Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
9,000
9,000
16,203,326
2,485
Systems, methods, and devices for scene change detection and image encoding. A sequence of image frames is input. For a first image frame of the sequence, a first total sum of absolute transformed differences (SATD) is calculated. For a second frame of the sequence, a second total SATD is calculated. An absolute difference between the first total SATD and the second total SATD is calculated. If the absolute difference meets or exceeds a threshold, the second frame and a third frame of the sequence subsequent to the second frame are encoded based on a scene change, and the second frame and the third frame are transmitted. If the absolute difference does not meet or exceed the threshold, the second frame is encoded based on a same scene and the second frame is transmitted.
1. A method for scene detection and image encoding using a processor, the method comprising: inputting a sequence of image frames to the processor; calculating, in the processor, for a first image frame of the sequence, a first total sum of absolute transformed differences (SATD); calculating, in the processor, for a second frame of the sequence, a second total SATD; calculating, in the processor, an absolute difference between the first total SATD and the second total SATD; if the absolute difference meets or exceeds a threshold: encoding, in the processor, the second frame and a third frame of the sequence subsequent to the second frame based on a scene change, and transmitting the second frame and the third frame; and if the absolute difference does not meet or exceed the threshold: encoding, in the processor, the second frame based on a same scene and transmitting the second frame. 2. The method of claim 1, wherein encoding the second frame based on a scene change comprises encoding the second frame as a skip frame. 3. The method of claim 1, wherein encoding the third frame based on a scene change comprises encoding the third frame as an intra-coded frame. 4. The method of claim 1, wherein encoding the third frame based on a scene change comprises encoding the third frame as an instantaneous decoder-refresh (IDR) frame. 5. The method of claim 1, wherein encoding the second frame based on the same scene comprises encoding the second frame as an inter-coded frame. 6. The method of claim 1, wherein encoding the second frame based on the same scene comprises encoding the second frame as an intra-coded frame or an inter-coded frame selectively based on performance. 7. The method of claim 1, wherein the first frame comprises a plurality of macroblocks, and the first total SATD is calculated by calculating a SATD for each macroblock and summing the macroblock SATDs. 8. The method of claim 1, wherein if the absolute difference does not meet or exceed the threshold, updating the threshold as TH = TH × ( N - 1 ) + D N N . , where: TH is the threshold, N is a sequence number of the current frame, and DN is the absolute difference between the first total SATD and the second total SATD. 9. The method of claim 1, wherein if the absolute difference meets or exceeds the threshold, updating the threshold to equal an absolute value of the difference between the second frame total SATD and the first frame total SATD. 10. The method of claim 1, wherein the threshold is weighted by a programmable constant. 11. A processor configured for scene change detection and image, comprising: circuitry configured to input a sequence of image frames; circuitry configured to calculate, for a first frame of the sequence, a first total sum of absolute transformed differences (SATD); circuitry configured to calculate, for a second frame of the sequence, a second total SATD; circuitry configured to calculate an absolute difference between the first total SATD and the second total SATD; circuitry configured to, if the absolute difference meets or exceeds a threshold: encode the second frame and a third frame of the sequence subsequent to the second frame based on a scene change and transmit the second frame and the third frame; and if the absolute difference does not meet or exceed the threshold: encode the second frame based on a same scene and transmit the second frame. 12. The processor of claim 11, wherein encoding the second frame based on a scene change comprises encoding the second frame as a skip frame. 13. The processor of claim 11, wherein encoding the third frame based on a scene change comprises encoding the third frame as an intra-coded frame. 14. The processor of claim 11, wherein encoding the third frame based on a scene change comprises encoding the third frame as an instantaneous decoder-refresh (IDR) frame. 15. The processor of claim 11, wherein encoding the second frame based on the same scene comprises encoding the second frame as an inter-coded frame. 16. The processor of claim 11, wherein encoding the second frame based on the same scene comprises encoding the second frame as an intra-coded frame or an inter-coded frame selectively based on performance. 17. The processor of claim 11, wherein the first frame comprises a plurality of macroblocks, and the first total SATD is calculated by calculating a SATD for each macroblock and summing the macroblock SATDs. 18. The processor of claim 11, wherein if the absolute difference does not meet or exceed the threshold, updating the threshold as TH = TH × ( N - 1 ) + D N N , where: TH is the threshold, N is a sequence number of the current frame, and DN is the absolute difference between the first total SATD and the second total SATD. 19. The processor of claim 11, wherein if the absolute difference meets or exceeds the threshold, updating the threshold to equal an absolute value of the difference between the second frame total SATD and the first frame total SATD. 20. The processor of claim 11, wherein the threshold is weighted by a programmable constant.
Systems, methods, and devices for scene change detection and image encoding. A sequence of image frames is input. For a first image frame of the sequence, a first total sum of absolute transformed differences (SATD) is calculated. For a second frame of the sequence, a second total SATD is calculated. An absolute difference between the first total SATD and the second total SATD is calculated. If the absolute difference meets or exceeds a threshold, the second frame and a third frame of the sequence subsequent to the second frame are encoded based on a scene change, and the second frame and the third frame are transmitted. If the absolute difference does not meet or exceed the threshold, the second frame is encoded based on a same scene and the second frame is transmitted.1. A method for scene detection and image encoding using a processor, the method comprising: inputting a sequence of image frames to the processor; calculating, in the processor, for a first image frame of the sequence, a first total sum of absolute transformed differences (SATD); calculating, in the processor, for a second frame of the sequence, a second total SATD; calculating, in the processor, an absolute difference between the first total SATD and the second total SATD; if the absolute difference meets or exceeds a threshold: encoding, in the processor, the second frame and a third frame of the sequence subsequent to the second frame based on a scene change, and transmitting the second frame and the third frame; and if the absolute difference does not meet or exceed the threshold: encoding, in the processor, the second frame based on a same scene and transmitting the second frame. 2. The method of claim 1, wherein encoding the second frame based on a scene change comprises encoding the second frame as a skip frame. 3. The method of claim 1, wherein encoding the third frame based on a scene change comprises encoding the third frame as an intra-coded frame. 4. The method of claim 1, wherein encoding the third frame based on a scene change comprises encoding the third frame as an instantaneous decoder-refresh (IDR) frame. 5. The method of claim 1, wherein encoding the second frame based on the same scene comprises encoding the second frame as an inter-coded frame. 6. The method of claim 1, wherein encoding the second frame based on the same scene comprises encoding the second frame as an intra-coded frame or an inter-coded frame selectively based on performance. 7. The method of claim 1, wherein the first frame comprises a plurality of macroblocks, and the first total SATD is calculated by calculating a SATD for each macroblock and summing the macroblock SATDs. 8. The method of claim 1, wherein if the absolute difference does not meet or exceed the threshold, updating the threshold as TH = TH × ( N - 1 ) + D N N . , where: TH is the threshold, N is a sequence number of the current frame, and DN is the absolute difference between the first total SATD and the second total SATD. 9. The method of claim 1, wherein if the absolute difference meets or exceeds the threshold, updating the threshold to equal an absolute value of the difference between the second frame total SATD and the first frame total SATD. 10. The method of claim 1, wherein the threshold is weighted by a programmable constant. 11. A processor configured for scene change detection and image, comprising: circuitry configured to input a sequence of image frames; circuitry configured to calculate, for a first frame of the sequence, a first total sum of absolute transformed differences (SATD); circuitry configured to calculate, for a second frame of the sequence, a second total SATD; circuitry configured to calculate an absolute difference between the first total SATD and the second total SATD; circuitry configured to, if the absolute difference meets or exceeds a threshold: encode the second frame and a third frame of the sequence subsequent to the second frame based on a scene change and transmit the second frame and the third frame; and if the absolute difference does not meet or exceed the threshold: encode the second frame based on a same scene and transmit the second frame. 12. The processor of claim 11, wherein encoding the second frame based on a scene change comprises encoding the second frame as a skip frame. 13. The processor of claim 11, wherein encoding the third frame based on a scene change comprises encoding the third frame as an intra-coded frame. 14. The processor of claim 11, wherein encoding the third frame based on a scene change comprises encoding the third frame as an instantaneous decoder-refresh (IDR) frame. 15. The processor of claim 11, wherein encoding the second frame based on the same scene comprises encoding the second frame as an inter-coded frame. 16. The processor of claim 11, wherein encoding the second frame based on the same scene comprises encoding the second frame as an intra-coded frame or an inter-coded frame selectively based on performance. 17. The processor of claim 11, wherein the first frame comprises a plurality of macroblocks, and the first total SATD is calculated by calculating a SATD for each macroblock and summing the macroblock SATDs. 18. The processor of claim 11, wherein if the absolute difference does not meet or exceed the threshold, updating the threshold as TH = TH × ( N - 1 ) + D N N , where: TH is the threshold, N is a sequence number of the current frame, and DN is the absolute difference between the first total SATD and the second total SATD. 19. The processor of claim 11, wherein if the absolute difference meets or exceeds the threshold, updating the threshold to equal an absolute value of the difference between the second frame total SATD and the first frame total SATD. 20. The processor of claim 11, wherein the threshold is weighted by a programmable constant.
2,400
9,001
9,001
15,887,662
2,425
Disclosed are systems and methods for selecting images using motion data. Video data and motion metadata can be received from a camera. A frame in the video data can be selected using the motion metadata. An image can be generated using the selected frame. A user interface comprising an element based on the image can be generated.
1. A method comprising: receiving video data and motion metadata, wherein the video data comprises a plurality of frames; determining, based on the motion metadata, a frame of the plurality of frames associated with the video data and associated with a highest degree of motion; generating a user interface comprising the frame associated with the video data; and causing output of the user interface. 2. The method of claim 1, wherein generating the user interface comprising the frame comprises generating the user interface comprising a selectable element indicating the frame. 3. The method of claim 2, further comprising: receiving, from a user device, a selection of the selectable element; and transmitting, to the user device, the video data. 4. The method of claim 1, wherein receiving the video data and the motion metadata comprises receiving, from a camera, the video data and the motion metadata, wherein the camera is configured to generate the video data and the motion metadata. 5. The method of claim 1, wherein determining the frame comprises determining the frame as having a highest degree of pixel change. 6. The method of claim 5, wherein determining the frame as having the highest degree of pixel change comprises: determining a first frame of the plurality of frames; determining, for a plurality of second frames in the plurality of frames, a respective background subtraction differential relative to the first frame; and determining, the frame as having the highest degree of pixel change, one of the plurality of second frames having a highest respective background subtraction differential. 7. The method of claim 6, wherein the method further comprises: determining, based on the motion metadata, a portion of the video data having a highest number of pixels changed; and wherein the first frame and the plurality of second frames are included in the portion of the video having a highest number of pixels changed. 8. The method of claim 1, wherein the motion metadata comprises at least one header associated with the video data. 9. A method comprising: receiving, from a camera, video data and motion metadata, wherein the video data comprises a plurality of frames; determining, based on the motion metadata, a frame of the plurality of frames; generating a user interface comprising a an element that indicates the frame; receiving, from a user device, a selection of the element; and transmitting the video data to the user device. 10. The method of claim 9, further comprising transmitting, in response to the selection of the element, additional video data occurring subsequent to the video data. 11. The method of claim 9, wherein the motion metadata comprises one or more headers associated with the video data. 12. The method of claim 11, wherein the one or more headers comprise one or more Hypertext Transfer Protocol (HTTP) headers associated with the video data. 13. The method of claim 9, wherein the motion metadata comprises a plurality of bytes, wherein each byte of the plurality of bytes corresponds to a respective second of the video data. 14. The method of claim 13, wherein each byte of the plurality of bytes describes an amount of pixels changed in the respective second of the video data. 15. The method of claim 9, wherein the motion metadata describes, for each frame in the plurality of frames, an amount of pixels changed relative to a preceding frame. 16. The method of claim 9, wherein determining the frame comprises determining, based on the motion metadata, the frame as corresponding to a period of highest motion in the video data. 17. The method of claim 9, wherein the frame is a first frame, the element is a first element, and the method further comprises: receiving, from the camera, second video data and second motion metadata, wherein the second video data comprises a second plurality of frames; determining, based on the second motion metadata, a second frame of the second plurality of frames; and updating the user interface to comprise the first element and a second element indicating the second frame. 18. A system comprising: a camera configured to at least: encode video data comprising a plurality of frames; determine, for the video data, motion metadata; transmit, to at least one computing device, the video data and motion metadata; and the at least one computing device, configured to at least: receive the video data and the motion metadata; determine, based on the motion metadata, a frame the plurality of frames associated with a highest degree of motion; and generate a user interface comprising an element indicating the frame. 19. The system of claim 18, wherein the motion metadata comprises one or more headers associated with the video data. 20. The system of claim 18, wherein the motion metadata comprises a plurality of bytes, wherein each byte of the plurality of bytes corresponds to a respective second of the video data, and wherein each byte of the plurality of bytes describes an amount of pixels changed in the respective second of the video data.
