, and determining, using the processor, that the question is unanswered. Responsive to detecting an answer to the question in a second communication from a client device of a third user directed to the first user, a further communication notifying the second user of the answer to the question may be sent using a processor. | 1-20. (canceled) 21. A computer-implemented method, comprising:
monitoring communications between users exchanged within a network computing system; detecting a question within a first communication from a client device of a first user directed to a client device of a second user; recording, in a data structure associated with the question, that the question is unanswered by the second user upon a determination that the question is unanswered; detecting an answer to the question in a second communication from a client device of a third user directed to the first user; and notifying, based upon the answer and using the data structure, the second user of the answer to the question. 22. The method of claim 21, wherein
the determination that the question is unanswered is based upon a detection of a communication after the first communication, from the first user to the client device of the third user, that includes the question. 23. The method of claim 22, wherein
the communication after the first communication, from the first user to the client device of the third user, is determined to be within a predetermined amount of time from the first communication. 24. The method of claim 21, wherein
the first communication occurs in a first communication channel, and the second communication occurs in a second and different communication channel. 25. The method of claim 21, wherein
the second user is notified automatically responsive to the answer being detected in the second communication. 26. The method of claim 21, wherein
the automatic notification is based upon a field in the data structure in which the second user has indicated preference of being notified of the answer. 27. The method of claim 21, further comprising:
generating a list of users to which communications comprising the question are sent and for which an answer is not received; presenting the list to the first user responsive to the answer being detected; and sending a communication, to each user on the list selected by the first user, notifying each selected user of the answer. 28. A computer hardware system, comprising:
a hardware processor programmed to initiate the following operations:
monitoring communications between users exchanged within a network computing system;
detecting a question within a first communication from a client device of a first user directed to a client device of a second user;
recording, in a data structure associated with the question, that the question is unanswered by the second user upon a determination that the question is unanswered;
detecting an answer to the question in a second communication from a client device of a third user directed to the first user; and
notifying, based upon the answer and using the data structure, the second user of the answer to the question. 29. The system of claim 28, wherein
the determination that the question is unanswered is based upon a detection of a communication after the first communication, from the first user to the client device of the third user, that includes the question. 30. The system of claim 29, wherein
the communication after the first communication, from the first user to the client device of the third user, is determined to be within a predetermined amount of time from the first communication. 31. The system of claim 28, wherein
the first communication occurs in a first communication channel, and the second communication occurs in a second and different communication channel. 32. The system of claim 28, wherein
the second user is notified automatically responsive to the answer being detected in the second communication. 33. The system of claim 28, wherein
the automatic notification is based upon a field in the data structure in which the second user has indicated preference of being notified of the answer. 34. The system of claim 28, wherein the hardware processor is further programmed to initiate the following operations:
generating a list of users to which communications comprising the question are sent and for which an answer is not received; presenting the list to the first user responsive to the answer being detected; and sending a communication, to each user on the list selected by the first user, notifying each selected user of the answer. 35. A computer program product, comprising
a computer readable storage medium having program code stored thereon, the program code executable by a computer hardware system to perform:
monitoring communications between users exchanged within a network computing system;
detecting a question within a first communication from a client device of a first user directed to a client device of a second user;
recording, in a data structure associated with the question, that the question is unanswered by the second user upon a determination that the question is unanswered;
detecting an answer to the question in a second communication from a client device of a third user directed to the first user; and
notifying, based upon the answer and using the data structure, the second user of the answer to the question. 36. The computer program product of claim 35, wherein
the determination that the question is unanswered is based upon a detection of a communication after the first communication, from the first user to the client device of the third user, that includes the question. 37. The computer program product of claim 36, wherein
the communication after the first communication, from the first user to the client device of the third user, is determined to be within a predetermined amount of time from the first communication. 38. The computer program product of claim 35, wherein
the first communication occurs in a first communication channel, and the second communication occurs in a second and different communication channel. 39. The computer program product of claim 35, wherein
the second user is notified automatically responsive to the answer being detected in the second communication. 40. The computer program product of claim 35, wherein
the automatic notification is based upon a field in the data structure in which the second user has indicated preference of being notified of the answer. | Distributing communications to users within a network computing system may include monitoring, using a processor, communications between users exchanged within the network computing system, detecting, using the processor, a question within a first communication from a client device of a first user directed to a client device of a second user, and determining, using the processor, that the question is unanswered. Responsive to detecting an answer to the question in a second communication from a client device of a third user directed to the first user, a further communication notifying the second user of the answer to the question may be sent using a processor.1-20. (canceled) 21. A computer-implemented method, comprising:
monitoring communications between users exchanged within a network computing system; detecting a question within a first communication from a client device of a first user directed to a client device of a second user; recording, in a data structure associated with the question, that the question is unanswered by the second user upon a determination that the question is unanswered; detecting an answer to the question in a second communication from a client device of a third user directed to the first user; and notifying, based upon the answer and using the data structure, the second user of the answer to the question. 22. The method of claim 21, wherein
the determination that the question is unanswered is based upon a detection of a communication after the first communication, from the first user to the client device of the third user, that includes the question. 23. The method of claim 22, wherein
the communication after the first communication, from the first user to the client device of the third user, is determined to be within a predetermined amount of time from the first communication. 24. The method of claim 21, wherein
the first communication occurs in a first communication channel, and the second communication occurs in a second and different communication channel. 25. The method of claim 21, wherein
the second user is notified automatically responsive to the answer being detected in the second communication. 26. The method of claim 21, wherein
the automatic notification is based upon a field in the data structure in which the second user has indicated preference of being notified of the answer. 27. The method of claim 21, further comprising:
generating a list of users to which communications comprising the question are sent and for which an answer is not received; presenting the list to the first user responsive to the answer being detected; and sending a communication, to each user on the list selected by the first user, notifying each selected user of the answer. 28. A computer hardware system, comprising:
a hardware processor programmed to initiate the following operations:
monitoring communications between users exchanged within a network computing system;
detecting a question within a first communication from a client device of a first user directed to a client device of a second user;
recording, in a data structure associated with the question, that the question is unanswered by the second user upon a determination that the question is unanswered;
detecting an answer to the question in a second communication from a client device of a third user directed to the first user; and
notifying, based upon the answer and using the data structure, the second user of the answer to the question. 29. The system of claim 28, wherein
the determination that the question is unanswered is based upon a detection of a communication after the first communication, from the first user to the client device of the third user, that includes the question. 30. The system of claim 29, wherein
the communication after the first communication, from the first user to the client device of the third user, is determined to be within a predetermined amount of time from the first communication. 31. The system of claim 28, wherein
the first communication occurs in a first communication channel, and the second communication occurs in a second and different communication channel. 32. The system of claim 28, wherein
the second user is notified automatically responsive to the answer being detected in the second communication. 33. The system of claim 28, wherein
the automatic notification is based upon a field in the data structure in which the second user has indicated preference of being notified of the answer. 34. The system of claim 28, wherein the hardware processor is further programmed to initiate the following operations:
generating a list of users to which communications comprising the question are sent and for which an answer is not received; presenting the list to the first user responsive to the answer being detected; and sending a communication, to each user on the list selected by the first user, notifying each selected user of the answer. 35. A computer program product, comprising
a computer readable storage medium having program code stored thereon, the program code executable by a computer hardware system to perform:
monitoring communications between users exchanged within a network computing system;
detecting a question within a first communication from a client device of a first user directed to a client device of a second user;
recording, in a data structure associated with the question, that the question is unanswered by the second user upon a determination that the question is unanswered;
detecting an answer to the question in a second communication from a client device of a third user directed to the first user; and
notifying, based upon the answer and using the data structure, the second user of the answer to the question. 36. The computer program product of claim 35, wherein
the determination that the question is unanswered is based upon a detection of a communication after the first communication, from the first user to the client device of the third user, that includes the question. 37. The computer program product of claim 36, wherein
the communication after the first communication, from the first user to the client device of the third user, is determined to be within a predetermined amount of time from the first communication. 38. The computer program product of claim 35, wherein
the first communication occurs in a first communication channel, and the second communication occurs in a second and different communication channel. 39. The computer program product of claim 35, wherein
the second user is notified automatically responsive to the answer being detected in the second communication. 40. The computer program product of claim 35, wherein
the automatic notification is based upon a field in the data structure in which the second user has indicated preference of being notified of the answer. | 2,400 |
8,974 | 8,974 | 15,012,982 | 2,461 | A method and apparatus provide for low latency transmissions. A higher layer configuration message can be received that indicates a set of resource blocks for receiving data packets in at least one symbol of a subframe. An attempt can be made to decode a data packet in a first set of resource elements within the set of resource blocks. The first set of resource elements can be in the at least one symbol of the subframe. An attempt can be made to decode the data packet in at least a second set of resource elements within the set of resource blocks. The second set of resource elements can be in the at least one symbol of the subframe. The second set of resource elements can include at least one resource element that is not in the first set of resource elements. The data packet in one of the first set of resource elements and the second set of resource elements can be successfully decoded. A data payload of the decoded data packet can be delivered to an application layer. | 1. A method comprising:
receiving a higher layer configuration message indicating a set of resource blocks for receiving data packets in at least one symbol of a subframe, the higher layer being higher than a physical layer; attempting to decode a data packet in a first set of resource elements within the set of resource blocks, the first set of resource elements in the at least one symbol of the subframe; attempting to decode the data packet in at least a second set of resource elements within the set of resource blocks, the second set of resource elements in the at least one symbol of the subframe, where the second set of resource elements includes at least one resource element that is not in the first set of resource elements; successfully decoding the data packet in one of the first set of resource elements and the second set of resource elements; and delivering a data payload of the decoded data packet to an application layer. 2. The method according to claim 1, wherein the at least one symbol is outside of a control region. 3. The method according to claim 1, wherein the higher layer configuration message also indicates a set of candidate symbols in the subframe, the at least one symbol belonging to the set of candidate symbols, the set of candidate symbols being less than all of the symbols in the subframe. 4. The method according to claim 1,
wherein a first number of resource elements in the first set of resource elements are based on a first aggregation level, wherein a second number of resource elements in the second set of resource elements are based on a second aggregation level higher than the first aggregation level, and wherein the second set of resource elements include the first set of resource elements and additional resource elements. 5. The method according to claim 4, wherein a number of the additional resource elements is the same as the first number of resource elements in the first set of resource elements. 6. The method according to claim 1, wherein the first set of resource elements comprise a subset of resource elements used for control channel monitoring in a subframe, where the control channel assigns resources in a second region of the subframe for data. 7. The method according to claim 1,
wherein the subframe comprises a first subframe, and wherein the method further comprises transmitting an ACK, in response to decoding the first packet, in a time-frequency resource in a second subframe with a first offset to the first subframe. 8. The method according to claim 1,
wherein receiving comprises receiving a higher layer configuration message indicating a set of resource blocks for receiving low latency data packets in at least one symbol of a subframe, the higher layer being higher than a physical layer, wherein the data packet comprises a low latency data packet, wherein the method further comprises: attempting to decode control information in the subframe, the control information assigning resources for receiving a normal latency data packet, where the normal latency data packet has a longer latency than the low latency data packet. 9. The method according to claim 8, further comprising:
decoding the normal latency data packet; and transmitting an ACK/NACK in a third subframe with a second offset to the first subframe in response to decoding the normal latency data packet where the second offset is greater than the first offset. 10. An apparatus comprising:
a transceiver configured to receive a higher layer configuration message indicating a set of resource blocks for receiving data packets in at least one symbol of a subframe, the higher layer being higher than a physical layer; and a controller coupled to the transceiver, the controller configured to
attempt to decode a data packet in a first set of resource elements within the set of resource blocks, the first set of resource elements in the at least one symbol of the subframe,
attempt to decode the data packet in at least a second set of resource elements within the set of resource blocks, the second set of resource elements in the at least one symbol of the subframe, where the second set of resource elements includes at least one resource element that is not in the first set of resource elements,
successfully decoding the data packet in one of the first set of resource elements and the second set of resource elements, and
deliver a data payload of the decoded data packet to an application layer. 11. The apparatus according to claim 10, wherein the at least one symbol is outside of a control region. 12. The apparatus according to claim 1, wherein the higher layer configuration message also indicates a set of candidate symbols in the subframe, the at least one symbol belonging to the set of candidate symbols, the set of candidate symbols being less than all of the symbols in the subframe. 13. The apparatus according to claim 10,
wherein a first number of resource elements in the first set of resource elements are based on a first aggregation level, wherein a second number of resource elements in the second set of resource elements are based on a second aggregation level higher than the first aggregation level, and wherein the second set of resource elements include the first set of resource elements and additional resource elements. 14. The apparatus according to claim 13, wherein a number of the additional resource elements is the same as the first number of resource elements in the first set of resource elements. 15. The apparatus according to claim 10, wherein the first set of resource elements comprise a subset of resource elements used for control channel monitoring in a subframe, where the control channel assigns resources in a second region of the subframe for data. 16. The apparatus according to claim 10,
wherein the subframe comprises a first subframe, and wherein the transceiver is configured to transmit an ACK, in response to decoding the first packet, in a time-frequency resource in a second subframe with a first offset to the first subframe. 17. The apparatus according to claim 10,
wherein the transceiver is configured to receive the higher layer configuration message indicating a set of resource blocks for receiving low latency data packets in at least one symbol of a subframe, the higher layer being higher than a physical layer, wherein the data packet comprises a low latency data packet, wherein the controller is configured to attempt to decode control information in the subframe, the control information assigning resources for receiving a normal latency data packet, where the normal latency data packet has a longer latency that the low latency data packet. 18. The apparatus according to claim 17, further comprising:
wherein the controller is configured to decode the normal latency data packet; and wherein the transceiver is configured to transmit an ACK/NACK in a third subframe with a second offset to the first subframe in response to decoding the normal latency data packet where the second offset is greater than the first offset. 19. A method comprising:
receiving a higher layer configuration message indicating a set of resource blocks for receiving data packets in at least one symbol of a subframe, the higher layer being higher than a physical layer; attempting to decode a data packet in a first low latency channel element including a first set of resource elements within the set of resource blocks, the first set of resource elements in the at least one symbol of the subframe, where a low latency channel element includes resource elements in orthogonal frequency multiplexed symbols configured for low latency transmission in a resource block configured for low latency transmission; attempting to decode the data packet in a second low latency channel element including at least a second set of resource elements within the set of resource blocks, the second set of resource elements in the at least one symbol of the subframe, where the second set of resource elements includes at least one resource element that is not in the first set of resource elements; successfully decoding the data packet in one of the first set of resource elements and the second set of resource elements; and delivering a data payload of the decoded data packet to an application layer. 20. The method according to claim 19, wherein the at least one symbol is outside of a control region of the subframe. | A method and apparatus provide for low latency transmissions. A higher layer configuration message can be received that indicates a set of resource blocks for receiving data packets in at least one symbol of a subframe. An attempt can be made to decode a data packet in a first set of resource elements within the set of resource blocks. The first set of resource elements can be in the at least one symbol of the subframe. An attempt can be made to decode the data packet in at least a second set of resource elements within the set of resource blocks. The second set of resource elements can be in the at least one symbol of the subframe. The second set of resource elements can include at least one resource element that is not in the first set of resource elements. The data packet in one of the first set of resource elements and the second set of resource elements can be successfully decoded. A data payload of the decoded data packet can be delivered to an application layer.1. A method comprising:
receiving a higher layer configuration message indicating a set of resource blocks for receiving data packets in at least one symbol of a subframe, the higher layer being higher than a physical layer; attempting to decode a data packet in a first set of resource elements within the set of resource blocks, the first set of resource elements in the at least one symbol of the subframe; attempting to decode the data packet in at least a second set of resource elements within the set of resource blocks, the second set of resource elements in the at least one symbol of the subframe, where the second set of resource elements includes at least one resource element that is not in the first set of resource elements; successfully decoding the data packet in one of the first set of resource elements and the second set of resource elements; and delivering a data payload of the decoded data packet to an application layer. 2. The method according to claim 1, wherein the at least one symbol is outside of a control region. 3. The method according to claim 1, wherein the higher layer configuration message also indicates a set of candidate symbols in the subframe, the at least one symbol belonging to the set of candidate symbols, the set of candidate symbols being less than all of the symbols in the subframe. 4. The method according to claim 1,
wherein a first number of resource elements in the first set of resource elements are based on a first aggregation level, wherein a second number of resource elements in the second set of resource elements are based on a second aggregation level higher than the first aggregation level, and wherein the second set of resource elements include the first set of resource elements and additional resource elements. 5. The method according to claim 4, wherein a number of the additional resource elements is the same as the first number of resource elements in the first set of resource elements. 6. The method according to claim 1, wherein the first set of resource elements comprise a subset of resource elements used for control channel monitoring in a subframe, where the control channel assigns resources in a second region of the subframe for data. 7. The method according to claim 1,
wherein the subframe comprises a first subframe, and wherein the method further comprises transmitting an ACK, in response to decoding the first packet, in a time-frequency resource in a second subframe with a first offset to the first subframe. 8. The method according to claim 1,
wherein receiving comprises receiving a higher layer configuration message indicating a set of resource blocks for receiving low latency data packets in at least one symbol of a subframe, the higher layer being higher than a physical layer, wherein the data packet comprises a low latency data packet, wherein the method further comprises: attempting to decode control information in the subframe, the control information assigning resources for receiving a normal latency data packet, where the normal latency data packet has a longer latency than the low latency data packet. 9. The method according to claim 8, further comprising:
decoding the normal latency data packet; and transmitting an ACK/NACK in a third subframe with a second offset to the first subframe in response to decoding the normal latency data packet where the second offset is greater than the first offset. 10. An apparatus comprising:
a transceiver configured to receive a higher layer configuration message indicating a set of resource blocks for receiving data packets in at least one symbol of a subframe, the higher layer being higher than a physical layer; and a controller coupled to the transceiver, the controller configured to
attempt to decode a data packet in a first set of resource elements within the set of resource blocks, the first set of resource elements in the at least one symbol of the subframe,
attempt to decode the data packet in at least a second set of resource elements within the set of resource blocks, the second set of resource elements in the at least one symbol of the subframe, where the second set of resource elements includes at least one resource element that is not in the first set of resource elements,
successfully decoding the data packet in one of the first set of resource elements and the second set of resource elements, and
deliver a data payload of the decoded data packet to an application layer. 11. The apparatus according to claim 10, wherein the at least one symbol is outside of a control region. 12. The apparatus according to claim 1, wherein the higher layer configuration message also indicates a set of candidate symbols in the subframe, the at least one symbol belonging to the set of candidate symbols, the set of candidate symbols being less than all of the symbols in the subframe. 13. The apparatus according to claim 10,
wherein a first number of resource elements in the first set of resource elements are based on a first aggregation level, wherein a second number of resource elements in the second set of resource elements are based on a second aggregation level higher than the first aggregation level, and wherein the second set of resource elements include the first set of resource elements and additional resource elements. 14. The apparatus according to claim 13, wherein a number of the additional resource elements is the same as the first number of resource elements in the first set of resource elements. 15. The apparatus according to claim 10, wherein the first set of resource elements comprise a subset of resource elements used for control channel monitoring in a subframe, where the control channel assigns resources in a second region of the subframe for data. 16. The apparatus according to claim 10,
wherein the subframe comprises a first subframe, and wherein the transceiver is configured to transmit an ACK, in response to decoding the first packet, in a time-frequency resource in a second subframe with a first offset to the first subframe. 17. The apparatus according to claim 10,
wherein the transceiver is configured to receive the higher layer configuration message indicating a set of resource blocks for receiving low latency data packets in at least one symbol of a subframe, the higher layer being higher than a physical layer, wherein the data packet comprises a low latency data packet, wherein the controller is configured to attempt to decode control information in the subframe, the control information assigning resources for receiving a normal latency data packet, where the normal latency data packet has a longer latency that the low latency data packet. 18. The apparatus according to claim 17, further comprising:
wherein the controller is configured to decode the normal latency data packet; and wherein the transceiver is configured to transmit an ACK/NACK in a third subframe with a second offset to the first subframe in response to decoding the normal latency data packet where the second offset is greater than the first offset. 19. A method comprising:
receiving a higher layer configuration message indicating a set of resource blocks for receiving data packets in at least one symbol of a subframe, the higher layer being higher than a physical layer; attempting to decode a data packet in a first low latency channel element including a first set of resource elements within the set of resource blocks, the first set of resource elements in the at least one symbol of the subframe, where a low latency channel element includes resource elements in orthogonal frequency multiplexed symbols configured for low latency transmission in a resource block configured for low latency transmission; attempting to decode the data packet in a second low latency channel element including at least a second set of resource elements within the set of resource blocks, the second set of resource elements in the at least one symbol of the subframe, where the second set of resource elements includes at least one resource element that is not in the first set of resource elements; successfully decoding the data packet in one of the first set of resource elements and the second set of resource elements; and delivering a data payload of the decoded data packet to an application layer. 20. The method according to claim 19, wherein the at least one symbol is outside of a control region of the subframe. | 2,400 |
8,975 | 8,975 | 16,025,370 | 2,469 | A system includes a processor configured to receive a data transfer request using a vehicle connectivity option. The processor is also configured to determine whether the request should be fulfilled using carrier aggregation, based on at least a power level powering the connectivity option. The processor is further configured to fulfil the request using or not using carrier aggregation, based at least in part on the results of the carrier aggregation determination. | 1. A system comprising:
a processor configured to: receive a data transfer request requesting use of a vehicle connectivity option; determine whether the request is to be fulfilled using carrier aggregation, based on at least a power remaining in a power source powering the connectivity option, responsive to receiving the request; and fulfil the request using carrier aggregation, based at least in part on the results of the carrier aggregation determination resulting in a determination that sufficient power remains; fulfil the request using a single carrier, based at least on part in the results of the carrier aggregation determination resulting in a determination that insufficient power remains; responsive to determining that insufficient power remains, determine whether a secondary characteristic exists that qualifies the request for a predefined aggregation decision; and fulfil the request based on the results of the predefined aggregation decision if the aggregation decision indicates a different aggregation usage than the carrier aggregation determination. 2. The system of claim 1, wherein the vehicle connectivity option includes an onboard modem. 3. The system of claim 2, wherein the power level is the power level of a vehicle power supply. 4. The system of claim 1, wherein the vehicle connectivity option includes a wirelessly connected cellular phone providing remote connectivity to the vehicle. 5. The system of claim 4, wherein the power level is the power level of a phone battery. 6. (canceled) 7. The system of claim 1, wherein the secondary characteristic is a request criticality included with the request. 8. The system of claim 1, wherein the secondary characteristic is predefined with respect to an entity from which the request originated, and of which the processor is aware. 9. The system of claim 1, wherein the secondary characteristic is predefined for environmental conditions and is determined by the processor based on environmental conditions. 10. The system of claim 1, wherein the secondary characteristic is predefined for route conditions and is determined by the processor based on current route conditions. 11. A system comprising:
a processor configured to: receive a data transfer request; determine that a request characteristic corresponds to at least one predefined aggregation characteristic that indicates that requests having that characteristic are to be fulfilled using carrier aggregation; and fulfil the request based on the aggregation indicated by the predefined aggregation characteristic, regardless of a power supply level associated with a vehicle connectivity option used to fulfil the request. 12. The system of claim 11, wherein the request characteristic includes a request type. 13. The system of claim 12, wherein the request type includes an emergency services type. 14. The system of claim 12, wherein the request type includes a system critical download type. 15. The system of claim 11, wherein the request characteristic includes a characteristic associated with a request-originating entity, the characteristic associated with the entity being known by the processor. 16. The system of claim 11, wherein the request characteristic includes a projected transfer size. 17. A vehicle comprising:
a processor configured to: receive a data transfer request; determine that carrier aggregation is appropriate for handling the request, based at least on environmental data predefined as impacting request completion likelihood corresponding to one or more predefined conditions for using carrier aggregation; and responsive to the determination, process the request using carrier aggregation. 18. The system of claim 17, wherein the environmental data includes an area of known signal loss projected to be reached by the vehicle before the request is projected to be completed. 19. The system of claim 17, wherein the environmental data includes weather projected to impact signal usability projected to be reached by the vehicle before the request is projected to be completed. 20. The system of claim 17, wherein the environmental data includes a destination projected to be reached by the vehicle before the request is projected to be completed. | A system includes a processor configured to receive a data transfer request using a vehicle connectivity option. The processor is also configured to determine whether the request should be fulfilled using carrier aggregation, based on at least a power level powering the connectivity option. The processor is further configured to fulfil the request using or not using carrier aggregation, based at least in part on the results of the carrier aggregation determination.1. A system comprising:
a processor configured to: receive a data transfer request requesting use of a vehicle connectivity option; determine whether the request is to be fulfilled using carrier aggregation, based on at least a power remaining in a power source powering the connectivity option, responsive to receiving the request; and fulfil the request using carrier aggregation, based at least in part on the results of the carrier aggregation determination resulting in a determination that sufficient power remains; fulfil the request using a single carrier, based at least on part in the results of the carrier aggregation determination resulting in a determination that insufficient power remains; responsive to determining that insufficient power remains, determine whether a secondary characteristic exists that qualifies the request for a predefined aggregation decision; and fulfil the request based on the results of the predefined aggregation decision if the aggregation decision indicates a different aggregation usage than the carrier aggregation determination. 2. The system of claim 1, wherein the vehicle connectivity option includes an onboard modem. 3. The system of claim 2, wherein the power level is the power level of a vehicle power supply. 4. The system of claim 1, wherein the vehicle connectivity option includes a wirelessly connected cellular phone providing remote connectivity to the vehicle. 5. The system of claim 4, wherein the power level is the power level of a phone battery. 6. (canceled) 7. The system of claim 1, wherein the secondary characteristic is a request criticality included with the request. 8. The system of claim 1, wherein the secondary characteristic is predefined with respect to an entity from which the request originated, and of which the processor is aware. 9. The system of claim 1, wherein the secondary characteristic is predefined for environmental conditions and is determined by the processor based on environmental conditions. 10. The system of claim 1, wherein the secondary characteristic is predefined for route conditions and is determined by the processor based on current route conditions. 11. A system comprising:
a processor configured to: receive a data transfer request; determine that a request characteristic corresponds to at least one predefined aggregation characteristic that indicates that requests having that characteristic are to be fulfilled using carrier aggregation; and fulfil the request based on the aggregation indicated by the predefined aggregation characteristic, regardless of a power supply level associated with a vehicle connectivity option used to fulfil the request. 12. The system of claim 11, wherein the request characteristic includes a request type. 13. The system of claim 12, wherein the request type includes an emergency services type. 14. The system of claim 12, wherein the request type includes a system critical download type. 15. The system of claim 11, wherein the request characteristic includes a characteristic associated with a request-originating entity, the characteristic associated with the entity being known by the processor. 16. The system of claim 11, wherein the request characteristic includes a projected transfer size. 17. A vehicle comprising:
a processor configured to: receive a data transfer request; determine that carrier aggregation is appropriate for handling the request, based at least on environmental data predefined as impacting request completion likelihood corresponding to one or more predefined conditions for using carrier aggregation; and responsive to the determination, process the request using carrier aggregation. 18. The system of claim 17, wherein the environmental data includes an area of known signal loss projected to be reached by the vehicle before the request is projected to be completed. 19. The system of claim 17, wherein the environmental data includes weather projected to impact signal usability projected to be reached by the vehicle before the request is projected to be completed. 20. The system of claim 17, wherein the environmental data includes a destination projected to be reached by the vehicle before the request is projected to be completed. | 2,400 |
8,976 | 8,976 | 15,685,299 | 2,439 | Disclosed are various examples for distributed profile and key management. In one example, a client device can include an agent application and a PIV-D application. The agent application can receive a partially populated device profile generated by a management service to configure a setting on the client device. The PIV-D application can generate a derived credential and provide the derived credential to the agent application. The agent application can modify the partially populated device profile to include the credential to create a fully populated device profile and configure the client device in accordance with the fully populated device profile. | 1. A system for distributed profile and key management, comprising:
a client device; and program instructions executable in the client device that, when executed by the client device, cause the client device to:
receive, by a first client application, a partially populated device profile, the partially populated device profile generated by a management service to configure at least one setting on the client device;
authenticate, by a second client application, the client device through communication with a third-party security service;
in response to the client device being authenticated, generate, by the second client application, a credential;
provide, by the second client application, the credential to the first client application;
modify, by the first client application, the partially populated device profile to include the credential to create a fully populated device profile; and
cause, by the first client application, the client device to be configured in accordance with the fully populated device profile. 2. The system of claim 1, wherein the first client application is an agent application executable on the client device. 3. The system of claim 2, further comprising program instructions executable in the client device that, when executed by the client device, cause the client device to encrypt, by the agent application, the fully populated device profile. 4. The system of claim 3, further comprising program instructions executable in the client device that, when executed by the client device, cause the client device to send, by the agent application, the fully populated device profile to the management service. 5. The system of claim 1, wherein the client device is configured in accordance with the fully populated device profile using at least one device management feature of an Android® operating system. 6. The system of claim 1, wherein the credential is a derived credential, the derived credential being generated using at least one personal identity verification (PIV) card credential. 7. The system of claim 6, wherein the derived credential is an X.509 public key certificate. 8. A non-transitory computer-readable medium for distributed profile and key management embodying program code executable in a client device that, when executed by the client device, causes the client device to:
receive, by a first client application, a partially populated device profile, the partially populated device profile generated by a management service to configure at least one setting on the client device; authenticate, by a second client application, the client device through communication with a third-party security service; in response to the client device being authenticated, generate, by the second client application, a credential; provide, by the second client application, the credential to the first client application; modify, by the first client application, the partially populated device profile to include the credential to create a fully populated device profile; and cause, by the first client application, the client device to be configured in accordance with the fully populated device profile. 9. The non-transitory computer-readable medium of claim 8, wherein the first client application is an agent application executable on the client device. 10. The non-transitory computer-readable medium of claim 9, further comprising program code executable in the client device that, when executed by the client device, causes the client device to encrypt, by the agent application, the fully populated device profile. 11. The non-transitory computer-readable medium of claim 10, further comprising program code executable in the client device that, when executed by the client device, causes the client device to send, by the agent application, the fully populated device profile to the management service. 12. The non-transitory computer-readable medium of claim 8, wherein the client device is configured in accordance with the fully populated device profile using at least one device management feature of an Android® operating system. 13. The non-transitory computer-readable medium of claim 8, wherein the credential is a derived credential, the derived credential being generated using at least one personal identity verification (PIV) card credential. 14. The non-transitory computer-readable medium of claim 13, wherein the derived credential is an X.509 public key certificate. 15. A computer-implemented method for distributed profile and key management, comprising:
receiving, by a first client application, a partially populated device profile, the partially populated device profile generated by a management service to configure at least one setting on the client device; authenticating, by a second client application, the client device through communication with a third-party security service; in response to the client device being authenticated, generating, by the second client application, a credential; providing, by the second client application, the credential to the first client application; modifying, by the first client application, the partially populated device profile to include the credential to create a fully populated device profile; and configuring, by the first client application, the client device in accordance with the fully populated device profile. 16. The computer-implemented method of claim 15, wherein the first client application is an agent application executable on the client device. 17. The computer-implemented method of claim 16, further comprising encrypting, by the agent application, the fully populated device profile. 18. The computer-implemented method of claim 17, further comprising sending, by the agent application, the fully populated device profile to the management service. 19. The computer-implemented method of claim 15, wherein the client device is configured in accordance with the fully populated device profile using at least one device management feature of an Android® operating system. 20. The computer-implemented method of claim 15, wherein the credential is a derived credential, the derived credential being generated using at least one personal identity verification (PIV) card credential. | Disclosed are various examples for distributed profile and key management. In one example, a client device can include an agent application and a PIV-D application. The agent application can receive a partially populated device profile generated by a management service to configure a setting on the client device. The PIV-D application can generate a derived credential and provide the derived credential to the agent application. The agent application can modify the partially populated device profile to include the credential to create a fully populated device profile and configure the client device in accordance with the fully populated device profile.1. A system for distributed profile and key management, comprising:
a client device; and program instructions executable in the client device that, when executed by the client device, cause the client device to:
receive, by a first client application, a partially populated device profile, the partially populated device profile generated by a management service to configure at least one setting on the client device;
authenticate, by a second client application, the client device through communication with a third-party security service;
in response to the client device being authenticated, generate, by the second client application, a credential;
provide, by the second client application, the credential to the first client application;
modify, by the first client application, the partially populated device profile to include the credential to create a fully populated device profile; and
cause, by the first client application, the client device to be configured in accordance with the fully populated device profile. 2. The system of claim 1, wherein the first client application is an agent application executable on the client device. 3. The system of claim 2, further comprising program instructions executable in the client device that, when executed by the client device, cause the client device to encrypt, by the agent application, the fully populated device profile. 4. The system of claim 3, further comprising program instructions executable in the client device that, when executed by the client device, cause the client device to send, by the agent application, the fully populated device profile to the management service. 5. The system of claim 1, wherein the client device is configured in accordance with the fully populated device profile using at least one device management feature of an Android® operating system. 6. The system of claim 1, wherein the credential is a derived credential, the derived credential being generated using at least one personal identity verification (PIV) card credential. 7. The system of claim 6, wherein the derived credential is an X.509 public key certificate. 8. A non-transitory computer-readable medium for distributed profile and key management embodying program code executable in a client device that, when executed by the client device, causes the client device to:
receive, by a first client application, a partially populated device profile, the partially populated device profile generated by a management service to configure at least one setting on the client device; authenticate, by a second client application, the client device through communication with a third-party security service; in response to the client device being authenticated, generate, by the second client application, a credential; provide, by the second client application, the credential to the first client application; modify, by the first client application, the partially populated device profile to include the credential to create a fully populated device profile; and cause, by the first client application, the client device to be configured in accordance with the fully populated device profile. 9. The non-transitory computer-readable medium of claim 8, wherein the first client application is an agent application executable on the client device. 10. The non-transitory computer-readable medium of claim 9, further comprising program code executable in the client device that, when executed by the client device, causes the client device to encrypt, by the agent application, the fully populated device profile. 11. The non-transitory computer-readable medium of claim 10, further comprising program code executable in the client device that, when executed by the client device, causes the client device to send, by the agent application, the fully populated device profile to the management service. 12. The non-transitory computer-readable medium of claim 8, wherein the client device is configured in accordance with the fully populated device profile using at least one device management feature of an Android® operating system. 13. The non-transitory computer-readable medium of claim 8, wherein the credential is a derived credential, the derived credential being generated using at least one personal identity verification (PIV) card credential. 14. The non-transitory computer-readable medium of claim 13, wherein the derived credential is an X.509 public key certificate. 15. A computer-implemented method for distributed profile and key management, comprising:
receiving, by a first client application, a partially populated device profile, the partially populated device profile generated by a management service to configure at least one setting on the client device; authenticating, by a second client application, the client device through communication with a third-party security service; in response to the client device being authenticated, generating, by the second client application, a credential; providing, by the second client application, the credential to the first client application; modifying, by the first client application, the partially populated device profile to include the credential to create a fully populated device profile; and configuring, by the first client application, the client device in accordance with the fully populated device profile. 16. The computer-implemented method of claim 15, wherein the first client application is an agent application executable on the client device. 17. The computer-implemented method of claim 16, further comprising encrypting, by the agent application, the fully populated device profile. 18. The computer-implemented method of claim 17, further comprising sending, by the agent application, the fully populated device profile to the management service. 19. The computer-implemented method of claim 15, wherein the client device is configured in accordance with the fully populated device profile using at least one device management feature of an Android® operating system. 20. The computer-implemented method of claim 15, wherein the credential is a derived credential, the derived credential being generated using at least one personal identity verification (PIV) card credential. | 2,400 |
8,977 | 8,977 | 16,128,821 | 2,485 | A method of encoding a video data signal (15) is provided, together with a method for decoding. The encoding comprises providing color information (51) for pixels in an image, providing a depth map with depth information (52) for the pixels, providing transition information (56, 57, 60, 70, 71) being representative of a width (63, 73) of a transition region (61, 72) in the image, the transition region (61, 72) comprising a depth transition (62) and blended pixels in which colors of a foreground object and a background object are blended, and generating (24) the video data signal (15) comprising encoded data representing the color information (51), the depth map (52) and the transition information (56, 57, 60, 70, 71). The decoding comprises using the transition information (56, 57, 60, 70, 71) for determining the width (63, 73) of the transition regions (61, 72) and for determining alpha values (53) for pixels inside the transition regions (61, 72). The determined alpha values (53) are used for determining the color of a blended pixel at the transition of a foreground object and a background object. | 1. A method, comprising:
receiving at the input of a decoder circuit an encoded three-dimensional video data signal, the encoded three-dimensional video data signal comprising encoded data representing:
a base two-dimensional image, wherein the base two-dimensional image comprises color information for pixels in the base two-dimensional image;
a depth map with depth information for the pixels; and
transition information representative of a width of a transition region in the base two-dimensional image, the transition region comprising a depth transition and blended pixels,
wherein the blended pixels comprise blended colors of a foreground object and a background object,
wherein the transition information does not include alpha values for all of the pixels in the transition region and does not include trimap data for all of the pixels in the transition region in the base two-dimensional image;
determining, using the decoder circuit, the width of the transition region based on the transition information; generating, using the decoder circuit, alpha values of the respective blended pixels based on the width of the transition region and a distance of the blended pixels to the depth transition; and determining, using the decoder circuit a color of the respective blended pixels based on the alpha values and the color information. 2. The method of claim 1, wherein the determining of the alpha values is based on a depth of the depth transition. 3. The method of claim 1,
wherein the encoded three-dimensional video signal further includes at least one parameter, wherein the at least one parameter describes at least one of a lighting condition, a position, a numerical aperture, and a focal length setting, wherein the focal length setting is for at least one camera at a time when it produced an input video data signal from which the encoded three-dimensional video signal was generated, wherein the decoder circuit generates the alpha values of the respective blended pixels based on the width of the transition region, the distance of the blended pixels to the depth transition, and the at least one parameter. 4. A non-transitory computer medium for decoding a video data signal, wherein the non-transitory computer medium comprises software, wherein the software causes a processor circuit to perform the method as claimed in claim 1. 5. A decoder circuit, comprising:
an input configured to receive an encoded three-dimensional video data signal, the encoded three-dimensional video data signal comprising encoded data representing:
a base two-dimensional image, wherein the base two-dimensional image compromises color information for pixels in the base two-dimensional image;
a depth map with depth information for the pixels; and
transition information representative of a width of a transition region,
wherein the transition region the transition region comprising a depth transition and blended pixels,
wherein the blended pixels comprise blended colors of a foreground object and a background object, wherein the transition information does not include alpha value for all of the pixels in the transition region and does not include trimap data for all of the pixels in the transition region in the base two-dimensional image;
a processor circuit configured to:
determine the width of the transition region, based on the transition information;
generate alpha values of the respective blended pixels, based on the width of the transition region and a distance of the blended pixels to the depth transition; and
determine a color of the respective blended pixels, based on the alpha values and the color information. 6. The decoder circuit of claim 5, wherein the determining of the alpha values is based on a depth of the depth transition. 7. The decoder circuit of claim 5,
wherein the encoded three-dimensional video signal further includes at least one parameter, wherein the at least one parameter describes at least one of a lighting condition, a position, a numerical aperture, and a focal length setting, wherein the focal length setting is for at least one camera at a time when it produced an input video data signal from which the encoded three-dimensional video signal was generated, wherein the decoder circuit generates the alpha values of the respective blended pixels based on the width of the transition region, the distance of the blended pixels to the depth transition, and the at least one parameter. | A method of encoding a video data signal (15) is provided, together with a method for decoding. The encoding comprises providing color information (51) for pixels in an image, providing a depth map with depth information (52) for the pixels, providing transition information (56, 57, 60, 70, 71) being representative of a width (63, 73) of a transition region (61, 72) in the image, the transition region (61, 72) comprising a depth transition (62) and blended pixels in which colors of a foreground object and a background object are blended, and generating (24) the video data signal (15) comprising encoded data representing the color information (51), the depth map (52) and the transition information (56, 57, 60, 70, 71). The decoding comprises using the transition information (56, 57, 60, 70, 71) for determining the width (63, 73) of the transition regions (61, 72) and for determining alpha values (53) for pixels inside the transition regions (61, 72). The determined alpha values (53) are used for determining the color of a blended pixel at the transition of a foreground object and a background object.1. A method, comprising:
receiving at the input of a decoder circuit an encoded three-dimensional video data signal, the encoded three-dimensional video data signal comprising encoded data representing:
a base two-dimensional image, wherein the base two-dimensional image comprises color information for pixels in the base two-dimensional image;
a depth map with depth information for the pixels; and
transition information representative of a width of a transition region in the base two-dimensional image, the transition region comprising a depth transition and blended pixels,
wherein the blended pixels comprise blended colors of a foreground object and a background object,
wherein the transition information does not include alpha values for all of the pixels in the transition region and does not include trimap data for all of the pixels in the transition region in the base two-dimensional image;
determining, using the decoder circuit, the width of the transition region based on the transition information; generating, using the decoder circuit, alpha values of the respective blended pixels based on the width of the transition region and a distance of the blended pixels to the depth transition; and determining, using the decoder circuit a color of the respective blended pixels based on the alpha values and the color information. 2. The method of claim 1, wherein the determining of the alpha values is based on a depth of the depth transition. 3. The method of claim 1,
wherein the encoded three-dimensional video signal further includes at least one parameter, wherein the at least one parameter describes at least one of a lighting condition, a position, a numerical aperture, and a focal length setting, wherein the focal length setting is for at least one camera at a time when it produced an input video data signal from which the encoded three-dimensional video signal was generated, wherein the decoder circuit generates the alpha values of the respective blended pixels based on the width of the transition region, the distance of the blended pixels to the depth transition, and the at least one parameter. 4. A non-transitory computer medium for decoding a video data signal, wherein the non-transitory computer medium comprises software, wherein the software causes a processor circuit to perform the method as claimed in claim 1. 5. A decoder circuit, comprising:
an input configured to receive an encoded three-dimensional video data signal, the encoded three-dimensional video data signal comprising encoded data representing:
a base two-dimensional image, wherein the base two-dimensional image compromises color information for pixels in the base two-dimensional image;
a depth map with depth information for the pixels; and
transition information representative of a width of a transition region,
wherein the transition region the transition region comprising a depth transition and blended pixels,
wherein the blended pixels comprise blended colors of a foreground object and a background object, wherein the transition information does not include alpha value for all of the pixels in the transition region and does not include trimap data for all of the pixels in the transition region in the base two-dimensional image;
a processor circuit configured to:
determine the width of the transition region, based on the transition information;
generate alpha values of the respective blended pixels, based on the width of the transition region and a distance of the blended pixels to the depth transition; and
determine a color of the respective blended pixels, based on the alpha values and the color information. 6. The decoder circuit of claim 5, wherein the determining of the alpha values is based on a depth of the depth transition. 7. The decoder circuit of claim 5,
wherein the encoded three-dimensional video signal further includes at least one parameter, wherein the at least one parameter describes at least one of a lighting condition, a position, a numerical aperture, and a focal length setting, wherein the focal length setting is for at least one camera at a time when it produced an input video data signal from which the encoded three-dimensional video signal was generated, wherein the decoder circuit generates the alpha values of the respective blended pixels based on the width of the transition region, the distance of the blended pixels to the depth transition, and the at least one parameter. | 2,400 |
8,978 | 8,978 | 13,190,466 | 2,451 | Methods, apparatus, and network oriented systems are discussed for estimating system, e.g. web site, usage removed from the web site, as well as scheduling and directing a data broadcast source to provide content based on web site usage estimates and predictions in a broadcast data stream. | 1. An apparatus for providing a usage estimate of a first network location, comprising:
a counter for determining a count of hits by at least one network entity within a predetermined time-interval to create a hit-count within said time-interval for said first network location; a module for estimating access to said first network location based upon said hit-count within said time-interval to create said usage estimate for said first network location; and a transmitter for sending said usage estimate for said first network location to a second network location to provide a usage estimate from said first network location to said second network location. 2. The apparatus of claim 1, said counter further comprising any of: a counter for determining a second count of hits by said network entity within a second predetermined time-interval; and a counter for determining a count pattern of hits at said network location based upon hit-counts within at least two time-intervals. 3. The apparatus of claim 1, said counter further comprising: an interpolator for interpolating a hit-count pattern for said network location. 4. The apparatus of claim 3, wherein said interpolator comprises any of: means for interpolating said hit-count pattern using a time-varying orthogonal function basis, wherein said time-varying orthogonal function basis includes at least one member of the collection comprising linear time-varying functions, polynomial time-varying functions, and exponential time-varying functions; means for interpolating said hit-count pattern using a time-varying wavelet function basis; and means for interpolating said hit-count pattern using a finite-difference scheme. 5. The apparatus of claim 1, further comprising: an integrator for integrating said network location access estimate to create an integrated network location access estimate. 6. The apparatus of claim 5, said integrater further comprising:
a counter associated with said second network location for determining a hit-count within said first time-interval to create a hit-count within said first time-interval for said first network location at said second network location; and a module for estimating access to said first network location based upon said hit-count within said first time-interval to create an integrated access estimate for said first network location at said second network location. 7. The apparatus of claim 5, further comprising:
a mechanism at said first network location for sending said usage estimate for said first network location to a scheduling location to create a usage estimate for said first network location at said scheduling location; and
a mechanism at said second network location for sending said integrated usage estimate for said first network location to said scheduling location to create said node usage estimate for said first network location at said scheduling location. 8. The apparatus of claim 7, further comprising any of:
a scheduler associated with said scheduling location that uses said usage estimate for said first network location to schedule the addition of content associated with said first network location to a broadcast stream; and a scheduler associated with said scheduling location that uses said usage estimate for said first network location to schedule the removal of content associated with said first network location from said broadcast stream. 9-14. (canceled) 15. A method for creating a usage estimate of a first network location, comprising the steps of:
providing a counter for determining a hit-count reflecting access to said first network location within a predetermined time-interval; estimating said access to said first network location based upon said hit-count during said predetermined time-interval; and sending said usage estimate to a second network location to provide usage estimate for said first network location at said second network location; wherein said first network location is distinctly addressed. 16. The method of claim 15, further comprising the steps of:
determining a second hit-count within a second predetermined time-intervals. 17. The method of claim 15, further comprising of the step of:
interpolating a hit-count pattern for said first network location. 18. The method of claim 15, further comprising any of the steps of:
interpolating said hit-count pattern using a time-varying orthogonal function basis, wherein said time-varying orthogonal function basis includes at least one member of the collection comprising: linear time-varying functions, polynomial time-varying functions, and exponential time-varying functions; interpolating said hit-count pattern using a time-varying wavelet function basis; and interpolating said hit-count pattern using a finite-difference scheme. 19. The method of claim 18, further comprising the steps of:
determining a hit-count within said predetermined time-interval for said first network location at said second network location; and estimating said usage of said first network location based upon said hit-count to create a usage estimate for said first network location at said second network location. 20. The method of claim 15, further comprising the steps of:
sending said usage estimate to a scheduling location to create a usage estimate for said first network location at said scheduling location; and said second network location sending an integrated usage estimate to said scheduling location to create said node usage estimate. 21. The method of claim 20, further comprising the steps of:
said scheduling location using said usage estimate to schedule the addition of content associated with said first network location to a broadcast stream; and said scheduling location using said usage estimate to schedule the removal of said content from said broadcast stream. 22-25. (canceled) 26. A network node providing at least a usage estimate of at least one content location, comprising:
means for determining at least one hit-count by at least one client within a first of a time-interval to create a hit-count within said first time-interval for said content location; and means for estimating said usage of said content location based upon said hit-count within said first time-interval to create said usage estimate. 27. The apparatus of claim 26, wherein said means for determining said hit-count is further comprised at least one of the following:
means for determining a second of said hit-counts within a second of said time-intervals for at least a second of said time-intervals; means for determining a hit-count for at least two of said content locations; and means for determining a hit-count pattern based upon said hit-counts within at least two time-interval collection members, for at least one of said content locations. 28. The apparatus of claim 27, wherein said means for determining said hit-count pattern is further comprised of: means for interpolating said hit-count pattern based upon at least two of said hit collection members for said content location. 29. The apparatus of claim 28, wherein at least one of said means for interpolating said hit-count pattern is comprised of:
means for interpolating said hit-count pattern based upon at least three of said hit collection members for said content location. 30. The apparatus of claim 28, wherein said means for interpolating said hit-count pattern for said URL is comprised of any of:
means for interpolating said hit-count pattern based upon said at least two hit collection members for said content location using a time-varying orthogonal function basis; means for interpolating said hit-count pattern based upon said at least two hit collection members for said content location using a time-varying wavelet function basis; and means for interpolating said hit-count pattern based upon said at least two hit collection members for said content location using a finite-difference scheme. 31-73. (canceled) | Methods, apparatus, and network oriented systems are discussed for estimating system, e.g. web site, usage removed from the web site, as well as scheduling and directing a data broadcast source to provide content based on web site usage estimates and predictions in a broadcast data stream.1. An apparatus for providing a usage estimate of a first network location, comprising:
a counter for determining a count of hits by at least one network entity within a predetermined time-interval to create a hit-count within said time-interval for said first network location; a module for estimating access to said first network location based upon said hit-count within said time-interval to create said usage estimate for said first network location; and a transmitter for sending said usage estimate for said first network location to a second network location to provide a usage estimate from said first network location to said second network location. 2. The apparatus of claim 1, said counter further comprising any of: a counter for determining a second count of hits by said network entity within a second predetermined time-interval; and a counter for determining a count pattern of hits at said network location based upon hit-counts within at least two time-intervals. 3. The apparatus of claim 1, said counter further comprising: an interpolator for interpolating a hit-count pattern for said network location. 4. The apparatus of claim 3, wherein said interpolator comprises any of: means for interpolating said hit-count pattern using a time-varying orthogonal function basis, wherein said time-varying orthogonal function basis includes at least one member of the collection comprising linear time-varying functions, polynomial time-varying functions, and exponential time-varying functions; means for interpolating said hit-count pattern using a time-varying wavelet function basis; and means for interpolating said hit-count pattern using a finite-difference scheme. 5. The apparatus of claim 1, further comprising: an integrator for integrating said network location access estimate to create an integrated network location access estimate. 6. The apparatus of claim 5, said integrater further comprising:
a counter associated with said second network location for determining a hit-count within said first time-interval to create a hit-count within said first time-interval for said first network location at said second network location; and a module for estimating access to said first network location based upon said hit-count within said first time-interval to create an integrated access estimate for said first network location at said second network location. 7. The apparatus of claim 5, further comprising:
a mechanism at said first network location for sending said usage estimate for said first network location to a scheduling location to create a usage estimate for said first network location at said scheduling location; and
a mechanism at said second network location for sending said integrated usage estimate for said first network location to said scheduling location to create said node usage estimate for said first network location at said scheduling location. 8. The apparatus of claim 7, further comprising any of:
a scheduler associated with said scheduling location that uses said usage estimate for said first network location to schedule the addition of content associated with said first network location to a broadcast stream; and a scheduler associated with said scheduling location that uses said usage estimate for said first network location to schedule the removal of content associated with said first network location from said broadcast stream. 9-14. (canceled) 15. A method for creating a usage estimate of a first network location, comprising the steps of:
providing a counter for determining a hit-count reflecting access to said first network location within a predetermined time-interval; estimating said access to said first network location based upon said hit-count during said predetermined time-interval; and sending said usage estimate to a second network location to provide usage estimate for said first network location at said second network location; wherein said first network location is distinctly addressed. 16. The method of claim 15, further comprising the steps of:
determining a second hit-count within a second predetermined time-intervals. 17. The method of claim 15, further comprising of the step of:
interpolating a hit-count pattern for said first network location. 18. The method of claim 15, further comprising any of the steps of:
interpolating said hit-count pattern using a time-varying orthogonal function basis, wherein said time-varying orthogonal function basis includes at least one member of the collection comprising: linear time-varying functions, polynomial time-varying functions, and exponential time-varying functions; interpolating said hit-count pattern using a time-varying wavelet function basis; and interpolating said hit-count pattern using a finite-difference scheme. 19. The method of claim 18, further comprising the steps of:
determining a hit-count within said predetermined time-interval for said first network location at said second network location; and estimating said usage of said first network location based upon said hit-count to create a usage estimate for said first network location at said second network location. 20. The method of claim 15, further comprising the steps of:
sending said usage estimate to a scheduling location to create a usage estimate for said first network location at said scheduling location; and said second network location sending an integrated usage estimate to said scheduling location to create said node usage estimate. 21. The method of claim 20, further comprising the steps of:
said scheduling location using said usage estimate to schedule the addition of content associated with said first network location to a broadcast stream; and said scheduling location using said usage estimate to schedule the removal of said content from said broadcast stream. 22-25. (canceled) 26. A network node providing at least a usage estimate of at least one content location, comprising:
means for determining at least one hit-count by at least one client within a first of a time-interval to create a hit-count within said first time-interval for said content location; and means for estimating said usage of said content location based upon said hit-count within said first time-interval to create said usage estimate. 27. The apparatus of claim 26, wherein said means for determining said hit-count is further comprised at least one of the following:
means for determining a second of said hit-counts within a second of said time-intervals for at least a second of said time-intervals; means for determining a hit-count for at least two of said content locations; and means for determining a hit-count pattern based upon said hit-counts within at least two time-interval collection members, for at least one of said content locations. 28. The apparatus of claim 27, wherein said means for determining said hit-count pattern is further comprised of: means for interpolating said hit-count pattern based upon at least two of said hit collection members for said content location. 29. The apparatus of claim 28, wherein at least one of said means for interpolating said hit-count pattern is comprised of:
means for interpolating said hit-count pattern based upon at least three of said hit collection members for said content location. 30. The apparatus of claim 28, wherein said means for interpolating said hit-count pattern for said URL is comprised of any of:
means for interpolating said hit-count pattern based upon said at least two hit collection members for said content location using a time-varying orthogonal function basis; means for interpolating said hit-count pattern based upon said at least two hit collection members for said content location using a time-varying wavelet function basis; and means for interpolating said hit-count pattern based upon said at least two hit collection members for said content location using a finite-difference scheme. 31-73. (canceled) | 2,400 |
8,979 | 8,979 | 13,645,820 | 2,484 | An access control reader enhances audio data captured by a beamforming microphone array. The access control reader determines a direction to a user and then utilizes beamforming in the direction of the user to enhance the user's voice. The user's enhanced voice is then transmitted to security personnel or a control system to validate the user's identity, in one example. | 1. An access control reader operation method in a security system, the method comprising:
detecting sounds with a beamforming microphone array of an access control reader; and enhancing desired components within the sounds detected by the beamforming microphone array based on a direction of a source of the desired components. 2. The method according to claim 1, further comprising:
isolating the desired components from background noise in the sounds detected by the beamforming microphone array; and then determining the direction to a source of the isolated desired components in the detected sounds. 3. The method according to claim 2, wherein the desired components in the sounds are isolated from background noise with spatial filtering. 4. The method according to claim 1, wherein the direction is determined by a controller of the access control reader that determines the direction from the beamforming microphone array to the source of the desired components. 5. The method according to claim 1, wherein the direction is determined by analyzing video data captured by a camera to determine a position of the source relative to the access control reader. 6. The method according to claim 1, further comprising transmitting the desired components to a control system for validation. 7. The method according to claim 6, wherein the control system validates a user's voice by comparing the user's voice to a voice library of valid users and enables access to a restricted area after the user's voice is validated. 8. The method according to claim 1, wherein the beamforming microphone array is a one-dimensional array of microphone elements. 9. The method according to claim 8, wherein the one-dimensional array of microphone elements resolves a two-dimensional speech zone to detect the sounds. 10. The method according to claim 1, wherein the beamforming microphone array is a two-dimensional array of microphone elements. 11. The method according to claim 10, wherein the two-dimensional array of microphone elements resolves a three-dimensional speech zone to detect the sounds. 12. An access control reader, comprising:
a beamforming microphone array for detecting sounds; and a controller that enhances desired components within the sounds detected by the beamforming microphone array based on a direction of the sounds relative to the beamforming microphone array. 13. The access control reader according to claim 12, wherein the beamforming microphone array is a two-dimensional array of microphone elements. 14. The access control reader according to claim 13, wherein the two-dimensional array of microphone elements creates a three-dimensional speech zone to detect the sounds. 15. The access control reader according to claim 12, wherein the beamforming microphone array is a one-dimensional array of microphone elements. 16. The access control reader according to claim 15, wherein the one-dimensional array of microphone elements creates a two-dimensional speech zone to detect the sounds. 17. The access control reader according to claim 12, wherein the desired components are isolated from background noise detected by the beamforming microphone array via spatial filtering. 18. The access control reader according to claim 12, wherein the controller determines a direction from the beamforming microphone array to a source of the desired components within the sounds. 19. The access control reader according to claim 12, further comprising a camera to record video data in front of the beamforming microphone array. 20. The access control reader according to claim 19, wherein the video data recorded by the camera is analyzed to determine a direction to a source of the desired components. 21. The access control reader according to claim 12, further comprising a keypad to enable user activation of the access control reader. 22. A security system, comprising:
an access control reader having a beamforming array for detecting sounds; a controller that enhances a voice of a user within the sounds detected by the beamforming microphone array based on a direction of the user; and a control system that receives the enhanced voice of the user via a communications network. 23. The system according to claim 22, wherein the control system validates the enhanced voice by comparing the enhanced voice to a voice library of valid users and then enables access to a restricted area after the user has been validated. 24. The system according to claim 22, wherein the controller determines the direction of the user by analyzing video data captured by a camera to determine the direction to the user relative to the access control reader. 25. The system according to claim 22, wherein the controller determines the direction to the user by analyzing the sounds detected by the beamforming microphone array. | An access control reader enhances audio data captured by a beamforming microphone array. The access control reader determines a direction to a user and then utilizes beamforming in the direction of the user to enhance the user's voice. The user's enhanced voice is then transmitted to security personnel or a control system to validate the user's identity, in one example.1. An access control reader operation method in a security system, the method comprising:
detecting sounds with a beamforming microphone array of an access control reader; and enhancing desired components within the sounds detected by the beamforming microphone array based on a direction of a source of the desired components. 2. The method according to claim 1, further comprising:
isolating the desired components from background noise in the sounds detected by the beamforming microphone array; and then determining the direction to a source of the isolated desired components in the detected sounds. 3. The method according to claim 2, wherein the desired components in the sounds are isolated from background noise with spatial filtering. 4. The method according to claim 1, wherein the direction is determined by a controller of the access control reader that determines the direction from the beamforming microphone array to the source of the desired components. 5. The method according to claim 1, wherein the direction is determined by analyzing video data captured by a camera to determine a position of the source relative to the access control reader. 6. The method according to claim 1, further comprising transmitting the desired components to a control system for validation. 7. The method according to claim 6, wherein the control system validates a user's voice by comparing the user's voice to a voice library of valid users and enables access to a restricted area after the user's voice is validated. 8. The method according to claim 1, wherein the beamforming microphone array is a one-dimensional array of microphone elements. 9. The method according to claim 8, wherein the one-dimensional array of microphone elements resolves a two-dimensional speech zone to detect the sounds. 10. The method according to claim 1, wherein the beamforming microphone array is a two-dimensional array of microphone elements. 11. The method according to claim 10, wherein the two-dimensional array of microphone elements resolves a three-dimensional speech zone to detect the sounds. 12. An access control reader, comprising:
a beamforming microphone array for detecting sounds; and a controller that enhances desired components within the sounds detected by the beamforming microphone array based on a direction of the sounds relative to the beamforming microphone array. 13. The access control reader according to claim 12, wherein the beamforming microphone array is a two-dimensional array of microphone elements. 14. The access control reader according to claim 13, wherein the two-dimensional array of microphone elements creates a three-dimensional speech zone to detect the sounds. 15. The access control reader according to claim 12, wherein the beamforming microphone array is a one-dimensional array of microphone elements. 16. The access control reader according to claim 15, wherein the one-dimensional array of microphone elements creates a two-dimensional speech zone to detect the sounds. 17. The access control reader according to claim 12, wherein the desired components are isolated from background noise detected by the beamforming microphone array via spatial filtering. 18. The access control reader according to claim 12, wherein the controller determines a direction from the beamforming microphone array to a source of the desired components within the sounds. 19. The access control reader according to claim 12, further comprising a camera to record video data in front of the beamforming microphone array. 20. The access control reader according to claim 19, wherein the video data recorded by the camera is analyzed to determine a direction to a source of the desired components. 21. The access control reader according to claim 12, further comprising a keypad to enable user activation of the access control reader. 22. A security system, comprising:
an access control reader having a beamforming array for detecting sounds; a controller that enhances a voice of a user within the sounds detected by the beamforming microphone array based on a direction of the user; and a control system that receives the enhanced voice of the user via a communications network. 23. The system according to claim 22, wherein the control system validates the enhanced voice by comparing the enhanced voice to a voice library of valid users and then enables access to a restricted area after the user has been validated. 24. The system according to claim 22, wherein the controller determines the direction of the user by analyzing video data captured by a camera to determine the direction to the user relative to the access control reader. 25. The system according to claim 22, wherein the controller determines the direction to the user by analyzing the sounds detected by the beamforming microphone array. | 2,400 |
8,980 | 8,980 | 15,250,331 | 2,419 | The present invention relates to an encoding device and a method, a decoding device and a method, an editing device and a method, a storage medium, and a program which can perform encoding and decoding so that buffer failure does not occur. Information, such as a minimum bit rate, a minimum buffer size, and a minimum initial delay time, is contained in a random access point header contained in an accessible point in a bitstream. A bitsteam analyzing unit 72 analyzes an input bitstream, sets the above-mentioned information, and outputs the resulting information to a buffer-information adding unit 73. The buffer-information adding unit 73 adds the input information to the input bitstream and outputs the resulting bitstream. The present invention is applicable to an encoding device and a decoding device which process bitstreams. | 1. (canceled) 2. A decoding method, comprising:
acquiring, from a bitstream, identification information identifying whether either all pictures in a predetermined section randomly accessible, broken-link information, and buffer characteristic information, which includes a combination of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and decoding the bitstream using the identification information, the broken-link information, and the buffer characteristic information. 3. A decoding device comprising:
circuitry configured to acquire, from a bitstream, identification information identifying whether either all pictures in a predetermined section randomly accessible, broken-link information, and buffer characteristic information, which includes a combination of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and decode the bitstream using the identification information, the broken-link information, and the buffer characteristic information. | The present invention relates to an encoding device and a method, a decoding device and a method, an editing device and a method, a storage medium, and a program which can perform encoding and decoding so that buffer failure does not occur. Information, such as a minimum bit rate, a minimum buffer size, and a minimum initial delay time, is contained in a random access point header contained in an accessible point in a bitstream. A bitsteam analyzing unit 72 analyzes an input bitstream, sets the above-mentioned information, and outputs the resulting information to a buffer-information adding unit 73. The buffer-information adding unit 73 adds the input information to the input bitstream and outputs the resulting bitstream. The present invention is applicable to an encoding device and a decoding device which process bitstreams.1. (canceled) 2. A decoding method, comprising:
acquiring, from a bitstream, identification information identifying whether either all pictures in a predetermined section randomly accessible, broken-link information, and buffer characteristic information, which includes a combination of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and decoding the bitstream using the identification information, the broken-link information, and the buffer characteristic information. 3. A decoding device comprising:
circuitry configured to acquire, from a bitstream, identification information identifying whether either all pictures in a predetermined section randomly accessible, broken-link information, and buffer characteristic information, which includes a combination of buffer size information and bit rate information as criteria for determining whether the bitstream is decodable using a decoder buffer size and a decoding bit rate, the buffer size information indicating a required buffer size of a buffer that stores the bitstream during decoding of the bitstream and the bit rate information indicating an input bit rate of the buffer; and decode the bitstream using the identification information, the broken-link information, and the buffer characteristic information. | 2,400 |
8,981 | 8,981 | 16,011,606 | 2,432 | In a system for determining vulnerabilities associated with a web property, a network accessible server associated with the property is identified. One or more software components/subsystems associated with that server and, optionally, one or more versions of that component/subsystem are identified. For the identified components and versions thereof, vulnerability information is obtained from a database and compiled to determine vulnerability of the web property, without requiring access to any code of the software components/subsystems. | 1. A method comprising:
communicating first requests to network accessible servers associated with a set of one or more domains; identifying a plurality of software components indicated in responses from the network accessible servers; obtaining vulnerability information for the plurality of software components; determining an aggregate vulnerability for each network accessible server based on the obtained vulnerability information; and generating vulnerability indications based on aggregate vulnerabilities. 2. The method of claim 1, further comprising identifying the network accessible servers associated with the set of domains. 3. The method of claim 2, wherein identifying the network accessible servers comprises communicating second requests to network addresses associated with the set of one or more domains to identify the network accessible servers. 4. The method of claim 1, wherein communicating the first requests comprises communicating to each of the network accessible servers multiple requests, each of which corresponds to a different user agent. 5. The method of claim 1, wherein the network accessible servers comprise web servers. 6. The method of claim 1, wherein identifying the plurality of software components comprises determining identifiers and versions of the plurality of software components. 7. The method of claim 6, wherein obtaining the vulnerability information for the plurality of software components comprises querying a set of one or more databases with the identifiers and versions of the plurality of software components. 8. The method of claim 1, wherein determining the aggregate vulnerability for each network accessible server comprises determining a ratio of software components of the network accessible server indicated as vulnerable by the vulnerability information to total software components of the network accessible server. 9. The method of claim 1, wherein determining the aggregate vulnerability for each network accessible server comprises determining frequency of use of those of the plurality of software components of the network accessible server indicated as vulnerable by the vulnerability information. 10. The method of claim 9, wherein determining frequency of use of those of the software components of the network accessible server indicated as vulnerable comprises determining frequency of use across the network accessible servers. 11. The method of claim 1, wherein the requests comprise hypertext transfer protocol requests. 12. A non-transitory, computer-readable medium having instructions stored thereon that are executable by a computing device to perform operations comprising:
communicating first requests to network accessible servers associated with a set of one or more domains; identifying a plurality of software components indicated in responses from the network accessible servers; obtaining vulnerability information for the plurality of software components; determining an aggregate vulnerability for each network accessible server based on the obtained vulnerability information; and generating vulnerability indications based on aggregate vulnerabilities. 13. The non-transitory, computer-readable medium of claim 12, further having instructions executable by a computing device to perform operations comprising identifying the network accessible servers associated with the set of domains. 14. The non-transitory, computer-readable medium of claim 12, wherein communicating the first requests comprises communicating to each of the network accessible servers multiple requests, each of which corresponds to a different user agent. 15. The non-transitory, computer-readable medium of claim 12, wherein identifying the plurality of software components comprises determining identifiers and versions of the plurality of software components. 16. The non-transitory, computer-readable medium of claim 15, wherein obtaining the vulnerability information for the plurality of software components comprises querying a set of one or more databases with the identifiers and versions of the plurality of software components. 17. The non-transitory, computer-readable medium of claim 12, wherein determining the aggregate vulnerability for each network accessible server comprises determining a ratio of software components of the network accessible server indicated as vulnerable by the vulnerability information to total software components of the network accessible server. 18. The non-transitory, computer-readable medium of claim 12, wherein determining the aggregate vulnerability for each network accessible server comprises determining frequency of use of those of the plurality of software components of the network accessible server indicated as vulnerable by the vulnerability information. 19. An apparatus comprising:
a processor; a set of one or more network interfaces; and a storage medium having instructed stored therein, the instructions executable by the processor to cause the apparatus to, communicate via the set of one or more network interfaces first requests to network accessible servers associated with a set of one or more domains; identify a plurality of software components indicated in responses from the network accessible servers; obtain vulnerability information for the plurality of software components; determine an aggregate vulnerability for each network accessible server based on the obtained vulnerability information; and generate vulnerability indications based on aggregate vulnerabilities. 20. The apparatus of claim 19, wherein the instructions to determine the aggregate vulnerability for each network accessible server comprise instructions executable by the processor to cause the apparatus to determine a ratio of software components of the network accessible server indicated as vulnerable by the vulnerability information to total software components of the network accessible server. | In a system for determining vulnerabilities associated with a web property, a network accessible server associated with the property is identified. One or more software components/subsystems associated with that server and, optionally, one or more versions of that component/subsystem are identified. For the identified components and versions thereof, vulnerability information is obtained from a database and compiled to determine vulnerability of the web property, without requiring access to any code of the software components/subsystems.1. A method comprising:
communicating first requests to network accessible servers associated with a set of one or more domains; identifying a plurality of software components indicated in responses from the network accessible servers; obtaining vulnerability information for the plurality of software components; determining an aggregate vulnerability for each network accessible server based on the obtained vulnerability information; and generating vulnerability indications based on aggregate vulnerabilities. 2. The method of claim 1, further comprising identifying the network accessible servers associated with the set of domains. 3. The method of claim 2, wherein identifying the network accessible servers comprises communicating second requests to network addresses associated with the set of one or more domains to identify the network accessible servers. 4. The method of claim 1, wherein communicating the first requests comprises communicating to each of the network accessible servers multiple requests, each of which corresponds to a different user agent. 5. The method of claim 1, wherein the network accessible servers comprise web servers. 6. The method of claim 1, wherein identifying the plurality of software components comprises determining identifiers and versions of the plurality of software components. 7. The method of claim 6, wherein obtaining the vulnerability information for the plurality of software components comprises querying a set of one or more databases with the identifiers and versions of the plurality of software components. 8. The method of claim 1, wherein determining the aggregate vulnerability for each network accessible server comprises determining a ratio of software components of the network accessible server indicated as vulnerable by the vulnerability information to total software components of the network accessible server. 9. The method of claim 1, wherein determining the aggregate vulnerability for each network accessible server comprises determining frequency of use of those of the plurality of software components of the network accessible server indicated as vulnerable by the vulnerability information. 10. The method of claim 9, wherein determining frequency of use of those of the software components of the network accessible server indicated as vulnerable comprises determining frequency of use across the network accessible servers. 11. The method of claim 1, wherein the requests comprise hypertext transfer protocol requests. 12. A non-transitory, computer-readable medium having instructions stored thereon that are executable by a computing device to perform operations comprising:
communicating first requests to network accessible servers associated with a set of one or more domains; identifying a plurality of software components indicated in responses from the network accessible servers; obtaining vulnerability information for the plurality of software components; determining an aggregate vulnerability for each network accessible server based on the obtained vulnerability information; and generating vulnerability indications based on aggregate vulnerabilities. 13. The non-transitory, computer-readable medium of claim 12, further having instructions executable by a computing device to perform operations comprising identifying the network accessible servers associated with the set of domains. 14. The non-transitory, computer-readable medium of claim 12, wherein communicating the first requests comprises communicating to each of the network accessible servers multiple requests, each of which corresponds to a different user agent. 15. The non-transitory, computer-readable medium of claim 12, wherein identifying the plurality of software components comprises determining identifiers and versions of the plurality of software components. 16. The non-transitory, computer-readable medium of claim 15, wherein obtaining the vulnerability information for the plurality of software components comprises querying a set of one or more databases with the identifiers and versions of the plurality of software components. 17. The non-transitory, computer-readable medium of claim 12, wherein determining the aggregate vulnerability for each network accessible server comprises determining a ratio of software components of the network accessible server indicated as vulnerable by the vulnerability information to total software components of the network accessible server. 18. The non-transitory, computer-readable medium of claim 12, wherein determining the aggregate vulnerability for each network accessible server comprises determining frequency of use of those of the plurality of software components of the network accessible server indicated as vulnerable by the vulnerability information. 19. An apparatus comprising:
a processor; a set of one or more network interfaces; and a storage medium having instructed stored therein, the instructions executable by the processor to cause the apparatus to, communicate via the set of one or more network interfaces first requests to network accessible servers associated with a set of one or more domains; identify a plurality of software components indicated in responses from the network accessible servers; obtain vulnerability information for the plurality of software components; determine an aggregate vulnerability for each network accessible server based on the obtained vulnerability information; and generate vulnerability indications based on aggregate vulnerabilities. 20. The apparatus of claim 19, wherein the instructions to determine the aggregate vulnerability for each network accessible server comprise instructions executable by the processor to cause the apparatus to determine a ratio of software components of the network accessible server indicated as vulnerable by the vulnerability information to total software components of the network accessible server. | 2,400 |
8,982 | 8,982 | 15,621,803 | 2,459 | Systems and methods are disclosed for transitioning communication sessions across services. In one implementation, a first communication is received from a user via a first service. The first communication is associated with a communication session. The first communication is processed to identify a request with respect to a second service. The second service is initiated in response to the request. | 1. A system comprising:
a processing device; and a memory coupled to the processing device and storing instructions that, when executed by the processing device, cause the system to perform operations comprising:
receiving, via a first service, a first communication from a user;
associating the first communication with a communication session;
processing the first communication to identify a request with respect to a second service; and
initiating the second service in response to the request. 2. The system of claim 1, wherein initiating the second service comprises providing an instruction to initiate the second service at a device associated with the user. 3. The system of claim 1, wherein initiating the second service comprises providing an instruction to initiate the second service in conjunction with the communication session at a device associated with the user. 4. The system of claim 1, wherein initiating the second service comprises providing the communication session to the second service. 5. The system of claim 1, wherein initiating the second service comprises providing an aspect of the communication session to the second service. 6. The system of claim 1, wherein the memory further stores instructions for causing the system to perform operations comprising:
receiving, via the second service, a second communication from the user; and associating the second communication with the communication session. 7. The system of claim 1, wherein the first service comprises an application executing on a device associated with the user. 8. The system of claim 1, wherein the first service comprises an application executing on a central device. 9. A method comprising:
receiving, via a first service, a first communication from a user; associating the first communication with a communication session; processing the first communication to identify a request with respect to a second service; and initiating the second service in response to the request. 10. The method of claim 9, wherein initiating the second service comprises providing an instruction to initiate the second service at a device associated with the user. 11. The method of claim 9, wherein initiating the second service comprises providing an instruction to initiate the second service in conjunction with the communication session at a device associated with the user. 12. The method of claim 9, wherein initiating the second service comprises providing the communication session to the second service. 13. The method of claim 9, wherein initiating the second service comprises providing an aspect of the communication session to the second service. 14. The method of claim 9, further comprising:
receiving, via the second service, a second communication from the user; and associating the second communication with the communication session. 15. The method of claim 9, wherein the first service comprises an application executing on a device associated with the user. 16. The method of claim 9, wherein the first service comprises an application executing on a central device. 17. A non-transitory computer readable medium having instructions stored thereon that, when executed by a processing device, cause the processing device to perform operations comprising:
receiving, via a first service, a first communication from a user; associating the first communication with a communication session; processing the first communication to identify a request with respect to a second service; and initiating the second service in response to the request. 18. The computer-readable medium of claim 17, wherein initiating the second service comprises providing an instruction to initiate the second service at a device associated with the user. 19. The computer-readable medium of claim 17, wherein initiating the second service comprises providing an instruction to initiate the second service in conjunction with the communication session at a device associated with the user. 20. The computer-readable medium of claim 17, wherein the medium further stores instructions for causing the processing device to perform operations comprising:
receiving, via the second service, a second communication from the user; and associating the second communication with the communication session. | Systems and methods are disclosed for transitioning communication sessions across services. In one implementation, a first communication is received from a user via a first service. The first communication is associated with a communication session. The first communication is processed to identify a request with respect to a second service. The second service is initiated in response to the request.1. A system comprising:
a processing device; and a memory coupled to the processing device and storing instructions that, when executed by the processing device, cause the system to perform operations comprising:
receiving, via a first service, a first communication from a user;
associating the first communication with a communication session;
processing the first communication to identify a request with respect to a second service; and
initiating the second service in response to the request. 2. The system of claim 1, wherein initiating the second service comprises providing an instruction to initiate the second service at a device associated with the user. 3. The system of claim 1, wherein initiating the second service comprises providing an instruction to initiate the second service in conjunction with the communication session at a device associated with the user. 4. The system of claim 1, wherein initiating the second service comprises providing the communication session to the second service. 5. The system of claim 1, wherein initiating the second service comprises providing an aspect of the communication session to the second service. 6. The system of claim 1, wherein the memory further stores instructions for causing the system to perform operations comprising:
receiving, via the second service, a second communication from the user; and associating the second communication with the communication session. 7. The system of claim 1, wherein the first service comprises an application executing on a device associated with the user. 8. The system of claim 1, wherein the first service comprises an application executing on a central device. 9. A method comprising:
receiving, via a first service, a first communication from a user; associating the first communication with a communication session; processing the first communication to identify a request with respect to a second service; and initiating the second service in response to the request. 10. The method of claim 9, wherein initiating the second service comprises providing an instruction to initiate the second service at a device associated with the user. 11. The method of claim 9, wherein initiating the second service comprises providing an instruction to initiate the second service in conjunction with the communication session at a device associated with the user. 12. The method of claim 9, wherein initiating the second service comprises providing the communication session to the second service. 13. The method of claim 9, wherein initiating the second service comprises providing an aspect of the communication session to the second service. 14. The method of claim 9, further comprising:
receiving, via the second service, a second communication from the user; and associating the second communication with the communication session. 15. The method of claim 9, wherein the first service comprises an application executing on a device associated with the user. 16. The method of claim 9, wherein the first service comprises an application executing on a central device. 17. A non-transitory computer readable medium having instructions stored thereon that, when executed by a processing device, cause the processing device to perform operations comprising:
receiving, via a first service, a first communication from a user; associating the first communication with a communication session; processing the first communication to identify a request with respect to a second service; and initiating the second service in response to the request. 18. The computer-readable medium of claim 17, wherein initiating the second service comprises providing an instruction to initiate the second service at a device associated with the user. 19. The computer-readable medium of claim 17, wherein initiating the second service comprises providing an instruction to initiate the second service in conjunction with the communication session at a device associated with the user. 20. The computer-readable medium of claim 17, wherein the medium further stores instructions for causing the processing device to perform operations comprising:
receiving, via the second service, a second communication from the user; and associating the second communication with the communication session. | 2,400 |
8,983 | 8,983 | 15,393,354 | 2,496 | Technologies for securely extending cloud service application programming interfaces (APIs) in a cloud service marketplace include a connector hub of a marketplace computing device communicatively coupled to a cloud service provider interface of a cloud service provider and a cloud service broker interface of a cloud service broker. The connector hub is configured to deploy an API connector instance in a connection factory of the marketplace computing device, transmit provider provisioning channel credentials to the API connector instance and the cloud service provider interface and transmit broker provisioning channel credentials to the API connector instance and the cloud service broker interface. The connector hub is additionally configured establish a provisioning channel between the cloud service provider interface and the cloud service broker interface. Additional embodiments are described herein. | 1. A method for securely extending cloud service application programming interfaces (APIs) in a cloud service marketplace, the method comprising:
deploying, by a connector hub of a marketplace computing device, an API connector instance in a connection factory of the marketplace computing device, wherein the API connector instance comprises source code of an API connector usable to communicate with a remote API associated with a cloud service of the cloud service provider; transmitting, by the connector hub, provider provisioning channel credentials to the API connector instance and a cloud service provider interface of the cloud service provider; transmitting, by the connector hub, broker provisioning channel credentials to the API connector instance and a cloud service broker interface of the cloud service broker; and establishing, by the connector hub, a provisioning channel between the cloud service provider interface and the cloud service broker interface, wherein establishing the provisioning channel comprises establishing (i) a first communication channel between the API connector instance and the cloud service provider interface using the provider provisioning channel credentials to perform a first authentication operation, and (ii) a second communication channel between the API connector instance and the cloud service broker interface using the broker provisioning channel credentials to perform a second authentication operation. 2. The method of claim 1, further comprising:
generating, by the connector hub, proxy provisioning channel credentials; deploying, by the connector hub, an authentication proxy instance in the connection factory; and transmitting, by the connector hub, the proxy provisioning channel credentials to the API connector instance and the authentication proxy instance, wherein establishing the provisioning channel between the cloud service provider interface and the cloud service broker interface comprises establishing (i) a first communication channel between the API connector instance and the cloud service provider interface by using the provider provisioning channel credentials to perform a first authentication operation, (ii) a second communication channel between the authentication proxy instance and the cloud service broker interface by using the broker provisioning channel credentials to perform a second authentication operation, and (iii) a third communication channel between the API connector instance and the authentication proxy instance by using the proxy provisioning channel credentials to perform a third authentication operation. 3. The method of claim 1, wherein establishing the second communication channel between the authentication proxy instance and the cloud service broker interface includes transmitting an address of the authentication proxy instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. 4. The method of claim 1, further comprising:
generating, by the connector hub, the provider provisioning channel credentials corresponding to the cloud service provider; and generating, by the connector hub, the broker provisioning channel credentials corresponding to the cloud service broker. 5. The method of claim 4, further comprising receiving, by the connector hub, an API connector provision notification from a cloud service broker marketplace of the marketplace computing device, wherein generating the broker provisioning channel credentials for the cloud service broker comprises generating the broker provisioning channel credentials in response to having received the API connector provision notification. 6. The method of claim 4, further comprising receiving, by the connector hub, an indication from the cloud service provider that a new cloud service of the cloud service provider has been made available in the cloud service broker marketplace, wherein generating the provider provisioning channel credentials comprises generating the provider provisioning channel credentials in response to having received the indication. 7. The method of claim 4, further comprising:
storing, by the connector hub, the provider provisioning channel credentials in a credentials database of the connector hub; associating, by the connector hub, the provider provisioning channel credentials with the cloud service provider in the credentials database; storing, by the connector hub, the broker provisioning channel credentials in the credentials database in the credentials database; and associating, by the connector hub, the broker provisioning channel credentials with a cloud service broker. 8. The method of claim 1, wherein establishing the second communication channel between the API connector instance and the cloud service broker interface includes transmitting an address of the API connector instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. 9. One or more computer-readable storage media comprising a plurality of instructions stored thereon that in response to being executed cause a connector hub of a marketplace computing device to:
deploy an API connector instance in a connection factory of the marketplace computing device, wherein the API connector instance comprises source code of an API connector usable to communicate with a remote API associated with a cloud service of the cloud service provider; transmit provider provisioning channel credentials to the API connector instance and a cloud service provider interface of the cloud service provider; transmit broker provisioning channel credentials to the API connector instance and a cloud service broker interface of the cloud service broker; and establish a provisioning channel between the cloud service provider interface and the cloud service broker interface, wherein to establish the provisioning channel comprises to establish (i) a first communication channel between the API connector instance and the cloud service provider interface using the provider provisioning channel credentials to perform a first authentication operation, and (ii) a second communication channel between the API connector instance and the cloud service broker interface using the broker provisioning channel credentials to perform a second authentication operation. 10. The one or more computer-readable storage media of claim 9, wherein the plurality of instructions further cause the connector hub to:
generate proxy provisioning channel credentials; deploy an authentication proxy instance in the connection factory; and transmit the proxy provisioning channel credentials to the API connector instance and the authentication proxy instance, wherein to establish the provisioning channel between the cloud service provider interface and the cloud service broker interface comprises to establish (i) a first communication channel between the API connector instance and the cloud service provider interface by using the provider provisioning channel credentials to perform a first authentication operation, (ii) a second communication channel between the authentication proxy instance and the cloud service broker interface by using the broker provisioning channel credentials to perform a second authentication operation, and (iii) a third communication channel between the API connector instance and the authentication proxy instance by using the proxy provisioning channel credentials to perform a third authentication operation. 11. The one or more computer-readable storage media of claim 9, wherein to establish the second communication channel between the authentication proxy instance and the cloud service broker interface includes to transmit an address of the authentication proxy instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. 12. The one or more computer-readable storage media of claim 9, wherein the plurality of instructions further cause the connector hub to:
generate the provider provisioning channel credentials corresponding to the cloud service provider; and generate the broker provisioning channel credentials corresponding to the cloud service broker. 13. The one or more computer-readable storage media of claim 12, wherein the plurality of instructions further cause the connector hub to receive an API connector provision notification from a cloud service broker marketplace of the marketplace computing device, wherein to generate the broker provisioning channel credentials for the cloud service broker comprises to generate the broker provisioning channel credentials in response to having received the API connector provision notification. 14. The one or more computer-readable storage media of claim 12, wherein the plurality of instructions further cause the connector hub to receive an indication from the cloud service provider that a new cloud service of the cloud service provider has been made available in the cloud service broker marketplace, wherein to generate the provider provisioning channel credentials comprises to generate the provider provisioning channel credentials in response to having received the indication. 15. The one or more computer-readable storage media of claim 12, wherein the plurality of instructions further cause the connector hub to:
store the provider provisioning channel credentials in a credentials database of the connector hub; associate the provider provisioning channel credentials with the cloud service provider in the credentials database; store the broker provisioning channel credentials in the credentials database in the credentials database; and associate the broker provisioning channel credentials with a cloud service broker. 16. The one or more computer-readable storage media of claim 9, wherein to establish the second communication channel between the API connector instance and the cloud service broker interface includes to transmit an address of the API connector instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. 17. A connector hub of a marketplace computing device for securely extending cloud service application programming interfaces (APIs) in a cloud service marketplace, wherein the cloud service marketplace includes a marketplace computing device, the marketplace computing device comprising:
a CPU; and a memory having stored therein a plurality of instructions that when executed by the processor cause a connector hub of the marketplace computing device to:
deploy an API connector instance in a connection factory of the marketplace computing device, wherein the API connector instance comprises source code of an API connector usable to communicate with a remote API associated with a cloud service of the cloud service provider;
transmit provider provisioning channel credentials to the API connector instance and a cloud service provider interface of the cloud service provider;
transmit broker provisioning channel credentials to the API connector instance and a cloud service broker interface of the cloud service broker; and
establish a provisioning channel between the cloud service provider interface and the cloud service broker interface, wherein to establish the provisioning channel comprises to establish (i) a first communication channel between the API connector instance and the cloud service provider interface using the provider provisioning channel credentials to perform a first authentication operation, and (ii) a second communication channel between the API connector instance and the cloud service broker interface using the broker provisioning channel credentials to perform a second authentication operation. 18. The marketplace computing device of claim 17, wherein the one or more processors are further configured to execute the instructions to:
generate proxy provisioning channel credentials; deploy an authentication proxy instance in the connection factory; and transmit the proxy provisioning channel credentials to the API connector instance and the authentication proxy instance, wherein to establish the provisioning channel between the cloud service provider interface and the cloud service broker interface comprises to establish (i) a first communication channel between the API connector instance and the cloud service provider interface by using the provider provisioning channel credentials to perform a first authentication operation, (ii) a second communication channel between the authentication proxy instance and the cloud service broker interface by using the broker provisioning channel credentials to perform a second authentication operation, and (iii) a third communication channel between the API connector instance and the authentication proxy instance by using the proxy provisioning channel credentials to perform a third authentication operation. 19. The marketplace computing device of claim 17, wherein to establish the second communication channel between the authentication proxy instance and the cloud service broker interface includes to transmit an address of the authentication proxy instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. 20. The marketplace computing device of claim 17, wherein the one or more processors are further configured to execute the instructions to:
generate the provider provisioning channel credentials corresponding to the cloud service provider; and generate the broker provisioning channel credentials corresponding to the cloud service broker. 21. The marketplace computing device of claim 20, wherein the one or more processors are further configured to execute the instructions to receive an API connector provision notification from a cloud service broker marketplace of the marketplace computing device, wherein to generate the broker provisioning channel credentials for the cloud service broker comprises to generate the broker provisioning channel credentials in response to having received the API connector provision notification. 22. The marketplace computing device of claim 20, wherein the one or more processors are further configured to execute the instructions to receive an indication from the cloud service provider that a new cloud service of the cloud service provider has been made available in the cloud service broker marketplace, wherein to generate the provider provisioning channel credentials comprises to generate the provider provisioning channel credentials in response to having received the indication. 23. The marketplace computing device of claim 20, wherein the one or more processors are further configured to execute the instructions to:
store the provider provisioning channel credentials in a credentials database of the connector hub; associate the provider provisioning channel credentials with the cloud service provider in the credentials database; store the broker provisioning channel credentials in the credentials database in the credentials database; and associate the broker provisioning channel credentials with a cloud service broker. 24. The marketplace computing device of claim 17, wherein to establish the second communication channel between the API connector instance and the cloud service broker interface includes to transmit an address of the API connector instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. | Technologies for securely extending cloud service application programming interfaces (APIs) in a cloud service marketplace include a connector hub of a marketplace computing device communicatively coupled to a cloud service provider interface of a cloud service provider and a cloud service broker interface of a cloud service broker. The connector hub is configured to deploy an API connector instance in a connection factory of the marketplace computing device, transmit provider provisioning channel credentials to the API connector instance and the cloud service provider interface and transmit broker provisioning channel credentials to the API connector instance and the cloud service broker interface. The connector hub is additionally configured establish a provisioning channel between the cloud service provider interface and the cloud service broker interface. Additional embodiments are described herein.1. A method for securely extending cloud service application programming interfaces (APIs) in a cloud service marketplace, the method comprising:
deploying, by a connector hub of a marketplace computing device, an API connector instance in a connection factory of the marketplace computing device, wherein the API connector instance comprises source code of an API connector usable to communicate with a remote API associated with a cloud service of the cloud service provider; transmitting, by the connector hub, provider provisioning channel credentials to the API connector instance and a cloud service provider interface of the cloud service provider; transmitting, by the connector hub, broker provisioning channel credentials to the API connector instance and a cloud service broker interface of the cloud service broker; and establishing, by the connector hub, a provisioning channel between the cloud service provider interface and the cloud service broker interface, wherein establishing the provisioning channel comprises establishing (i) a first communication channel between the API connector instance and the cloud service provider interface using the provider provisioning channel credentials to perform a first authentication operation, and (ii) a second communication channel between the API connector instance and the cloud service broker interface using the broker provisioning channel credentials to perform a second authentication operation. 2. The method of claim 1, further comprising:
generating, by the connector hub, proxy provisioning channel credentials; deploying, by the connector hub, an authentication proxy instance in the connection factory; and transmitting, by the connector hub, the proxy provisioning channel credentials to the API connector instance and the authentication proxy instance, wherein establishing the provisioning channel between the cloud service provider interface and the cloud service broker interface comprises establishing (i) a first communication channel between the API connector instance and the cloud service provider interface by using the provider provisioning channel credentials to perform a first authentication operation, (ii) a second communication channel between the authentication proxy instance and the cloud service broker interface by using the broker provisioning channel credentials to perform a second authentication operation, and (iii) a third communication channel between the API connector instance and the authentication proxy instance by using the proxy provisioning channel credentials to perform a third authentication operation. 3. The method of claim 1, wherein establishing the second communication channel between the authentication proxy instance and the cloud service broker interface includes transmitting an address of the authentication proxy instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. 4. The method of claim 1, further comprising:
generating, by the connector hub, the provider provisioning channel credentials corresponding to the cloud service provider; and generating, by the connector hub, the broker provisioning channel credentials corresponding to the cloud service broker. 5. The method of claim 4, further comprising receiving, by the connector hub, an API connector provision notification from a cloud service broker marketplace of the marketplace computing device, wherein generating the broker provisioning channel credentials for the cloud service broker comprises generating the broker provisioning channel credentials in response to having received the API connector provision notification. 6. The method of claim 4, further comprising receiving, by the connector hub, an indication from the cloud service provider that a new cloud service of the cloud service provider has been made available in the cloud service broker marketplace, wherein generating the provider provisioning channel credentials comprises generating the provider provisioning channel credentials in response to having received the indication. 7. The method of claim 4, further comprising:
storing, by the connector hub, the provider provisioning channel credentials in a credentials database of the connector hub; associating, by the connector hub, the provider provisioning channel credentials with the cloud service provider in the credentials database; storing, by the connector hub, the broker provisioning channel credentials in the credentials database in the credentials database; and associating, by the connector hub, the broker provisioning channel credentials with a cloud service broker. 8. The method of claim 1, wherein establishing the second communication channel between the API connector instance and the cloud service broker interface includes transmitting an address of the API connector instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. 9. One or more computer-readable storage media comprising a plurality of instructions stored thereon that in response to being executed cause a connector hub of a marketplace computing device to:
deploy an API connector instance in a connection factory of the marketplace computing device, wherein the API connector instance comprises source code of an API connector usable to communicate with a remote API associated with a cloud service of the cloud service provider; transmit provider provisioning channel credentials to the API connector instance and a cloud service provider interface of the cloud service provider; transmit broker provisioning channel credentials to the API connector instance and a cloud service broker interface of the cloud service broker; and establish a provisioning channel between the cloud service provider interface and the cloud service broker interface, wherein to establish the provisioning channel comprises to establish (i) a first communication channel between the API connector instance and the cloud service provider interface using the provider provisioning channel credentials to perform a first authentication operation, and (ii) a second communication channel between the API connector instance and the cloud service broker interface using the broker provisioning channel credentials to perform a second authentication operation. 10. The one or more computer-readable storage media of claim 9, wherein the plurality of instructions further cause the connector hub to:
generate proxy provisioning channel credentials; deploy an authentication proxy instance in the connection factory; and transmit the proxy provisioning channel credentials to the API connector instance and the authentication proxy instance, wherein to establish the provisioning channel between the cloud service provider interface and the cloud service broker interface comprises to establish (i) a first communication channel between the API connector instance and the cloud service provider interface by using the provider provisioning channel credentials to perform a first authentication operation, (ii) a second communication channel between the authentication proxy instance and the cloud service broker interface by using the broker provisioning channel credentials to perform a second authentication operation, and (iii) a third communication channel between the API connector instance and the authentication proxy instance by using the proxy provisioning channel credentials to perform a third authentication operation. 11. The one or more computer-readable storage media of claim 9, wherein to establish the second communication channel between the authentication proxy instance and the cloud service broker interface includes to transmit an address of the authentication proxy instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. 12. The one or more computer-readable storage media of claim 9, wherein the plurality of instructions further cause the connector hub to:
generate the provider provisioning channel credentials corresponding to the cloud service provider; and generate the broker provisioning channel credentials corresponding to the cloud service broker. 13. The one or more computer-readable storage media of claim 12, wherein the plurality of instructions further cause the connector hub to receive an API connector provision notification from a cloud service broker marketplace of the marketplace computing device, wherein to generate the broker provisioning channel credentials for the cloud service broker comprises to generate the broker provisioning channel credentials in response to having received the API connector provision notification. 14. The one or more computer-readable storage media of claim 12, wherein the plurality of instructions further cause the connector hub to receive an indication from the cloud service provider that a new cloud service of the cloud service provider has been made available in the cloud service broker marketplace, wherein to generate the provider provisioning channel credentials comprises to generate the provider provisioning channel credentials in response to having received the indication. 15. The one or more computer-readable storage media of claim 12, wherein the plurality of instructions further cause the connector hub to:
store the provider provisioning channel credentials in a credentials database of the connector hub; associate the provider provisioning channel credentials with the cloud service provider in the credentials database; store the broker provisioning channel credentials in the credentials database in the credentials database; and associate the broker provisioning channel credentials with a cloud service broker. 16. The one or more computer-readable storage media of claim 9, wherein to establish the second communication channel between the API connector instance and the cloud service broker interface includes to transmit an address of the API connector instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. 17. A connector hub of a marketplace computing device for securely extending cloud service application programming interfaces (APIs) in a cloud service marketplace, wherein the cloud service marketplace includes a marketplace computing device, the marketplace computing device comprising:
a CPU; and a memory having stored therein a plurality of instructions that when executed by the processor cause a connector hub of the marketplace computing device to:
deploy an API connector instance in a connection factory of the marketplace computing device, wherein the API connector instance comprises source code of an API connector usable to communicate with a remote API associated with a cloud service of the cloud service provider;
transmit provider provisioning channel credentials to the API connector instance and a cloud service provider interface of the cloud service provider;