Disclosed are systems and methods for selecting images using motion data. Video data and motion metadata can be received from a camera. A frame in the video data can be selected using the motion metadata. An image can be generated using the selected frame. A user interface comprising an element based on the image can be generated.1. A method comprising: receiving video data and motion metadata, wherein the video data comprises a plurality of frames; determining, based on the motion metadata, a frame of the plurality of frames associated with the video data and associated with a highest degree of motion; generating a user interface comprising the frame associated with the video data; and causing output of the user interface. 2. The method of claim 1, wherein generating the user interface comprising the frame comprises generating the user interface comprising a selectable element indicating the frame. 3. The method of claim 2, further comprising: receiving, from a user device, a selection of the selectable element; and transmitting, to the user device, the video data. 4. The method of claim 1, wherein receiving the video data and the motion metadata comprises receiving, from a camera, the video data and the motion metadata, wherein the camera is configured to generate the video data and the motion metadata. 5. The method of claim 1, wherein determining the frame comprises determining the frame as having a highest degree of pixel change. 6. The method of claim 5, wherein determining the frame as having the highest degree of pixel change comprises: determining a first frame of the plurality of frames; determining, for a plurality of second frames in the plurality of frames, a respective background subtraction differential relative to the first frame; and determining, the frame as having the highest degree of pixel change, one of the plurality of second frames having a highest respective background subtraction differential. 7. The method of claim 6, wherein the method further comprises: determining, based on the motion metadata, a portion of the video data having a highest number of pixels changed; and wherein the first frame and the plurality of second frames are included in the portion of the video having a highest number of pixels changed. 8. The method of claim 1, wherein the motion metadata comprises at least one header associated with the video data. 9. A method comprising: receiving, from a camera, video data and motion metadata, wherein the video data comprises a plurality of frames; determining, based on the motion metadata, a frame of the plurality of frames; generating a user interface comprising a an element that indicates the frame; receiving, from a user device, a selection of the element; and transmitting the video data to the user device. 10. The method of claim 9, further comprising transmitting, in response to the selection of the element, additional video data occurring subsequent to the video data. 11. The method of claim 9, wherein the motion metadata comprises one or more headers associated with the video data. 12. The method of claim 11, wherein the one or more headers comprise one or more Hypertext Transfer Protocol (HTTP) headers associated with the video data. 13. The method of claim 9, wherein the motion metadata comprises a plurality of bytes, wherein each byte of the plurality of bytes corresponds to a respective second of the video data. 14. The method of claim 13, wherein each byte of the plurality of bytes describes an amount of pixels changed in the respective second of the video data. 15. The method of claim 9, wherein the motion metadata describes, for each frame in the plurality of frames, an amount of pixels changed relative to a preceding frame. 16. The method of claim 9, wherein determining the frame comprises determining, based on the motion metadata, the frame as corresponding to a period of highest motion in the video data. 17. The method of claim 9, wherein the frame is a first frame, the element is a first element, and the method further comprises: receiving, from the camera, second video data and second motion metadata, wherein the second video data comprises a second plurality of frames; determining, based on the second motion metadata, a second frame of the second plurality of frames; and updating the user interface to comprise the first element and a second element indicating the second frame. 18. A system comprising: a camera configured to at least: encode video data comprising a plurality of frames; determine, for the video data, motion metadata; transmit, to at least one computing device, the video data and motion metadata; and the at least one computing device, configured to at least: receive the video data and the motion metadata; determine, based on the motion metadata, a frame the plurality of frames associated with a highest degree of motion; and generate a user interface comprising an element indicating the frame. 19. The system of claim 18, wherein the motion metadata comprises one or more headers associated with the video data. 20. The system of claim 18, wherein the motion metadata comprises a plurality of bytes, wherein each byte of the plurality of bytes corresponds to a respective second of the video data, and wherein each byte of the plurality of bytes describes an amount of pixels changed in the respective second of the video data.
2,400
9,002
9,002
15,762,022
2,466
The disclosure relates to a method in a cellular communications network, and apparatus for performing the method, the method including analyzing block error rate data to determine a number of block error rate events, the block error rate data relating to a connection between a User Equipment (UE) and a first base station in a cellular communications network and the block error rate event being an instance of the block error rate exceeding a first threshold value; determining whether the number of block error rate events in a predetermined time period exceeds a second threshold value; and, if so, performing a physical cell identifier conflict resolution operation
1. A method in a cellular communications network, the method comprising: analyzing block error rate data to determine a plurality of block error rate events, the block error rate data relating to a connection between a User Equipment (UE) and a first base station in a cellular communications network, and each block error rate event of the plurality of block error rate events being an instance of a block error rate exceeding a first threshold value; determining whether a count of the plurality of block error rate events in a predetermined time period exceeds a second threshold value; and, if so, performing a physical cell identifier conflict resolution operation. 2. The method as claimed in claim 1, further comprising: receiving signal quality data relating to a quality of signals received at the UE, wherein each block error rate event is an instance of the block error rate exceeding the first threshold value when the quality of signals received at the UE is above a third threshold value. 3. The method as claimed in claim 2, further comprising: analyzing the block error rate data to determine a periodicity of the plurality of block error rate events. 4. The method as claimed in claim 3, further comprising: monitoring a data rate between the UE and the first base station; and analyzing the block error rate data and data rate data to determine the periodicity of the plurality of block error rate events. 5. The method as claimed in claim 2, wherein the block error rate data relates to a plurality of connections between a plurality of UEs and the first base station; the signal quality data relates to the quality of signals received by a plurality of UEs; and the data rate data relates to the data rate between a plurality of UEs and the first base station. 6. The method as claimed in claim 1, wherein the cellular communications network includes a second base station, and the first base station and the second base station are periodically synchronized. 7. A non-transitory computer-readable storage medium storing a computer program or suite of computer programs which upon execution by a computer system performs the method of claim 1. 8. An apparatus in a cellular communications network comprising, a processor adapted to: analyze block error rate data to determine a plurality of block error rate events, the block error rate data relating to a block error rate between a User Equipment (UE) and a first base station in the cellular communications network, and each block error rate event of the plurality of block error rate events being an instance of the block error rate exceeding a first threshold value; determine whether a count of the plurality of block error rate events in a predetermined time period exceeds a second threshold value; and, if so, initiate a physical cell identifier conflict resolution operation. 9. The apparatus as claimed in claim 8, further comprising a receiver, wherein the receiver is adapted to receive signal quality data relating to a quality of signals between the UE and the first base station, wherein each block error rate event is an instance of the block error rate exceeding the first threshold value when the quality of signals received at the UE is above a third threshold value. 10. The apparatus as claimed in claim 9, wherein the processor is further adapted to analyze the block error rate data to determine a periodicity of the plurality of block error rate events. 11. The apparatus as claimed in claim 10, wherein the processor is further adapted to monitor a data rate between the first base station and the UE, and to analyze the block error rate data and data rate data to determine the periodicity of the plurality of block error rate events. 12. The apparatus as claimed in claim 11, wherein the block error rate data relates to a plurality of connections between a plurality of UEs and the first base station; the signal quality data relates to the quality of signals received by a plurality of UEs; and the data rate data relates to the data rate between a plurality of UEs and the first base station. 13. The apparatus as claimed in claim 8 wherein the apparatus is one of the first base station, another base station in the cellular communications network, the UE, or a remote node. 14. A cellular communications network including the apparatus of claim 8.
The disclosure relates to a method in a cellular communications network, and apparatus for performing the method, the method including analyzing block error rate data to determine a number of block error rate events, the block error rate data relating to a connection between a User Equipment (UE) and a first base station in a cellular communications network and the block error rate event being an instance of the block error rate exceeding a first threshold value; determining whether the number of block error rate events in a predetermined time period exceeds a second threshold value; and, if so, performing a physical cell identifier conflict resolution operation1. A method in a cellular communications network, the method comprising: analyzing block error rate data to determine a plurality of block error rate events, the block error rate data relating to a connection between a User Equipment (UE) and a first base station in a cellular communications network, and each block error rate event of the plurality of block error rate events being an instance of a block error rate exceeding a first threshold value; determining whether a count of the plurality of block error rate events in a predetermined time period exceeds a second threshold value; and, if so, performing a physical cell identifier conflict resolution operation. 2. The method as claimed in claim 1, further comprising: receiving signal quality data relating to a quality of signals received at the UE, wherein each block error rate event is an instance of the block error rate exceeding the first threshold value when the quality of signals received at the UE is above a third threshold value. 3. The method as claimed in claim 2, further comprising: analyzing the block error rate data to determine a periodicity of the plurality of block error rate events. 4. The method as claimed in claim 3, further comprising: monitoring a data rate between the UE and the first base station; and analyzing the block error rate data and data rate data to determine the periodicity of the plurality of block error rate events. 5. The method as claimed in claim 2, wherein the block error rate data relates to a plurality of connections between a plurality of UEs and the first base station; the signal quality data relates to the quality of signals received by a plurality of UEs; and the data rate data relates to the data rate between a plurality of UEs and the first base station. 6. The method as claimed in claim 1, wherein the cellular communications network includes a second base station, and the first base station and the second base station are periodically synchronized. 7. A non-transitory computer-readable storage medium storing a computer program or suite of computer programs which upon execution by a computer system performs the method of claim 1. 8. An apparatus in a cellular communications network comprising, a processor adapted to: analyze block error rate data to determine a plurality of block error rate events, the block error rate data relating to a block error rate between a User Equipment (UE) and a first base station in the cellular communications network, and each block error rate event of the plurality of block error rate events being an instance of the block error rate exceeding a first threshold value; determine whether a count of the plurality of block error rate events in a predetermined time period exceeds a second threshold value; and, if so, initiate a physical cell identifier conflict resolution operation. 9. The apparatus as claimed in claim 8, further comprising a receiver, wherein the receiver is adapted to receive signal quality data relating to a quality of signals between the UE and the first base station, wherein each block error rate event is an instance of the block error rate exceeding the first threshold value when the quality of signals received at the UE is above a third threshold value. 10. The apparatus as claimed in claim 9, wherein the processor is further adapted to analyze the block error rate data to determine a periodicity of the plurality of block error rate events. 11. The apparatus as claimed in claim 10, wherein the processor is further adapted to monitor a data rate between the first base station and the UE, and to analyze the block error rate data and data rate data to determine the periodicity of the plurality of block error rate events. 12. The apparatus as claimed in claim 11, wherein the block error rate data relates to a plurality of connections between a plurality of UEs and the first base station; the signal quality data relates to the quality of signals received by a plurality of UEs; and the data rate data relates to the data rate between a plurality of UEs and the first base station. 13. The apparatus as claimed in claim 8 wherein the apparatus is one of the first base station, another base station in the cellular communications network, the UE, or a remote node. 14. A cellular communications network including the apparatus of claim 8.
2,400
9,003
9,003
16,158,433
2,435
A retail environment having retail terminals with data entry point devices selectively encrypts input received by the data entry point devices and passes the encrypted data to a security module. The selective encryption is based on whether or not sensitive or confidential information, such as a personal identification number (PIN) associated with a debit card, is being input. To prevent hacking of the software of the retail terminal, content destined for display on the retail terminal is authenticated prior to display. In this manner, the retail terminal may be assured that confidential information is input only when desired, and thus may be encrypted only as needed.
1. A fuel dispenser, comprising: a user interface comprising a display and one or more data entry point devices configured to receive information from a user; and a control system configured to: determine whether content to be presented on the display of the fuel dispenser requests confidential information; authenticate the content to be presented on the display during execution of the application but before being displayed by comparing indicia associated with the content to a secure copy of the indicia; present the content on the display if the content is authenticated; and if the content requests confidential information, encrypt data received from one or more data entry point devices for transmission to a location separate from the fuel dispenser. 2. The fuel dispenser of claim 1, further comprising at least one fuel delivery component and wherein the control system is further configured to control a delivery of fuel to the user through the at least one fuel delivery component. 3. The fuel dispenser of claim 1, wherein the control system is configured to transmit the data received from the one or more data entry point devices as unencrypted if the information requested is not confidential information. 4. The fuel dispenser of claim 1, wherein the control system is configured to determine whether the content requests a personal identification number (PIN). 5. The fuel dispenser of claim 1, wherein the indicia associated with the content comprises a digital signature. 6. The fuel dispenser of claim 1, wherein the control system is configured to disable the one or more data entry point devices when the content cannot be authenticated. 7. The fuel dispenser of claim 1, wherein the control system enables at least one of the one or more data entry point devices when the content is authenticated.
A retail environment having retail terminals with data entry point devices selectively encrypts input received by the data entry point devices and passes the encrypted data to a security module. The selective encryption is based on whether or not sensitive or confidential information, such as a personal identification number (PIN) associated with a debit card, is being input. To prevent hacking of the software of the retail terminal, content destined for display on the retail terminal is authenticated prior to display. In this manner, the retail terminal may be assured that confidential information is input only when desired, and thus may be encrypted only as needed.1. A fuel dispenser, comprising: a user interface comprising a display and one or more data entry point devices configured to receive information from a user; and a control system configured to: determine whether content to be presented on the display of the fuel dispenser requests confidential information; authenticate the content to be presented on the display during execution of the application but before being displayed by comparing indicia associated with the content to a secure copy of the indicia; present the content on the display if the content is authenticated; and if the content requests confidential information, encrypt data received from one or more data entry point devices for transmission to a location separate from the fuel dispenser. 2. The fuel dispenser of claim 1, further comprising at least one fuel delivery component and wherein the control system is further configured to control a delivery of fuel to the user through the at least one fuel delivery component. 3. The fuel dispenser of claim 1, wherein the control system is configured to transmit the data received from the one or more data entry point devices as unencrypted if the information requested is not confidential information. 4. The fuel dispenser of claim 1, wherein the control system is configured to determine whether the content requests a personal identification number (PIN). 5. The fuel dispenser of claim 1, wherein the indicia associated with the content comprises a digital signature. 6. The fuel dispenser of claim 1, wherein the control system is configured to disable the one or more data entry point devices when the content cannot be authenticated. 7. The fuel dispenser of claim 1, wherein the control system enables at least one of the one or more data entry point devices when the content is authenticated.
2,400
9,004
9,004
16,711,604
2,473
Distributing indications of emergency messages via Wi-Fi. A cellular device may temporarily disable its cellular modem. The cellular device may receive an indication over Wi-Fi that an emergency message has been broadcast. In response, the cellular device may activate its cellular modem and retrieve the emergency message via a cellular network.
1. An accessory wireless device, comprising: a radio, comprising one or more antennas configured for wireless communication; a cellular modem operably coupled to the radio; and a processor operably coupled to the cellular modem, wherein the cellular modem and the processor are configured to: establish peer-to-peer communication with a companion wireless device, wherein the companion device is in communication with a wireless cellular network and the cellular modem is not in communication with the wireless cellular network; and receive, over the peer-to-peer communication from the companion wireless device, an emergency alert or an indication of the emergency alert when the wireless cellular network broadcasts emergency information, wherein the emergency alert or the indication of the emergency alert is received over the peer-to-peer communication while the cellular modem is not in communication with the wireless cellular network. 2. The accessory wireless device of claim 1, wherein when the indication of the emergency alert is received over the peer-to-peer communication, the cellular modem and the processor are further configured to: activate the cellular modem to connect to the wireless cellular network; and retrieve the emergency alert over the wireless cellular network. 3. The accessory wireless device of claim 1, wherein the cellular modem is not in communication with the wireless cellular network due to the cellular modem being turned off or temporarily disabled. 4. The accessory wireless device of claim 1, wherein the cellular modem is not in communication with the wireless cellular network due to the accessory wireless device being out of radio coverage of the wireless cellular network. 5. The accessory wireless device of claim 1, wherein the cellular modem and the processor are further configured to determine that the companion wireless device is trusted, wherein the emergency alert is received over the peer-to-peer communication from the companion wireless device. 6. The accessory wireless device of claim 1, wherein the peer-to-peer communication includes Bluetooth. 7. The accessory wireless device of claim 1, wherein the peer-to-peer communication includes a wireless local area network. 8. An apparatus for operating a first wireless device, the apparatus comprising: a processor configured to cause the first wireless device to: establish peer-to-peer communication with a companion wireless device, wherein the companion device is in communication with a wireless cellular network and the first wireless device is not in communication with the wireless cellular network; and receive, over the peer-to-peer communication from the companion wireless device, an emergency alert or an indication of the emergency alert when the wireless cellular network broadcasts the emergency alert, wherein the emergency alert or the indication of the emergency alert is received over the peer-to-peer communication while the first wireless device is not in communication with the wireless cellular network. 9. The apparatus of claim 8, wherein when the indication of the emergency alert is received over the peer-to-peer communication, the processor is further configured to cause the first wireless device to: activate a baseband layer of the first wireless device to connect to the wireless cellular network; and retrieve the emergency alert over the wireless cellular network. 10. The apparatus of claim 8, wherein the first wireless device is not in communication with the wireless cellular network due to a baseband layer of the first wireless device being turned off or temporarily disabled. 11. The apparatus of claim 8, wherein the first wireless device is not in communication with the wireless cellular network due to the first wireless device being out of radio coverage of the wireless cellular network. 12. The apparatus of claim 8, wherein the processor is further configured to cause the first wireless device to determine that the companion wireless device is trusted, wherein the emergency alert is received over the peer-to-peer communication from the companion wireless device. 13. An apparatus for operating a companion wireless device, the apparatus comprising: a processor configured to cause the companion wireless device to: establish communication with a cellular wireless network; establish peer-to-peer communication with an accessory wireless device, wherein the accessory wireless device is not in communication with the wireless cellular network; receive, from the wireless cellular network, an emergency alert; and provide, to the accessory wireless device, over the peer-to-peer communication, the emergency alert or an indication of the emergency, wherein the emergency alert or the indication of the emergency alert is provided over the peer-to-peer communication while the accessory wireless device is not in communication with the wireless cellular network. 14. The apparatus of claim 13, wherein the peer-to-peer communication includes a wireless local area network. 15. The apparatus of claim 13, wherein the peer-to-peer communication includes Bluetooth. 16. The apparatus of claim 13, wherein the accessory wireless device is not in communication with the wireless cellular network due to a baseband layer of the accessory wireless device being turned off or temporarily disabled. 17. The apparatus of claim 13, wherein the accessory wireless device is not in communication with the wireless cellular network due to the accessory wireless device being out of radio coverage of the wireless cellular network. 18. The apparatus of claim 13, wherein the indication of the emergency alert is provided via crowd sourcing 19. The apparatus of claim 13, wherein the indication of the emergency alert is also provided to a third wireless device. 20. The apparatus of claim 13, wherein the companion wireless device is verified by the accessory wireless device, wherein, in response to the companion wireless device being verified by the accessory wireless device, the emergency alert is provided to the accessory wireless device.
Distributing indications of emergency messages via Wi-Fi. A cellular device may temporarily disable its cellular modem. The cellular device may receive an indication over Wi-Fi that an emergency message has been broadcast. In response, the cellular device may activate its cellular modem and retrieve the emergency message via a cellular network.1. An accessory wireless device, comprising: a radio, comprising one or more antennas configured for wireless communication; a cellular modem operably coupled to the radio; and a processor operably coupled to the cellular modem, wherein the cellular modem and the processor are configured to: establish peer-to-peer communication with a companion wireless device, wherein the companion device is in communication with a wireless cellular network and the cellular modem is not in communication with the wireless cellular network; and receive, over the peer-to-peer communication from the companion wireless device, an emergency alert or an indication of the emergency alert when the wireless cellular network broadcasts emergency information, wherein the emergency alert or the indication of the emergency alert is received over the peer-to-peer communication while the cellular modem is not in communication with the wireless cellular network. 2. The accessory wireless device of claim 1, wherein when the indication of the emergency alert is received over the peer-to-peer communication, the cellular modem and the processor are further configured to: activate the cellular modem to connect to the wireless cellular network; and retrieve the emergency alert over the wireless cellular network. 3. The accessory wireless device of claim 1, wherein the cellular modem is not in communication with the wireless cellular network due to the cellular modem being turned off or temporarily disabled. 4. The accessory wireless device of claim 1, wherein the cellular modem is not in communication with the wireless cellular network due to the accessory wireless device being out of radio coverage of the wireless cellular network. 5. The accessory wireless device of claim 1, wherein the cellular modem and the processor are further configured to determine that the companion wireless device is trusted, wherein the emergency alert is received over the peer-to-peer communication from the companion wireless device. 6. The accessory wireless device of claim 1, wherein the peer-to-peer communication includes Bluetooth. 7. The accessory wireless device of claim 1, wherein the peer-to-peer communication includes a wireless local area network. 8. An apparatus for operating a first wireless device, the apparatus comprising: a processor configured to cause the first wireless device to: establish peer-to-peer communication with a companion wireless device, wherein the companion device is in communication with a wireless cellular network and the first wireless device is not in communication with the wireless cellular network; and receive, over the peer-to-peer communication from the companion wireless device, an emergency alert or an indication of the emergency alert when the wireless cellular network broadcasts the emergency alert, wherein the emergency alert or the indication of the emergency alert is received over the peer-to-peer communication while the first wireless device is not in communication with the wireless cellular network. 9. The apparatus of claim 8, wherein when the indication of the emergency alert is received over the peer-to-peer communication, the processor is further configured to cause the first wireless device to: activate a baseband layer of the first wireless device to connect to the wireless cellular network; and retrieve the emergency alert over the wireless cellular network. 10. The apparatus of claim 8, wherein the first wireless device is not in communication with the wireless cellular network due to a baseband layer of the first wireless device being turned off or temporarily disabled. 11. The apparatus of claim 8, wherein the first wireless device is not in communication with the wireless cellular network due to the first wireless device being out of radio coverage of the wireless cellular network. 12. The apparatus of claim 8, wherein the processor is further configured to cause the first wireless device to determine that the companion wireless device is trusted, wherein the emergency alert is received over the peer-to-peer communication from the companion wireless device. 13. An apparatus for operating a companion wireless device, the apparatus comprising: a processor configured to cause the companion wireless device to: establish communication with a cellular wireless network; establish peer-to-peer communication with an accessory wireless device, wherein the accessory wireless device is not in communication with the wireless cellular network; receive, from the wireless cellular network, an emergency alert; and provide, to the accessory wireless device, over the peer-to-peer communication, the emergency alert or an indication of the emergency, wherein the emergency alert or the indication of the emergency alert is provided over the peer-to-peer communication while the accessory wireless device is not in communication with the wireless cellular network. 14. The apparatus of claim 13, wherein the peer-to-peer communication includes a wireless local area network. 15. The apparatus of claim 13, wherein the peer-to-peer communication includes Bluetooth. 16. The apparatus of claim 13, wherein the accessory wireless device is not in communication with the wireless cellular network due to a baseband layer of the accessory wireless device being turned off or temporarily disabled. 17. The apparatus of claim 13, wherein the accessory wireless device is not in communication with the wireless cellular network due to the accessory wireless device being out of radio coverage of the wireless cellular network. 18. The apparatus of claim 13, wherein the indication of the emergency alert is provided via crowd sourcing 19. The apparatus of claim 13, wherein the indication of the emergency alert is also provided to a third wireless device. 20. The apparatus of claim 13, wherein the companion wireless device is verified by the accessory wireless device, wherein, in response to the companion wireless device being verified by the accessory wireless device, the emergency alert is provided to the accessory wireless device.
2,400
9,005
9,005
15,170,437
2,425
A system may selectively deliver interactive portions of a piece of content, based for example on a recipient user's historical tendency to use interactive portions of prior content. Multiple levels of interactivity may be defined for a given piece of content, such as an advertisement, and different users may receive different levels of interactivity based on how much they use interactive features. Some users may receive no interactive features at all, while others may receive the interactive features, and despite the fact that all of the users' devices may be perfectly capable of processing the interactive features for the user. The omission from transmission may conserve bandwidth and transmission resources.
1. A method comprising: monitoring, by one or more computing devices, a level of usage, by a user, of first interactive content that accompanies first content consumed by the user; determining, based at least on the level of usage of the first interactive content, a future level of interactivity; in response to a determination that second content has accompanying second interactive content, and based on the future level of interactivity, determining that the second interactive content should not be transmitted to a user device associated with the user; and transmitting, to the user device associated with the user, the second content without the second interactive content.
A system may selectively deliver interactive portions of a piece of content, based for example on a recipient user's historical tendency to use interactive portions of prior content. Multiple levels of interactivity may be defined for a given piece of content, such as an advertisement, and different users may receive different levels of interactivity based on how much they use interactive features. Some users may receive no interactive features at all, while others may receive the interactive features, and despite the fact that all of the users' devices may be perfectly capable of processing the interactive features for the user. The omission from transmission may conserve bandwidth and transmission resources.1. A method comprising: monitoring, by one or more computing devices, a level of usage, by a user, of first interactive content that accompanies first content consumed by the user; determining, based at least on the level of usage of the first interactive content, a future level of interactivity; in response to a determination that second content has accompanying second interactive content, and based on the future level of interactivity, determining that the second interactive content should not be transmitted to a user device associated with the user; and transmitting, to the user device associated with the user, the second content without the second interactive content.
2,400
9,006
9,006
15,366,677
2,497
Systems, methods, apparatuses, and software for a content delivery network that caches content for delivery to end user devices is presented. In one example, a method includes, for domain name system translation nodes associated with the content delivery network, establishing address translations to translate domain names into network addresses usable by the end user devices for reaching content at the cache nodes, with portions of the network addresses comprising stenographic information. The method also includes providing ones of the network addresses with the stenographic information to the end user devices responsive to domain name translation requests issued by the end user devices. The method also includes, responsive to content requests issued by the end user devices, determining locality information associated with attack traffic directed at the content delivery network based at least on the stenographic information in the network addresses of the content requests.
1. A method of operating a content delivery network (CDN) comprising a plurality of cache nodes that cache content for delivery to end user devices, the method comprising: for domain name system (DNS) translation nodes associated with the CDN, establishing address translations to translate domain names into network addresses usable by the end user devices for reaching content at the cache nodes, with portions of the network addresses comprising stenographic information; providing ones of the network addresses with the stenographic information to the end user devices responsive to domain name translation requests issued by the end user devices; responsive to content requests issued by the end user devices, determining locality information associated with attack traffic directed at the CDN based at least on the stenographic information in the network addresses of the content requests. 2. The method of claim 1, further comprising: mitigating the attack traffic by dropping content requests associated with ones of the content requests issued at locations indicated by the locality information. 3. The method of claim 1, further comprising: for the DNS translation nodes associated with a first location indicated by the locality information, providing first network addresses with first stenographic information comprising one or more actions to be taken by ones of the cache nodes that receive the content requests that include the first network addresses with the first stenographic information. 4. The method of claim 1, further comprising: iterating selected stenographic information among the DNS translation nodes each associated with individual geographic locations; processing the selected stenographic information received in ones of the content requests for each iteration to identify which of the DNS nodes serviced the domain name translation requests for the ones of the content requests received during each iteration; based at least on the individual geographic locations of the DNS translation nodes and the selected stenographic information, determining one or more geographic locations associated with the ones of the content requests received during each iteration; determining the locality information associated with the attack traffic based at least in part on the one or more geographic locations associated with the content requests. 5. The method of claim 1, further comprising: in the cache nodes that receive ones of the content requests associated with the attack traffic, processing the stenographic information included in the network addresses of the content requests to perform an action indicated by the stenographic information. 6. The method of claim 5, wherein the action indicated by the stenographic information comprises at least one of logging of properties associated with the content requests and dropping traffic associated with the content requests. 7. The method of claim 1, further comprising: responsive to ones of the domain name translation requests issued by the end user devices corresponding to content of the CDN experiencing the attack traffic, logging properties associated with the domain name translation requests issued by the end user devices. 8. The method of claim 7, further comprising: transferring information related to the properties associated with the domain name translation requests issued by the end user devices to a control node of the CDN; and in the control node of the CDN, identifying at least one locality associated with the attack traffic based at least on the information. 9. The method of claim 1, further comprising: responsive to ones of the domain name translation requests corresponding to content of the CDN that is experiencing the attack traffic, ignoring the ones of the domain name translation requests. 10. The method of claim 1, wherein the network addresses comprise Internet Protocol version 6 (IPv6) network addresses, wherein the portions of the network addresses comprising stenographic information are included in at least a lower 64 bits of the network addresses, and wherein the network addresses comprise routing information in at least an upper 64 bits of the network addresses, the routing information configured to direct the content requests to at least one cache node that caches the content. 11. A content delivery network (CDN) having a plurality of cache nodes that cache content for delivery to end user devices, the CDN comprising: a control node configured to establish address translations for domain name system (DNS) translation nodes associated with the CDN to translate domain names into network addresses usable by the end user devices for reaching content at the cache nodes, with portions of the network addresses comprising stenographic information; the DNS translation nodes configured to provide ones of the network addresses with the stenographic information to the end user devices responsive to domain name translation requests issued by the end user devices; responsive to content requests issued by the end user devices, the control node configured to determine locality information associated with attack traffic directed at the CDN based at least on the stenographic information in the network addresses of the content requests. 12. The CDN of claim 11, comprising: the cache nodes configured to mitigate the attack traffic by dropping content requests associated with ones of the content requests issued at locations indicated by the locality information. 13. The CDN of claim 11, comprising: the control node configured to provide to the DNS translation nodes associated with a first location indicated by the locality information, first network addresses with first stenographic information comprising one or more actions to be taken by ones of the cache nodes that receive the content requests that include the first network addresses with the first stenographic information. 14. The CDN of claim 11, comprising: the control node configured to iterate selected stenographic information among the DNS translation nodes each associated with individual geographic locations; the control node configured to process the selected stenographic information received in ones of the content requests for each iteration to identify which of the DNS nodes serviced the domain name translation requests for the ones of the content requests received during each iteration; based at least on the individual geographic locations of the DNS translation nodes and the selected stenographic information, the control node configured to determine one or more geographic locations associated with the ones of the content requests received during each iteration; the control node configured to determine the locality information associated with the attack traffic based at least in part on the one or more geographic locations associated with the content requests. 15. The CDN of claim 11, comprising: the cache nodes that receive ones of the content requests associated with the attack traffic configured to process the stenographic information included in the network addresses of the content requests to perform an action indicated by the stenographic information. 16. The CDN of claim 15, wherein the action indicated by the stenographic information comprises at least one of logging of properties associated with the content requests and dropping traffic associated with the content requests. 17. The CDN of claim 11, comprising: responsive to ones of the domain name translation requests issued by the end user devices corresponding to content of the CDN experiencing the attack traffic, the DNS translation nodes configured to log properties associated with the domain name translation requests issued by the end user devices. 18. The CDN of claim 17, comprising: the DNS translation nodes configured to transfer information related to the properties associated with the domain name translation requests issued by the end user devices to the control node; and the control node configured to identify at least one locality associated with the attack traffic based at least on the information. 19. The CDN of claim 11, comprising: responsive to ones of the domain name translation requests corresponding to content of the CDN that is experiencing the attack traffic, the DNS translation nodes configured to ignore the ones of the domain name translation requests. 20. The CDN of claim 11, wherein the network addresses comprise Internet Protocol version 6 (IPv6) network addresses, wherein the portions of the network addresses comprising stenographic information are included in at least a lower 64 bits of the network addresses, and wherein the network addresses comprise routing information in at least an upper 64 bits of the network addresses, the routing information configured to direct the content requests to at least one cache node that caches the content.