transmit broker provisioning channel credentials to the API connector instance and a cloud service broker interface of the cloud service broker; and
establish a provisioning channel between the cloud service provider interface and the cloud service broker interface, wherein to establish the provisioning channel comprises to establish (i) a first communication channel between the API connector instance and the cloud service provider interface using the provider provisioning channel credentials to perform a first authentication operation, and (ii) a second communication channel between the API connector instance and the cloud service broker interface using the broker provisioning channel credentials to perform a second authentication operation. 18. The marketplace computing device of claim 17, wherein the one or more processors are further configured to execute the instructions to:
generate proxy provisioning channel credentials; deploy an authentication proxy instance in the connection factory; and transmit the proxy provisioning channel credentials to the API connector instance and the authentication proxy instance, wherein to establish the provisioning channel between the cloud service provider interface and the cloud service broker interface comprises to establish (i) a first communication channel between the API connector instance and the cloud service provider interface by using the provider provisioning channel credentials to perform a first authentication operation, (ii) a second communication channel between the authentication proxy instance and the cloud service broker interface by using the broker provisioning channel credentials to perform a second authentication operation, and (iii) a third communication channel between the API connector instance and the authentication proxy instance by using the proxy provisioning channel credentials to perform a third authentication operation. 19. The marketplace computing device of claim 17, wherein to establish the second communication channel between the authentication proxy instance and the cloud service broker interface includes to transmit an address of the authentication proxy instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. 20. The marketplace computing device of claim 17, wherein the one or more processors are further configured to execute the instructions to:
generate the provider provisioning channel credentials corresponding to the cloud service provider; and generate the broker provisioning channel credentials corresponding to the cloud service broker. 21. The marketplace computing device of claim 20, wherein the one or more processors are further configured to execute the instructions to receive an API connector provision notification from a cloud service broker marketplace of the marketplace computing device, wherein to generate the broker provisioning channel credentials for the cloud service broker comprises to generate the broker provisioning channel credentials in response to having received the API connector provision notification. 22. The marketplace computing device of claim 20, wherein the one or more processors are further configured to execute the instructions to receive an indication from the cloud service provider that a new cloud service of the cloud service provider has been made available in the cloud service broker marketplace, wherein to generate the provider provisioning channel credentials comprises to generate the provider provisioning channel credentials in response to having received the indication. 23. The marketplace computing device of claim 20, wherein the one or more processors are further configured to execute the instructions to:
store the provider provisioning channel credentials in a credentials database of the connector hub; associate the provider provisioning channel credentials with the cloud service provider in the credentials database; store the broker provisioning channel credentials in the credentials database in the credentials database; and associate the broker provisioning channel credentials with a cloud service broker. 24. The marketplace computing device of claim 17, wherein to establish the second communication channel between the API connector instance and the cloud service broker interface includes to transmit an address of the API connector instance to the cloud service broker interface, wherein the address is usable by the cloud service broker interface to initiate communications with the authentication proxy instance. | 2,400 |
8,984 | 8,984 | 15,107,757 | 2,439 | A personal computing device receives a request for data from a requester. The personal computing device determines whether or not that request is to be permitted or not permitted. The personal computing device indicates to the user both a data indication of what data has been requested by the requester and a policy indication of what policy (e.g. retention policy) is associated with that data. The personal computing device may take the form of a smart watch. The data indication may take the form of an icon and the policy indication may take the form of an icon overlaid upon the data icon. | 1. A method of controlling provision of data comprising:
sending a request for said data from a requester to a personal computing device, said request identifying said data and a policy to be associated with said data; receiving said request at said personal computing device; determining with said personal computing device if said request is a permitted request and
(i) if said request is a permitted request, then authorizing said provision of said data to said requester; and
(ii) if said request is not a permitted request, then not authorizing said provision of said data to said requester. 2. A method as claimed in claim 1, further comprising:
indicating with an indication device, of said personal computing device a data indication of what data has been requested by said requester and a policy indication of what policy is associated with said data. 3. A method as claimed in claim 1, wherein said policy is a retention policy for said data applied by said requester. 4. A method as claimed in claim 3, wherein said retention policy is selected from a predetermined group of retention policies. 5. A method as claimed in claim 4, wherein that said predetermined group of retention policies includes one or more of:
said data is retained permanently by said requester; said data is retained until completion of a transaction associated with said data; said data is retained for use by said requester to perform a predetermined processing task and thereafter will not be retained; said data is retained by said requester for a predetermined period of time; and said data is retained for use by said requester a predetermined number of times and thereafter will not be retained. 6. A method as claimed in claim 1, wherein said indication device is a display screen. 7. A method as claimed in claim 6, wherein said data indication includes a data icon identifying a data type of said data. 8. A method as claimed in claim 2, wherein said policy indication includes a policy icon identifying a policy type of said policy. 9. A method as claimed in claim 7, wherein said policy icon is overlaid on said data icon. 10. A method as claimed in claim 1, comprising displaying on a display screen associated with said requester said data indication of what data has been requested by said requester and said policy indication of what policy is associated with said data. 11. A method as claimed in claim 1, wherein said requester is a remote server communicating with said personal computing device via a local terminal device. 12. A method as claimed in claim 1, wherein said determining includes said personal computing device communicating with an authorizing server via a telecommunications connection. 13. A method as claimed in claim 10, wherein said authorizing server generates said data indication and said policy indication for display on said display screen associated with said requester. 14. (canceled) 15. A method as claimed in claim 1, wherein said personal computing device generates said data indication and said policy indication for display on said display screen of said personal computing device in dependence upon a data type and a policy type indicated by said request. 16. (canceled) 17. A method as claimed in claim 14, wherein if said permission data indicates said request is an automatically permitted request, then said personal computing device automatically authorizes said provision and at least one of said data indication and said policy indication indicates that said request has been authorized. 18. A method as claimed in claim 14, wherein if said permission data indicates said request is an optionally authorized request, then at least one of said data indication and said policy indication prompts a user of said personal computing device to provide a user input to one of (i) authorize said request whereupon said personal computing device authorizes said provision; and (ii) not authorize said request. 19. A method as claimed in claim 14, wherein if said permission data indicates said request is an unauthorized request, then said personal computing device does not authorize said provision. 20. A method as claimed in claim 14, wherein if said permission data indicates said request is an unauthorized request, then at least one of said data indication and said policy indication indicates that said request as not been authorized. 21. (canceled) 22. A personal computing device for controlling provision of data, said personal computing device comprising:
receiving circuitry configured to receive a request for said data from a requester, said request identifying said data and a policy to be associated with said data; determining circuitry configured to determine if said request is a permitted request and
(i) if said request is a permitted request, then authorizing said provision of said data to said requester; and
(ii) if said request is not a permitted request, then not authorizing said provision of said data to said requester. 23. A personal computing device for controlling provision of data, said personal computing device comprising:
receiving means for receiving a quest for said data from a requester, said request identifying said data and a policy to be associated with said data; determining means for determining if said request is a permitted request and
(i) if said request is a permitted request, then authorizing said provision of said data to said requester; and
(ii) if said request is not a permitted request, then not authorizing said provision of said data to said requester. 24-25. (canceled) | A personal computing device receives a request for data from a requester. The personal computing device determines whether or not that request is to be permitted or not permitted. The personal computing device indicates to the user both a data indication of what data has been requested by the requester and a policy indication of what policy (e.g. retention policy) is associated with that data. The personal computing device may take the form of a smart watch. The data indication may take the form of an icon and the policy indication may take the form of an icon overlaid upon the data icon.1. A method of controlling provision of data comprising:
sending a request for said data from a requester to a personal computing device, said request identifying said data and a policy to be associated with said data; receiving said request at said personal computing device; determining with said personal computing device if said request is a permitted request and
(i) if said request is a permitted request, then authorizing said provision of said data to said requester; and
(ii) if said request is not a permitted request, then not authorizing said provision of said data to said requester. 2. A method as claimed in claim 1, further comprising:
indicating with an indication device, of said personal computing device a data indication of what data has been requested by said requester and a policy indication of what policy is associated with said data. 3. A method as claimed in claim 1, wherein said policy is a retention policy for said data applied by said requester. 4. A method as claimed in claim 3, wherein said retention policy is selected from a predetermined group of retention policies. 5. A method as claimed in claim 4, wherein that said predetermined group of retention policies includes one or more of:
said data is retained permanently by said requester; said data is retained until completion of a transaction associated with said data; said data is retained for use by said requester to perform a predetermined processing task and thereafter will not be retained; said data is retained by said requester for a predetermined period of time; and said data is retained for use by said requester a predetermined number of times and thereafter will not be retained. 6. A method as claimed in claim 1, wherein said indication device is a display screen. 7. A method as claimed in claim 6, wherein said data indication includes a data icon identifying a data type of said data. 8. A method as claimed in claim 2, wherein said policy indication includes a policy icon identifying a policy type of said policy. 9. A method as claimed in claim 7, wherein said policy icon is overlaid on said data icon. 10. A method as claimed in claim 1, comprising displaying on a display screen associated with said requester said data indication of what data has been requested by said requester and said policy indication of what policy is associated with said data. 11. A method as claimed in claim 1, wherein said requester is a remote server communicating with said personal computing device via a local terminal device. 12. A method as claimed in claim 1, wherein said determining includes said personal computing device communicating with an authorizing server via a telecommunications connection. 13. A method as claimed in claim 10, wherein said authorizing server generates said data indication and said policy indication for display on said display screen associated with said requester. 14. (canceled) 15. A method as claimed in claim 1, wherein said personal computing device generates said data indication and said policy indication for display on said display screen of said personal computing device in dependence upon a data type and a policy type indicated by said request. 16. (canceled) 17. A method as claimed in claim 14, wherein if said permission data indicates said request is an automatically permitted request, then said personal computing device automatically authorizes said provision and at least one of said data indication and said policy indication indicates that said request has been authorized. 18. A method as claimed in claim 14, wherein if said permission data indicates said request is an optionally authorized request, then at least one of said data indication and said policy indication prompts a user of said personal computing device to provide a user input to one of (i) authorize said request whereupon said personal computing device authorizes said provision; and (ii) not authorize said request. 19. A method as claimed in claim 14, wherein if said permission data indicates said request is an unauthorized request, then said personal computing device does not authorize said provision. 20. A method as claimed in claim 14, wherein if said permission data indicates said request is an unauthorized request, then at least one of said data indication and said policy indication indicates that said request as not been authorized. 21. (canceled) 22. A personal computing device for controlling provision of data, said personal computing device comprising:
receiving circuitry configured to receive a request for said data from a requester, said request identifying said data and a policy to be associated with said data; determining circuitry configured to determine if said request is a permitted request and
(i) if said request is a permitted request, then authorizing said provision of said data to said requester; and
(ii) if said request is not a permitted request, then not authorizing said provision of said data to said requester. 23. A personal computing device for controlling provision of data, said personal computing device comprising:
receiving means for receiving a quest for said data from a requester, said request identifying said data and a policy to be associated with said data; determining means for determining if said request is a permitted request and
(i) if said request is a permitted request, then authorizing said provision of said data to said requester; and
(ii) if said request is not a permitted request, then not authorizing said provision of said data to said requester. 24-25. (canceled) | 2,400 |
8,985 | 8,985 | 14,884,709 | 2,495 | A system for communicating images, comprises an imaging device configured to capture and image and generate a digital image file, the imaging device comprising a device identifier; a set of routines configured to label the digital image file, associated account information with the digital image file, associate the device identifier with the digital image file, and communicate the digital image file to a server; a server configured to receive digital image files and process the digital image file according to at least one of a label associated with the digital image file, account information associated with the digital image file, and a device identifier associated with a device that captured the digital image file. | 1. A system for communicating images, comprising:
an imaging device configured to capture and image and generate a digital image file, the imaging device comprising a device identifier; a set of routines configured to label the digital image file, associated account information with the digital image file, associate the device identifier with the digital image file, and communicate the digital image file to a server; a server configured to receive digital image files and process the digital image file according to at least one of a label associated with the digital image file, account information associated with the digital image file, and a device identifier associated with a device that captured the digital image file. 2. The system of claim 1, wherein the imaging device further comprises a shared key, and wherein the routines are configured to encrypt the digital image file using the shared key. 3. The system of claim 2, wherein the server comprises a plurality of shared keys, each associated with a particular imaging device, and wherein the server is configured to decrypt messages from a particular imaging device using the shared key associated with the particular device. 4. The system of claim 1, wherein the routines are stored on the imaging device. 5. The system of claim 1, further comprising a terminal coupled with the imaging device, and wherein the routines are stored on the terminal. 6. The system of claim 5, wherein the terminal is a mobile device. 7. The system of claim 6, wherein the mobile device is a potable computing device, tablet, or smartphone. 8. The system of claim 1, further comprising one or more storage locations, and wherein the account information identifies a file location in the one or more storage locations. 9. The system of claim 1, wherein the routines are further configured to convert a format associated with the digital image file before communicating the digital image file to a server. 10. The system of claim 1, wherein the routines are further configured to perform at least one of initialization, sending heartbeats to the server, failure reporting, configuration updates, and software updates. 11. An imaging device, comprising:
a modality configured to capture and image and generate a digital image file; a device identifier; a shared key; and a set of routines configured to label the digital image file, associated account information with the digital image file, associate the device identifier with the digital image file, encrypt the digital image file using the shared key, and communicate the digital image file to a server; wherein the label, account information and device identifier instruct the server as to how to process the digital image file. 12. The imaging device of claim 11, wherein the imaging device is an ultrasound device. 13. The device of claim 11, wherein the routines are configured to communicate the digital image data via a standard port. 14. The device of claim 11, wherein the routines are further configured to perform at least one of initialization, sending heartbeats to the server, failure reporting, configuration updates, and software updates. | A system for communicating images, comprises an imaging device configured to capture and image and generate a digital image file, the imaging device comprising a device identifier; a set of routines configured to label the digital image file, associated account information with the digital image file, associate the device identifier with the digital image file, and communicate the digital image file to a server; a server configured to receive digital image files and process the digital image file according to at least one of a label associated with the digital image file, account information associated with the digital image file, and a device identifier associated with a device that captured the digital image file.1. A system for communicating images, comprising:
an imaging device configured to capture and image and generate a digital image file, the imaging device comprising a device identifier; a set of routines configured to label the digital image file, associated account information with the digital image file, associate the device identifier with the digital image file, and communicate the digital image file to a server; a server configured to receive digital image files and process the digital image file according to at least one of a label associated with the digital image file, account information associated with the digital image file, and a device identifier associated with a device that captured the digital image file. 2. The system of claim 1, wherein the imaging device further comprises a shared key, and wherein the routines are configured to encrypt the digital image file using the shared key. 3. The system of claim 2, wherein the server comprises a plurality of shared keys, each associated with a particular imaging device, and wherein the server is configured to decrypt messages from a particular imaging device using the shared key associated with the particular device. 4. The system of claim 1, wherein the routines are stored on the imaging device. 5. The system of claim 1, further comprising a terminal coupled with the imaging device, and wherein the routines are stored on the terminal. 6. The system of claim 5, wherein the terminal is a mobile device. 7. The system of claim 6, wherein the mobile device is a potable computing device, tablet, or smartphone. 8. The system of claim 1, further comprising one or more storage locations, and wherein the account information identifies a file location in the one or more storage locations. 9. The system of claim 1, wherein the routines are further configured to convert a format associated with the digital image file before communicating the digital image file to a server. 10. The system of claim 1, wherein the routines are further configured to perform at least one of initialization, sending heartbeats to the server, failure reporting, configuration updates, and software updates. 11. An imaging device, comprising:
a modality configured to capture and image and generate a digital image file; a device identifier; a shared key; and a set of routines configured to label the digital image file, associated account information with the digital image file, associate the device identifier with the digital image file, encrypt the digital image file using the shared key, and communicate the digital image file to a server; wherein the label, account information and device identifier instruct the server as to how to process the digital image file. 12. The imaging device of claim 11, wherein the imaging device is an ultrasound device. 13. The device of claim 11, wherein the routines are configured to communicate the digital image data via a standard port. 14. The device of claim 11, wherein the routines are further configured to perform at least one of initialization, sending heartbeats to the server, failure reporting, configuration updates, and software updates. | 2,400 |
8,986 | 8,986 | 15,449,876 | 2,497 | Techniques are described herein that are capable of providing security for code between a code generator and a compiler. The code generator generates source code. The code generator generates a first checksum of a file that includes the source code. The code generator provides the first checksum to the compiler via a secure channel. The compiler generates a second checksum of the file that includes the source code. The compiler determines whether to compile the source code based at least in part on whether the first checksum and the second checksum are the same. The first checksum and the second checksum being the same indicates that the source code is to be compiled. The first checksum and the second checksum being different indicates that the source code is not to be compiled. | 1. A code security system comprising:
a code generator to generate source code, the code generator further to generate a first checksum of a file that includes the source code, the code generator further to provide the first checksum to a compiler via a first secure channel; and the compiler to generate a second checksum of the file that includes the source code, the compiler further to determine whether to compile the source code based at least in part on whether the first checksum and the second checksum are same,
the first checksum and the second checksum being the same indicating that the source code is to be compiled,
the first checksum and the second checksum being different indicating that the source code is not to be compiled. 2. The code security system of claim 1, wherein the code generator is further to provide a designated algorithm that is used to generate the first checksum to the compiler via the first secure channel; and
wherein the compiler is to use the designated algorithm that is received from the code generator to generate the second checksum. 3. The code security system of claim 2, wherein the code generator supports a plurality of algorithms for generating checksums; and
wherein the code generator is to randomly select the designated algorithm from the plurality of algorithms to be used to generate the first checksum. 4. The code security system of claim 2, wherein the code generator supports a plurality of algorithms for generating checksums;
wherein the code generator is to communicate with the compiler to determine which of the plurality of algorithms are supported by the compiler; and wherein the code generator is to select the designated algorithm from a subset of the plurality of algorithms, which is indicated by the compiler to be supported by the compiler, to be used to generate the first checksum. 5. The code security system of claim 2, wherein the code generator supports a plurality of algorithms for generating checksums; and
wherein the code generator is to select the designated algorithm from the plurality of algorithms to be used to generate the first checksum based at least in part on an estimated cryptographic security associated with the designated algorithm being greater than an estimated cryptographic security associated with each of the other algorithms. 6. The code security system of claim 1, wherein the code generator is to create a process that runs the compiler, the code generator to use the process to provide the first checksum to the compiler via the first secure channel. 7. The code security system of claim 1, wherein the code generator is to provide the first checksum to the compiler via at least one of (a) one or more command line arguments, (b) one or more named pipes, (c) a shared memory, or (d) a secure network connection. 8. The code security system of claim 1, wherein the code generator is to generate a first keyed-hash message authentication code of the file that includes the source code using an RSA algorithm or a key exchange algorithm; and
wherein the compiler is to generate a second keyed-hash message authentication code of the file that includes the source code using the RSA algorithm or the key exchange algorithm, the compiler to determine whether to compile the source code based at least in part on whether the first keyed-hash message authentication code and the second keyed-hash message authentication code are same,
the first keyed-hash message authentication code and the second keyed-hash message authentication code being the same indicating that the source code is to be compiled,
the first keyed-hash message authentication code and the second keyed-hash message authentication code being different indicating that the source code is not to be compiled. 9. The code security system of claim 1, wherein compilation of the source code results in compiled code, the compiler further to generate a third checksum of the compiled code, the compiler further configured to provide the third checksum to the code generator via a second secure channel; and
wherein the code generator is further to generate a fourth checksum of the compiled code, the code generator further to determine whether to load the compiled code based at least in part on whether the third checksum and the fourth checksum are same,
the third checksum and the fourth checksum being the same indicating that the compiled code is to be loaded,
the third checksum and the fourth checksum being different indicating that the compiled code is not to be loaded. 10. The code security system of claim 9, wherein the compiler is further to provide a designated algorithm that is used to generate the third checksum to the code generator via the second secure channel; and
wherein the code generator is to use the designated algorithm that is received from the compiler to generate the fourth checksum. 11. The code security system of claim 9, wherein the code generator is to create a process that runs the compiler, the code generator to use the process to provide the first checksum to the compiler via the first secure channel; and
wherein the compiler is to use the process to provide the third checksum to the code generator via the second secure channel. 12. The code security system of claim 9, wherein the compiler is to provide the third checksum to the code generator via at least one of (a) a command line output, (b) one or more named pipes, (c) a shared memory, or (d) a secure network connection. 13. A method of providing security for code comprising:
generating source code by a code generator; generating, by the code generator, a first checksum of a file that includes the source code; providing, by the code generator, the first checksum to a compiler via a first secure channel; generating, by the compiler, a second checksum of the file that includes the source code; and selectively compiling the source code, by the compiler, based at least in part on whether the first checksum and the second checksum are same,
the first checksum and the second checksum being the same indicating that the source code is to be compiled,
the first checksum and the second checksum being different indicating that the source code is not to be compiled. 14. The method of claim 13, further comprising:
providing, by the code generator, a designated algorithm that is used to generate the first checksum to the compiler via the first secure channel; wherein generating the second checksum comprises:
using, by the compiler, the designated algorithm that is received from the code generator to generate the second checksum. 15. The method of claim 13, wherein selectively compiling the source code comprises:
compiling the source code, by the compiler, to provide compiled code in response to the first checksum and the second checksum being the same; and wherein the method further comprises:
generating, by the compiler, a third checksum of the compiled code;
providing, by the compiler, the third checksum to the code generator via a second secure channel;
generating, by the code generator, a fourth checksum of the compiled code; and
selectively loading the compiled code, by the code generator, based at least in part on whether the third checksum and the fourth checksum are same,
the third checksum and the fourth checksum being the same indicating that the compiled code is to be loaded,
the third checksum and the fourth checksum being different indicating that the compiled code is not to be loaded. 16. The method of claim 15, further comprising:
providing, by the compiler, a designated algorithm that is used to generate the third checksum to the code generator via the second secure channel; wherein generating the fourth checksum comprises:
using, by the code generator, the designated algorithm that is received from the compiler to generate the fourth checksum. 17. The method of claim 16, wherein the compiler supports a plurality of algorithms for generating checksums; and
wherein the method further comprises:
selecting, by the compiler, the designated algorithm from the plurality of algorithms in accordance with a round-robin selection technique to be used to generate the third checksum. 18. The method of claim 16, wherein the compiler supports a plurality of algorithms for generating checksums; and
wherein the method further comprises:
randomly selecting, by the compiler, the designated algorithm from the plurality of algorithms to be used to generate the third checksum. 19. The method of claim 15, further comprising:
creating, by the code generator, a process that runs the compiler; wherein providing the first checksum comprises:
using, by the code generator, the process to provide the first checksum to the compiler via the first secure channel; and
wherein providing the third checksum comprises:
using, by the compiler, the process to provide the third checksum to the code generator via the second secure channel. 20. A computer program product comprising a computer-readable storage medium having instructions recorded thereon for enabling a processor-based system to provide security for code, the instructions comprising:
first instructions for enabling the processor-based system to cause a code generator to generate a first checksum of a file that includes source code generated; second instructions for enabling the processor-based system to cause the code generator to provide the first checksum to a compiler via a first secure channel; third instructions for enabling the processor-based system to cause the compiler to generate a second checksum of the file that includes the source code; and fourth instructions for enabling the processor-based system to cause the compiler to selectively compile the source code based at least in part on whether the first checksum and the second checksum are same,
the first checksum and the second checksum being the same indicating that the source code is to be compiled,
the first checksum and the second checksum being different indicating that the source code is not to be compiled. | Techniques are described herein that are capable of providing security for code between a code generator and a compiler. The code generator generates source code. The code generator generates a first checksum of a file that includes the source code. The code generator provides the first checksum to the compiler via a secure channel. The compiler generates a second checksum of the file that includes the source code. The compiler determines whether to compile the source code based at least in part on whether the first checksum and the second checksum are the same. The first checksum and the second checksum being the same indicates that the source code is to be compiled. The first checksum and the second checksum being different indicates that the source code is not to be compiled.1. A code security system comprising:
a code generator to generate source code, the code generator further to generate a first checksum of a file that includes the source code, the code generator further to provide the first checksum to a compiler via a first secure channel; and the compiler to generate a second checksum of the file that includes the source code, the compiler further to determine whether to compile the source code based at least in part on whether the first checksum and the second checksum are same,
the first checksum and the second checksum being the same indicating that the source code is to be compiled,
the first checksum and the second checksum being different indicating that the source code is not to be compiled. 2. The code security system of claim 1, wherein the code generator is further to provide a designated algorithm that is used to generate the first checksum to the compiler via the first secure channel; and
wherein the compiler is to use the designated algorithm that is received from the code generator to generate the second checksum. 3. The code security system of claim 2, wherein the code generator supports a plurality of algorithms for generating checksums; and
wherein the code generator is to randomly select the designated algorithm from the plurality of algorithms to be used to generate the first checksum. 4. The code security system of claim 2, wherein the code generator supports a plurality of algorithms for generating checksums;
wherein the code generator is to communicate with the compiler to determine which of the plurality of algorithms are supported by the compiler; and wherein the code generator is to select the designated algorithm from a subset of the plurality of algorithms, which is indicated by the compiler to be supported by the compiler, to be used to generate the first checksum. 5. The code security system of claim 2, wherein the code generator supports a plurality of algorithms for generating checksums; and
wherein the code generator is to select the designated algorithm from the plurality of algorithms to be used to generate the first checksum based at least in part on an estimated cryptographic security associated with the designated algorithm being greater than an estimated cryptographic security associated with each of the other algorithms. 6. The code security system of claim 1, wherein the code generator is to create a process that runs the compiler, the code generator to use the process to provide the first checksum to the compiler via the first secure channel. 7. The code security system of claim 1, wherein the code generator is to provide the first checksum to the compiler via at least one of (a) one or more command line arguments, (b) one or more named pipes, (c) a shared memory, or (d) a secure network connection. 8. The code security system of claim 1, wherein the code generator is to generate a first keyed-hash message authentication code of the file that includes the source code using an RSA algorithm or a key exchange algorithm; and
wherein the compiler is to generate a second keyed-hash message authentication code of the file that includes the source code using the RSA algorithm or the key exchange algorithm, the compiler to determine whether to compile the source code based at least in part on whether the first keyed-hash message authentication code and the second keyed-hash message authentication code are same,
the first keyed-hash message authentication code and the second keyed-hash message authentication code being the same indicating that the source code is to be compiled,
the first keyed-hash message authentication code and the second keyed-hash message authentication code being different indicating that the source code is not to be compiled. 9. The code security system of claim 1, wherein compilation of the source code results in compiled code, the compiler further to generate a third checksum of the compiled code, the compiler further configured to provide the third checksum to the code generator via a second secure channel; and
wherein the code generator is further to generate a fourth checksum of the compiled code, the code generator further to determine whether to load the compiled code based at least in part on whether the third checksum and the fourth checksum are same,
the third checksum and the fourth checksum being the same indicating that the compiled code is to be loaded,
the third checksum and the fourth checksum being different indicating that the compiled code is not to be loaded. 10. The code security system of claim 9, wherein the compiler is further to provide a designated algorithm that is used to generate the third checksum to the code generator via the second secure channel; and
wherein the code generator is to use the designated algorithm that is received from the compiler to generate the fourth checksum. 11. The code security system of claim 9, wherein the code generator is to create a process that runs the compiler, the code generator to use the process to provide the first checksum to the compiler via the first secure channel; and
wherein the compiler is to use the process to provide the third checksum to the code generator via the second secure channel. 12. The code security system of claim 9, wherein the compiler is to provide the third checksum to the code generator via at least one of (a) a command line output, (b) one or more named pipes, (c) a shared memory, or (d) a secure network connection. 13. A method of providing security for code comprising:
generating source code by a code generator; generating, by the code generator, a first checksum of a file that includes the source code; providing, by the code generator, the first checksum to a compiler via a first secure channel; generating, by the compiler, a second checksum of the file that includes the source code; and selectively compiling the source code, by the compiler, based at least in part on whether the first checksum and the second checksum are same,
the first checksum and the second checksum being the same indicating that the source code is to be compiled,
the first checksum and the second checksum being different indicating that the source code is not to be compiled. 14. The method of claim 13, further comprising:
providing, by the code generator, a designated algorithm that is used to generate the first checksum to the compiler via the first secure channel; wherein generating the second checksum comprises:
using, by the compiler, the designated algorithm that is received from the code generator to generate the second checksum. 15. The method of claim 13, wherein selectively compiling the source code comprises:
compiling the source code, by the compiler, to provide compiled code in response to the first checksum and the second checksum being the same; and wherein the method further comprises:
generating, by the compiler, a third checksum of the compiled code;
providing, by the compiler, the third checksum to the code generator via a second secure channel;
generating, by the code generator, a fourth checksum of the compiled code; and
selectively loading the compiled code, by the code generator, based at least in part on whether the third checksum and the fourth checksum are same,
the third checksum and the fourth checksum being the same indicating that the compiled code is to be loaded,
the third checksum and the fourth checksum being different indicating that the compiled code is not to be loaded. 16. The method of claim 15, further comprising:
providing, by the compiler, a designated algorithm that is used to generate the third checksum to the code generator via the second secure channel; wherein generating the fourth checksum comprises:
using, by the code generator, the designated algorithm that is received from the compiler to generate the fourth checksum. 17. The method of claim 16, wherein the compiler supports a plurality of algorithms for generating checksums; and
wherein the method further comprises:
selecting, by the compiler, the designated algorithm from the plurality of algorithms in accordance with a round-robin selection technique to be used to generate the third checksum. 18. The method of claim 16, wherein the compiler supports a plurality of algorithms for generating checksums; and
wherein the method further comprises:
randomly selecting, by the compiler, the designated algorithm from the plurality of algorithms to be used to generate the third checksum. 19. The method of claim 15, further comprising:
creating, by the code generator, a process that runs the compiler; wherein providing the first checksum comprises:
using, by the code generator, the process to provide the first checksum to the compiler via the first secure channel; and
wherein providing the third checksum comprises:
using, by the compiler, the process to provide the third checksum to the code generator via the second secure channel. 20. A computer program product comprising a computer-readable storage medium having instructions recorded thereon for enabling a processor-based system to provide security for code, the instructions comprising:
first instructions for enabling the processor-based system to cause a code generator to generate a first checksum of a file that includes source code generated; second instructions for enabling the processor-based system to cause the code generator to provide the first checksum to a compiler via a first secure channel; third instructions for enabling the processor-based system to cause the compiler to generate a second checksum of the file that includes the source code; and fourth instructions for enabling the processor-based system to cause the compiler to selectively compile the source code based at least in part on whether the first checksum and the second checksum are same,
the first checksum and the second checksum being the same indicating that the source code is to be compiled,
the first checksum and the second checksum being different indicating that the source code is not to be compiled. | 2,400 |
8,987 | 8,987 | 14,854,084 | 2,454 | Disclosed are various examples of providing a client device with media content based on policies applied to the client devices. A computing device receives a request for media content from a client device. A computing device also receives a device identifier and a current device context from the client device. The computing device identifies a policy applicable to the requested media content based at least in part on the current device context. The computing device then selects a component of the media content to send to the client device based at least in part on the applicable policy. Finally, the computing device sends the selected component of the media content to the client device. | 1. A system, comprising:
a computing device comprising a processor and a memory; and an application stored in the memory of the computing device that, when executed by the processor of the computing device, causes the computing device to at least:
receive a request for media content from a client device;
receive a device identifier and a current device context associated with the client device;
identify a policy applicable to the requested media content based at least in part on the current device context or the device identifier; and
select a component of the media content to send to the client device based at least in part on the applicable policy; and
provide the client device with access to the selected component. 2. The system of claim 1, wherein the application, when executed by the processor of the computing device, further causes the computing device to at least:
determine that the component of the media content is unavailable; and send a request to a media transcription engine to generate the component of the media content. 3. The system of claim 1, wherein the application, when executed by the processor of the computing device, further causes the computing device to at least encrypt the selected component of the media content. 4. The system of claim 1, wherein the component of the media content is stored in encrypted form. 5. The system of claim 1, wherein the component of the media content comprises at least one of a video component, an image component, an audio component, or a transcript. 6. The system of claim 1, wherein the policy defines whether the client device is authorized to access the component of the media content based at least in part on the current device context. 7. The system of claim 1, wherein the current device context comprises at least one of a current location of the client device, a bandwidth of a network connection between the client device and the computing device, a type of network connection between the client device and the computing device, an identification of a current network to which the client device is connected, an ownership status of the client device, or a balance of a data allotment associated with a network account used by the client device to access the network. 8. A method, comprising:
receiving a request for media content from a client device; receiving a device identifier and a current device context associated with the client device; identifying a policy applicable to the requested media content based at least in part on the current device context or the device identifier; and selecting a component of the media content to send to the client device based at least in part on the applicable policy; and providing the client device with access to the selected component. 9. The method of claim 8, further comprising:
determining that the component of the media content is unavailable; and sending a request to a media transcription engine to generate the component of the media content. 10. The method of claim 8, further comprising encrypting the selected component of the media content. 11. The method of claim 8, wherein the selected component of the media content is stored in encrypted form. 12. The method of claim 8, wherein the component of the media content comprises at least one of a video component, an image component, an audio component, or a transcript. 13. The method of claim 8, wherein the policy defines whether the client device is authorized to access the component of the media content based at least in part on the current device context. 14. The method of claim 8, wherein the current device context comprises at least one of a current location of the client device, a bandwidth of a network connection between the client device and the computing device, a type of network connection between the client device and the computing device, an identification of a current network to which the client device is connected, an ownership status of the client device, or a balance of a data allotment associated with a network account used by the client device to access the network. 15. A non-transitory computer-readable medium storing a plurality of computer instructions executable by a computing device, the plurality of computer instructions being configured to cause the computing device to at least:
receive a request for media content from a client device; receive a device identifier and a current device context associated with the client device; identify a policy applicable to the requested media content based at least in part on the current device context or the device identifier; and select a component of the media content to send to the client device based at least in part on the applicable policy; and provide the client device with access to the selected component. 16. The non-transitory computer-readable medium of claim 15, wherein the plurality of computer instructions are further configured to cause the computing device to at least:
determine that the component of the media content is unavailable; and send a request to a media transcription engine to generate the component of the media content. 17. The non-transitory computer-readable medium of claim 15, wherein the current device context comprises at least one of a current location of the client device, a bandwidth of a network connection between the client device and the computing device, a type of network connection between the client device and the computing device, an identification of a current network to which the client device is connected, an ownership status of the client device, or a balance of a data allotment associated with a network account used by the client device to access the network. 18. The non-transitory computer-readable medium of claim 17, wherein the policy defines whether the client device is authorized to access the component of the media content based at least in part on the current device context and the plurality of computer instructions are further configured to cause the computing device to at least:
identify the current location of the client device; and determine that the current location of the client device is an authorized location for the client device to receive the component of the media content, wherein the policy specifies the authorized location. 19. The non-transitory computer-readable medium of claim 17, wherein the policy defines whether the client device is authorized to access the component of the media content based at least in part on the current device context and the plurality of computer instructions are further configured to cause the computing device to at least:
determine the bandwidth of the network connection between the client device and the computing device; and determine that the bandwidth of the network connection exceeds a minimum bandwidth required for the client device to be authorized to receive the component of the media content, wherein the policy specifies the minimum bandwidth. 20. The non-transitory computer-readable medium of claim 17, wherein the policy defines whether the client device is authorized to access the component of the media content based at least in part on the current device context and the plurality of computer instructions are further configured to cause the computing device to at least:
determine a service set identifier (SSID) for the current network to which the client device is connected; and determine that the SSID matches an authorized SSID of an authorized network for which the client device is authorized to receive the component of the media content when connected to the authorized network, wherein the policy specifies the authorized SSID. | Disclosed are various examples of providing a client device with media content based on policies applied to the client devices. A computing device receives a request for media content from a client device. A computing device also receives a device identifier and a current device context from the client device. The computing device identifies a policy applicable to the requested media content based at least in part on the current device context. The computing device then selects a component of the media content to send to the client device based at least in part on the applicable policy. Finally, the computing device sends the selected component of the media content to the client device.1. A system, comprising:
a computing device comprising a processor and a memory; and an application stored in the memory of the computing device that, when executed by the processor of the computing device, causes the computing device to at least:
receive a request for media content from a client device;
receive a device identifier and a current device context associated with the client device;
identify a policy applicable to the requested media content based at least in part on the current device context or the device identifier; and
select a component of the media content to send to the client device based at least in part on the applicable policy; and
provide the client device with access to the selected component. 2. The system of claim 1, wherein the application, when executed by the processor of the computing device, further causes the computing device to at least:
determine that the component of the media content is unavailable; and send a request to a media transcription engine to generate the component of the media content. 3. The system of claim 1, wherein the application, when executed by the processor of the computing device, further causes the computing device to at least encrypt the selected component of the media content. 4. The system of claim 1, wherein the component of the media content is stored in encrypted form. 5. The system of claim 1, wherein the component of the media content comprises at least one of a video component, an image component, an audio component, or a transcript. 6. The system of claim 1, wherein the policy defines whether the client device is authorized to access the component of the media content based at least in part on the current device context. 7. The system of claim 1, wherein the current device context comprises at least one of a current location of the client device, a bandwidth of a network connection between the client device and the computing device, a type of network connection between the client device and the computing device, an identification of a current network to which the client device is connected, an ownership status of the client device, or a balance of a data allotment associated with a network account used by the client device to access the network. 8. A method, comprising:
receiving a request for media content from a client device; receiving a device identifier and a current device context associated with the client device; identifying a policy applicable to the requested media content based at least in part on the current device context or the device identifier; and selecting a component of the media content to send to the client device based at least in part on the applicable policy; and providing the client device with access to the selected component. 9. The method of claim 8, further comprising:
determining that the component of the media content is unavailable; and sending a request to a media transcription engine to generate the component of the media content. 10. The method of claim 8, further comprising encrypting the selected component of the media content. 11. The method of claim 8, wherein the selected component of the media content is stored in encrypted form. 12. The method of claim 8, wherein the component of the media content comprises at least one of a video component, an image component, an audio component, or a transcript. 13. The method of claim 8, wherein the policy defines whether the client device is authorized to access the component of the media content based at least in part on the current device context. 14. The method of claim 8, wherein the current device context comprises at least one of a current location of the client device, a bandwidth of a network connection between the client device and the computing device, a type of network connection between the client device and the computing device, an identification of a current network to which the client device is connected, an ownership status of the client device, or a balance of a data allotment associated with a network account used by the client device to access the network. 15. A non-transitory computer-readable medium storing a plurality of computer instructions executable by a computing device, the plurality of computer instructions being configured to cause the computing device to at least:
receive a request for media content from a client device; receive a device identifier and a current device context associated with the client device; identify a policy applicable to the requested media content based at least in part on the current device context or the device identifier; and select a component of the media content to send to the client device based at least in part on the applicable policy; and provide the client device with access to the selected component. 16. The non-transitory computer-readable medium of claim 15, wherein the plurality of computer instructions are further configured to cause the computing device to at least:
determine that the component of the media content is unavailable; and send a request to a media transcription engine to generate the component of the media content. 17. The non-transitory computer-readable medium of claim 15, wherein the current device context comprises at least one of a current location of the client device, a bandwidth of a network connection between the client device and the computing device, a type of network connection between the client device and the computing device, an identification of a current network to which the client device is connected, an ownership status of the client device, or a balance of a data allotment associated with a network account used by the client device to access the network. 18. The non-transitory computer-readable medium of claim 17, wherein the policy defines whether the client device is authorized to access the component of the media content based at least in part on the current device context and the plurality of computer instructions are further configured to cause the computing device to at least:
identify the current location of the client device; and determine that the current location of the client device is an authorized location for the client device to receive the component of the media content, wherein the policy specifies the authorized location. 19. The non-transitory computer-readable medium of claim 17, wherein the policy defines whether the client device is authorized to access the component of the media content based at least in part on the current device context and the plurality of computer instructions are further configured to cause the computing device to at least:
determine the bandwidth of the network connection between the client device and the computing device; and determine that the bandwidth of the network connection exceeds a minimum bandwidth required for the client device to be authorized to receive the component of the media content, wherein the policy specifies the minimum bandwidth. 20. The non-transitory computer-readable medium of claim 17, wherein the policy defines whether the client device is authorized to access the component of the media content based at least in part on the current device context and the plurality of computer instructions are further configured to cause the computing device to at least:
determine a service set identifier (SSID) for the current network to which the client device is connected; and determine that the SSID matches an authorized SSID of an authorized network for which the client device is authorized to receive the component of the media content when connected to the authorized network, wherein the policy specifies the authorized SSID. | 2,400 |
8,988 | 8,988 | 15,703,851 | 2,457 | A system for managing and processing of a user message as initiated by a sender messaging device of a sending user to an addressed receiver messaging device of a receiving user and transmitted through a telecommunication network to a multimedia messaging system (MMS) implemented therein for transmitting the received user message from the sender messaging device to the receiver messaging device based on an receiver message device address, a first server receives and manages brand-related data and configuration data for processing the messages and a second server creates a modified user message having the brand-related data (BRD) message inserted with the user message and within the messaging format of the user message and responsive to a BRD message insertion rule defined by the BRD configuration data associated with the BRD message, and then transmitting the modified user message to the addressed receiver messaging device. | 1. A system for managing and processing of a user message as initiated by a sender messaging device of a sending user to an addressed receiver messaging device of a receiving user and transmitted through a telecommunication network to a multimedia messaging system (MMS) implemented therein for transmitting the received user message from the sender messaging device to the receiver messaging device based on a receiver message device address, the system comprising:
a first server having an input interface and an output interface, a processor, a memory and computer executable instructions, the input interface coupled to a system user device and receiving a brand-related data (BRD) message and associated BRD configuration data for the BRD message, the brand-related data message including a unique identification of the system user from among a plurality of system users of the first server, the BRD configuration data including at least one BRD message insertion rule applicable to the received BRD message, the first server assigning a BRD message instance ID to the BRD message and storing the BRD message and the associated BRD configuration data in the memory; and a second server having a processor, a memory and computer executable instructions, and having a first interface communicatively coupled to the output interface of the first server and at least one second interface communicatively coupled to the telecommunication network and to the multimedia messaging system implemented therein, the second server receiving from the MMS system the received user message as received from the MMS system prior to the MMS system transmitting the user message to the receiver messaging device using the received message device address thereof, the second server receiving the BRD message and associated BRD configuration data from the first server over the first interface and creating a modified user message having the BRD message inserted within the messaging format of the user message with the creating being responsive to the at least one BRD message insertion rule associated with the BRD message, the second server transmitting the modified user message over the second interface to the telecommunication network for delivery of the modified user message to the receiver messaging device. 2. The system of claim 1 wherein the at least one BRD message insertion rule in the BRD configuration data that is applicable to the received BRD message is selected from the group consisting of when the BRD message is to be inserted, the number of times and frequency as to the insertion of the BRD message, one or more message processing circumstances for inserting the BRD message, an identification as to the placement or location of the BRD message relative the user message within the modified user message, an identification of a executable link or file associated with the BRD message, and a timing or a duration of a display or an enabled action associated with the BRD message within the modified user message after receipt by the receiver messaging device of the modified user message. 3. The system of claim 1 wherein the at least one BRD message insertion rule includes an executable link or file identifying a network accessible resource selected from the group consisting of an image, a video, an audio, a document, a material, a program, a webpage, a website, and an Internet/url address. 4. The system of claim 1 wherein the at least one BRD message insertion rule includes instructions for the second server to review the received user message to determine if the received user message includes within a header a pre-authorized by the sender allowing for the modification of the sender initiated user message to include the BRD message, wherein the second server is configured to create the modified user message with the BRD message contained therein only where the received user message included a pre-authorization. 5. The system of claim 1 wherein the brand related data message is selected from the group consisting of data representative of or corresponding to an image, picture, symbol, icon or graphic element used as a brand, trademark, or service mark associated with a company, business, organization, product, or service; a hypertext link, Worldwide Web link, an Internet address to an image, a video, an audio, a document, a material, a program, a webpage, and a website, and an Internet resource. 6. The system of claim 1 wherein the brand related data message is selected from the group consisting of data representative of or corresponding to an image, picture, symbol, icon or graphic element used as a brand, trademark, or service mark associated with a company, business, organization, product, or service, and wherein the second server further creates the modified user message to include a hypertext link, a Worldwide Web link, or an Internet address that can be activated by the receiving user device upon receiving user received input upon displaying of the modified user message on the receiving user device, and wherein the created user data includes instructions within the brand related data for configuring the receiving user device to initiate an action selected from the group consisting of displaying an image, a video, an audio, a document, and a material, and activating an application program on the receiving user device, initiating the opening of a webpage by a browser application on the receiving user device, and accessing a remote website or Internet resource by the receiving user device. 7. The system of claim 1 wherein the at least one BRD message insertion rule includes instructions for the second server to create the modified user message to include the BRD message inserted inline with the user message of the modified user message and the created modified message enables the displaying of the inserted BRD message on the receiving user device inline with the content of the user message. 8. The system of claim 1 wherein the at least one BRD message insertion rule includes instructions for creating the modified user message to include the BRD message to be placed within the modified user message at the beginning or at the end of the content of the user message. 9. The system of claim 1 wherein the BRD message is a graphics element including a brand, a logo, an image, an icon, or a symbol and wherein the second server receives the graphics element from the first server and creates the modified user message to include the inserted graphics element inserted within the messaging format of the user message, the BRD message of the graphics element being a graphics element associated with a company, a client, a product or a service associated with an entity providing the BRD message and associated BRD configuration data to the first server. 10. The system of claim 1, further comprising,
in the multimedia messaging system (MMS), having computer executable instructions for reviewing the received user message to determine if the received user message includes within a header a pre-authorized by the sender allowing for the modification of the sender initiated user message to include the BRD message, wherein the multimedia messaging system only transmits the received user message to the second server when the MMS system identifies that the received user contains a pre-authorization, and wherein the second server only receives the user message when the second server can apply the at least one BRD message insertion rule as provided by the associated BRD configuration data and creating the modified user message to include the BRD message inserted within the messaging format of the user message. 11. The system of claim 1 wherein the at least one BRD message insertion rule applicable to the received BRD message includes a pre-determined interval or frequency of received user messages, a pre-determined number of received user messages, and a random message indicator and wherein the second server is configured to create the modified message to include the BRD message responsive a BRD message insertion rule based thereon. 12. The system of claim 1 wherein the second server is configured to receive a plurality of user messages from the MMS system over the second interface, to determined a message count value for each of the received plurality of user messages and to store the determined message count value, and a predetermined message count threshold value, the at least one BRD message insertion rule applicable to the received BRD message includes a pre-determined message count interval or frequency of received user messages for modifying the user message to include the BRD message, wherein the second server is configured to compare a current count value for a received user message to the stored pre-determined message count value, and to only create a modified user message responsive to the comparing. 13. The system of claim 1 wherein the at least one BRD message insertion rule applicable to the received BRD message inserting the brand-related data further comprises BRD receiving user device timer data associated with the BRD message, wherein the second server creates the modified user message to include the BRD receiving user device timer data in addition to the user message and the BRD message, the BRD receiving user device timer data configured to instruct the receiving user device with instructions and rules as to the timing and duration of the displaying of the BRD message contained within the received modified user message. 14. The system of claim 1 wherein the second server is implemented as a sub-system component of the MMS system. 15. A system for managing and processing of a user messages as initiated by sender messaging devices of a plurality of sending users, each to a at least one of a plurality of addressed receiver messaging devices of a plurality of receiving users, with each user message being transmitted through a telecommunication network to a multimedia messaging system (MMS) implemented therein that transmits the received user messages from each sender messaging device to the addressed receiver messaging devices based on receiver message device addresses, the system comprising:
a first server having an input interface and an output interface, a processor, a memory and computer executable instructions, the input interface coupled to a plurality of system user devices and receiving a plurality of brand-related data (BRD) messages each having associated BRD configuration data, each the brand-related data message including a unique identification of the system user from among the plurality of system users of the first server, each BRD configuration data for each BRD message including at least one BRD message insertion rule applicable to the associated BRD message, the first server assigning a BRD message instance ID to each BRD message and storing each BRD message and the associated BRD configuration data in the memory based thereon; and a second server having a processor, a memory and computer executable instructions, and having a first interface communicatively coupled to the output interface of the first server and at least one second interface communicatively coupled to the telecommunication network and to the multimedia messaging system implemented therein, the second server receiving from the MMS system one or more of the received user messages as received from the MMS system prior to the MMS system transmitting the one or more user message to the receiver messaging device using the received message device address thereof, the second server receiving each BRD message and the associated BRD configuration data for each BRD message from the first server over the first interface and for each creating a modified user message having at least one BRD message inserted within the messaging format of the user message with the creating being responsive to the at least one BRD message insertion rule associated with the BRD message, the second server transmitting each modified user message over the second interface to the telecommunication network for delivery of the modified user message to the receiver messaging device per the receiver message device address therewith. 16. The system of claim 15 wherein the for each received user message, the second server modifying each user message as a function of each of the one or more BRD message insertion rules of each of the BRD configuration data for each received BRD message, wherein each of the BRD insertion rules is selected from the group consisting of when the BRD message is to be inserted, the number of times and frequency as to the insertion of the BRD message, one or more message processing circumstances for inserting the BRD message, an identification as to the placement or location of the BRD message relative the user message within the modified user message, an identification of a executable link or file associated with the BRD message, and a timing or a duration of a display or an enabled action associated with the BRD message within the modified user message after receipt by the receiver messaging device of the modified user message. 17. The system of claim 15 wherein each BRD message insertion rule in the BRD configuration data that is applicable to the received BRD message is selected from the group consisting of when the BRD message is to be inserted, the number of times and frequency as to the insertion of the BRD message, one or more message processing circumstances for inserting the BRD message, an identification as to the placement or location of the BRD message relative the user message within the modified user message, an identification of a executable link or file associated with the BRD message, and a timing or a duration of a display or an enabled action associated with the BRD message within the modified user message after receipt by the receiver messaging device of the modified user message. 18. The system of claim 15 wherein one or more of the BRD message insertion rules of one or more of the BRD configuration data for one or more BRD messages includes an executable link or file identifying a network accessible resource selected from the group consisting of an image, a video, an audio, a document, a material, a program, a webpage, a website, and an Internet/url address. 19. The system of claim 15 wherein at least one of the BRD message insertion rules for the plurality of BRD configuration data for the plurality of BRD messages includes instruction the second server to review the received user message to determine if the received user message includes within a header a pre-authorized by the sender allowing for the modification of the sender initiated user message to include the BRD message, wherein the second server is configured to create the modified user message with the BRD message contained therein only where the received user message included a pre-authorization. 20. The system of claim 15 wherein the brand related data message is selected from the group consisting of data representative of or corresponding to an image, picture, symbol, icon or graphic element used as a brand, trademark, or service mark associated with a company, business, organization, product, or service; a hypertext link, Worldwide Web link, an Internet address to an image, a video, an audio, a document, a material, a program, a webpage, and a website, and an Internet resource. 21. The system of claim 15 wherein each brand related data message is selected from the group consisting of data representative of or corresponding to an image, picture, symbol, icon or graphic element used as a brand, trademark, or service mark associated with a company, business, organization, product, or service, and wherein the second server further creates the modified user message to include a hypertext link, a Worldwide Web link, or an Internet address that can be activated by the receiving user device upon receiving user received input upon displaying of the modified user message on the receiving user device, and wherein the created user data includes instructions within the brand related data for configuring the receiving user device to initiate an action selected from the group consisting of displaying an image, a video, an audio, a document, and a material, and activating an application program on the receiving user device, initiating the opening of a webpage by a browser application on the receiving user device, and accessing a remote website or Internet resource by the receiving user device. 22. The system of claim 15 wherein at least one of the BRD message insertion rules for one or more of the BRD configuration data includes instructions for the second sever to create the modified user message to include the BRD message inserted inline with the user message of the modified user message and the created modified message enables the displaying of the inserted BRD message on the receiving user device inline with the content of the user message. 23. The system of claim 15 wherein the at least one BRD message insertion rule includes instructions for the second sever to create the modified user message to include the BRD message to be placed within the modified user message at the beginning or at the end of the content of the user message. 24. The system of claim 15 wherein one or more of the BRD messages is a graphics element including a brand, a logo, an image, an icon, or a symbol and wherein the second server receives the graphics element from the first server and creates the modified user message to include the inserted graphics element inserted within the messaging format of the user message, the BRD message of the graphics element being a graphics element associated with a company, a client, a product or a service associated with an entity providing the BRD message and associated BRD configuration data to the first server. 25. The system of claim 15, further comprising,
in the multimedia messaging system (MMS), having computer executable instructions for reviewing the received user message to determine if the received user message includes within a header a pre-authorized by the sender allowing for the modification of the sender initiated user message to include the BRD message, wherein the multimedia messaging system only transmits the received user message to the second server when the MMS system identifies that the received user contains a pre-authorization, and wherein the second server only receives the user messages when the second server applies the at least one BRD message insertion rule as provided by the associated BRD configuration data and creates the modified user message to include one or more BRD message inserted within the messaging format of the user message. 26. The system of claim 15 wherein the at least one BRD message insertion rule applicable to one of the received BRD messages includes a pre-determined interval or frequency of received user messages, a pre-determined number of received user messages, and a random message indicator and wherein the second server is configured to create the modified message to include the BRD message responsive a BRD message insertion rule based thereon. 27. The method of claim 15 wherein at least one BRD message insertion rule for one or more BRD configuration data for one or more BRD messages includes BRD receiving user device timer data associated with the BRD message, wherein the second server creates the modified user message to include the BRD receiving user device timer data in addition to the user message and the BRD message, the BRD receiving user device timer data configured to instruct the receiving user device with instructions and rules as to the timing and duration of the displaying of the BRD message contained within the received modified user message. 28. The system of claim 15 wherein the second server is implemented as a sub-system component of the MMS system. | A system for managing and processing of a user message as initiated by a sender messaging device of a sending user to an addressed receiver messaging device of a receiving user and transmitted through a telecommunication network to a multimedia messaging system (MMS) implemented therein for transmitting the received user message from the sender messaging device to the receiver messaging device based on an receiver message device address, a first server receives and manages brand-related data and configuration data for processing the messages and a second server creates a modified user message having the brand-related data (BRD) message inserted with the user message and within the messaging format of the user message and responsive to a BRD message insertion rule defined by the BRD configuration data associated with the BRD message, and then transmitting the modified user message to the addressed receiver messaging device.1. A system for managing and processing of a user message as initiated by a sender messaging device of a sending user to an addressed receiver messaging device of a receiving user and transmitted through a telecommunication network to a multimedia messaging system (MMS) implemented therein for transmitting the received user message from the sender messaging device to the receiver messaging device based on a receiver message device address, the system comprising:
a first server having an input interface and an output interface, a processor, a memory and computer executable instructions, the input interface coupled to a system user device and receiving a brand-related data (BRD) message and associated BRD configuration data for the BRD message, the brand-related data message including a unique identification of the system user from among a plurality of system users of the first server, the BRD configuration data including at least one BRD message insertion rule applicable to the received BRD message, the first server assigning a BRD message instance ID to the BRD message and storing the BRD message and the associated BRD configuration data in the memory; and a second server having a processor, a memory and computer executable instructions, and having a first interface communicatively coupled to the output interface of the first server and at least one second interface communicatively coupled to the telecommunication network and to the multimedia messaging system implemented therein, the second server receiving from the MMS system the received user message as received from the MMS system prior to the MMS system transmitting the user message to the receiver messaging device using the received message device address thereof, the second server receiving the BRD message and associated BRD configuration data from the first server over the first interface and creating a modified user message having the BRD message inserted within the messaging format of the user message with the creating being responsive to the at least one BRD message insertion rule associated with the BRD message, the second server transmitting the modified user message over the second interface to the telecommunication network for delivery of the modified user message to the receiver messaging device. 2. The system of claim 1 wherein the at least one BRD message insertion rule in the BRD configuration data that is applicable to the received BRD message is selected from the group consisting of when the BRD message is to be inserted, the number of times and frequency as to the insertion of the BRD message, one or more message processing circumstances for inserting the BRD message, an identification as to the placement or location of the BRD message relative the user message within the modified user message, an identification of a executable link or file associated with the BRD message, and a timing or a duration of a display or an enabled action associated with the BRD message within the modified user message after receipt by the receiver messaging device of the modified user message. 3. The system of claim 1 wherein the at least one BRD message insertion rule includes an executable link or file identifying a network accessible resource selected from the group consisting of an image, a video, an audio, a document, a material, a program, a webpage, a website, and an Internet/url address. 4. The system of claim 1 wherein the at least one BRD message insertion rule includes instructions for the second server to review the received user message to determine if the received user message includes within a header a pre-authorized by the sender allowing for the modification of the sender initiated user message to include the BRD message, wherein the second server is configured to create the modified user message with the BRD message contained therein only where the received user message included a pre-authorization. 5. The system of claim 1 wherein the brand related data message is selected from the group consisting of data representative of or corresponding to an image, picture, symbol, icon or graphic element used as a brand, trademark, or service mark associated with a company, business, organization, product, or service; a hypertext link, Worldwide Web link, an Internet address to an image, a video, an audio, a document, a material, a program, a webpage, and a website, and an Internet resource. 6. The system of claim 1 wherein the brand related data message is selected from the group consisting of data representative of or corresponding to an image, picture, symbol, icon or graphic element used as a brand, trademark, or service mark associated with a company, business, organization, product, or service, and wherein the second server further creates the modified user message to include a hypertext link, a Worldwide Web link, or an Internet address that can be activated by the receiving user device upon receiving user received input upon displaying of the modified user message on the receiving user device, and wherein the created user data includes instructions within the brand related data for configuring the receiving user device to initiate an action selected from the group consisting of displaying an image, a video, an audio, a document, and a material, and activating an application program on the receiving user device, initiating the opening of a webpage by a browser application on the receiving user device, and accessing a remote website or Internet resource by the receiving user device. 7. The system of claim 1 wherein the at least one BRD message insertion rule includes instructions for the second server to create the modified user message to include the BRD message inserted inline with the user message of the modified user message and the created modified message enables the displaying of the inserted BRD message on the receiving user device inline with the content of the user message. 8. The system of claim 1 wherein the at least one BRD message insertion rule includes instructions for creating the modified user message to include the BRD message to be placed within the modified user message at the beginning or at the end of the content of the user message. 9. The system of claim 1 wherein the BRD message is a graphics element including a brand, a logo, an image, an icon, or a symbol and wherein the second server receives the graphics element from the first server and creates the modified user message to include the inserted graphics element inserted within the messaging format of the user message, the BRD message of the graphics element being a graphics element associated with a company, a client, a product or a service associated with an entity providing the BRD message and associated BRD configuration data to the first server. 10. The system of claim 1, further comprising,
in the multimedia messaging system (MMS), having computer executable instructions for reviewing the received user message to determine if the received user message includes within a header a pre-authorized by the sender allowing for the modification of the sender initiated user message to include the BRD message, wherein the multimedia messaging system only transmits the received user message to the second server when the MMS system identifies that the received user contains a pre-authorization, and wherein the second server only receives the user message when the second server can apply the at least one BRD message insertion rule as provided by the associated BRD configuration data and creating the modified user message to include the BRD message inserted within the messaging format of the user message. 11. The system of claim 1 wherein the at least one BRD message insertion rule applicable to the received BRD message includes a pre-determined interval or frequency of received user messages, a pre-determined number of received user messages, and a random message indicator and wherein the second server is configured to create the modified message to include the BRD message responsive a BRD message insertion rule based thereon. 12. The system of claim 1 wherein the second server is configured to receive a plurality of user messages from the MMS system over the second interface, to determined a message count value for each of the received plurality of user messages and to store the determined message count value, and a predetermined message count threshold value, the at least one BRD message insertion rule applicable to the received BRD message includes a pre-determined message count interval or frequency of received user messages for modifying the user message to include the BRD message, wherein the second server is configured to compare a current count value for a received user message to the stored pre-determined message count value, and to only create a modified user message responsive to the comparing. 13. The system of claim 1 wherein the at least one BRD message insertion rule applicable to the received BRD message inserting the brand-related data further comprises BRD receiving user device timer data associated with the BRD message, wherein the second server creates the modified user message to include the BRD receiving user device timer data in addition to the user message and the BRD message, the BRD receiving user device timer data configured to instruct the receiving user device with instructions and rules as to the timing and duration of the displaying of the BRD message contained within the received modified user message. 14. The system of claim 1 wherein the second server is implemented as a sub-system component of the MMS system. 15. A system for managing and processing of a user messages as initiated by sender messaging devices of a plurality of sending users, each to a at least one of a plurality of addressed receiver messaging devices of a plurality of receiving users, with each user message being transmitted through a telecommunication network to a multimedia messaging system (MMS) implemented therein that transmits the received user messages from each sender messaging device to the addressed receiver messaging devices based on receiver message device addresses, the system comprising:
a first server having an input interface and an output interface, a processor, a memory and computer executable instructions, the input interface coupled to a plurality of system user devices and receiving a plurality of brand-related data (BRD) messages each having associated BRD configuration data, each the brand-related data message including a unique identification of the system user from among the plurality of system users of the first server, each BRD configuration data for each BRD message including at least one BRD message insertion rule applicable to the associated BRD message, the first server assigning a BRD message instance ID to each BRD message and storing each BRD message and the associated BRD configuration data in the memory based thereon; and a second server having a processor, a memory and computer executable instructions, and having a first interface communicatively coupled to the output interface of the first server and at least one second interface communicatively coupled to the telecommunication network and to the multimedia messaging system implemented therein, the second server receiving from the MMS system one or more of the received user messages as received from the MMS system prior to the MMS system transmitting the one or more user message to the receiver messaging device using the received message device address thereof, the second server receiving each BRD message and the associated BRD configuration data for each BRD message from the first server over the first interface and for each creating a modified user message having at least one BRD message inserted within the messaging format of the user message with the creating being responsive to the at least one BRD message insertion rule associated with the BRD message, the second server transmitting each modified user message over the second interface to the telecommunication network for delivery of the modified user message to the receiver messaging device per the receiver message device address therewith. 16. The system of claim 15 wherein the for each received user message, the second server modifying each user message as a function of each of the one or more BRD message insertion rules of each of the BRD configuration data for each received BRD message, wherein each of the BRD insertion rules is selected from the group consisting of when the BRD message is to be inserted, the number of times and frequency as to the insertion of the BRD message, one or more message processing circumstances for inserting the BRD message, an identification as to the placement or location of the BRD message relative the user message within the modified user message, an identification of a executable link or file associated with the BRD message, and a timing or a duration of a display or an enabled action associated with the BRD message within the modified user message after receipt by the receiver messaging device of the modified user message. 17. The system of claim 15 wherein each BRD message insertion rule in the BRD configuration data that is applicable to the received BRD message is selected from the group consisting of when the BRD message is to be inserted, the number of times and frequency as to the insertion of the BRD message, one or more message processing circumstances for inserting the BRD message, an identification as to the placement or location of the BRD message relative the user message within the modified user message, an identification of a executable link or file associated with the BRD message, and a timing or a duration of a display or an enabled action associated with the BRD message within the modified user message after receipt by the receiver messaging device of the modified user message. 18. The system of claim 15 wherein one or more of the BRD message insertion rules of one or more of the BRD configuration data for one or more BRD messages includes an executable link or file identifying a network accessible resource selected from the group consisting of an image, a video, an audio, a document, a material, a program, a webpage, a website, and an Internet/url address. 19. The system of claim 15 wherein at least one of the BRD message insertion rules for the plurality of BRD configuration data for the plurality of BRD messages includes instruction the second server to review the received user message to determine if the received user message includes within a header a pre-authorized by the sender allowing for the modification of the sender initiated user message to include the BRD message, wherein the second server is configured to create the modified user message with the BRD message contained therein only where the received user message included a pre-authorization. 20. The system of claim 15 wherein the brand related data message is selected from the group consisting of data representative of or corresponding to an image, picture, symbol, icon or graphic element used as a brand, trademark, or service mark associated with a company, business, organization, product, or service; a hypertext link, Worldwide Web link, an Internet address to an image, a video, an audio, a document, a material, a program, a webpage, and a website, and an Internet resource. 21. The system of claim 15 wherein each brand related data message is selected from the group consisting of data representative of or corresponding to an image, picture, symbol, icon or graphic element used as a brand, trademark, or service mark associated with a company, business, organization, product, or service, and wherein the second server further creates the modified user message to include a hypertext link, a Worldwide Web link, or an Internet address that can be activated by the receiving user device upon receiving user received input upon displaying of the modified user message on the receiving user device, and wherein the created user data includes instructions within the brand related data for configuring the receiving user device to initiate an action selected from the group consisting of displaying an image, a video, an audio, a document, and a material, and activating an application program on the receiving user device, initiating the opening of a webpage by a browser application on the receiving user device, and accessing a remote website or Internet resource by the receiving user device. 22. The system of claim 15 wherein at least one of the BRD message insertion rules for one or more of the BRD configuration data includes instructions for the second sever to create the modified user message to include the BRD message inserted inline with the user message of the modified user message and the created modified message enables the displaying of the inserted BRD message on the receiving user device inline with the content of the user message. 23. The system of claim 15 wherein the at least one BRD message insertion rule includes instructions for the second sever to create the modified user message to include the BRD message to be placed within the modified user message at the beginning or at the end of the content of the user message. 24. The system of claim 15 wherein one or more of the BRD messages is a graphics element including a brand, a logo, an image, an icon, or a symbol and wherein the second server receives the graphics element from the first server and creates the modified user message to include the inserted graphics element inserted within the messaging format of the user message, the BRD message of the graphics element being a graphics element associated with a company, a client, a product or a service associated with an entity providing the BRD message and associated BRD configuration data to the first server. 25. The system of claim 15, further comprising,
in the multimedia messaging system (MMS), having computer executable instructions for reviewing the received user message to determine if the received user message includes within a header a pre-authorized by the sender allowing for the modification of the sender initiated user message to include the BRD message, wherein the multimedia messaging system only transmits the received user message to the second server when the MMS system identifies that the received user contains a pre-authorization, and wherein the second server only receives the user messages when the second server applies the at least one BRD message insertion rule as provided by the associated BRD configuration data and creates the modified user message to include one or more BRD message inserted within the messaging format of the user message. 26. The system of claim 15 wherein the at least one BRD message insertion rule applicable to one of the received BRD messages includes a pre-determined interval or frequency of received user messages, a pre-determined number of received user messages, and a random message indicator and wherein the second server is configured to create the modified message to include the BRD message responsive a BRD message insertion rule based thereon. 27. The method of claim 15 wherein at least one BRD message insertion rule for one or more BRD configuration data for one or more BRD messages includes BRD receiving user device timer data associated with the BRD message, wherein the second server creates the modified user message to include the BRD receiving user device timer data in addition to the user message and the BRD message, the BRD receiving user device timer data configured to instruct the receiving user device with instructions and rules as to the timing and duration of the displaying of the BRD message contained within the received modified user message. 28. The system of claim 15 wherein the second server is implemented as a sub-system component of the MMS system. | 2,400 |
8,989 | 8,989 | 15,954,421 | 2,486 | Techniques are described for optimizing video decoder operations. | 1. A system, comprising:
one or more processors and memory configured to: receive manifest data for media content, the manifest data including first information for generating a request for a fragment of the media content, the fragment including a plurality of units, each unit in the plurality of units corresponding to a set of bits representing the media content, the fragment further including an indicator for a boundary between an end of a first unit and a beginning of a second unit in the plurality of units, the manifest data further including second information identifying a location of the indicator in the fragment; and extract the second information from the manifest data for decoding a video frame included in the fragment. 2. The system of claim 1, wherein the plurality of units comprise network abstraction layer (NAL) units. 3. The system of claim 1, wherein the first unit includes a first number of bits and the second unit includes a second number of bits, the first number being different than the second number. 4. The system of claim 1, wherein the indicator is represented by a start code prefix having a particular sequence of bits. 5. The system of claim 4, wherein a third unit in the plurality of units includes a series of bits corresponding to a modified sequence of bits, the modified sequence of bits including a bit pattern inserted within the particular sequence of bits corresponding to the start code prefix, and wherein the one or more processors and memory are further configured to remove the bit pattern from the modified sequence of bits. 6. The system of claim 1, wherein the video frame is excluded from storage as a reference frame. 7. The system of claim 1, wherein the one or more processors and memory are further configured to:
receive media content data indicating a reduced residual coefficient matrix representing a parent residual coefficient matrix, the reduced residual coefficient matrix corresponding to a portion of the video frame being decoded, and the reduced residual coefficient matrix including non-zero residual coefficients of the parent residual coefficient matrix, the media content data also including reduced residual coefficient matrix metadata indicating a size of the parent residual coefficient matrix, the size of the parent residual coefficient matrix being larger than a size of the reduced residual coefficient matrix; and apply an inverse transform matrix to the reduced residual coefficient matrix based on the size of the reduced residual coefficient matrix and the size of the parent residual coefficient matrix. 8. A method, comprising:
receiving manifest data for media content, the manifest data including first information for generating a request for a fragment of the media content, the fragment including a plurality of units, each unit in the plurality of units corresponding to a set of bits representing the media content, the fragment further including an indicator for a boundary between an end of a first unit and a beginning of a second unit in the plurality of units, the manifest data further including second information identifying a location of the indicator in the fragment; and extracting the second information from the manifest data for decoding a video frame included in the fragment. 9. The method of claim 8, wherein the plurality of units comprise network abstraction layer (NAL) units. 10. The method of claim 8, wherein the first unit includes a first number of bits and the second unit includes a second number of bits, the first number being different than the second number. 11. The method of claim 8, wherein the indicator is represented by a start code prefix having a particular sequence of bits. 12. The method of claim 11, wherein a third unit in the plurality of units includes a series of bits corresponding to a modified sequence of bits, the modified sequence of bits including a bit pattern inserted within the particular sequence of bits corresponding to the start code prefix, and the method further comprises removing the bit pattern from the modified sequence of bits. 13. The method of claim 8, wherein the video frame is excluded from storage as a reference frame. 14. The method of claim 8, further comprising:
receiving media content data indicating a reduced residual coefficient matrix representing a parent residual coefficient matrix, the reduced residual coefficient matrix corresponding to a portion of the video frame being decoded, and the reduced residual coefficient matrix including non-zero residual coefficients of the parent residual coefficient matrix, the media content data also including reduced residual coefficient matrix metadata indicating a size of the parent residual coefficient matrix, the size of the parent residual coefficient matrix being larger than a size of the reduced residual coefficient matrix; and applying an inverse transform matrix to the reduced residual coefficient matrix based on the size of the reduced residual coefficient matrix and the size of the parent residual coefficient matrix. 15. A computer program product comprising computer-readable program code to be executed by one or more processors when retrieved from a non-transitory computer-readable medium, the program code including instructions configured to cause:
receiving manifest data for media content, the manifest data including first information for generating a request for a fragment of the media content, the fragment including a plurality of units, each unit in the plurality of units corresponding to a set of bits representing the media content, the fragment further including an indicator for a boundary between an end of a first unit and a beginning of a second unit in the plurality of units, the manifest data further including second information identifying a location of the indicator in the fragment; and extracting the second information from the manifest data for decoding a video frame included in the fragment. 16. The computer program product of claim 15, wherein the plurality of units comprise network abstraction layer (NAL) units. 17. The computer program product of claim 15, wherein the first unit includes a first number of bits and the second unit includes a second number of bits, the first number being different than the second number. 18. The computer program product of claim 15, wherein the indicator is represented by a start code prefix having a particular sequence of bits. 19. The computer program product of claim 18, wherein a third unit in the plurality of units includes a series of bits corresponding to a modified sequence of bits, the modified sequence of bits including a bit pattern inserted within the particular sequence of bits corresponding to the start code prefix, and the program code further including instructions configured to cause removing the bit pattern from the modified sequence of bits. 20. The computer program product of claim 15, wherein the video frame is excluded from storage as a reference frame. 21. The computer program product of claim 15, further comprising:
receiving media content data indicating a reduced residual coefficient matrix representing a parent residual coefficient matrix, the reduced residual coefficient matrix corresponding to a portion of the video frame being decoded, and the reduced residual coefficient matrix including non-zero residual coefficients of the parent residual coefficient matrix, the media content data also including reduced residual coefficient matrix metadata indicating a size of the parent residual coefficient matrix, the size of the parent residual coefficient matrix being larger than a size of the reduced residual coefficient matrix; and applying an inverse transform matrix to the reduced residual coefficient matrix based on the size of the reduced residual coefficient matrix and the size of the parent residual coefficient matrix. | Techniques are described for optimizing video decoder operations.1. A system, comprising:
one or more processors and memory configured to: receive manifest data for media content, the manifest data including first information for generating a request for a fragment of the media content, the fragment including a plurality of units, each unit in the plurality of units corresponding to a set of bits representing the media content, the fragment further including an indicator for a boundary between an end of a first unit and a beginning of a second unit in the plurality of units, the manifest data further including second information identifying a location of the indicator in the fragment; and extract the second information from the manifest data for decoding a video frame included in the fragment. 2. The system of claim 1, wherein the plurality of units comprise network abstraction layer (NAL) units. 3. The system of claim 1, wherein the first unit includes a first number of bits and the second unit includes a second number of bits, the first number being different than the second number. 4. The system of claim 1, wherein the indicator is represented by a start code prefix having a particular sequence of bits. 5. The system of claim 4, wherein a third unit in the plurality of units includes a series of bits corresponding to a modified sequence of bits, the modified sequence of bits including a bit pattern inserted within the particular sequence of bits corresponding to the start code prefix, and wherein the one or more processors and memory are further configured to remove the bit pattern from the modified sequence of bits. 6. The system of claim 1, wherein the video frame is excluded from storage as a reference frame. 7. The system of claim 1, wherein the one or more processors and memory are further configured to:
receive media content data indicating a reduced residual coefficient matrix representing a parent residual coefficient matrix, the reduced residual coefficient matrix corresponding to a portion of the video frame being decoded, and the reduced residual coefficient matrix including non-zero residual coefficients of the parent residual coefficient matrix, the media content data also including reduced residual coefficient matrix metadata indicating a size of the parent residual coefficient matrix, the size of the parent residual coefficient matrix being larger than a size of the reduced residual coefficient matrix; and apply an inverse transform matrix to the reduced residual coefficient matrix based on the size of the reduced residual coefficient matrix and the size of the parent residual coefficient matrix. 8. A method, comprising:
receiving manifest data for media content, the manifest data including first information for generating a request for a fragment of the media content, the fragment including a plurality of units, each unit in the plurality of units corresponding to a set of bits representing the media content, the fragment further including an indicator for a boundary between an end of a first unit and a beginning of a second unit in the plurality of units, the manifest data further including second information identifying a location of the indicator in the fragment; and extracting the second information from the manifest data for decoding a video frame included in the fragment. 9. The method of claim 8, wherein the plurality of units comprise network abstraction layer (NAL) units. 10. The method of claim 8, wherein the first unit includes a first number of bits and the second unit includes a second number of bits, the first number being different than the second number. 11. The method of claim 8, wherein the indicator is represented by a start code prefix having a particular sequence of bits. 12. The method of claim 11, wherein a third unit in the plurality of units includes a series of bits corresponding to a modified sequence of bits, the modified sequence of bits including a bit pattern inserted within the particular sequence of bits corresponding to the start code prefix, and the method further comprises removing the bit pattern from the modified sequence of bits. 13. The method of claim 8, wherein the video frame is excluded from storage as a reference frame. 14. The method of claim 8, further comprising:
receiving media content data indicating a reduced residual coefficient matrix representing a parent residual coefficient matrix, the reduced residual coefficient matrix corresponding to a portion of the video frame being decoded, and the reduced residual coefficient matrix including non-zero residual coefficients of the parent residual coefficient matrix, the media content data also including reduced residual coefficient matrix metadata indicating a size of the parent residual coefficient matrix, the size of the parent residual coefficient matrix being larger than a size of the reduced residual coefficient matrix; and applying an inverse transform matrix to the reduced residual coefficient matrix based on the size of the reduced residual coefficient matrix and the size of the parent residual coefficient matrix. 15. A computer program product comprising computer-readable program code to be executed by one or more processors when retrieved from a non-transitory computer-readable medium, the program code including instructions configured to cause:
receiving manifest data for media content, the manifest data including first information for generating a request for a fragment of the media content, the fragment including a plurality of units, each unit in the plurality of units corresponding to a set of bits representing the media content, the fragment further including an indicator for a boundary between an end of a first unit and a beginning of a second unit in the plurality of units, the manifest data further including second information identifying a location of the indicator in the fragment; and extracting the second information from the manifest data for decoding a video frame included in the fragment. 16. The computer program product of claim 15, wherein the plurality of units comprise network abstraction layer (NAL) units. 17. The computer program product of claim 15, wherein the first unit includes a first number of bits and the second unit includes a second number of bits, the first number being different than the second number. 18. The computer program product of claim 15, wherein the indicator is represented by a start code prefix having a particular sequence of bits. 19. The computer program product of claim 18, wherein a third unit in the plurality of units includes a series of bits corresponding to a modified sequence of bits, the modified sequence of bits including a bit pattern inserted within the particular sequence of bits corresponding to the start code prefix, and the program code further including instructions configured to cause removing the bit pattern from the modified sequence of bits. 20. The computer program product of claim 15, wherein the video frame is excluded from storage as a reference frame. 21. The computer program product of claim 15, further comprising:
receiving media content data indicating a reduced residual coefficient matrix representing a parent residual coefficient matrix, the reduced residual coefficient matrix corresponding to a portion of the video frame being decoded, and the reduced residual coefficient matrix including non-zero residual coefficients of the parent residual coefficient matrix, the media content data also including reduced residual coefficient matrix metadata indicating a size of the parent residual coefficient matrix, the size of the parent residual coefficient matrix being larger than a size of the reduced residual coefficient matrix; and applying an inverse transform matrix to the reduced residual coefficient matrix based on the size of the reduced residual coefficient matrix and the size of the parent residual coefficient matrix. | 2,400 |
8,990 | 8,990 | 16,150,947 | 2,413 | A wireless access point that serves one or more wireless client devices in a wireless network determines that at least one particular client device that is associated to the wireless access point should not be associated to the wireless access point. The wireless access point transmits frames so that they are received at the particular client device with reduced strength so as to provoke the particular client device to transition from the wireless access point. | 1. A method comprising:
at a wireless access point:
determining that a client device associated to the wireless access point should no longer be associated to the wireless access point; and
in response to determining that the client device should no longer be associated to the wireless access point, provoking the client device to transition from the wireless access point by transmitting a series of frames such that each subsequent frame in the series of frames is received at the client device with a strength that is reduced relative to a previous frame in the series of frames. 2. The method of claim 1, wherein provoking the client device to transition from the wireless access point includes transmitting a series of beacons such that each subsequent beacon in the series of beacons is transmitted with nulling parameters to increase nulling towards the particular client device relative to a previous beacon in the series of beacons. 3. The method of claim 1, wherein provoking the client device to transition from the wireless access point includes transmitting a series of unicast frames destined for the client device such that each subsequent unicast frame in the series of unicast frames is transmitted with reduced power relative to a previous unicast frame in the series of unicast frames. 4. The method of claim 3, further comprising determining a time to initiate transmitting the series of unicast frames so that there are few or no broadcast frames while the series of unicast frames is transmitted. 5. The method of claim 1, wherein determining that the client device should no longer be associated to the wireless access point includes determining that there is another wireless access point that would provide higher link quality to the client device than the wireless access point. 6. The method of claim 1, further comprising transmitting non-beacon frames that are not addressed to the client device with nulling parameters to null the non-beacon frames towards the particular client device. 7. The method of claim 1, further comprising:
after provoking the client device to transition from the wireless access point, determining whether the client device has transitioned from the wireless access point; and if it is determined that the client device has not transitioned from the wireless access point, transmitting a frame to the client device to provoke the client device to disassociate from the wireless access point. 8. A wireless access point comprising:
a plurality of transmitters, each associated with a corresponding one of a plurality of antennas; a plurality of receivers, each associated with a corresponding one of the plurality of antennas; and a baseband processor coupled to the plurality of transmitters and the plurality of receivers, wherein the baseband processor:
determines that a client device associated to the wireless access point should no longer be associated to the wireless access point; and
in response to determining that the client device should no longer be associated to the wireless access point, provokes the client device to transition from the wireless access point by transmitting a series of frames such that each subsequent frame in the series of frames is received at the client device with a strength that is reduced relative to a previous frame in the series of frames. 9. The wireless access point of claim 8, wherein the baseband processor provokes the client device to transition from the wireless access point by transmitting a series of beacons such that each subsequent beacon in the series of beacons is transmitted with nulling parameters to increase nulling towards the particular client device relative to a previous beacon in the series of beacons. 10. The wireless access point of claim 8, wherein the baseband processor provokes the client device to transition from the wireless access point by transmitting a series of unicast frames destined for the client device such that each subsequent unicast frame in the series of unicast frames is transmitted with reduced power relative to a previous unicast frame in the series of unicast frames. 11. The wireless access point of claim 10, wherein the baseband processor further determines a time to initiate transmitting the series of unicast frames so that there are few or no broadcast frames while the series of unicast frames is transmitted. 12. The wireless access point of claim 8, wherein the baseband processor determines that the client device should no longer be associated to the wireless access point by determining that there is another wireless access point that would provide higher link quality to the client device than the wireless access point. 13. The wireless access point of claim 8, wherein the baseband processor further transmits non-beacon frames that are not addressed to the client device with nulling parameters to null the non-beacon frames towards the particular client device. 14. The wireless access point of claim 8, wherein the baseband processor further:
after provoking the client device to transition from the wireless access point, determines whether the client device has transitioned from the wireless access point; and if it is determined that the client device has not transitioned from the wireless access point, transmits a frame to the client device to provoke the client device to disassociate from the wireless access point. 15. A non-transitory computer readable storage media encoded with instructions that, when executed by a processor, cause the processor to perform operations for a wireless access point, the operations comprising:
determining that a client device associated to the wireless access point should no longer be associated to the wireless access point; and in response to determining that the client device should no longer be associated to the wireless access point, provoking the client device to transition from the wireless access point by transmitting a series of frames such that each subsequent frame in the series of frames is received at the client device with a strength that is reduced relative to a previous frame in the series of frames. 16. The non-transitory computer readable storage media of claim 15, provoking the client device to transition from the wireless access point includes transmitting a series of beacons such that each subsequent beacon in the series of beacons is transmitted with nulling parameters to increase nulling towards the particular client device relative to a previous beacon in the series of beacons. 17. The non-transitory computer readable storage media of claim 15, wherein provoking the client device to transition from the wireless access point includes transmitting a series of unicast frames destined for the client device such that each subsequent unicast frame in the series of unicast frames is transmitted with reduced power relative to a previous unicast frame in the series of unicast frames. 18. The non-transitory computer readable storage media of claim 15, wherein determining that the client device should no longer be associated to the wireless access point includes determining that there is another wireless access point that would provide higher link quality to the client device than the wireless access point. 19. The non-transitory computer readable storage media of claim 15, wherein the instructions further cause the processor to perform operations comprising:
transmitting non-beacon frames that are not addressed to the client device with nulling parameters to null the non-beacon frames towards the particular client device. 20. The non-transitory computer readable storage media of claim 15, wherein the instructions further cause the processor to perform operations comprising:
after provoking the client device to transition from the wireless access point, determining whether the client device has transitioned from the wireless access point; and if it is determined that the client device has not transitioned from the wireless access point, transmitting a frame to the client device to provoke the client device to disassociate from the wireless access point. | A wireless access point that serves one or more wireless client devices in a wireless network determines that at least one particular client device that is associated to the wireless access point should not be associated to the wireless access point. The wireless access point transmits frames so that they are received at the particular client device with reduced strength so as to provoke the particular client device to transition from the wireless access point.1. A method comprising:
at a wireless access point:
determining that a client device associated to the wireless access point should no longer be associated to the wireless access point; and
in response to determining that the client device should no longer be associated to the wireless access point, provoking the client device to transition from the wireless access point by transmitting a series of frames such that each subsequent frame in the series of frames is received at the client device with a strength that is reduced relative to a previous frame in the series of frames. 2. The method of claim 1, wherein provoking the client device to transition from the wireless access point includes transmitting a series of beacons such that each subsequent beacon in the series of beacons is transmitted with nulling parameters to increase nulling towards the particular client device relative to a previous beacon in the series of beacons. 3. The method of claim 1, wherein provoking the client device to transition from the wireless access point includes transmitting a series of unicast frames destined for the client device such that each subsequent unicast frame in the series of unicast frames is transmitted with reduced power relative to a previous unicast frame in the series of unicast frames. 4. The method of claim 3, further comprising determining a time to initiate transmitting the series of unicast frames so that there are few or no broadcast frames while the series of unicast frames is transmitted. 5. The method of claim 1, wherein determining that the client device should no longer be associated to the wireless access point includes determining that there is another wireless access point that would provide higher link quality to the client device than the wireless access point. 6. The method of claim 1, further comprising transmitting non-beacon frames that are not addressed to the client device with nulling parameters to null the non-beacon frames towards the particular client device. 7. The method of claim 1, further comprising:
after provoking the client device to transition from the wireless access point, determining whether the client device has transitioned from the wireless access point; and if it is determined that the client device has not transitioned from the wireless access point, transmitting a frame to the client device to provoke the client device to disassociate from the wireless access point. 8. A wireless access point comprising:
a plurality of transmitters, each associated with a corresponding one of a plurality of antennas; a plurality of receivers, each associated with a corresponding one of the plurality of antennas; and a baseband processor coupled to the plurality of transmitters and the plurality of receivers, wherein the baseband processor:
determines that a client device associated to the wireless access point should no longer be associated to the wireless access point; and
in response to determining that the client device should no longer be associated to the wireless access point, provokes the client device to transition from the wireless access point by transmitting a series of frames such that each subsequent frame in the series of frames is received at the client device with a strength that is reduced relative to a previous frame in the series of frames. 9. The wireless access point of claim 8, wherein the baseband processor provokes the client device to transition from the wireless access point by transmitting a series of beacons such that each subsequent beacon in the series of beacons is transmitted with nulling parameters to increase nulling towards the particular client device relative to a previous beacon in the series of beacons. 10. The wireless access point of claim 8, wherein the baseband processor provokes the client device to transition from the wireless access point by transmitting a series of unicast frames destined for the client device such that each subsequent unicast frame in the series of unicast frames is transmitted with reduced power relative to a previous unicast frame in the series of unicast frames. 11. The wireless access point of claim 10, wherein the baseband processor further determines a time to initiate transmitting the series of unicast frames so that there are few or no broadcast frames while the series of unicast frames is transmitted. 12. The wireless access point of claim 8, wherein the baseband processor determines that the client device should no longer be associated to the wireless access point by determining that there is another wireless access point that would provide higher link quality to the client device than the wireless access point. 13. The wireless access point of claim 8, wherein the baseband processor further transmits non-beacon frames that are not addressed to the client device with nulling parameters to null the non-beacon frames towards the particular client device. 14. The wireless access point of claim 8, wherein the baseband processor further:
after provoking the client device to transition from the wireless access point, determines whether the client device has transitioned from the wireless access point; and if it is determined that the client device has not transitioned from the wireless access point, transmits a frame to the client device to provoke the client device to disassociate from the wireless access point. 15. A non-transitory computer readable storage media encoded with instructions that, when executed by a processor, cause the processor to perform operations for a wireless access point, the operations comprising:
determining that a client device associated to the wireless access point should no longer be associated to the wireless access point; and in response to determining that the client device should no longer be associated to the wireless access point, provoking the client device to transition from the wireless access point by transmitting a series of frames such that each subsequent frame in the series of frames is received at the client device with a strength that is reduced relative to a previous frame in the series of frames. 16. The non-transitory computer readable storage media of claim 15, provoking the client device to transition from the wireless access point includes transmitting a series of beacons such that each subsequent beacon in the series of beacons is transmitted with nulling parameters to increase nulling towards the particular client device relative to a previous beacon in the series of beacons. 17. The non-transitory computer readable storage media of claim 15, wherein provoking the client device to transition from the wireless access point includes transmitting a series of unicast frames destined for the client device such that each subsequent unicast frame in the series of unicast frames is transmitted with reduced power relative to a previous unicast frame in the series of unicast frames. 18. The non-transitory computer readable storage media of claim 15, wherein determining that the client device should no longer be associated to the wireless access point includes determining that there is another wireless access point that would provide higher link quality to the client device than the wireless access point. 19. The non-transitory computer readable storage media of claim 15, wherein the instructions further cause the processor to perform operations comprising:
transmitting non-beacon frames that are not addressed to the client device with nulling parameters to null the non-beacon frames towards the particular client device. 20. The non-transitory computer readable storage media of claim 15, wherein the instructions further cause the processor to perform operations comprising:
after provoking the client device to transition from the wireless access point, determining whether the client device has transitioned from the wireless access point; and if it is determined that the client device has not transitioned from the wireless access point, transmitting a frame to the client device to provoke the client device to disassociate from the wireless access point. | 2,400 |
8,991 | 8,991 | 15,084,823 | 2,452 | Disclosed are various embodiments for throttling requests for a network service. A request for a network service is received from a client application and parameters are extracted from the request. Throttling policies applicable to the parameters are identified and retrieved, and it is determined whether the request should be processed based at least upon the throttling policies and the request parameters. | 1. A method, comprising:
receiving, by a request throttling client, authorization from a request throttling server to make a determination to process a network service request received by a network service device corresponding to a network service, the network service request being received over a network on behalf of a client; extracting, by the request throttling client, at least one request parameter from the network service request; identifying, by the request throttling client, at least one throttling policy applicable to the at least one request parameter; determining, by the request throttling client, whether the network service request should be granted based at least in part upon the at least one throttling policy and at least one of: usage data of the network service or historical request data of the network service, wherein the at least one throttling policy defines a particular amount of capacity to allocate to the network service device; and processing, by the request throttling client, the network service request in response to determining that the at least one request parameter does not violate the at least one throttling policy. 2. The method of claim 1, further comprising determining, by the request throttling client, that the at least one throttling policy is cached within the request throttling client. 3. The method of claim 1, further comprising:
determining, by the request throttling client, that the at least one throttling policy is not cached within the request throttling client; and processing, by the request throttling client, the network service request in response to determining that the at least one throttling policy is not cached in the request throttling client. 4. The method of claim 3, further comprising requesting, by the request throttling client, at least one other throttling policy applicable to the at least one request parameter from the request throttling server. 5. The method of claim 4, further comprising receiving, by the request throttling client, the at least one other throttling policy applicable to the at least one request parameter to be cached. 6. The method of claim 5, further comprising applying, by the request throttling client, the at least one other throttling policy applicable to the at least one request parameter. 7. The method of claim 1, further comprising:
determining, by the request throttling client, that the at least one throttling policy is not cached within the request throttling client; and requesting, by the request throttling client, the at least one throttling policy from the request throttling server. 8. The method of claim 1, wherein the request throttling client comprises an application programming interface (API) and the method further comprises invoking, by the network service, the request throttling client. 9. A system, comprising:
at least one computing device; and a request throttling client executable in the at least one computing device, the request throttling client causing the at least one computing device to:
receive authorization from a request throttling server to make a determination to process a network service request received over a network on behalf of a client;
extract at least one request parameter from the network service request;
identify at least one throttling policy applicable to the at least one request parameter, the at least one throttling policy defining at least one policy for the at least one request parameter;
retrieve the at least one throttling policy applicable to the at least one request parameter;
determine whether the network service request should be processed based at least in part upon the at least one throttling policy and at least one of: usage data of a network service or request data of the network service; and
process the network service request in response to determining that the at least one request parameter does not violate the at least one throttling policy. 10. The system of claim 9, wherein the periodic basis is further based at least in part upon a volume of requests and the periodic basis is adjusted at an inverse rate relative to the volume of requests. 11. The system of claim 9, wherein the request throttling client further causes the at least one computing device to transmit an error message in response to determining that the network service request is denied. 12. The system of claim 9, wherein the request throttling client further causes the at least one computing device to receive a message comprising credentials provided by a user. 13. The system of claim 12, wherein the request throttling client further causes the at least one computing device to return a Boolean response indicating that the user is authenticated. 14. The system of claim 9, wherein the network service facilitates an electronic commerce system and the at least one request parameter identifies a marketplace for which the network service is intended. 15. A method, comprising:
receiving, by a request throttling client, a request to access a network service on behalf of a client; determining, by the request throttling client, that the request throttling client is authorized to make a throttling determination with respect to the request; extracting, by the request throttling client, at least one request parameter from the request; identifying, by the request throttling client, at least one throttling policy applicable to the at least one request parameter, the at least one throttling policy defining at least one policy for the at least one request parameter; determining, by the request throttling client, that the at least one throttling policy is cached in the request throttling client; in response to determining that the at least one throttling policy is cached in the request throttling client, retrieving the at least one throttling policy from a cache in the request throttling client; and determining, by the request throttling client, whether the request should be granted based at least in part upon the at least one throttling policy and at least one of: usage data of the network service or historical request data of the network service. 16. The method of claim 15, wherein authorization is received by the request throttling client from the request throttling server to make the throttling determination. 17. The method of claim 15, further comprising:
tracking, by the request throttling client, client request data associated with an internet protocol (IP) address associated with the client; and denying, by the request throttling client, the request based at least in part upon the client request data. 18. The method of claim 15, further comprising processing, by the request throttling client , the request in response to determining that he at least one request parameter does not violate the at least one throttling policy. 19. The method of claim 18, further comprising retrieving, by the request throttling client, the usage data from the request throttling server. 20. The method of claim 18, further comprising:
determining, by the request throttling client, that the at least one throttling policy comprises a policy that defines an absolute request threshold of the client; determining, by the request throttling client, that a historical request data associated with the client indicates that the absolute request threshold has been exceeded; and denying, by the request throttling client, the request in response to determining that the historical data associated with the client indicates that the absolute request threshold has been exceeded. | Disclosed are various embodiments for throttling requests for a network service. A request for a network service is received from a client application and parameters are extracted from the request. Throttling policies applicable to the parameters are identified and retrieved, and it is determined whether the request should be processed based at least upon the throttling policies and the request parameters.1. A method, comprising:
receiving, by a request throttling client, authorization from a request throttling server to make a determination to process a network service request received by a network service device corresponding to a network service, the network service request being received over a network on behalf of a client; extracting, by the request throttling client, at least one request parameter from the network service request; identifying, by the request throttling client, at least one throttling policy applicable to the at least one request parameter; determining, by the request throttling client, whether the network service request should be granted based at least in part upon the at least one throttling policy and at least one of: usage data of the network service or historical request data of the network service, wherein the at least one throttling policy defines a particular amount of capacity to allocate to the network service device; and processing, by the request throttling client, the network service request in response to determining that the at least one request parameter does not violate the at least one throttling policy. 2. The method of claim 1, further comprising determining, by the request throttling client, that the at least one throttling policy is cached within the request throttling client. 3. The method of claim 1, further comprising:
determining, by the request throttling client, that the at least one throttling policy is not cached within the request throttling client; and processing, by the request throttling client, the network service request in response to determining that the at least one throttling policy is not cached in the request throttling client. 4. The method of claim 3, further comprising requesting, by the request throttling client, at least one other throttling policy applicable to the at least one request parameter from the request throttling server. 5. The method of claim 4, further comprising receiving, by the request throttling client, the at least one other throttling policy applicable to the at least one request parameter to be cached. 6. The method of claim 5, further comprising applying, by the request throttling client, the at least one other throttling policy applicable to the at least one request parameter. 7. The method of claim 1, further comprising:
determining, by the request throttling client, that the at least one throttling policy is not cached within the request throttling client; and requesting, by the request throttling client, the at least one throttling policy from the request throttling server. 8. The method of claim 1, wherein the request throttling client comprises an application programming interface (API) and the method further comprises invoking, by the network service, the request throttling client. 9. A system, comprising:
at least one computing device; and a request throttling client executable in the at least one computing device, the request throttling client causing the at least one computing device to:
receive authorization from a request throttling server to make a determination to process a network service request received over a network on behalf of a client;
extract at least one request parameter from the network service request;
identify at least one throttling policy applicable to the at least one request parameter, the at least one throttling policy defining at least one policy for the at least one request parameter;
retrieve the at least one throttling policy applicable to the at least one request parameter;
determine whether the network service request should be processed based at least in part upon the at least one throttling policy and at least one of: usage data of a network service or request data of the network service; and
process the network service request in response to determining that the at least one request parameter does not violate the at least one throttling policy. 10. The system of claim 9, wherein the periodic basis is further based at least in part upon a volume of requests and the periodic basis is adjusted at an inverse rate relative to the volume of requests. 11. The system of claim 9, wherein the request throttling client further causes the at least one computing device to transmit an error message in response to determining that the network service request is denied. 12. The system of claim 9, wherein the request throttling client further causes the at least one computing device to receive a message comprising credentials provided by a user. 13. The system of claim 12, wherein the request throttling client further causes the at least one computing device to return a Boolean response indicating that the user is authenticated. 14. The system of claim 9, wherein the network service facilitates an electronic commerce system and the at least one request parameter identifies a marketplace for which the network service is intended. 15. A method, comprising:
receiving, by a request throttling client, a request to access a network service on behalf of a client; determining, by the request throttling client, that the request throttling client is authorized to make a throttling determination with respect to the request; extracting, by the request throttling client, at least one request parameter from the request; identifying, by the request throttling client, at least one throttling policy applicable to the at least one request parameter, the at least one throttling policy defining at least one policy for the at least one request parameter; determining, by the request throttling client, that the at least one throttling policy is cached in the request throttling client; in response to determining that the at least one throttling policy is cached in the request throttling client, retrieving the at least one throttling policy from a cache in the request throttling client; and determining, by the request throttling client, whether the request should be granted based at least in part upon the at least one throttling policy and at least one of: usage data of the network service or historical request data of the network service. 16. The method of claim 15, wherein authorization is received by the request throttling client from the request throttling server to make the throttling determination. 17. The method of claim 15, further comprising:
tracking, by the request throttling client, client request data associated with an internet protocol (IP) address associated with the client; and denying, by the request throttling client, the request based at least in part upon the client request data. 18. The method of claim 15, further comprising processing, by the request throttling client , the request in response to determining that he at least one request parameter does not violate the at least one throttling policy. 19. The method of claim 18, further comprising retrieving, by the request throttling client, the usage data from the request throttling server. 20. The method of claim 18, further comprising:
determining, by the request throttling client, that the at least one throttling policy comprises a policy that defines an absolute request threshold of the client; determining, by the request throttling client, that a historical request data associated with the client indicates that the absolute request threshold has been exceeded; and denying, by the request throttling client, the request in response to determining that the historical data associated with the client indicates that the absolute request threshold has been exceeded. | 2,400 |
8,992 | 8,992 | 15,878,566 | 2,431 | A system and method in accordance with example embodiments may include systems and methods for generating and transforming data presentation. The method may include receiving, using a processor, a request for a web page, and submitting, by the processor, the request to a computer server system. The request can include a user identification and a user password. The method may further include receiving, from the computer server system, data corresponding to the requested web page. Further, the method includes storing, in a memory, the received data, and causing the received data to be shown on a display associated with the user device. | 1. A system, comprising:
a server side processor that calculates a hash value for a known web application; server side data storage that stores the known web application and calculated hash value for the known web application; a server side communication interface that receives, via a network, a request for the known web application from a client device, provides, via the network, the known web application to the client device, and receives, via the network, a client hash value associated with the known web application provided to the client device that has been calculated by the client device; and a hash processor that compares the calculated hash value for the known web application with the received client hash value in order to determine if the calculated hash value for the known web application and the received client hash value are the same and identifies malware when the hash processor determines that the calculated hash value for the known web application and the received client hash value are not the same. 2. The system of claim 1, wherein the server side processor and the mobile device calculate the hash value for the known web application and client hash value, respectively, using a trivial hash function. 3. The system of claim 1, wherein the server side processor and the mobile device calculate the hash value for the known web application and client hash value, respectively, using a perfect hash function. 4. The system of claim 1, wherein the server side processor and the mobile device calculate the hash value for the known web application and client hash value, respectively, using a special-purpose hash function. 5. The system of claim 1, wherein the server side processor and the mobile device calculate the hash value for the known web application and client hash value, respectively, using a rolling hash function. 6. The system of claim 1, wherein the known web application includes a script. 7. The system of claim 1, wherein the communication interface transmits an alert to the client device via the network when the hash processor determines that the calculated hash value for the known web application and the received client hash value are not the same. 8. The system of claim 1, wherein the hash processor does not identify malware when the hash processor determines that the calculated hash value for the known web application and the received client hash value are the same. 9. A system, comprising:
a request communication interface of a mobile device that requests a web application from a server via a network and receives the web application from the server; a mobile device hash processor that calculates a hash value of the received web application; and a hash value transmission interface of the mobile device that transmits the calculated hash value of the received web application, wherein a server side processor calculates a hash value for the web application, server side data storage stores the web application and calculated hash value for the web application, a server side communication interface receives the request, provides the web application to the mobile device, and receives a hash value that has been calculated by the mobile device, and a server side hash processor compares the stored hash value for the web application with the hash value that has been calculated by the mobile device in order to determine if the hash value for the web application and the hash value that has been calculated by the mobile device are the same and identifies malware when the hash processor determines that the stored hash value for the web application and the hash value that has been calculated by the mobile device are not the same. 10. A method, comprising:
calculating, using a server side processor, a hash value for a known web application; storing the known web application and calculated hash value for the known web application in server side data storage; receiving, via a network at a server side communication interface, a request for the known web application from a client device; providing, via the network and server side communication interface, the known web application to the client device; receiving, via a network at the server side communication interface, a client hash value associated with the known web application provided to the client device that has been calculated by the client device; and comparing, using a hash processor, the calculated hash value for the known web application with the received client hash value in order to determine if the calculated hash value for the known web application and the received client hash value are the same and identifies malware when the hash processor determines that the calculated hash value for the known web application and the received client hash value are not the same. 11. The method of claim 10, further comprising calculating, using the server side processor and the mobile device, the hash value for the known web application and client hash value, respectively, using a trivial hash function. 12. The method of claim 10, further comprising calculating, using the server side processor and the mobile device, the hash value for the known web application and client hash value, respectively, using a perfect hash function. 13. The method of claim 10, further comprising calculating, using the server side processor and the mobile device, the hash value for the known web application and client hash value, respectively, using a special-purpose hash function. 14. The method of claim 10, further comprising calculating, using the server side processor and the mobile device, the hash value for the known web application and client hash value, respectively, using a rolling hash function. 15. The method of claim 10, wherein the known web application includes a script. 16. The method of claim 10, further comprising transmitting, via a network using the communication interface, an alert to the client device when the hash processor determines that the calculated hash value for the known web application and the received client hash value are not the same. | A system and method in accordance with example embodiments may include systems and methods for generating and transforming data presentation. The method may include receiving, using a processor, a request for a web page, and submitting, by the processor, the request to a computer server system. The request can include a user identification and a user password. The method may further include receiving, from the computer server system, data corresponding to the requested web page. Further, the method includes storing, in a memory, the received data, and causing the received data to be shown on a display associated with the user device.1. A system, comprising:
a server side processor that calculates a hash value for a known web application; server side data storage that stores the known web application and calculated hash value for the known web application; a server side communication interface that receives, via a network, a request for the known web application from a client device, provides, via the network, the known web application to the client device, and receives, via the network, a client hash value associated with the known web application provided to the client device that has been calculated by the client device; and a hash processor that compares the calculated hash value for the known web application with the received client hash value in order to determine if the calculated hash value for the known web application and the received client hash value are the same and identifies malware when the hash processor determines that the calculated hash value for the known web application and the received client hash value are not the same. 2. The system of claim 1, wherein the server side processor and the mobile device calculate the hash value for the known web application and client hash value, respectively, using a trivial hash function. 3. The system of claim 1, wherein the server side processor and the mobile device calculate the hash value for the known web application and client hash value, respectively, using a perfect hash function. 4. The system of claim 1, wherein the server side processor and the mobile device calculate the hash value for the known web application and client hash value, respectively, using a special-purpose hash function. 5. The system of claim 1, wherein the server side processor and the mobile device calculate the hash value for the known web application and client hash value, respectively, using a rolling hash function. 6. The system of claim 1, wherein the known web application includes a script. 7. The system of claim 1, wherein the communication interface transmits an alert to the client device via the network when the hash processor determines that the calculated hash value for the known web application and the received client hash value are not the same. 8. The system of claim 1, wherein the hash processor does not identify malware when the hash processor determines that the calculated hash value for the known web application and the received client hash value are the same. 9. A system, comprising:
a request communication interface of a mobile device that requests a web application from a server via a network and receives the web application from the server; a mobile device hash processor that calculates a hash value of the received web application; and a hash value transmission interface of the mobile device that transmits the calculated hash value of the received web application, wherein a server side processor calculates a hash value for the web application, server side data storage stores the web application and calculated hash value for the web application, a server side communication interface receives the request, provides the web application to the mobile device, and receives a hash value that has been calculated by the mobile device, and a server side hash processor compares the stored hash value for the web application with the hash value that has been calculated by the mobile device in order to determine if the hash value for the web application and the hash value that has been calculated by the mobile device are the same and identifies malware when the hash processor determines that the stored hash value for the web application and the hash value that has been calculated by the mobile device are not the same. 10. A method, comprising:
calculating, using a server side processor, a hash value for a known web application; storing the known web application and calculated hash value for the known web application in server side data storage; receiving, via a network at a server side communication interface, a request for the known web application from a client device; providing, via the network and server side communication interface, the known web application to the client device; receiving, via a network at the server side communication interface, a client hash value associated with the known web application provided to the client device that has been calculated by the client device; and comparing, using a hash processor, the calculated hash value for the known web application with the received client hash value in order to determine if the calculated hash value for the known web application and the received client hash value are the same and identifies malware when the hash processor determines that the calculated hash value for the known web application and the received client hash value are not the same. 11. The method of claim 10, further comprising calculating, using the server side processor and the mobile device, the hash value for the known web application and client hash value, respectively, using a trivial hash function. 12. The method of claim 10, further comprising calculating, using the server side processor and the mobile device, the hash value for the known web application and client hash value, respectively, using a perfect hash function. 13. The method of claim 10, further comprising calculating, using the server side processor and the mobile device, the hash value for the known web application and client hash value, respectively, using a special-purpose hash function. 14. The method of claim 10, further comprising calculating, using the server side processor and the mobile device, the hash value for the known web application and client hash value, respectively, using a rolling hash function. 15. The method of claim 10, wherein the known web application includes a script. 16. The method of claim 10, further comprising transmitting, via a network using the communication interface, an alert to the client device when the hash processor determines that the calculated hash value for the known web application and the received client hash value are not the same. | 2,400 |
8,993 | 8,993 | 13,617,433 | 2,481 | Aspects of the disclosure relate to the delivery of media content over a network. Specifically, aspects are directed to identification and/or extraction of a selected data such as a video clip from content and providing identifying information to a user to retrieve, view, and/or share the selected video clip. Aspects described herein provide the ability to identify a starting point and stopping point of a video clip on a media gateway device and generate a URL that can be used and/or shared in order to access the selected video clip. The URL may identify a stored media clip, or may contain information from which a video clip can be recreated. | 1. A media clip system, comprising:
a processor; and memory storing computer executable instructions that, when executed, cause the system to perform:
receiving a media clip definition message from a device;
creating a network address corresponding to a media clip defined by the media clip definition message, wherein the media clip is less than an entire media program on which the clip is based; and
sending the network address to a device associated with a user identified in the media clip definition message. 2. The apparatus of claim 1, wherein said media clip definition message comprises a program ID, a start timestamp, an end timestamp, and a customer ID. 3. The apparatus of claim 1, wherein said media clip definition message comprises the clip. 4. The apparatus of claim 1, wherein said computer executable instructions further cause the apparatus to perform:
recreating the media clip based on the media clip definition message; sending the media clip to a media clip storage service, wherein said storage location of the media clip corresponds to the network address. 5. The apparatus of claim 1, wherein the network address comprises a uniform resource locator (URL) including one or more variables identifying a program ID, a start timestamp, and an end timestamp. 6. The apparatus of claim 2, wherein the network address comprises a uniform resource locator (URL) including one or more variables identifying the program ID, the start timestamp, the end timestamp, and the customer ID. 7. The apparatus of claim 1, wherein the device associated with the user identified in the media clip definition message corresponds to one of a creator of the media clip and a recipient of the media clip. 8. One or more tangible computer readable media comprising computer executable instructions defining a process that, when executed by a processor, configure the processor to perform:
receiving a media clip definition message from a device; creating a network address corresponding to a media clip defined by the media clip definition message, wherein the media clip is less than an entire media program on which the clip is based; and sending the network address to a device associated with a user identified in the media clip definition message. 9. The computer readable media of claim 8, wherein said media clip definition message comprises a program ID, a start timestamp, an end timestamp, and a customer ID. 10. The computer readable media of claim 8, wherein said media clip definition message comprises the clip. 11. The computer readable media of claim 8, wherein said computer executable instructions further configure the processor to perform:
recreating the media clip based on the media clip definition message; sending the media clip to a media clip storage service, wherein said storage location of the media clip corresponds to the network address. 12. The computer readable media of claim 8, wherein the network address comprises a uniform resource locator (URL) including one or more variables identifying a program ID, a start timestamp, and an end timestamp. 13. The computer readable media of claim 9, wherein the network address comprises a uniform resource locator (URL) including one or more variables identifying the program ID, the start timestamp, the end timestamp, and the customer ID. 14. The computer readable media of claim 8, wherein the device associated with the user identified in the media clip definition message corresponds to one of a creator of the media clip and a recipient of the media clip. 15. A method comprising:
receiving a media clip definition message from a device; creating a network address corresponding to a media clip defined by the media clip definition message, wherein the media clip is less than an entire media program on which the clip is based; and sending the network address to a device associated with a user identified in the media clip definition message. 16. The method of claim 15, wherein said media clip definition message comprises a program ID, a start timestamp, an end timestamp, and a customer ID. 17. The method of claim 15, wherein said media clip definition message comprises the clip. 18. The method of claim 15, further comprising:
recreating the media clip based on the media clip definition message; sending the media clip to a media clip storage service, wherein said storage location of the media clip corresponds to the network address. 19. The method of claim 15, wherein the network address comprises a uniform resource locator (URL) including one or more variables identifying a program ID, a start timestamp, and an end timestamp. 20. The method of claim 15, wherein the device associated with the user identified in the media clip definition message corresponds to one of a creator of the media clip and a recipient of the media clip. | Aspects of the disclosure relate to the delivery of media content over a network. Specifically, aspects are directed to identification and/or extraction of a selected data such as a video clip from content and providing identifying information to a user to retrieve, view, and/or share the selected video clip. Aspects described herein provide the ability to identify a starting point and stopping point of a video clip on a media gateway device and generate a URL that can be used and/or shared in order to access the selected video clip. The URL may identify a stored media clip, or may contain information from which a video clip can be recreated.1. A media clip system, comprising:
a processor; and memory storing computer executable instructions that, when executed, cause the system to perform:
receiving a media clip definition message from a device;
creating a network address corresponding to a media clip defined by the media clip definition message, wherein the media clip is less than an entire media program on which the clip is based; and
sending the network address to a device associated with a user identified in the media clip definition message. 2. The apparatus of claim 1, wherein said media clip definition message comprises a program ID, a start timestamp, an end timestamp, and a customer ID. 3. The apparatus of claim 1, wherein said media clip definition message comprises the clip. 4. The apparatus of claim 1, wherein said computer executable instructions further cause the apparatus to perform:
recreating the media clip based on the media clip definition message; sending the media clip to a media clip storage service, wherein said storage location of the media clip corresponds to the network address. 5. The apparatus of claim 1, wherein the network address comprises a uniform resource locator (URL) including one or more variables identifying a program ID, a start timestamp, and an end timestamp. 6. The apparatus of claim 2, wherein the network address comprises a uniform resource locator (URL) including one or more variables identifying the program ID, the start timestamp, the end timestamp, and the customer ID. 7. The apparatus of claim 1, wherein the device associated with the user identified in the media clip definition message corresponds to one of a creator of the media clip and a recipient of the media clip. 8. One or more tangible computer readable media comprising computer executable instructions defining a process that, when executed by a processor, configure the processor to perform:
receiving a media clip definition message from a device; creating a network address corresponding to a media clip defined by the media clip definition message, wherein the media clip is less than an entire media program on which the clip is based; and sending the network address to a device associated with a user identified in the media clip definition message. 9. The computer readable media of claim 8, wherein said media clip definition message comprises a program ID, a start timestamp, an end timestamp, and a customer ID. 10. The computer readable media of claim 8, wherein said media clip definition message comprises the clip. 11. The computer readable media of claim 8, wherein said computer executable instructions further configure the processor to perform:
recreating the media clip based on the media clip definition message; sending the media clip to a media clip storage service, wherein said storage location of the media clip corresponds to the network address. 12. The computer readable media of claim 8, wherein the network address comprises a uniform resource locator (URL) including one or more variables identifying a program ID, a start timestamp, and an end timestamp. 13. The computer readable media of claim 9, wherein the network address comprises a uniform resource locator (URL) including one or more variables identifying the program ID, the start timestamp, the end timestamp, and the customer ID. 14. The computer readable media of claim 8, wherein the device associated with the user identified in the media clip definition message corresponds to one of a creator of the media clip and a recipient of the media clip. 15. A method comprising:
receiving a media clip definition message from a device; creating a network address corresponding to a media clip defined by the media clip definition message, wherein the media clip is less than an entire media program on which the clip is based; and sending the network address to a device associated with a user identified in the media clip definition message. 16. The method of claim 15, wherein said media clip definition message comprises a program ID, a start timestamp, an end timestamp, and a customer ID. 17. The method of claim 15, wherein said media clip definition message comprises the clip. 18. The method of claim 15, further comprising:
recreating the media clip based on the media clip definition message; sending the media clip to a media clip storage service, wherein said storage location of the media clip corresponds to the network address. 19. The method of claim 15, wherein the network address comprises a uniform resource locator (URL) including one or more variables identifying a program ID, a start timestamp, and an end timestamp. 20. The method of claim 15, wherein the device associated with the user identified in the media clip definition message corresponds to one of a creator of the media clip and a recipient of the media clip. | 2,400 |
8,994 | 8,994 | 15,789,459 | 2,416 | Certain aspects of the present disclosure provide techniques for multiplexing initial access transmissions with data and/or control transmissions. | 1. A method for wireless communication by a first base station (BS), comprising:
communicating, in a first time interval, with at least a first user equipment (UE), via directional transmissions using a first set of frequency resources; and participating in at least one of an access or management procedure, during the first time interval, via directional transmissions using a second set of frequency resources. 2. The method of claim 1, wherein the at least one of an access or management procedure comprises at least one of: a directional initial access, beam management, mobility management, radio resource management (RRM), or radio link monitoring (RLM). 3. The method of claim 1, wherein:
communicating with the first UE comprises transmitting a first set of one or more signals using the first set of frequency resources to the first UE; and participating in at least one of the access or management procedure comprises transmitting a second set of one or more signals using the second set of frequency resources. 4. The method of claim 3, wherein participating in at least one of the access or management procedure comprises:
transmitting at least one of a directional synchronization (SYNC) signal, a beam reference signal, a physical broadcast channel (PBCH), a downlink control channel, or a downlink data channel carrying part of the system information. 5. The method of claim 4, wherein participating in at least one the access or management procedure further comprises:
sweeping different transmit beam directions while transmitting the at least one of the directional SYNC signal, beam reference signal, PBCH, downlink control channel or downlink data channel. 6. The method of claim 3, wherein communicating with the first UE comprises:
transmitting at least one of a directional physical downlink shared channel (PDSCH), a physical downlink control channel (PDCCH), a paging channel, a beam reference signal, or a synchronization signal. 7. The method of claim 6, wherein a remaining minimum system information (RMSI) is transmitted using the physical downlink shared channel. 8. The method of claim 3, wherein the first set of one or more signals and the second set of one or more signals are quasi-collocated. 9. The method of claim 1, wherein:
communicating with the first UE comprises receiving or monitoring for a first set of one or more signals in the first set of frequency resources from the first UE; and participating in at least one of the access or management procedure further comprises receiving or monitoring for a second set of one or more signals related to a directional random access channel (RACH) in the second set of frequency resources. 10. The method of claim 9, wherein participating in at least one of the access or management procedure further comprises:
sweeping different receive beam directions while monitoring the directional RACH transmission in the second set of frequency resources. 11. The method of claim 9, wherein communicating with the first UE comprises receiving at least one of a directional physical uplink shared channel (PUSCH) or physical uplink control channel (PUCCH) from the first UE. 12. The method of claim 9, wherein communicating with the first UE comprises communicating with the first UE as a part of a dedicated RACH procedure. 13. The method of claim 1, wherein the first set of frequency resources and the second set of frequency resources are non-overlapping. 14. The method of claim 1, wherein the first BS is configured to participate in the at least one of an access or management procedure with a second UE using the second set of resources,. 15. The method of claim 14, wherein an indication of at least part of resources and configurations for participating in the at least one of an access and management procedure with the first BS is provided to the second UE by a second BS. 16. The method of claim 1, wherein communicating with the first UE involves at least one of backhaul (BH) communications, integrated access and backhaul (IAB) communications, or device to device (D2D) communications between the first UE and a second UE. 17. The method of claim 1, wherein the first BS operates in a millimeter-wave (mmWave) spectrum. 18. The method of claim 1, wherein the BS:
communicates with the first UE using a first antenna subarray; and participates in at least one of the access or management procedure using a second antenna subarray. 19. An apparatus for wireless communication by a first base station (BS), comprising:
means for communicating, in a first time interval, with at least a first user equipment (UE), via directional transmissions using a first set of frequency resources; and means for participating in at least one of an access or management procedure, during the first time interval, via directional transmissions using a second set of frequency resources. 20. The apparatus of claim 19, wherein the at least one of an access or management procedure comprises at least one of: a directional initial access, beam management, mobility management, radio resource management (RRM), or radio link monitoring (RLM). 21. The apparatus of claim 19, wherein:
means for communicating with the first UE comprises means for transmitting a first set of one or more signals using the first set of frequency resources to the first UE; and means for participating in at least one of the access or management procedure comprises means for transmitting a second set of one or more signals using the second set of frequency resources. 22. The apparatus of claim 21, wherein means for participating in at least one of the access or management procedure comprises:
means for transmitting at least one of a directional synchronization (SYNC) signal, a beam reference signal, a physical broadcast channel (PBCH), a downlink control channel, or a downlink data channel carrying part of the system information. 23. The apparatus of claim 22, wherein means for participating in at least one the access or management procedure further comprises:
means for sweeping different transmit beam directions while transmitting the at least one of the directional SYNC signal, beam reference signal, PBCH, downlink control channel or downlink data channel. 24. The apparatus of claim 21, wherein means for communicating with the first UE comprises:
means for transmitting at least one of a directional physical downlink shared channel (PDSCH), a physical downlink control channel (PDCCH), a paging channel, a beam reference signal, or a synchronization signal. 25. The apparatus of claim 19, wherein:
means for communicating with the first UE comprises means for receiving or monitoring for a first set of one or more signals in the first set of frequency resources from the first UE; and means for participating in at least one of the access or management procedure further comprises means for receiving or means for monitoring for a second set of one or more signals related to a directional random access channel (RACH) in the second set of frequency resources. 26. The apparatus of claim 25, wherein means for participating in at least one of the access or management procedure further comprises:
means for sweeping different receive beam directions while monitoring the directional RACH transmission in the second set of frequency resources. 27. The apparatus of claim 25, wherein means for communicating with the first UE comprises means for receiving at least one of a directional physical uplink shared channel (PUSCH) or physical uplink control channel (PUCCH) from the first UE. 28. The apparatus of claim 19, wherein:
the means for communicating uses a first antenna subarray; and the means for participating uses a second antenna subarray. 29. An apparatus for wireless communication by a first base station (BS), comprising:
at least one processor configured to communicate, in a first time interval, with at least a first user equipment (UE), via directional transmissions using a first set of frequency resources, and to participating in at least one of an access or management procedure, during the first time interval, via directional transmissions using a second set of frequency resources; and a memory coupled with the at least one processor. 30. A computer readable medium having instructions stored thereon for:
communicating, in a first time interval, with at least a first user equipment (UE), via directional transmissions using a first set of frequency resources; and participating in at least one of an access or management procedure, during the first time interval, via directional transmissions using a second set of frequency resources. | Certain aspects of the present disclosure provide techniques for multiplexing initial access transmissions with data and/or control transmissions.1. A method for wireless communication by a first base station (BS), comprising:
communicating, in a first time interval, with at least a first user equipment (UE), via directional transmissions using a first set of frequency resources; and participating in at least one of an access or management procedure, during the first time interval, via directional transmissions using a second set of frequency resources. 2. The method of claim 1, wherein the at least one of an access or management procedure comprises at least one of: a directional initial access, beam management, mobility management, radio resource management (RRM), or radio link monitoring (RLM). 3. The method of claim 1, wherein:
communicating with the first UE comprises transmitting a first set of one or more signals using the first set of frequency resources to the first UE; and participating in at least one of the access or management procedure comprises transmitting a second set of one or more signals using the second set of frequency resources. 4. The method of claim 3, wherein participating in at least one of the access or management procedure comprises:
transmitting at least one of a directional synchronization (SYNC) signal, a beam reference signal, a physical broadcast channel (PBCH), a downlink control channel, or a downlink data channel carrying part of the system information. 5. The method of claim 4, wherein participating in at least one the access or management procedure further comprises:
sweeping different transmit beam directions while transmitting the at least one of the directional SYNC signal, beam reference signal, PBCH, downlink control channel or downlink data channel. 6. The method of claim 3, wherein communicating with the first UE comprises:
transmitting at least one of a directional physical downlink shared channel (PDSCH), a physical downlink control channel (PDCCH), a paging channel, a beam reference signal, or a synchronization signal. 7. The method of claim 6, wherein a remaining minimum system information (RMSI) is transmitted using the physical downlink shared channel. 8. The method of claim 3, wherein the first set of one or more signals and the second set of one or more signals are quasi-collocated. 9. The method of claim 1, wherein:
communicating with the first UE comprises receiving or monitoring for a first set of one or more signals in the first set of frequency resources from the first UE; and participating in at least one of the access or management procedure further comprises receiving or monitoring for a second set of one or more signals related to a directional random access channel (RACH) in the second set of frequency resources. 10. The method of claim 9, wherein participating in at least one of the access or management procedure further comprises:
sweeping different receive beam directions while monitoring the directional RACH transmission in the second set of frequency resources. 11. The method of claim 9, wherein communicating with the first UE comprises receiving at least one of a directional physical uplink shared channel (PUSCH) or physical uplink control channel (PUCCH) from the first UE. 12. The method of claim 9, wherein communicating with the first UE comprises communicating with the first UE as a part of a dedicated RACH procedure. 13. The method of claim 1, wherein the first set of frequency resources and the second set of frequency resources are non-overlapping. 14. The method of claim 1, wherein the first BS is configured to participate in the at least one of an access or management procedure with a second UE using the second set of resources,. 15. The method of claim 14, wherein an indication of at least part of resources and configurations for participating in the at least one of an access and management procedure with the first BS is provided to the second UE by a second BS. 16. The method of claim 1, wherein communicating with the first UE involves at least one of backhaul (BH) communications, integrated access and backhaul (IAB) communications, or device to device (D2D) communications between the first UE and a second UE. 17. The method of claim 1, wherein the first BS operates in a millimeter-wave (mmWave) spectrum. 18. The method of claim 1, wherein the BS:
communicates with the first UE using a first antenna subarray; and participates in at least one of the access or management procedure using a second antenna subarray. 19. An apparatus for wireless communication by a first base station (BS), comprising:
means for communicating, in a first time interval, with at least a first user equipment (UE), via directional transmissions using a first set of frequency resources; and means for participating in at least one of an access or management procedure, during the first time interval, via directional transmissions using a second set of frequency resources. 20. The apparatus of claim 19, wherein the at least one of an access or management procedure comprises at least one of: a directional initial access, beam management, mobility management, radio resource management (RRM), or radio link monitoring (RLM). 21. The apparatus of claim 19, wherein:
means for communicating with the first UE comprises means for transmitting a first set of one or more signals using the first set of frequency resources to the first UE; and means for participating in at least one of the access or management procedure comprises means for transmitting a second set of one or more signals using the second set of frequency resources. 22. The apparatus of claim 21, wherein means for participating in at least one of the access or management procedure comprises:
means for transmitting at least one of a directional synchronization (SYNC) signal, a beam reference signal, a physical broadcast channel (PBCH), a downlink control channel, or a downlink data channel carrying part of the system information. 23. The apparatus of claim 22, wherein means for participating in at least one the access or management procedure further comprises:
means for sweeping different transmit beam directions while transmitting the at least one of the directional SYNC signal, beam reference signal, PBCH, downlink control channel or downlink data channel. 24. The apparatus of claim 21, wherein means for communicating with the first UE comprises:
means for transmitting at least one of a directional physical downlink shared channel (PDSCH), a physical downlink control channel (PDCCH), a paging channel, a beam reference signal, or a synchronization signal. 25. The apparatus of claim 19, wherein:
means for communicating with the first UE comprises means for receiving or monitoring for a first set of one or more signals in the first set of frequency resources from the first UE; and means for participating in at least one of the access or management procedure further comprises means for receiving or means for monitoring for a second set of one or more signals related to a directional random access channel (RACH) in the second set of frequency resources. 26. The apparatus of claim 25, wherein means for participating in at least one of the access or management procedure further comprises:
means for sweeping different receive beam directions while monitoring the directional RACH transmission in the second set of frequency resources. 27. The apparatus of claim 25, wherein means for communicating with the first UE comprises means for receiving at least one of a directional physical uplink shared channel (PUSCH) or physical uplink control channel (PUCCH) from the first UE. 28. The apparatus of claim 19, wherein:
the means for communicating uses a first antenna subarray; and the means for participating uses a second antenna subarray. 29. An apparatus for wireless communication by a first base station (BS), comprising:
at least one processor configured to communicate, in a first time interval, with at least a first user equipment (UE), via directional transmissions using a first set of frequency resources, and to participating in at least one of an access or management procedure, during the first time interval, via directional transmissions using a second set of frequency resources; and a memory coupled with the at least one processor. 30. A computer readable medium having instructions stored thereon for:
communicating, in a first time interval, with at least a first user equipment (UE), via directional transmissions using a first set of frequency resources; and participating in at least one of an access or management procedure, during the first time interval, via directional transmissions using a second set of frequency resources. | 2,400 |