Systems, methods, apparatuses, and software for a content delivery network that caches content for delivery to end user devices is presented. In one example, a method includes, for domain name system translation nodes associated with the content delivery network, establishing address translations to translate domain names into network addresses usable by the end user devices for reaching content at the cache nodes, with portions of the network addresses comprising stenographic information. The method also includes providing ones of the network addresses with the stenographic information to the end user devices responsive to domain name translation requests issued by the end user devices. The method also includes, responsive to content requests issued by the end user devices, determining locality information associated with attack traffic directed at the content delivery network based at least on the stenographic information in the network addresses of the content requests.1. A method of operating a content delivery network (CDN) comprising a plurality of cache nodes that cache content for delivery to end user devices, the method comprising: for domain name system (DNS) translation nodes associated with the CDN, establishing address translations to translate domain names into network addresses usable by the end user devices for reaching content at the cache nodes, with portions of the network addresses comprising stenographic information; providing ones of the network addresses with the stenographic information to the end user devices responsive to domain name translation requests issued by the end user devices; responsive to content requests issued by the end user devices, determining locality information associated with attack traffic directed at the CDN based at least on the stenographic information in the network addresses of the content requests. 2. The method of claim 1, further comprising: mitigating the attack traffic by dropping content requests associated with ones of the content requests issued at locations indicated by the locality information. 3. The method of claim 1, further comprising: for the DNS translation nodes associated with a first location indicated by the locality information, providing first network addresses with first stenographic information comprising one or more actions to be taken by ones of the cache nodes that receive the content requests that include the first network addresses with the first stenographic information. 4. The method of claim 1, further comprising: iterating selected stenographic information among the DNS translation nodes each associated with individual geographic locations; processing the selected stenographic information received in ones of the content requests for each iteration to identify which of the DNS nodes serviced the domain name translation requests for the ones of the content requests received during each iteration; based at least on the individual geographic locations of the DNS translation nodes and the selected stenographic information, determining one or more geographic locations associated with the ones of the content requests received during each iteration; determining the locality information associated with the attack traffic based at least in part on the one or more geographic locations associated with the content requests. 5. The method of claim 1, further comprising: in the cache nodes that receive ones of the content requests associated with the attack traffic, processing the stenographic information included in the network addresses of the content requests to perform an action indicated by the stenographic information. 6. The method of claim 5, wherein the action indicated by the stenographic information comprises at least one of logging of properties associated with the content requests and dropping traffic associated with the content requests. 7. The method of claim 1, further comprising: responsive to ones of the domain name translation requests issued by the end user devices corresponding to content of the CDN experiencing the attack traffic, logging properties associated with the domain name translation requests issued by the end user devices. 8. The method of claim 7, further comprising: transferring information related to the properties associated with the domain name translation requests issued by the end user devices to a control node of the CDN; and in the control node of the CDN, identifying at least one locality associated with the attack traffic based at least on the information. 9. The method of claim 1, further comprising: responsive to ones of the domain name translation requests corresponding to content of the CDN that is experiencing the attack traffic, ignoring the ones of the domain name translation requests. 10. The method of claim 1, wherein the network addresses comprise Internet Protocol version 6 (IPv6) network addresses, wherein the portions of the network addresses comprising stenographic information are included in at least a lower 64 bits of the network addresses, and wherein the network addresses comprise routing information in at least an upper 64 bits of the network addresses, the routing information configured to direct the content requests to at least one cache node that caches the content. 11. A content delivery network (CDN) having a plurality of cache nodes that cache content for delivery to end user devices, the CDN comprising: a control node configured to establish address translations for domain name system (DNS) translation nodes associated with the CDN to translate domain names into network addresses usable by the end user devices for reaching content at the cache nodes, with portions of the network addresses comprising stenographic information; the DNS translation nodes configured to provide ones of the network addresses with the stenographic information to the end user devices responsive to domain name translation requests issued by the end user devices; responsive to content requests issued by the end user devices, the control node configured to determine locality information associated with attack traffic directed at the CDN based at least on the stenographic information in the network addresses of the content requests. 12. The CDN of claim 11, comprising: the cache nodes configured to mitigate the attack traffic by dropping content requests associated with ones of the content requests issued at locations indicated by the locality information. 13. The CDN of claim 11, comprising: the control node configured to provide to the DNS translation nodes associated with a first location indicated by the locality information, first network addresses with first stenographic information comprising one or more actions to be taken by ones of the cache nodes that receive the content requests that include the first network addresses with the first stenographic information. 14. The CDN of claim 11, comprising: the control node configured to iterate selected stenographic information among the DNS translation nodes each associated with individual geographic locations; the control node configured to process the selected stenographic information received in ones of the content requests for each iteration to identify which of the DNS nodes serviced the domain name translation requests for the ones of the content requests received during each iteration; based at least on the individual geographic locations of the DNS translation nodes and the selected stenographic information, the control node configured to determine one or more geographic locations associated with the ones of the content requests received during each iteration; the control node configured to determine the locality information associated with the attack traffic based at least in part on the one or more geographic locations associated with the content requests. 15. The CDN of claim 11, comprising: the cache nodes that receive ones of the content requests associated with the attack traffic configured to process the stenographic information included in the network addresses of the content requests to perform an action indicated by the stenographic information. 16. The CDN of claim 15, wherein the action indicated by the stenographic information comprises at least one of logging of properties associated with the content requests and dropping traffic associated with the content requests. 17. The CDN of claim 11, comprising: responsive to ones of the domain name translation requests issued by the end user devices corresponding to content of the CDN experiencing the attack traffic, the DNS translation nodes configured to log properties associated with the domain name translation requests issued by the end user devices. 18. The CDN of claim 17, comprising: the DNS translation nodes configured to transfer information related to the properties associated with the domain name translation requests issued by the end user devices to the control node; and the control node configured to identify at least one locality associated with the attack traffic based at least on the information. 19. The CDN of claim 11, comprising: responsive to ones of the domain name translation requests corresponding to content of the CDN that is experiencing the attack traffic, the DNS translation nodes configured to ignore the ones of the domain name translation requests. 20. The CDN of claim 11, wherein the network addresses comprise Internet Protocol version 6 (IPv6) network addresses, wherein the portions of the network addresses comprising stenographic information are included in at least a lower 64 bits of the network addresses, and wherein the network addresses comprise routing information in at least an upper 64 bits of the network addresses, the routing information configured to direct the content requests to at least one cache node that caches the content.
2,400
9,007
9,007
16,257,129
2,447
A message can be selectively provided to users of an online content management service based at least in part on a user relationship between the users and a shared content item. Users having the user relationship associated with the message can be shown the message, where users without the user relationship are not shown the message. For example, a message can be configured to be shown upon the first time a content item is opened by a user, but not on subsequent openings of the content item.
1. A method executable at a server, the method comprising: receiving a request from a first client for access to a shared content item in a shared content management system, the shared content item being shared by a plurality of users, including a first user of the first client; accessing metadata for the shared content item, the metadata including a record of interactions of the plurality of users with the shared content item and a set of user-generated messages, each message associated with one or more of a plurality of user relationships to the shared content item; determining a user relationship of the first user to the shared content item based at least in part on the record of interactions; selecting a message from the set of user-generated messages based at least in part on the determined user relationship; and transmitting, to the first client, the first content item with the selected message included within a message area of the first content item. 2. The method of claim 1, wherein the user relationship is based at least in part on the first user having viewed the content item, first user having edited the content item or a user not having viewed the content item. 3. The method of claim 1, wherein the set of user-generated messages includes edits to the content item. 4. A method executable at a server, the method comprising: receiving a request from a first client for access to a first shared content item in a shared content management system; accessing metadata for the first shared content item, the metadata including a set of user-generated messages, each message associated with one or more of a plurality of user relationships to the first shared content item; determining a first user relationship of a first user of the first client to the first shared content item; selecting a first message from the set of user-generated messages based at least in part on the determined first user relationship; and transmitting, to the first client, the first shared content item with the selected first message. 5. The method of claim 4, further comprising: determining a second user relationship of the first user to a second shared content item in the shared content management system; and wherein selecting the message from the set of user generated messages further comprises selecting the message from the set of user generated messages based at least in part on a message setting that requires both the determined second user relationship and the determined user relationship in order to be transmitted to the first client. 6. The method of claim 4, wherein the first shared content item is a document comprising a designated area for insertion of the one or more user generated messages based at least in part on the determined user relationship to the document; and wherein transmitting, to the first client, the first shared content item with the selected message further comprises inserting the one or more user generated messages into the designated area of the document. 7. The method of claim 4, further comprising: determining a second user relationship of the first user to an author of the one or more user generated messages; and wherein selecting the message from the set of user-generated messages further comprises selecting the message from the set of user generated messages based at least in part on the association of the message with determined first user relationship to the first shared content item and second user relationship to the author. 8. The method of claim 4, further comprising: determining a second user relationship of the first user to the first shared content item; and selecting a second message from the set of user generated messages based at least in part on the determined second user relationship; wherein transmitting, to the first client, the first shared content item with the selected first message further includes transmitting the selected second message. 9. The method of claim 4, wherein determining the user relationship of the first user to the first shared content item further comprises determining the user relationship based at least in part on a interaction of the first user with the first shared content item. 10. The method of claim 4, wherein determining the user relationship of the first user to the first shared content item further comprises determining a number of times the first shared content item has been opened by the user. 11. The method of claim 4, wherein determining the user relationship of the first user to the first shared content item further comprises determining that the first user has not viewed the first shared content item since the first message was enabled for transmission with the content item. 12. The method of claim 4, wherein determining the user relationship of the first user to the first shared content item further comprises determining that the first message has not yet been transmitted with the first shared content item to the first user. 13. A non-transitory computer readable medium including one or more sequences of instructions that, when executed by one or more processors, cause the processors to perform operations comprising: receiving a request from a first client for access to a first shared content item in a shared content management system; accessing metadata for the first shared content item, the metadata including a set of user-generated messages, each message associated with one or more of a plurality of user relationships to the first shared content item; determining a first user relationship of a first user of the first client to the first shared content item; selecting a first message from the set of user-generated messages based at least in part on the determined first user relationship; and transmitting, to the first client, the first shared content item with the selected first message. 14. The non-transitory computer readable medium of claim 13, further comprising: determining a second user relationship of the first user to a second shared content item in the shared content management system; and wherein selecting the message from the set of user generated messages further comprises selecting the message from the set of user generated messages based at least in part on a message setting that requires both the determined second user relationship and the determined user relationship in order to be transmitted to the first client. 15. The non-transitory computer readable medium of claim 13, wherein the first shared content item is a document comprising a designated area for insertion of the one or more user generated messages based at least in part on the determined user relationship to the document; and wherein transmitting, to the first client, the first shared content item with the selected message further comprises inserting the one or more user generated messages into the designated area of the document. 16. The non-transitory computer readable medium of claim 13, further comprising: determining a second user relationship of the first user to an author of the one or more user generated messages; and wherein selecting the message from the set of user-generated messages further comprises selecting the message from the set of user generated messages based at least in part on the association of the message with determined first user relationship to the first shared content item and second user relationship to the author. 17. The non-transitory computer readable medium of claim 13, further comprising: determining a second user relationship of the first user to the first shared content item; and selecting a second message from the set of user generated messages based at least in part on the determined second user relationship; wherein transmitting, to the first client, the first shared content item with the selected first message further includes transmitting the selected second message. 18. The non-transitory computer readable medium of claim 13, wherein determining the user relationship of the first user to the first shared content item further comprises determining the user relationship based at least in part on a interaction of the first user with the first shared content item. 19. The non-transitory computer readable medium of claim 13, wherein determining the user relationship of the first user to the first shared content item further comprises determining a number of times the first shared content item has been opened by the user. 20. The non-transitory computer readable medium of claim 13, wherein determining the user relationship of the first user to the first shared content item further comprises determining that the first user has not viewed the first shared content item since the first message was enabled for transmission with the content item.
A message can be selectively provided to users of an online content management service based at least in part on a user relationship between the users and a shared content item. Users having the user relationship associated with the message can be shown the message, where users without the user relationship are not shown the message. For example, a message can be configured to be shown upon the first time a content item is opened by a user, but not on subsequent openings of the content item.1. A method executable at a server, the method comprising: receiving a request from a first client for access to a shared content item in a shared content management system, the shared content item being shared by a plurality of users, including a first user of the first client; accessing metadata for the shared content item, the metadata including a record of interactions of the plurality of users with the shared content item and a set of user-generated messages, each message associated with one or more of a plurality of user relationships to the shared content item; determining a user relationship of the first user to the shared content item based at least in part on the record of interactions; selecting a message from the set of user-generated messages based at least in part on the determined user relationship; and transmitting, to the first client, the first content item with the selected message included within a message area of the first content item. 2. The method of claim 1, wherein the user relationship is based at least in part on the first user having viewed the content item, first user having edited the content item or a user not having viewed the content item. 3. The method of claim 1, wherein the set of user-generated messages includes edits to the content item. 4. A method executable at a server, the method comprising: receiving a request from a first client for access to a first shared content item in a shared content management system; accessing metadata for the first shared content item, the metadata including a set of user-generated messages, each message associated with one or more of a plurality of user relationships to the first shared content item; determining a first user relationship of a first user of the first client to the first shared content item; selecting a first message from the set of user-generated messages based at least in part on the determined first user relationship; and transmitting, to the first client, the first shared content item with the selected first message. 5. The method of claim 4, further comprising: determining a second user relationship of the first user to a second shared content item in the shared content management system; and wherein selecting the message from the set of user generated messages further comprises selecting the message from the set of user generated messages based at least in part on a message setting that requires both the determined second user relationship and the determined user relationship in order to be transmitted to the first client. 6. The method of claim 4, wherein the first shared content item is a document comprising a designated area for insertion of the one or more user generated messages based at least in part on the determined user relationship to the document; and wherein transmitting, to the first client, the first shared content item with the selected message further comprises inserting the one or more user generated messages into the designated area of the document. 7. The method of claim 4, further comprising: determining a second user relationship of the first user to an author of the one or more user generated messages; and wherein selecting the message from the set of user-generated messages further comprises selecting the message from the set of user generated messages based at least in part on the association of the message with determined first user relationship to the first shared content item and second user relationship to the author. 8. The method of claim 4, further comprising: determining a second user relationship of the first user to the first shared content item; and selecting a second message from the set of user generated messages based at least in part on the determined second user relationship; wherein transmitting, to the first client, the first shared content item with the selected first message further includes transmitting the selected second message. 9. The method of claim 4, wherein determining the user relationship of the first user to the first shared content item further comprises determining the user relationship based at least in part on a interaction of the first user with the first shared content item. 10. The method of claim 4, wherein determining the user relationship of the first user to the first shared content item further comprises determining a number of times the first shared content item has been opened by the user. 11. The method of claim 4, wherein determining the user relationship of the first user to the first shared content item further comprises determining that the first user has not viewed the first shared content item since the first message was enabled for transmission with the content item. 12. The method of claim 4, wherein determining the user relationship of the first user to the first shared content item further comprises determining that the first message has not yet been transmitted with the first shared content item to the first user. 13. A non-transitory computer readable medium including one or more sequences of instructions that, when executed by one or more processors, cause the processors to perform operations comprising: receiving a request from a first client for access to a first shared content item in a shared content management system; accessing metadata for the first shared content item, the metadata including a set of user-generated messages, each message associated with one or more of a plurality of user relationships to the first shared content item; determining a first user relationship of a first user of the first client to the first shared content item; selecting a first message from the set of user-generated messages based at least in part on the determined first user relationship; and transmitting, to the first client, the first shared content item with the selected first message. 14. The non-transitory computer readable medium of claim 13, further comprising: determining a second user relationship of the first user to a second shared content item in the shared content management system; and wherein selecting the message from the set of user generated messages further comprises selecting the message from the set of user generated messages based at least in part on a message setting that requires both the determined second user relationship and the determined user relationship in order to be transmitted to the first client. 15. The non-transitory computer readable medium of claim 13, wherein the first shared content item is a document comprising a designated area for insertion of the one or more user generated messages based at least in part on the determined user relationship to the document; and wherein transmitting, to the first client, the first shared content item with the selected message further comprises inserting the one or more user generated messages into the designated area of the document. 16. The non-transitory computer readable medium of claim 13, further comprising: determining a second user relationship of the first user to an author of the one or more user generated messages; and wherein selecting the message from the set of user-generated messages further comprises selecting the message from the set of user generated messages based at least in part on the association of the message with determined first user relationship to the first shared content item and second user relationship to the author. 17. The non-transitory computer readable medium of claim 13, further comprising: determining a second user relationship of the first user to the first shared content item; and selecting a second message from the set of user generated messages based at least in part on the determined second user relationship; wherein transmitting, to the first client, the first shared content item with the selected first message further includes transmitting the selected second message. 18. The non-transitory computer readable medium of claim 13, wherein determining the user relationship of the first user to the first shared content item further comprises determining the user relationship based at least in part on a interaction of the first user with the first shared content item. 19. The non-transitory computer readable medium of claim 13, wherein determining the user relationship of the first user to the first shared content item further comprises determining a number of times the first shared content item has been opened by the user. 20. The non-transitory computer readable medium of claim 13, wherein determining the user relationship of the first user to the first shared content item further comprises determining that the first user has not viewed the first shared content item since the first message was enabled for transmission with the content item.
2,400
9,008
9,008
15,906,509
2,461
Methods and systems are disclosed including a mobile device configured for initiating a communication session with a transceiver interface of a node that comprises a network interface. The node may be queried via the communication session for a status report associated with an error, and an instruction may be communicated to the node via the communication session instructing the node to perform an operation. Communication may be established with the wireless access point via the wireless network after communication of the instruction. The transceiver interface may be configured to communicate via a second network to address issues in the wide area network.
1. A method comprising: querying a node for data associated with a plurality of devices connected to a wireless network provided by a wireless access point of the node; and communicating, by a mobile device and to the node via a communication session established over a short-range communication interface of the node, an instruction configured to cause the node to adjust a parameter associated with the wireless network for one or more of the plurality of devices, wherein the instruction is generated based on the data.
Methods and systems are disclosed including a mobile device configured for initiating a communication session with a transceiver interface of a node that comprises a network interface. The node may be queried via the communication session for a status report associated with an error, and an instruction may be communicated to the node via the communication session instructing the node to perform an operation. Communication may be established with the wireless access point via the wireless network after communication of the instruction. The transceiver interface may be configured to communicate via a second network to address issues in the wide area network.1. A method comprising: querying a node for data associated with a plurality of devices connected to a wireless network provided by a wireless access point of the node; and communicating, by a mobile device and to the node via a communication session established over a short-range communication interface of the node, an instruction configured to cause the node to adjust a parameter associated with the wireless network for one or more of the plurality of devices, wherein the instruction is generated based on the data.
2,400
9,009
9,009
15,878,175
2,413
Technology for using an open mobile alliance (OMA) management object (MO) for congestion control in mobile networks is described. A novel type of OMA MO for application specific access control (ASAC) can include internet protocol (IP) flow descriptions that can be used to characterize applications with fine granularity. Priorities can be assigned to IP flows based on the IP flow descriptions. A user equipment (UE) can receive such an OMA MO and also receive application-barring information regarding a congestion level in a mobile network with which an application at the UE wishes to connect. The UE can have a connectivity manager (CM) that determines whether to allow the application to establish a connection with the mobile network based on the priority level of the application's associated IP flow and the application-barring information.
1. An apparatus of a user equipment (UE) configured for application specific congestion control for data communication (ACDC), the apparatus comprising: one or more processors configured to: identify, at the UE, an Open Mobile Alliance (OMA) management object (MO) for ACDC, wherein the OMA MO comprises: a leaf that corresponds to one or more application identifiers; and a leaf that corresponds to one or more ACDC levels for one or more applications operating at the UE; associate, at the UE, each of the one or more applications with an ACDC level based on the application identifiers; decode, at the UE, application barring information received from a network for each ACDC level; and determine, at the UE, when the one or more applications operating at the UE are permitted to communicate with the network based on the decoded application barring information for each ACDC level; and memory configured to store the OMA MO. 2. The apparatus of claim 1, wherein the one or more processors are further configured to encode information from the one or more applications permitted to communicate for transmission to the network. 3. The apparatus of claim 1, further comprising a transceiver configured to: receive the MO from the network; and receive the application barring information from the network. 4. The apparatus of claim 1, wherein the one or more processors are further configured to apply a lowest ACDC level to an application operating at the UE when the leaf that corresponds to the one or more ACDC levels does not define an ACDC level for an application identifier associated with the application. 5. The apparatus of claim 1, wherein the one or more processors are further configured to decode the application barring information received from the network via a system information block (SIB) type 2. 6. The apparatus of claim 1, wherein the OMA MO comprises a leaf that corresponds to operating system specific application IDs (OSAppIDs) for the one or more applications operating at the UE. 7. The apparatus of claim 1, wherein the UE includes an antenna, a touch sensitive display screen, a speaker, a microphone, a graphics processor, an application processor, an internal memory, or a non-volatile memory port. 8. An apparatus of a user equipment (UE) configured for application specific congestion control for data communication (ACDC), the apparatus comprising: one or more processors configured to: decode an Open Mobile Alliance (OMA) management object (MO) for ACDC received from a network; identify, from the MO, ACDC levels for one or more applications operating at the UE; decode application barring information received from the network; and determine that one or more applications operating at the UE are permitted to communicate with the network based on the ACDC levels included in the MO and the application barring information; and memory configured to memory configured to store the OMA MO. 9. The apparatus of claim 8, further comprising a transceiver configured to: receive the MO from the network; and receive the application barring information from the network. 10. The apparatus of claim 8, wherein the one or more processors are further configured to apply a lowest ACDC level to an application operating at the UE when the MO does not define an ACDC level for the application. 11. The apparatus of claim 8, wherein the one or more processors are further configured to decode the application barring information received from the network via a system information block (SIB) type 2. 12. The apparatus of claim 8, wherein the one or more processors are further configured to decode the application barring information received from the network via a dedicated signaling message. 13. The apparatus of claim 8, wherein the one or more processors are further configured to identify, from the MO, operating system specific application IDs (OSAppIDs) for the one or more applications operating at the UE. 14. The apparatus of claim 8, wherein the application barring information includes a level of traffic congestion at the network. 15. The apparatus of claim 8, wherein the UE includes an antenna, a touch sensitive display screen, a speaker, a microphone, a graphics processor, an application processor, an internal memory, or a non-volatile memory port. 16. At least one non-transitory machine readable storage medium having instructions embodied thereon for communicating data from a user equipment (UE) to a network, the instructions when executed perform the following: decoding, at the UE, an Open Mobile Alliance (OMA) management object (MO) received from the network, wherein the MO is for application specific congestion control for data communication (ACDC); identifying, at the UE, one or more leafs included in the OMA MO, wherein the one or more leafs includes: a leaf that corresponds to one or more application identifiers; and a leaf that corresponds to one or more ACDC levels for one or more applications operating at the UE; associating, at the UE, each of the one or more applications with an ACDC level based on the application identifiers; decoding, at the UE, application barring information received from the network for each ACDC level; and determining, at the UE, when the one or more applications operating at the UE are permitted to communicate with the network based on the decoded application barring information for each ACDC level. 17. The at least one non-transitory machine readable storage medium of claim 16, further comprising instructions when executed perform the following: encoding information from the one or more applications permitted to communicate for transmission to the network. 18. The at least one non-transitory machine readable storage medium of claim 16, further comprising instructions when executed perform the following: applying a lowest ACDC level to an application operating at the UE when the leaf that corresponds to the one or more ACDC levels does not define an ACDC level for an application identifier associated with the application. 19. The at least one non-transitory machine readable storage medium of claim 16, further comprising instructions when executed perform the following: decoding the application barring information received from the network via a system information block (SIB) type 2. 20. The at least one non-transitory machine readable storage medium of claim 16, further comprising instructions when executed perform the following: identifying the one or more leafs included in the OMA to include a leaf that corresponds to operating system specific application IDs (OSAppIDs) for the one or more applications operating at the UE. 21. The at least one non-transitory machine readable storage medium of claim 16, further comprising instructions when executed perform the following: decoding the application barring information received from the network via a dedicated signaling message. 22. The at least one non-transitory machine readable storage medium of claim 16, wherein the application barring information includes a level of traffic congestion at the network.