8,995 | 8,995 | 15,827,419 | 2,469 | The present disclosure relates to a 5 th generation 5G) or pre-5G communication system for supporting higher data rates beyond a 4 th generation (4G) communication system such as long-term evolution (LTE). A method for a base station (BS) are provided. The method includes receiving signals from at least one terminal, decoding a signal having a signal strength that is higher than a threshold value among the received signals, identifying whether a resource through which the signal has been transmitted is included in an overlap region in which a first resource region dynamically allocated by control information and a second resource region predetermined by configuration information overlap each other if the decoding of the signal fails, and skipping storage of the received signal in a buffer if the resource through which the signal has been transmitted is included in the overlap region. | 1. A method for a base station (BS), the method comprising:
receiving signals from at least one terminal; decoding a signal having a signal strength that is higher than a threshold value; identifying whether a resource through which the signal has been transmitted is included in an overlap region in which a first resource region dynamically allocated by control information and a second resource region predetermined by configuration information overlap each other if the decoding of the signal fails; and skipping storage of the received signal in a buffer if the resource through which the signal has been transmitted is included in the overlap region. 2. The method of claim 1, further comprising storing the received signal in the buffer if the resource through which the signal has been transmitted is not included in the overlap region. 3. The method of claim 2, further comprising:
requesting retransmission of the signal; receiving the signal; and combining the retransmitted signal with the signal stored in the buffer and decoding the combined signal if the signal stored in the buffer exists. 4. The method of claim 3, wherein the requesting of the retransmission comprises requesting the retransmission through the resource excluding the overlap region. 5. The method of claim 1, wherein the receiving of the signal further comprises:
transmitting the control information for dynamically allocating the first resource region to a first terminal; transmitting the configuration information for allocating the second resource region to a second terminal; and receiving the signal in the first resource region and the second resource region. 6. The method of claim 1,
wherein the configuration information is transmitted through radio resource control (RRC) signaling, and wherein the control information is transmitted through a physical downlink control channel (PDCCH). 7. The method of claim 1, wherein the skipping further comprises:
identifying an amount of resources in the overlap region; identifying whether the amount of resources in the overlap region exceeds a threshold amount of resources; and storing the received signal in the buffer if the amount of resources in the overlap region does not exceed the threshold amount of resources. 8. A base station (BS) comprising:
a transceiver; and a controller configured to:
receive signals from at least one terminal,
decode a signal having a signal strength that is higher than a threshold value,
identify whether a resource through which the signal has been transmitted is included in an overlap region in which a first resource region dynamically allocated by control information and a second resource region predetermined by configuration information overlap each other if the decoding of the signal fails, and
skip storage of the received signal in a buffer if the resource through which the signal has been transmitted is included in the overlap region. 9. The BS of claim 8, wherein the controller is further configured to store the received signal in the buffer if the resource through which the signal has been transmitted is not included in the overlap region. 10. The BS of claim 9, wherein the controller is further configured to:
request retransmission of the signal, receive the signal, and combine the retransmitted signal with the signal stored in the buffer and decode the combined signal if the signal stored in the buffer exists. 11. The BS of claim 10, wherein the controller is further configured to request the retransmission through the resource excluding the overlap region. 12. The BS of claim 8, wherein the controller is further configured to:
transmit the control information for dynamically allocating the first resource region to a first terminal, transmit the configuration information for allocating the second resource region to a second terminal, and receive the signal in the first resource region and the second resource region. 13. The BS of claim 8,
wherein the configuration information is transmitted through radio resource control (RRC) signaling, and wherein the control information is transmitted through a physical downlink control channel (PDCCH). 14. The BS of claim 8, wherein the controller is further configured to:
identify an amount of resources in the overlap region, identify whether the amount of resources in the overlap region exceeds a threshold amount of resources, and store the received signal in the buffer if the amount of resources in the overlap region does not exceed the threshold amount of resources. 15. The BS of claim 8, wherein the signal strength is determined via discontinuous transmission (DTX) expressed as an energy level of the received signal or a signal-to-interference ratio (SIR). | The present disclosure relates to a 5 th generation 5G) or pre-5G communication system for supporting higher data rates beyond a 4 th generation (4G) communication system such as long-term evolution (LTE). A method for a base station (BS) are provided. The method includes receiving signals from at least one terminal, decoding a signal having a signal strength that is higher than a threshold value among the received signals, identifying whether a resource through which the signal has been transmitted is included in an overlap region in which a first resource region dynamically allocated by control information and a second resource region predetermined by configuration information overlap each other if the decoding of the signal fails, and skipping storage of the received signal in a buffer if the resource through which the signal has been transmitted is included in the overlap region.1. A method for a base station (BS), the method comprising:
receiving signals from at least one terminal; decoding a signal having a signal strength that is higher than a threshold value; identifying whether a resource through which the signal has been transmitted is included in an overlap region in which a first resource region dynamically allocated by control information and a second resource region predetermined by configuration information overlap each other if the decoding of the signal fails; and skipping storage of the received signal in a buffer if the resource through which the signal has been transmitted is included in the overlap region. 2. The method of claim 1, further comprising storing the received signal in the buffer if the resource through which the signal has been transmitted is not included in the overlap region. 3. The method of claim 2, further comprising:
requesting retransmission of the signal; receiving the signal; and combining the retransmitted signal with the signal stored in the buffer and decoding the combined signal if the signal stored in the buffer exists. 4. The method of claim 3, wherein the requesting of the retransmission comprises requesting the retransmission through the resource excluding the overlap region. 5. The method of claim 1, wherein the receiving of the signal further comprises:
transmitting the control information for dynamically allocating the first resource region to a first terminal; transmitting the configuration information for allocating the second resource region to a second terminal; and receiving the signal in the first resource region and the second resource region. 6. The method of claim 1,
wherein the configuration information is transmitted through radio resource control (RRC) signaling, and wherein the control information is transmitted through a physical downlink control channel (PDCCH). 7. The method of claim 1, wherein the skipping further comprises:
identifying an amount of resources in the overlap region; identifying whether the amount of resources in the overlap region exceeds a threshold amount of resources; and storing the received signal in the buffer if the amount of resources in the overlap region does not exceed the threshold amount of resources. 8. A base station (BS) comprising:
a transceiver; and a controller configured to:
receive signals from at least one terminal,
decode a signal having a signal strength that is higher than a threshold value,
identify whether a resource through which the signal has been transmitted is included in an overlap region in which a first resource region dynamically allocated by control information and a second resource region predetermined by configuration information overlap each other if the decoding of the signal fails, and
skip storage of the received signal in a buffer if the resource through which the signal has been transmitted is included in the overlap region. 9. The BS of claim 8, wherein the controller is further configured to store the received signal in the buffer if the resource through which the signal has been transmitted is not included in the overlap region. 10. The BS of claim 9, wherein the controller is further configured to:
request retransmission of the signal, receive the signal, and combine the retransmitted signal with the signal stored in the buffer and decode the combined signal if the signal stored in the buffer exists. 11. The BS of claim 10, wherein the controller is further configured to request the retransmission through the resource excluding the overlap region. 12. The BS of claim 8, wherein the controller is further configured to:
transmit the control information for dynamically allocating the first resource region to a first terminal, transmit the configuration information for allocating the second resource region to a second terminal, and receive the signal in the first resource region and the second resource region. 13. The BS of claim 8,
wherein the configuration information is transmitted through radio resource control (RRC) signaling, and wherein the control information is transmitted through a physical downlink control channel (PDCCH). 14. The BS of claim 8, wherein the controller is further configured to:
identify an amount of resources in the overlap region, identify whether the amount of resources in the overlap region exceeds a threshold amount of resources, and store the received signal in the buffer if the amount of resources in the overlap region does not exceed the threshold amount of resources. 15. The BS of claim 8, wherein the signal strength is determined via discontinuous transmission (DTX) expressed as an energy level of the received signal or a signal-to-interference ratio (SIR). | 2,400 |
8,996 | 8,996 | 15,906,183 | 2,425 | A method and apparatus for merging audio streams is provided herein. More particularly, when an officer streams video, the identities of other officers on scene are determined. Audio associated with the other officers is then merged with the video. | 1. An apparatus comprising:
a receiver configured to receive a first video stream from a first person; logic circuitry configured to:
determine a second person is in proximity to the first person;
determine a talkgroup associated with the second person;
merge audio associated with the talkgroup with the first video stream;
a transmitter configured to transmit the first video stream with the merged audio. 2. The apparatus of claim 1 wherein the receiver is also configured to:
receive the first video stream over a first network; and
receive audio associated with the talkgroup over a second network. 3. The apparatus of claim 2 wherein the first network is a broadband network, and the second network is a narrowband public-safety network. 4. The apparatus of claim 1 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the first and the second persons share a same Computer Aided Dispatch Identification (CAD ID). 5. The apparatus of claim 1 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the first and the second persons share a same location or are within a predetermined distance from each other. 6. The apparatus of claim 1 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the second person is within a Field of View (FoV) of a camera streaming the video. 7. The apparatus of claim 1 wherein the logic circuitry is also configured to merge audio associated with a second video stream received from the second person. 8. The apparatus of claim 1 wherein the first video stream from the first person comprises a video stream from a body-worn camera. 9. A method comprising the steps of:
receiving a first video stream from a first person; determining a second person is in proximity to the first person; determining a talkgroup associated with the second person; merging audio associated with the talkgroup with the first video stream; transmitting the first video stream with the merged audio. 10. The method of claim 9 wherein the first video stream is received over a first network; and audio associated with the talkgroup is received over a second network. 11. The method of claim 10 wherein the first network is a broadband network, and the second network is a narrowband public-safety network. 12. The method of claim 9 wherein the step of determining the second person is in proximity to the first person comprises the step of determining that the first and the second person share a same Computer Aided Dispatch Identification (CAD ID). 13. The method of claim 9 wherein the step of determining the second person is in proximity to the first person comprises the step of determining that the first and the second person share a same location or are within a predetermined distance from each other. 14. The method of claim 9 wherein the step of determining the second person is in proximity to the first person comprises the step of determining that the second person is within a Field of View (FoV) of a camera streaming the first video. 15. The method of claim 9 further comprising the step of merging audio associated with a second video being streamed by the second person. 16. The method of claim 9 wherein the first video stream from the first person comprises a video stream from a body-worn camera. 17. An apparatus comprising:
a receiver configured to receive a first body-worn-camera video stream from a first body-worn camera worn by a first person and receive a second body-worn-camera video stream from a second body-worn camera worn by a second person; logic circuitry configured to:
determine the second person is in proximity to the first person;
merge audio associated with the second body-worn-camera video stream with the first body-worn-camera video stream when it is determined that the second person is in proximity to the first person;
a transmitter configured to transmit the first body-worn camera video stream with the merged audio. 18. The apparatus of claim 17 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the first and the second person share a same Computer Aided Dispatch Identification (CAD ID). 19. The apparatus of claim 17 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the first and the second person share a same location or are within a predetermined distance from each other. 20. The apparatus of claim 17 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the second person is within a Field of View (FoV) of the first body-worn-camera. | A method and apparatus for merging audio streams is provided herein. More particularly, when an officer streams video, the identities of other officers on scene are determined. Audio associated with the other officers is then merged with the video.1. An apparatus comprising:
a receiver configured to receive a first video stream from a first person; logic circuitry configured to:
determine a second person is in proximity to the first person;
determine a talkgroup associated with the second person;
merge audio associated with the talkgroup with the first video stream;
a transmitter configured to transmit the first video stream with the merged audio. 2. The apparatus of claim 1 wherein the receiver is also configured to:
receive the first video stream over a first network; and
receive audio associated with the talkgroup over a second network. 3. The apparatus of claim 2 wherein the first network is a broadband network, and the second network is a narrowband public-safety network. 4. The apparatus of claim 1 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the first and the second persons share a same Computer Aided Dispatch Identification (CAD ID). 5. The apparatus of claim 1 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the first and the second persons share a same location or are within a predetermined distance from each other. 6. The apparatus of claim 1 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the second person is within a Field of View (FoV) of a camera streaming the video. 7. The apparatus of claim 1 wherein the logic circuitry is also configured to merge audio associated with a second video stream received from the second person. 8. The apparatus of claim 1 wherein the first video stream from the first person comprises a video stream from a body-worn camera. 9. A method comprising the steps of:
receiving a first video stream from a first person; determining a second person is in proximity to the first person; determining a talkgroup associated with the second person; merging audio associated with the talkgroup with the first video stream; transmitting the first video stream with the merged audio. 10. The method of claim 9 wherein the first video stream is received over a first network; and audio associated with the talkgroup is received over a second network. 11. The method of claim 10 wherein the first network is a broadband network, and the second network is a narrowband public-safety network. 12. The method of claim 9 wherein the step of determining the second person is in proximity to the first person comprises the step of determining that the first and the second person share a same Computer Aided Dispatch Identification (CAD ID). 13. The method of claim 9 wherein the step of determining the second person is in proximity to the first person comprises the step of determining that the first and the second person share a same location or are within a predetermined distance from each other. 14. The method of claim 9 wherein the step of determining the second person is in proximity to the first person comprises the step of determining that the second person is within a Field of View (FoV) of a camera streaming the first video. 15. The method of claim 9 further comprising the step of merging audio associated with a second video being streamed by the second person. 16. The method of claim 9 wherein the first video stream from the first person comprises a video stream from a body-worn camera. 17. An apparatus comprising:
a receiver configured to receive a first body-worn-camera video stream from a first body-worn camera worn by a first person and receive a second body-worn-camera video stream from a second body-worn camera worn by a second person; logic circuitry configured to:
determine the second person is in proximity to the first person;
merge audio associated with the second body-worn-camera video stream with the first body-worn-camera video stream when it is determined that the second person is in proximity to the first person;
a transmitter configured to transmit the first body-worn camera video stream with the merged audio. 18. The apparatus of claim 17 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the first and the second person share a same Computer Aided Dispatch Identification (CAD ID). 19. The apparatus of claim 17 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the first and the second person share a same location or are within a predetermined distance from each other. 20. The apparatus of claim 17 wherein the logic circuitry determines the second person is in proximity to the first person by determining that the second person is within a Field of View (FoV) of the first body-worn-camera. | 2,400 |
8,997 | 8,997 | 14,502,631 | 2,416 | This disclosure generally relates to radio resource control for D2D communication. In one embodiment, a master UE of the D2D communication may obtain radio resource information of a slave UE before performing radio resource configuration for the D2D communication between the master UE and the slave UE. Based on the radio resource information, the master UE may configure radio resource for the D2D communication. In this way, radio resource configuration may be performed for both the D2D communication and cellular communication without violating the slave UE's radio capability. | 1. A method implemented at least in part by master user equipment comprising:
obtaining radio resource information of slave user equipment in cellular communication; and performing radio resource configuration for device-to-device (D2D) communication between the master user equipment and the slave user equipment based on the radio resource information. 2. The method of claim 1, wherein obtaining the radio resource information comprises:
transmitting a message to a base station associated with the cellular communication, the message indicating that the D2D communication is to be set up; and receiving the radio resource information from the base station, wherein the radio resource information is transmitted by the base station in response to the message. 3. The method of claim 2, wherein the radio resource information includes cellular radio resource configuration information and radio capability information of the slave user equipment. 4. The method of claim 3, wherein the radio capability information includes at least one of:
Multiple Input Multiple Output (MIMO) capability, maximum number of Downlink Share Channel (DL-SCH) transport block bits received within a Transmission Time Interval (TTI), maximum number of Uplink Share Channel (UL-SCH) transport block bits transmitted within a TTI, total number of DL-SCH soft channel bits, and supported band combination. 5. The method of claim 1, wherein obtaining the radio resource information comprises:
receiving the radio resource information from a base station associated with the cellular communication or from the slave user equipment, wherein the radio resource information is transmitted by the base station or the slave user equipment in response to that cellular radio resource of the slave user equipment is configured after the D2D communication is set up. 6. The method of claim 5, wherein the radio resource information includes cellular radio resource configuration information of the slave user equipment. 7. The method of claim 1, further comprising:
responsive to D2D radio resource being configured after the D2D communication is set up, transmitting D2D radio resource configuration information to a base station associated with the cellular communication. 8. A method implemented at least in part by a base station comprising:
responsive to a predetermined condition of device-to-device (D2D) communication between master user equipment and slave user equipment being met, determining radio resource information of the slave user equipment in cellular communication; and transmitting the radio resource information to the master user equipment. 9. The method of claim 8, wherein determining the radio resource information comprises:
responsive to receiving a message indicating that the D2D communication is to be set up, obtaining the radio resource information. 10. The method of claim 9, wherein the radio resource information includes cellular radio resource configuration information and radio capability information of the slave user equipment. 11. The method of claim 8, wherein determining the radio resource information comprises:
responsive to that cellular radio resource of the slave user equipment is configured after the D2D communication is set up, obtaining the radio resource information. 12. The method of claim 11, wherein the radio resource information includes cellular radio resource configuration information of the slave user equipment. 13. The method of claim 9, wherein obtaining the radio resource information comprises:
obtaining the radio resource information from a base station serving the slave user equipment. 14. The method of claim 8, further comprising:
receiving D2D radio resource configuration information from the master user equipment or the slave user equipment, wherein the D2D radio resource configuration information is transmitted by the master user equipment or the slave user equipment responsive to D2D radio resource being configured after the D2D communication is set up. 15. User equipment comprising:
a receiver configured to receive radio resource information of slave user equipment in cellular communication; and a controller configured to perform radio resource configuration for device-to-device (D2D) communication with the slave user equipment based on the radio resource information. 16. The user equipment of claim 15, further comprising a transmitter configured to transmit a message to a base station associated with the cellular communication, the message indicating that the D2D communication is to be set up,
wherein the receiver is configured to receive the radio resource information from the base station, the radio resource information being transmitted from the base station in response to the message. 17. The user equipment of claim 16, wherein the radio resource information includes cellular radio resource configuration information and radio capability information of the slave user equipment. 18. The user equipment of claim 15, wherein the receiver is configured to receive the radio resource information from a base station associated with the cellular communication or from the slave user equipment, wherein the radio resource information is transmitted from the base station or the slave user equipment in response to that cellular radio resource of the slave user equipment is configured after the D2D communication is set up. 19. The user equipment of claim 18, wherein the radio resource information includes cellular radio resource configuration information of the slave user equipment. 20. The user equipment of claim 15, further comprising:
a transmitter configured to transmit D2D radio resource configuration information to a base station associated with the cellular communication, responsive to D2D radio resource being configured after the D2D communication is set up. | This disclosure generally relates to radio resource control for D2D communication. In one embodiment, a master UE of the D2D communication may obtain radio resource information of a slave UE before performing radio resource configuration for the D2D communication between the master UE and the slave UE. Based on the radio resource information, the master UE may configure radio resource for the D2D communication. In this way, radio resource configuration may be performed for both the D2D communication and cellular communication without violating the slave UE's radio capability.1. A method implemented at least in part by master user equipment comprising:
obtaining radio resource information of slave user equipment in cellular communication; and performing radio resource configuration for device-to-device (D2D) communication between the master user equipment and the slave user equipment based on the radio resource information. 2. The method of claim 1, wherein obtaining the radio resource information comprises:
transmitting a message to a base station associated with the cellular communication, the message indicating that the D2D communication is to be set up; and receiving the radio resource information from the base station, wherein the radio resource information is transmitted by the base station in response to the message. 3. The method of claim 2, wherein the radio resource information includes cellular radio resource configuration information and radio capability information of the slave user equipment. 4. The method of claim 3, wherein the radio capability information includes at least one of:
Multiple Input Multiple Output (MIMO) capability, maximum number of Downlink Share Channel (DL-SCH) transport block bits received within a Transmission Time Interval (TTI), maximum number of Uplink Share Channel (UL-SCH) transport block bits transmitted within a TTI, total number of DL-SCH soft channel bits, and supported band combination. 5. The method of claim 1, wherein obtaining the radio resource information comprises:
receiving the radio resource information from a base station associated with the cellular communication or from the slave user equipment, wherein the radio resource information is transmitted by the base station or the slave user equipment in response to that cellular radio resource of the slave user equipment is configured after the D2D communication is set up. 6. The method of claim 5, wherein the radio resource information includes cellular radio resource configuration information of the slave user equipment. 7. The method of claim 1, further comprising:
responsive to D2D radio resource being configured after the D2D communication is set up, transmitting D2D radio resource configuration information to a base station associated with the cellular communication. 8. A method implemented at least in part by a base station comprising:
responsive to a predetermined condition of device-to-device (D2D) communication between master user equipment and slave user equipment being met, determining radio resource information of the slave user equipment in cellular communication; and transmitting the radio resource information to the master user equipment. 9. The method of claim 8, wherein determining the radio resource information comprises:
responsive to receiving a message indicating that the D2D communication is to be set up, obtaining the radio resource information. 10. The method of claim 9, wherein the radio resource information includes cellular radio resource configuration information and radio capability information of the slave user equipment. 11. The method of claim 8, wherein determining the radio resource information comprises:
responsive to that cellular radio resource of the slave user equipment is configured after the D2D communication is set up, obtaining the radio resource information. 12. The method of claim 11, wherein the radio resource information includes cellular radio resource configuration information of the slave user equipment. 13. The method of claim 9, wherein obtaining the radio resource information comprises:
obtaining the radio resource information from a base station serving the slave user equipment. 14. The method of claim 8, further comprising:
receiving D2D radio resource configuration information from the master user equipment or the slave user equipment, wherein the D2D radio resource configuration information is transmitted by the master user equipment or the slave user equipment responsive to D2D radio resource being configured after the D2D communication is set up. 15. User equipment comprising:
a receiver configured to receive radio resource information of slave user equipment in cellular communication; and a controller configured to perform radio resource configuration for device-to-device (D2D) communication with the slave user equipment based on the radio resource information. 16. The user equipment of claim 15, further comprising a transmitter configured to transmit a message to a base station associated with the cellular communication, the message indicating that the D2D communication is to be set up,
wherein the receiver is configured to receive the radio resource information from the base station, the radio resource information being transmitted from the base station in response to the message. 17. The user equipment of claim 16, wherein the radio resource information includes cellular radio resource configuration information and radio capability information of the slave user equipment. 18. The user equipment of claim 15, wherein the receiver is configured to receive the radio resource information from a base station associated with the cellular communication or from the slave user equipment, wherein the radio resource information is transmitted from the base station or the slave user equipment in response to that cellular radio resource of the slave user equipment is configured after the D2D communication is set up. 19. The user equipment of claim 18, wherein the radio resource information includes cellular radio resource configuration information of the slave user equipment. 20. The user equipment of claim 15, further comprising:
a transmitter configured to transmit D2D radio resource configuration information to a base station associated with the cellular communication, responsive to D2D radio resource being configured after the D2D communication is set up. | 2,400 |
8,998 | 8,998 | 14,631,881 | 2,461 | Methods and systems for prevent unauthorized use of a Domain Name System (DNS) channel in an organization are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; determining whether the packet is a DNS packet or a non-DNS packet; if the packet is a DNS packet, determining whether the destination address of the packet denotes a legitimate DNS server; and, according to whether the destination address of the packet denotes a legitimate DNS server, permitting the packet. | 1. A method for preventing unauthorized use of a Domain Name Service (DNS) channel, comprising:
a) receiving a packet b) determining whether the packet is a DNS packet or a non-DNS packet c) when the packet is a DNS packet, determining whether the destination address of the packet denotes a legitimate DNS server d) according to whether the destination address of the packet denotes a legitimate DNS server, permitting the packet. 2. The method of claim 1, wherein a legitimate DNS server is determined by referring to a whitelist of known legitimate DNS server IP addresses 3. The method of claim 1, additionally comprising: discarding the packet, if the destination address of the packet does not refer to a legitimate DNS server. 4. The method of claim 1, additionally comprising: modifying the destination address of the packet to denote a legitimate DNS Server, if the original destination address does not denote a legitimate DNS server. 5. The method of claim 1, wherein the method includes a server. 6. The method of claim 1, wherein the method includes a device comprising a firewall. 7. A computer system for preventing unauthorized use of a Domain Name Service (DNS) channel, comprising:
a storage medium for storing computer components; and a computerized processor for executing the computer components comprising:
a first computer component for receiving a packet;
a second computer component for determining whether the packet is a DNS packet or a non-DNS packet;
a third computer component for, when the packet is a DNS packet, determining whether the destination address of the packet denotes a legitimate DNS server; and
a fourth computer component for, according to whether the destination address of the packet denotes a legitimate DNS server, permitting the packet. 8. The system of claim 7, wherein the fourth computer component determines a legitimate DNS server is legitimate is by referring to a whitelist of known legitimate DNS server IP addresses 9. The computer system of claim 7, additionally comprising: a fifth computer component for discarding the packet, if the destination address of the packet does not refer to a legitimate DNS server. 10. The computer system of claim 7, additionally comprising: a fifth computer component for modifying the destination address of the packet to denote a legitimate DNS Server, if the original destination address does not denote a legitimate DNS server. 11. The computer system of claim 7, wherein the system includes a server. 12. The computer system of claim 7, wherein the system includes a device comprising a firewall. 13. A computer-usable non-transitory storage medium having a computer program embodied thereon for causing a suitable programmed system to prevent unauthorized use of a DNS channel, by performing the following steps when such program is executed on the system, the steps comprising:
a) receiving a packet b) determining whether the packet is a DNS packet or a non-DNS packet c) when the packet is a DNS packet, determining whether the destination address of the packet denotes a legitimate DNS server d) according to whether the destination address of the packet denotes a legitimate DNS server, permitting the packet. 14. The storage medium of claim 13, wherein a legitimate DNS server is determined by referring to a whitelist of known legitimate DNS server IP addresses 15. The storage medium of claim 13, additionally performing the step of discarding the packet, if the destination address of the packet does not refer to a legitimate DNS server. 16. The storage medium of claim 13, additionally performing the step of modifying the destination address of the packet to denote a legitimate DNS Server, if the original destination address does not denote a legitimate DNS server. | Methods and systems for prevent unauthorized use of a Domain Name System (DNS) channel in an organization are disclosed. These methods and systems comprise elements of hardware and software for receiving a packet; determining whether the packet is a DNS packet or a non-DNS packet; if the packet is a DNS packet, determining whether the destination address of the packet denotes a legitimate DNS server; and, according to whether the destination address of the packet denotes a legitimate DNS server, permitting the packet.1. A method for preventing unauthorized use of a Domain Name Service (DNS) channel, comprising:
a) receiving a packet b) determining whether the packet is a DNS packet or a non-DNS packet c) when the packet is a DNS packet, determining whether the destination address of the packet denotes a legitimate DNS server d) according to whether the destination address of the packet denotes a legitimate DNS server, permitting the packet. 2. The method of claim 1, wherein a legitimate DNS server is determined by referring to a whitelist of known legitimate DNS server IP addresses 3. The method of claim 1, additionally comprising: discarding the packet, if the destination address of the packet does not refer to a legitimate DNS server. 4. The method of claim 1, additionally comprising: modifying the destination address of the packet to denote a legitimate DNS Server, if the original destination address does not denote a legitimate DNS server. 5. The method of claim 1, wherein the method includes a server. 6. The method of claim 1, wherein the method includes a device comprising a firewall. 7. A computer system for preventing unauthorized use of a Domain Name Service (DNS) channel, comprising:
a storage medium for storing computer components; and a computerized processor for executing the computer components comprising:
a first computer component for receiving a packet;
a second computer component for determining whether the packet is a DNS packet or a non-DNS packet;
a third computer component for, when the packet is a DNS packet, determining whether the destination address of the packet denotes a legitimate DNS server; and
a fourth computer component for, according to whether the destination address of the packet denotes a legitimate DNS server, permitting the packet. 8. The system of claim 7, wherein the fourth computer component determines a legitimate DNS server is legitimate is by referring to a whitelist of known legitimate DNS server IP addresses 9. The computer system of claim 7, additionally comprising: a fifth computer component for discarding the packet, if the destination address of the packet does not refer to a legitimate DNS server. 10. The computer system of claim 7, additionally comprising: a fifth computer component for modifying the destination address of the packet to denote a legitimate DNS Server, if the original destination address does not denote a legitimate DNS server. 11. The computer system of claim 7, wherein the system includes a server. 12. The computer system of claim 7, wherein the system includes a device comprising a firewall. 13. A computer-usable non-transitory storage medium having a computer program embodied thereon for causing a suitable programmed system to prevent unauthorized use of a DNS channel, by performing the following steps when such program is executed on the system, the steps comprising:
a) receiving a packet b) determining whether the packet is a DNS packet or a non-DNS packet c) when the packet is a DNS packet, determining whether the destination address of the packet denotes a legitimate DNS server d) according to whether the destination address of the packet denotes a legitimate DNS server, permitting the packet. 14. The storage medium of claim 13, wherein a legitimate DNS server is determined by referring to a whitelist of known legitimate DNS server IP addresses 15. The storage medium of claim 13, additionally performing the step of discarding the packet, if the destination address of the packet does not refer to a legitimate DNS server. 16. The storage medium of claim 13, additionally performing the step of modifying the destination address of the packet to denote a legitimate DNS Server, if the original destination address does not denote a legitimate DNS server. | 2,400 |
8,999 | 8,999 | 14,962,814 | 2,482 | A system for providing improved video quality and compression efficiency during encoding by detecting video segments having film grain approaching the “Red Lady” problem. The system detects when film grain approaches the level of the “Red Lady” problem by measuring frame-by-frame temporal differences (ME scores). From the ME scores, two key indicators are identified: (1) The average temporal difference in frames with an intermediate motion level higher than frames of non-noisy video; and (2) The fluctuation of the temporal differences between frames in a group is very small. When these indicators identify a high film video, a signal is provided to an encoder which allocates less bits to I frames and more bits to P and B frames than for other frames of video without comparable film grain. | 1. A method for encoding video comprising:
obtaining video frames provided to an encoder; obtaining motion estimation (ME) data for the video frames; calculating a ME score for the video frames; comparing the ME score with a threshold; calculating the value of a metric from a temporal variability of the ME score; comparing the temporal variability metric with a predetermined value; and providing a high film grain indication signal to the encoder indicating a particular segment of the video frames contains high film grain when the ME score exceeds a threshold and the ME score temporal variability metric is below a predetermined level. 2. The method of claim 1, wherein when the high film grain signal is provided, the encoder allocates less bits to I frames and more bits to P and B type frames than to other frames of the video. 3. The method of claim 1, wherein when the high film grain indication is not provided, the encoder allocates more bits to the I frame than when the high film grain indication is provided. 4. The method of claim 1, wherein the ME score threshold is greater than 20. 5. An apparatus to encode video frames, the apparatus comprising:
an encoder having a first input for receiving video frames to be processed and a second input for receiving parameter data to enable the encoder to allocate bits for frames for encoding; a frame buffer having an input receiving the video frames and an output providing the first input to the encoder; a preprocessor for receiving the video frames and having an output providing the second input to the controller; a preprocessor memory connected to the processor for storing code that is executable by the preprocessor to determine the parameter data to enable the encoder to allocate bits, the code causing the preprocessor to perform the following steps;
obtaining motion estimation (ME) data for the video frames;
calculating a ME score for the video frames;
comparing the ME score with a threshold;
calculating the value of a metric from a temporal variability of the ME score;
comparing the temporal variability metric with a predetermined value; and
providing a high film grain indication signal to the encoder indicating a particular segment contains high film grain when the ME score exceeds a threshold and the ME score temporal variability metric is below a predetermined level. 6. The apparatus of claim 5, wherein when the high film grain signal is provided, the encoder allocates less bits to I frames and more bits to P and B type frames than to other frames of the video. 7. The apparatus of claim 5, wherein when the high film grain indication is not provided, the encoder allocates more bits to the I frame than when the high film grain indication is provided. 8. The apparatus of claim 5, wherein the ME score threshold is greater than 20. | A system for providing improved video quality and compression efficiency during encoding by detecting video segments having film grain approaching the “Red Lady” problem. The system detects when film grain approaches the level of the “Red Lady” problem by measuring frame-by-frame temporal differences (ME scores). From the ME scores, two key indicators are identified: (1) The average temporal difference in frames with an intermediate motion level higher than frames of non-noisy video; and (2) The fluctuation of the temporal differences between frames in a group is very small. When these indicators identify a high film video, a signal is provided to an encoder which allocates less bits to I frames and more bits to P and B frames than for other frames of video without comparable film grain.1. A method for encoding video comprising:
obtaining video frames provided to an encoder; obtaining motion estimation (ME) data for the video frames; calculating a ME score for the video frames; comparing the ME score with a threshold; calculating the value of a metric from a temporal variability of the ME score; comparing the temporal variability metric with a predetermined value; and providing a high film grain indication signal to the encoder indicating a particular segment of the video frames contains high film grain when the ME score exceeds a threshold and the ME score temporal variability metric is below a predetermined level. 2. The method of claim 1, wherein when the high film grain signal is provided, the encoder allocates less bits to I frames and more bits to P and B type frames than to other frames of the video. 3. The method of claim 1, wherein when the high film grain indication is not provided, the encoder allocates more bits to the I frame than when the high film grain indication is provided. 4. The method of claim 1, wherein the ME score threshold is greater than 20. 5. An apparatus to encode video frames, the apparatus comprising:
an encoder having a first input for receiving video frames to be processed and a second input for receiving parameter data to enable the encoder to allocate bits for frames for encoding; a frame buffer having an input receiving the video frames and an output providing the first input to the encoder; a preprocessor for receiving the video frames and having an output providing the second input to the controller; a preprocessor memory connected to the processor for storing code that is executable by the preprocessor to determine the parameter data to enable the encoder to allocate bits, the code causing the preprocessor to perform the following steps;
obtaining motion estimation (ME) data for the video frames;
calculating a ME score for the video frames;
comparing the ME score with a threshold;
calculating the value of a metric from a temporal variability of the ME score;
comparing the temporal variability metric with a predetermined value; and
providing a high film grain indication signal to the encoder indicating a particular segment contains high film grain when the ME score exceeds a threshold and the ME score temporal variability metric is below a predetermined level. 6. The apparatus of claim 5, wherein when the high film grain signal is provided, the encoder allocates less bits to I frames and more bits to P and B type frames than to other frames of the video. 7. The apparatus of claim 5, wherein when the high film grain indication is not provided, the encoder allocates more bits to the I frame than when the high film grain indication is provided. 8. The apparatus of claim 5, wherein the ME score threshold is greater than 20. | 2,400 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.