Technology for using an open mobile alliance (OMA) management object (MO) for congestion control in mobile networks is described. A novel type of OMA MO for application specific access control (ASAC) can include internet protocol (IP) flow descriptions that can be used to characterize applications with fine granularity. Priorities can be assigned to IP flows based on the IP flow descriptions. A user equipment (UE) can receive such an OMA MO and also receive application-barring information regarding a congestion level in a mobile network with which an application at the UE wishes to connect. The UE can have a connectivity manager (CM) that determines whether to allow the application to establish a connection with the mobile network based on the priority level of the application's associated IP flow and the application-barring information.1. An apparatus of a user equipment (UE) configured for application specific congestion control for data communication (ACDC), the apparatus comprising: one or more processors configured to: identify, at the UE, an Open Mobile Alliance (OMA) management object (MO) for ACDC, wherein the OMA MO comprises: a leaf that corresponds to one or more application identifiers; and a leaf that corresponds to one or more ACDC levels for one or more applications operating at the UE; associate, at the UE, each of the one or more applications with an ACDC level based on the application identifiers; decode, at the UE, application barring information received from a network for each ACDC level; and determine, at the UE, when the one or more applications operating at the UE are permitted to communicate with the network based on the decoded application barring information for each ACDC level; and memory configured to store the OMA MO. 2. The apparatus of claim 1, wherein the one or more processors are further configured to encode information from the one or more applications permitted to communicate for transmission to the network. 3. The apparatus of claim 1, further comprising a transceiver configured to: receive the MO from the network; and receive the application barring information from the network. 4. The apparatus of claim 1, wherein the one or more processors are further configured to apply a lowest ACDC level to an application operating at the UE when the leaf that corresponds to the one or more ACDC levels does not define an ACDC level for an application identifier associated with the application. 5. The apparatus of claim 1, wherein the one or more processors are further configured to decode the application barring information received from the network via a system information block (SIB) type 2. 6. The apparatus of claim 1, wherein the OMA MO comprises a leaf that corresponds to operating system specific application IDs (OSAppIDs) for the one or more applications operating at the UE. 7. The apparatus of claim 1, wherein the UE includes an antenna, a touch sensitive display screen, a speaker, a microphone, a graphics processor, an application processor, an internal memory, or a non-volatile memory port. 8. An apparatus of a user equipment (UE) configured for application specific congestion control for data communication (ACDC), the apparatus comprising: one or more processors configured to: decode an Open Mobile Alliance (OMA) management object (MO) for ACDC received from a network; identify, from the MO, ACDC levels for one or more applications operating at the UE; decode application barring information received from the network; and determine that one or more applications operating at the UE are permitted to communicate with the network based on the ACDC levels included in the MO and the application barring information; and memory configured to memory configured to store the OMA MO. 9. The apparatus of claim 8, further comprising a transceiver configured to: receive the MO from the network; and receive the application barring information from the network. 10. The apparatus of claim 8, wherein the one or more processors are further configured to apply a lowest ACDC level to an application operating at the UE when the MO does not define an ACDC level for the application. 11. The apparatus of claim 8, wherein the one or more processors are further configured to decode the application barring information received from the network via a system information block (SIB) type 2. 12. The apparatus of claim 8, wherein the one or more processors are further configured to decode the application barring information received from the network via a dedicated signaling message. 13. The apparatus of claim 8, wherein the one or more processors are further configured to identify, from the MO, operating system specific application IDs (OSAppIDs) for the one or more applications operating at the UE. 14. The apparatus of claim 8, wherein the application barring information includes a level of traffic congestion at the network. 15. The apparatus of claim 8, wherein the UE includes an antenna, a touch sensitive display screen, a speaker, a microphone, a graphics processor, an application processor, an internal memory, or a non-volatile memory port. 16. At least one non-transitory machine readable storage medium having instructions embodied thereon for communicating data from a user equipment (UE) to a network, the instructions when executed perform the following: decoding, at the UE, an Open Mobile Alliance (OMA) management object (MO) received from the network, wherein the MO is for application specific congestion control for data communication (ACDC); identifying, at the UE, one or more leafs included in the OMA MO, wherein the one or more leafs includes: a leaf that corresponds to one or more application identifiers; and a leaf that corresponds to one or more ACDC levels for one or more applications operating at the UE; associating, at the UE, each of the one or more applications with an ACDC level based on the application identifiers; decoding, at the UE, application barring information received from the network for each ACDC level; and determining, at the UE, when the one or more applications operating at the UE are permitted to communicate with the network based on the decoded application barring information for each ACDC level. 17. The at least one non-transitory machine readable storage medium of claim 16, further comprising instructions when executed perform the following: encoding information from the one or more applications permitted to communicate for transmission to the network. 18. The at least one non-transitory machine readable storage medium of claim 16, further comprising instructions when executed perform the following: applying a lowest ACDC level to an application operating at the UE when the leaf that corresponds to the one or more ACDC levels does not define an ACDC level for an application identifier associated with the application. 19. The at least one non-transitory machine readable storage medium of claim 16, further comprising instructions when executed perform the following: decoding the application barring information received from the network via a system information block (SIB) type 2. 20. The at least one non-transitory machine readable storage medium of claim 16, further comprising instructions when executed perform the following: identifying the one or more leafs included in the OMA to include a leaf that corresponds to operating system specific application IDs (OSAppIDs) for the one or more applications operating at the UE. 21. The at least one non-transitory machine readable storage medium of claim 16, further comprising instructions when executed perform the following: decoding the application barring information received from the network via a dedicated signaling message. 22. The at least one non-transitory machine readable storage medium of claim 16, wherein the application barring information includes a level of traffic congestion at the network.
2,400
9,010
9,010
16,169,013
2,414
This disclosure relates to techniques and devices for implementing an emergency power save mode (EPSM) in a user equipment device (UE). A UE may enter the EPSM in response to user input. While operating in the EPSM, the UE may power down a display of the UE to preserve battery life and may broadcast an emergency beacon in response to user input to a hardware button of the UE, such as a volume button. The UE may supply sound or haptic feedback in response to broadcasting the emergency beacon.
1. A user equipment device (UE), comprising: a display; an antenna; a radio operably coupled to the antenna; and a processing element coupled to the radio and the display, wherein the UE is configured to: receive first user input causing the UE to enter an emergency power save mode (EPSM); wherein, while in the EPSM, the UE is configured to: power down the display; and broadcast an emergency beacon using the radio in response to receiving second user input. 2. The UE of claim 1, wherein the UE is further configured to: determine that a remaining battery level of the UE is below a predetermined threshold; and in response to determining that the remaining battery level of the UE is below the predetermined threshold, automatically display an icon on the display that is configured to receive the first user input to cause the UE to enter the EPSM. 3. The UE of claim 1, wherein the emergency beacon comprises an off-grid radio service (OGRS) device-to-device communication. 4. The UE of claim 1, wherein the UE is further configured to: provide haptic feedback in response to successfully broadcasting the emergency beacon. 5. The UE of claim 1, wherein the UE is further configured to: emit a sound in response to successfully broadcasting the emergency beacon. 6. The UE of claim 1, wherein the second user input comprises pressing a hardware button of the UE. 7. The UE of claim 6, wherein the hardware button is a volume button. 8. A method for implementing an emergency power save mode, the method comprising, by a user equipment device (UE): receiving first user input causing the UE to enter the emergency power save mode (EPSM); and while in the EPSM: powering down a display of the UE; and broadcasting an emergency beacon using a radio of the UE in response to receiving second user input. 9. The method of claim 8, the method further comprising: determining that a remaining battery level of the UE is below a predetermined threshold; and in response to determining that the remaining battery level of the UE is below the predetermined threshold, automatically displaying an icon on the display that is configured to receive the first user input to cause the UE to enter the EPSM. 10. The method of claim 8, wherein the emergency beacon comprises an off-grid radio service (OGRS) device-to-device communication. 11. The method of claim 8, the method further comprising: providing haptic feedback in response to successfully broadcasting the emergency beacon. 12. The method of claim 8, the method further comprising: emitting a sound in response to successfully broadcasting the emergency beacon. 13. The method of claim 8, wherein the second user input comprises pressing a hardware button of the UE. 14. The method of claim 13, wherein the hardware button is a volume button. 15. An apparatus comprising a processing element and configured to cause a UE to: in response to receiving first user input, cause the UE to enter an emergency power save mode (EPSM); and while in the EPSM: power down a display of the UE; and broadcast an emergency beacon using a radio of the UE in response to receiving second user input. 16. The apparatus of claim 15, wherein the apparatus is further configured to cause the UE to: determine that a remaining battery level of the UE is below a predetermined threshold; and in response to determining that the remaining battery level of the UE is below the predetermined threshold, automatically display an icon on the display that is configured to receive the first user input to cause the UE to enter the EPSM. 17. The apparatus of claim 15, wherein the emergency beacon comprises an off-grid radio service (OGRS) device-to-device communication. 18. The apparatus of claim 15, wherein the apparatus is further configured to cause the UE to: provide haptic feedback in response to successfully broadcasting the emergency beacon. 19. The apparatus of claim 15, wherein the apparatus is further configured to cause the UE to: emit a sound in response to successfully broadcasting the emergency beacon. 20. The apparatus of claim 15, wherein the second user input comprises activating a physical button of the UE.
This disclosure relates to techniques and devices for implementing an emergency power save mode (EPSM) in a user equipment device (UE). A UE may enter the EPSM in response to user input. While operating in the EPSM, the UE may power down a display of the UE to preserve battery life and may broadcast an emergency beacon in response to user input to a hardware button of the UE, such as a volume button. The UE may supply sound or haptic feedback in response to broadcasting the emergency beacon.1. A user equipment device (UE), comprising: a display; an antenna; a radio operably coupled to the antenna; and a processing element coupled to the radio and the display, wherein the UE is configured to: receive first user input causing the UE to enter an emergency power save mode (EPSM); wherein, while in the EPSM, the UE is configured to: power down the display; and broadcast an emergency beacon using the radio in response to receiving second user input. 2. The UE of claim 1, wherein the UE is further configured to: determine that a remaining battery level of the UE is below a predetermined threshold; and in response to determining that the remaining battery level of the UE is below the predetermined threshold, automatically display an icon on the display that is configured to receive the first user input to cause the UE to enter the EPSM. 3. The UE of claim 1, wherein the emergency beacon comprises an off-grid radio service (OGRS) device-to-device communication. 4. The UE of claim 1, wherein the UE is further configured to: provide haptic feedback in response to successfully broadcasting the emergency beacon. 5. The UE of claim 1, wherein the UE is further configured to: emit a sound in response to successfully broadcasting the emergency beacon. 6. The UE of claim 1, wherein the second user input comprises pressing a hardware button of the UE. 7. The UE of claim 6, wherein the hardware button is a volume button. 8. A method for implementing an emergency power save mode, the method comprising, by a user equipment device (UE): receiving first user input causing the UE to enter the emergency power save mode (EPSM); and while in the EPSM: powering down a display of the UE; and broadcasting an emergency beacon using a radio of the UE in response to receiving second user input. 9. The method of claim 8, the method further comprising: determining that a remaining battery level of the UE is below a predetermined threshold; and in response to determining that the remaining battery level of the UE is below the predetermined threshold, automatically displaying an icon on the display that is configured to receive the first user input to cause the UE to enter the EPSM. 10. The method of claim 8, wherein the emergency beacon comprises an off-grid radio service (OGRS) device-to-device communication. 11. The method of claim 8, the method further comprising: providing haptic feedback in response to successfully broadcasting the emergency beacon. 12. The method of claim 8, the method further comprising: emitting a sound in response to successfully broadcasting the emergency beacon. 13. The method of claim 8, wherein the second user input comprises pressing a hardware button of the UE. 14. The method of claim 13, wherein the hardware button is a volume button. 15. An apparatus comprising a processing element and configured to cause a UE to: in response to receiving first user input, cause the UE to enter an emergency power save mode (EPSM); and while in the EPSM: power down a display of the UE; and broadcast an emergency beacon using a radio of the UE in response to receiving second user input. 16. The apparatus of claim 15, wherein the apparatus is further configured to cause the UE to: determine that a remaining battery level of the UE is below a predetermined threshold; and in response to determining that the remaining battery level of the UE is below the predetermined threshold, automatically display an icon on the display that is configured to receive the first user input to cause the UE to enter the EPSM. 17. The apparatus of claim 15, wherein the emergency beacon comprises an off-grid radio service (OGRS) device-to-device communication. 18. The apparatus of claim 15, wherein the apparatus is further configured to cause the UE to: provide haptic feedback in response to successfully broadcasting the emergency beacon. 19. The apparatus of claim 15, wherein the apparatus is further configured to cause the UE to: emit a sound in response to successfully broadcasting the emergency beacon. 20. The apparatus of claim 15, wherein the second user input comprises activating a physical button of the UE.
2,400
9,011
9,011
15,415,856
2,458
A computer system initiates a chat upon receiving a chat input from a user. The computer system records a chat state for the chat. When the chat is at the chat state, the computer system can operate to determine a search criterion from the chat input. The computer can then select a chat response from a chat library based at least in part on the chat state and the search criterion. The chat response can be communicated to the user.
1. A computer system for interacting with humans, the computer system comprising: a memory to store instructions; one or more processors to execute instructions stored in the memory; initiate a chat upon receiving a chat input from a user; record a chat state for the chat; when the chat is at the chat state, determine a search criterion from the chat input, and select a chat response from a chat library, based at least in part on the chat state and the search criterion.
A computer system initiates a chat upon receiving a chat input from a user. The computer system records a chat state for the chat. When the chat is at the chat state, the computer system can operate to determine a search criterion from the chat input. The computer can then select a chat response from a chat library based at least in part on the chat state and the search criterion. The chat response can be communicated to the user.1. A computer system for interacting with humans, the computer system comprising: a memory to store instructions; one or more processors to execute instructions stored in the memory; initiate a chat upon receiving a chat input from a user; record a chat state for the chat; when the chat is at the chat state, determine a search criterion from the chat input, and select a chat response from a chat library, based at least in part on the chat state and the search criterion.
2,400
9,012
9,012
15,130,892
2,435
A system for electronically sharing private documents using document pointers is disclosed. The system includes a processor and memory. A pointer database electronically coupled to the processor for storing a pointer to a document associated with a user and stored on a repository device of a plurality of repository devices remote from the server system, wherein the pointer comprises a unique identifier of the document and an associated location of that document on the repository device. A network communications interface electronically coupled to the processor is configured to electronically receive from a client device, an electronic authorization to share the document with a recipient third-party device of a plurality of recipient third-party devices, and, in response to the electronic request, transmit an encrypted information package including the pointer to the document to one of the client device, the repository, or the third-party device to facilitate the document sharing.
1. A server system for facilitating the sharing of documents, comprising: a processor and memory storing one or more programs comprising computer instructions for execution by the processor; a pointer database electronically coupled to the processor for storing a pointer to a document associated with a user and stored on a repository device of a plurality of repository devices remote from the server system, wherein the pointer comprises a unique identifier of the document and an associated location of that document on the repository device; a network communications interface electronically coupled to the processor and configured to: electronically receive via a computer network, from a client device associated with the user, an electronic authorization to share the document with a recipient third-party device of a plurality of recipient third-party devices remote from the client device; and in response to the electronic request, transmit an information package including the pointer to the document to one of the client device, the repository, or the third-party device to facilitate the sharing of the document stored on the repository device with the recipient third-party device, wherein the information package is encrypted using an encryption key. 2. The system of claim 1, wherein the network communications interface is further configured to, prior to receiving the electronic authorization form the client device: receive via the computer network a request from the third-party device for the document; and transmit via the computer network to the client device an authorization request to share the document with the third-party device. 3. The system of claim 2, wherein communications received and transmitted by the network communications interface are over one or more secure communication channels. 4. The system of claim 1, wherein the plurality of repository devices comprises all repository devices accessible by the server system. 5. The system of claim 1, wherein the repository device is the client device, and comprises a client processor and client memory storing one or more client programs comprising client computer instructions for execution by the client device. 6. The system of claim 5, wherein the document is stored in the client memory and wherein the one or more client computer instructions comprise transmitting the document to the recipient third-party device upon receipt of the pointer. 7. The system of claim 6, further comprising, at the client device, downloading the document to the client memory from the repository device. 8. The system of claim 5, wherein the client computer instructions comprise instructions to facilitate transmitting the document from the repository device to the recipient third-party device. 9. The system of claim 1, wherein the computer instructions comprise the step of creating a certificate associated with the document. 10. The system of claim 1, wherein the computer instructions comprise instructions for: receiving a request, from the client device, for a list of documents associated with the client device; transmitting at least one request to one or more of the plurality of repository devices for one or more lists of documents associated with the user; receiving the one or more lists of documents from the one or more repository devices; and transmitting the one or more lists to the client device. 11. The system of claim 10, wherein the computer instructions further comprise instructions for compiling the one or more lists of documents into a single list before transmitting the single list to the client device. 12. The system of claim 1, wherein the computer instructions comprise instructions for: receiving a request, from the client device, to store the document in a storage device of the client device; searching in the pointer database for a pointer associated with the document; and transmitting a request to the repository device to send the document to the client device. 13. The system of claim 1, wherein the network communications interface is further configured to receive a request, from the client device, to update an old version of the document associated with the user stored on the repository device with a new version of the document, and to transmit, to the client device, a pointer associated with the old version of the document and a request to send the new version of the document to a repository device associated with the pointer, wherein the computer instructions further comprise instructions for searching in the pointer database for the pointer associated with the old version of the document. 14. The system of claim 13, wherein the computer instructions further comprise instructions for identifying at least one additional repository device that stores the old version of the document, and wherein the network communications interface is further configured to transmit, to the second repository device, a request to send the new version of the document to the at least one additional repository device. 15. The system of claim 1, wherein the network communications interface is further configured to receive a request, from the client device, to update an old version of the document associated with the user stored on the repository device with a new version of the document, and transmit, to a second repository device, a pointer associated with the old version of the document and a request to send the document to the repository device associated with the pointer, wherein the computer instructions further comprise instructions for searching in the pointer database for the pointer associated with the old version of the document. 16. The system of claim 15, wherein the computer instructions further comprise instructions for identifying at least one additional repository device that stores the old version of the document, and wherein the network communications interface is further configured to transmit, to the second repository device, a request to send the new version of the document to the at least one additional repository device. 17. The system of claim 1, wherein the encryption key is generated by or known to the client device. 18. The system of claim 1, wherein the information package is encrypted at the server system and a decryption key is sent separately from the information package. 19. The system of claim 1, wherein the information package is encrypted at the client device and a decryption key to decrypt the information package is generated by or known to the client device. 20. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a server system with one or more processors and memory storing the one or more programs, cause the server system to: receive, from a client device associated with a user, an electronic authorization to share a document associated with the user with a recipient third-party device of a plurality of third-party devices remote from the server system; search a pointer database for a pointer to the document, the pointer comprising a unique identifier for the document and a location of the stored document on a repository device; and transmit an information package including the pointer to the document to one of the client device, the repository, or the third party device to facilitate the sharing of the document stored on the repository device with the recipient third-party device, wherein the information package is encrypted using an encryption key.
A system for electronically sharing private documents using document pointers is disclosed. The system includes a processor and memory. A pointer database electronically coupled to the processor for storing a pointer to a document associated with a user and stored on a repository device of a plurality of repository devices remote from the server system, wherein the pointer comprises a unique identifier of the document and an associated location of that document on the repository device. A network communications interface electronically coupled to the processor is configured to electronically receive from a client device, an electronic authorization to share the document with a recipient third-party device of a plurality of recipient third-party devices, and, in response to the electronic request, transmit an encrypted information package including the pointer to the document to one of the client device, the repository, or the third-party device to facilitate the document sharing.1. A server system for facilitating the sharing of documents, comprising: a processor and memory storing one or more programs comprising computer instructions for execution by the processor; a pointer database electronically coupled to the processor for storing a pointer to a document associated with a user and stored on a repository device of a plurality of repository devices remote from the server system, wherein the pointer comprises a unique identifier of the document and an associated location of that document on the repository device; a network communications interface electronically coupled to the processor and configured to: electronically receive via a computer network, from a client device associated with the user, an electronic authorization to share the document with a recipient third-party device of a plurality of recipient third-party devices remote from the client device; and in response to the electronic request, transmit an information package including the pointer to the document to one of the client device, the repository, or the third-party device to facilitate the sharing of the document stored on the repository device with the recipient third-party device, wherein the information package is encrypted using an encryption key. 2. The system of claim 1, wherein the network communications interface is further configured to, prior to receiving the electronic authorization form the client device: receive via the computer network a request from the third-party device for the document; and transmit via the computer network to the client device an authorization request to share the document with the third-party device. 3. The system of claim 2, wherein communications received and transmitted by the network communications interface are over one or more secure communication channels. 4. The system of claim 1, wherein the plurality of repository devices comprises all repository devices accessible by the server system. 5. The system of claim 1, wherein the repository device is the client device, and comprises a client processor and client memory storing one or more client programs comprising client computer instructions for execution by the client device. 6. The system of claim 5, wherein the document is stored in the client memory and wherein the one or more client computer instructions comprise transmitting the document to the recipient third-party device upon receipt of the pointer. 7. The system of claim 6, further comprising, at the client device, downloading the document to the client memory from the repository device. 8. The system of claim 5, wherein the client computer instructions comprise instructions to facilitate transmitting the document from the repository device to the recipient third-party device. 9. The system of claim 1, wherein the computer instructions comprise the step of creating a certificate associated with the document. 10. The system of claim 1, wherein the computer instructions comprise instructions for: receiving a request, from the client device, for a list of documents associated with the client device; transmitting at least one request to one or more of the plurality of repository devices for one or more lists of documents associated with the user; receiving the one or more lists of documents from the one or more repository devices; and transmitting the one or more lists to the client device. 11. The system of claim 10, wherein the computer instructions further comprise instructions for compiling the one or more lists of documents into a single list before transmitting the single list to the client device. 12. The system of claim 1, wherein the computer instructions comprise instructions for: receiving a request, from the client device, to store the document in a storage device of the client device; searching in the pointer database for a pointer associated with the document; and transmitting a request to the repository device to send the document to the client device. 13. The system of claim 1, wherein the network communications interface is further configured to receive a request, from the client device, to update an old version of the document associated with the user stored on the repository device with a new version of the document, and to transmit, to the client device, a pointer associated with the old version of the document and a request to send the new version of the document to a repository device associated with the pointer, wherein the computer instructions further comprise instructions for searching in the pointer database for the pointer associated with the old version of the document. 14. The system of claim 13, wherein the computer instructions further comprise instructions for identifying at least one additional repository device that stores the old version of the document, and wherein the network communications interface is further configured to transmit, to the second repository device, a request to send the new version of the document to the at least one additional repository device. 15. The system of claim 1, wherein the network communications interface is further configured to receive a request, from the client device, to update an old version of the document associated with the user stored on the repository device with a new version of the document, and transmit, to a second repository device, a pointer associated with the old version of the document and a request to send the document to the repository device associated with the pointer, wherein the computer instructions further comprise instructions for searching in the pointer database for the pointer associated with the old version of the document. 16. The system of claim 15, wherein the computer instructions further comprise instructions for identifying at least one additional repository device that stores the old version of the document, and wherein the network communications interface is further configured to transmit, to the second repository device, a request to send the new version of the document to the at least one additional repository device. 17. The system of claim 1, wherein the encryption key is generated by or known to the client device. 18. The system of claim 1, wherein the information package is encrypted at the server system and a decryption key is sent separately from the information package. 19. The system of claim 1, wherein the information package is encrypted at the client device and a decryption key to decrypt the information package is generated by or known to the client device. 20. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a server system with one or more processors and memory storing the one or more programs, cause the server system to: receive, from a client device associated with a user, an electronic authorization to share a document associated with the user with a recipient third-party device of a plurality of third-party devices remote from the server system; search a pointer database for a pointer to the document, the pointer comprising a unique identifier for the document and a location of the stored document on a repository device; and transmit an information package including the pointer to the document to one of the client device, the repository, or the third party device to facilitate the sharing of the document stored on the repository device with the recipient third-party device, wherein the information package is encrypted using an encryption key.
2,400
9,013
9,013
14,759,428
2,483
Systems, methods and instrumentalities are provided to implement motion information signaling for scalable video coding. A video coding device may generate a video bitstream comprising a plurality of base layer pictures and a plurality of corresponding enhancement layer pictures. The video coding device may identify a prediction unit (PU) of one of the enhancement layer pictures. The video coding device may determine whether the PU uses an inter-layer reference picture of the enhancement layer picture as a reference picture. The video coding device may set motion vector information associated with the inter-layer reference picture of enhancement layer to a value indicative of zero motion, e.g., if the PU uses the inter-layer reference layer picture as the reference picture.
1.-26. (canceled) 27. A video encoding method comprising: generating a video bitstream comprising a plurality of base layer pictures and a plurality of corresponding enhancement layer pictures; identifying a prediction unit (PU) of one of the enhancement layer pictures; determining whether the PU uses an inter-layer reference picture of the enhancement layer picture as a reference picture; and on a condition that the PU uses the inter-layer reference picture as the reference picture, setting motion vector information associated with the inter-layer reference picture of enhancement layer to a value indicative of zero motion, and sending the motion vector information, associated with the inter-layer picture reference of the enhancement layer, indicative of zero motion. 28. The method of claim 27, wherein the motion vector information associated with the inter-layer reference picture of enhancement layer comprises one or more of a motion vector predictor (MVP), or a motion vector difference (MVD). 29. The method of claim 27, wherein the enhancement layer picture is associated with an enhancement layer and the inter-layer reference picture is derived from a collocated base layer picture. 30. The method of claim 27, wherein the inter-layer reference picture is associated with a reference picture list of an enhancement layer. 31. The method of claim 27, wherein the inter-layer reference picture is stored in a decoded picture buffer (DPB) of enhancement layer. 32. The method of claim 27, wherein the motion vector information associated with the inter-layer reference picture of enhancement layer comprises one or more motion vectors, and wherein the motion vectors are associated with the PU. 33. The method of claim 32, wherein each of the motion vectors is set to a value 0. 34. The method of claim 27, further comprising: on a condition that the PU uses the inter-layer reference picture as the reference picture, disabling the use of the inter-layer reference picture for bi-prediction of the PU of the enhancement layer picture. 35. The method of claim 34, on a condition that the PU uses the inter-layer reference picture as the reference picture, performing motion prediction using uni-prediction. 36. A video decoding method comprising: receiving a video bitstream comprising a plurality of base layer pictures and a plurality of enhancement layer pictures; and on a condition that a prediction unit (PU) of the one of the enhancement layer pictures makes reference to an inter-layer reference picture as a reference picture for motion prediction, receiving an enhancement layer motion vector information, associated with an inter-layer picture, indicative of zero motion, and setting the enhancement layer motion vector information associated with the inter-layer reference picture to a value indicative of zero motion. 37. A video encoding device comprising: a processor configured to: generate a video bitstream comprising a plurality of base layer pictures and a plurality of corresponding enhancement layer pictures; identify a prediction unit (PU) of one of the enhancement layer pictures; determine whether the PU uses an inter-layer reference picture of the enhancement layer picture as a reference picture; and on a condition that the PU uses the inter-layer reference picture as the reference picture, set motion vector information associated with the inter-layer reference picture of enhancement layer to a value indicative of zero motion, and send the motion vector information, associated with the inter-layer reference picture of the enhancement layer, indicative of zero motion. 38. The video encoding device of claim 37, wherein the motion vector information associated with the inter-layer reference picture of enhancement layer comprises one or more of a motion vector predictor (MVP), or a motion vector difference (MVD). 39. The video encoding device of claim 37, wherein the enhancement layer picture is associated with an enhancement layer and the inter-layer reference picture is derived from a collocated base layer picture. 40. The video encoding device of claim 37, wherein the inter-layer reference picture is associated with a reference picture list of enhancement layer. 41. The video encoding device of claim 37, wherein the inter-layer reference picture is stored in a decoded picture buffer (DPB) of enhancement layer. 42. The video encoding device of claim 37, wherein the motion vector information associated with the inter-layer reference picture of enhancement layer comprises one or more motion vectors, and wherein the motion vectors are associated with the PU. 43. The video encoding device of claim 42, wherein each of the motion vectors is set to a value 0. 44. The video encoding device of claim 37, wherein the processor is further configured to: on a condition that the PU uses the inter-layer reference picture as the reference picture, disable the use of the inter-layer reference picture for bi-prediction of the enhancement layer picture. 45. The video encoding device of claim 44, wherein the processor is further configured to: on a condition that the PU uses the inter-layer reference picture as the reference picture, perform motion prediction using uni-prediction. 46. A video decoding device comprising: a processor configured to: receive a video bitstream comprising a plurality of base layer pictures and a plurality of enhancement layer pictures; and on a condition that a prediction unit (PU) of the one of the enhancement layer pictures makes reference to an inter-layer reference picture for motion prediction, receive an enhancement layer motion vector information, associated with the inter-layer reference picture, indicative of zero motion, and set the enhancement layer motion vector information associated with the inter-layer reference picture to a value indicative of zero motion.
Systems, methods and instrumentalities are provided to implement motion information signaling for scalable video coding. A video coding device may generate a video bitstream comprising a plurality of base layer pictures and a plurality of corresponding enhancement layer pictures. The video coding device may identify a prediction unit (PU) of one of the enhancement layer pictures. The video coding device may determine whether the PU uses an inter-layer reference picture of the enhancement layer picture as a reference picture. The video coding device may set motion vector information associated with the inter-layer reference picture of enhancement layer to a value indicative of zero motion, e.g., if the PU uses the inter-layer reference layer picture as the reference picture.1.-26. (canceled) 27. A video encoding method comprising: generating a video bitstream comprising a plurality of base layer pictures and a plurality of corresponding enhancement layer pictures; identifying a prediction unit (PU) of one of the enhancement layer pictures; determining whether the PU uses an inter-layer reference picture of the enhancement layer picture as a reference picture; and on a condition that the PU uses the inter-layer reference picture as the reference picture, setting motion vector information associated with the inter-layer reference picture of enhancement layer to a value indicative of zero motion, and sending the motion vector information, associated with the inter-layer picture reference of the enhancement layer, indicative of zero motion. 28. The method of claim 27, wherein the motion vector information associated with the inter-layer reference picture of enhancement layer comprises one or more of a motion vector predictor (MVP), or a motion vector difference (MVD). 29. The method of claim 27, wherein the enhancement layer picture is associated with an enhancement layer and the inter-layer reference picture is derived from a collocated base layer picture. 30. The method of claim 27, wherein the inter-layer reference picture is associated with a reference picture list of an enhancement layer. 31. The method of claim 27, wherein the inter-layer reference picture is stored in a decoded picture buffer (DPB) of enhancement layer. 32. The method of claim 27, wherein the motion vector information associated with the inter-layer reference picture of enhancement layer comprises one or more motion vectors, and wherein the motion vectors are associated with the PU. 33. The method of claim 32, wherein each of the motion vectors is set to a value 0. 34. The method of claim 27, further comprising: on a condition that the PU uses the inter-layer reference picture as the reference picture, disabling the use of the inter-layer reference picture for bi-prediction of the PU of the enhancement layer picture. 35. The method of claim 34, on a condition that the PU uses the inter-layer reference picture as the reference picture, performing motion prediction using uni-prediction. 36. A video decoding method comprising: receiving a video bitstream comprising a plurality of base layer pictures and a plurality of enhancement layer pictures; and on a condition that a prediction unit (PU) of the one of the enhancement layer pictures makes reference to an inter-layer reference picture as a reference picture for motion prediction, receiving an enhancement layer motion vector information, associated with an inter-layer picture, indicative of zero motion, and setting the enhancement layer motion vector information associated with the inter-layer reference picture to a value indicative of zero motion. 37. A video encoding device comprising: a processor configured to: generate a video bitstream comprising a plurality of base layer pictures and a plurality of corresponding enhancement layer pictures; identify a prediction unit (PU) of one of the enhancement layer pictures; determine whether the PU uses an inter-layer reference picture of the enhancement layer picture as a reference picture; and on a condition that the PU uses the inter-layer reference picture as the reference picture, set motion vector information associated with the inter-layer reference picture of enhancement layer to a value indicative of zero motion, and send the motion vector information, associated with the inter-layer reference picture of the enhancement layer, indicative of zero motion. 38. The video encoding device of claim 37, wherein the motion vector information associated with the inter-layer reference picture of enhancement layer comprises one or more of a motion vector predictor (MVP), or a motion vector difference (MVD). 39. The video encoding device of claim 37, wherein the enhancement layer picture is associated with an enhancement layer and the inter-layer reference picture is derived from a collocated base layer picture. 40. The video encoding device of claim 37, wherein the inter-layer reference picture is associated with a reference picture list of enhancement layer. 41. The video encoding device of claim 37, wherein the inter-layer reference picture is stored in a decoded picture buffer (DPB) of enhancement layer. 42. The video encoding device of claim 37, wherein the motion vector information associated with the inter-layer reference picture of enhancement layer comprises one or more motion vectors, and wherein the motion vectors are associated with the PU. 43. The video encoding device of claim 42, wherein each of the motion vectors is set to a value 0. 44. The video encoding device of claim 37, wherein the processor is further configured to: on a condition that the PU uses the inter-layer reference picture as the reference picture, disable the use of the inter-layer reference picture for bi-prediction of the enhancement layer picture. 45. The video encoding device of claim 44, wherein the processor is further configured to: on a condition that the PU uses the inter-layer reference picture as the reference picture, perform motion prediction using uni-prediction. 46. A video decoding device comprising: a processor configured to: receive a video bitstream comprising a plurality of base layer pictures and a plurality of enhancement layer pictures; and on a condition that a prediction unit (PU) of the one of the enhancement layer pictures makes reference to an inter-layer reference picture for motion prediction, receive an enhancement layer motion vector information, associated with the inter-layer reference picture, indicative of zero motion, and set the enhancement layer motion vector information associated with the inter-layer reference picture to a value indicative of zero motion.
2,400
9,014
9,014
15,870,335
2,492
A technique includes controlling compartmentalized access to a database, including, in a proxy for the database, mapping a user to a set of available query resources based at least in part on at least one credential provided by the user. Controlling the compartmentalized access to the database also includes exposing the set of available query resources to the user for selection based at least in part on the mapping. The set of available query resources includes a query object. The technique includes, in response to the user selecting a query resource, using the proxy to access the database for the user based on the selected query resource and returning a corresponding result to the user.
1. A method comprising: controlling compartmentalized access to a database, comprising: in a proxy for the database, mapping a user to a set of available query resources based at least in part on at least one credential provided by the user, wherein the set of available query resources comprises a query object; exposing the set of available query resources to the user for selection based at least in part on the mapping; and in response to the user selecting a query resource of the available query resources, using the proxy to access the database for the user based on the selected query resource and returning a corresponding result to the user. 2. The method of claim 1, further comprising, in the proxy, authenticating the user based at least in part on the at least one credential, wherein exposing the set of available query resources is further based at least in part on results of the authentication. 3. The method of claim 1, wherein the mapping comprises associating the user with a given user group of a plurality of user groups, and the exposing comprises revealing a set of available query resources based on the association of the user with the given user group. 4. The method of claim 1, wherein exposing the set of available query resources comprises revealing a query template and the user selecting the query resource comprises the user communicating a query method call using the query template, the method further comprising: in response to the user calling, communicating a query based at least in part on the query method call to the database to access the database for the user; and receiving a query result from the database in response to the query, wherein using the proxy to return the result comprises communicating the query result to the user. 5. The method of claim 1, wherein exposing the set of available query resources comprises revealing a handler function call to the user, the handler function call being associated with machine executable instructions hidden to the user, the method further comprising: receiving at least one value from the user for the least one parameter, executing the handler function call based at least in part on execution of the machine executable instructions; and receiving a result from the database in response to the execution of the machine executable instructions. 6. The method of claim 5, wherein executing the handler function call further comprises communicating at least one query to the database. 7. The method of claim 1, wherein exposing the set of available query resources to the user comprises exposing at least one query resource to test whether the user is attempting unauthorized access to the database and selectively generating an alert based at least in part on use of the at least one query resource by the user. 8. The method of claim 1, further comprising using the proxy to expose query resources to at least one other database based at least in part on another mapping associated with the at least one credential. 9. A system comprising: a database; and a database abstraction engine to provide compartmentalized access to the database for a user, the database abstraction engine comprising: an authentication engine to associate the user with a given predefined role of a plurality of predefined roles; an authorization engine to: select a group of methods for accessing the database based at least in part on the association and expose a query object of the selected group of methods to the user to allow the user to select a given method of the plurality of methods; and a processing engine to: transform the selected method without exposing the transformation to the user to generate at least one database request; communicate the at least one database request with the database; and communicate a result of the at least one database request to the user. 10. The system of claim 9, wherein the database abstraction engine further comprises: a remote procedure call interface to communicate remotely with a client associated with the user. 11. The system of claim 10, wherein: the authentication engine performs a validation test on at least one credential provided by the user in a remote procedure call; and the remote procedure call interface, in response to the validation test validating the user: creates a session identification; communicates the session identification to the user; interacts thereafter with the user using at least one other procedure call; and uses the session identification in the at least one other procedure call to identify the user. 12. An article comprising a non-transitory storage medium to store instructions that when executed by a processor-based system cause the processor-based system to: provide a remote procedure call interface to be invoked by a first remote procedure call initiated by a user, wherein the user provides at least one credential in association with the call; in response to the remote procedure call: associate the user with a set of available query resources based at least in part on the at least one credential, the set of available query resources comprising a query object; expose the set of available query resources to the user for selection; and establish a session identification; and in response to at least one remote procedure call associated with the session identification: allow the user to select a query resource of the available query resources; access the database for the user based on the selected query resource; and return a corresponding result to the user. 13. An article of claim 12, the storage medium storing instructions that when executed by the processor-based system cause the processor-based system to: reveal a query template to the user; in response to the user communicating a query method call using the query template, communicate a query based at least in part on the query template to access the database for the user; and receiving a query result from the database in response to the query. 14. An article of claim 12, the storage medium storing instructions that when executed by the processor-based system cause the processor-based system to: reveal a handler function call to the user, the handler function call being associated with machine executable instructions hidden to the user; execute the handler function call based at least in part on execution of the machine executable instructions; and receive a result from the database in response to the execution of the machine executable instructions. 15. An article of claim 12, the storage medium storing instructions that when executed by the processor-based system cause the processor-based system to: expose at least one query resource to test whether the user is attempting unauthorized access to the database and selectively generate an alert based at least in part on use of the at least one query resource by the user.
A technique includes controlling compartmentalized access to a database, including, in a proxy for the database, mapping a user to a set of available query resources based at least in part on at least one credential provided by the user. Controlling the compartmentalized access to the database also includes exposing the set of available query resources to the user for selection based at least in part on the mapping. The set of available query resources includes a query object. The technique includes, in response to the user selecting a query resource, using the proxy to access the database for the user based on the selected query resource and returning a corresponding result to the user.1. A method comprising: controlling compartmentalized access to a database, comprising: in a proxy for the database, mapping a user to a set of available query resources based at least in part on at least one credential provided by the user, wherein the set of available query resources comprises a query object; exposing the set of available query resources to the user for selection based at least in part on the mapping; and in response to the user selecting a query resource of the available query resources, using the proxy to access the database for the user based on the selected query resource and returning a corresponding result to the user. 2. The method of claim 1, further comprising, in the proxy, authenticating the user based at least in part on the at least one credential, wherein exposing the set of available query resources is further based at least in part on results of the authentication. 3. The method of claim 1, wherein the mapping comprises associating the user with a given user group of a plurality of user groups, and the exposing comprises revealing a set of available query resources based on the association of the user with the given user group. 4. The method of claim 1, wherein exposing the set of available query resources comprises revealing a query template and the user selecting the query resource comprises the user communicating a query method call using the query template, the method further comprising: in response to the user calling, communicating a query based at least in part on the query method call to the database to access the database for the user; and receiving a query result from the database in response to the query, wherein using the proxy to return the result comprises communicating the query result to the user. 5. The method of claim 1, wherein exposing the set of available query resources comprises revealing a handler function call to the user, the handler function call being associated with machine executable instructions hidden to the user, the method further comprising: receiving at least one value from the user for the least one parameter, executing the handler function call based at least in part on execution of the machine executable instructions; and receiving a result from the database in response to the execution of the machine executable instructions. 6. The method of claim 5, wherein executing the handler function call further comprises communicating at least one query to the database. 7. The method of claim 1, wherein exposing the set of available query resources to the user comprises exposing at least one query resource to test whether the user is attempting unauthorized access to the database and selectively generating an alert based at least in part on use of the at least one query resource by the user. 8. The method of claim 1, further comprising using the proxy to expose query resources to at least one other database based at least in part on another mapping associated with the at least one credential. 9. A system comprising: a database; and a database abstraction engine to provide compartmentalized access to the database for a user, the database abstraction engine comprising: an authentication engine to associate the user with a given predefined role of a plurality of predefined roles; an authorization engine to: select a group of methods for accessing the database based at least in part on the association and expose a query object of the selected group of methods to the user to allow the user to select a given method of the plurality of methods; and a processing engine to: transform the selected method without exposing the transformation to the user to generate at least one database request; communicate the at least one database request with the database; and communicate a result of the at least one database request to the user. 10. The system of claim 9, wherein the database abstraction engine further comprises: a remote procedure call interface to communicate remotely with a client associated with the user. 11. The system of claim 10, wherein: the authentication engine performs a validation test on at least one credential provided by the user in a remote procedure call; and the remote procedure call interface, in response to the validation test validating the user: creates a session identification; communicates the session identification to the user; interacts thereafter with the user using at least one other procedure call; and uses the session identification in the at least one other procedure call to identify the user. 12. An article comprising a non-transitory storage medium to store instructions that when executed by a processor-based system cause the processor-based system to: provide a remote procedure call interface to be invoked by a first remote procedure call initiated by a user, wherein the user provides at least one credential in association with the call; in response to the remote procedure call: associate the user with a set of available query resources based at least in part on the at least one credential, the set of available query resources comprising a query object; expose the set of available query resources to the user for selection; and establish a session identification; and in response to at least one remote procedure call associated with the session identification: allow the user to select a query resource of the available query resources; access the database for the user based on the selected query resource; and return a corresponding result to the user. 13. An article of claim 12, the storage medium storing instructions that when executed by the processor-based system cause the processor-based system to: reveal a query template to the user; in response to the user communicating a query method call using the query template, communicate a query based at least in part on the query template to access the database for the user; and receiving a query result from the database in response to the query. 14. An article of claim 12, the storage medium storing instructions that when executed by the processor-based system cause the processor-based system to: reveal a handler function call to the user, the handler function call being associated with machine executable instructions hidden to the user; execute the handler function call based at least in part on execution of the machine executable instructions; and receive a result from the database in response to the execution of the machine executable instructions. 15. An article of claim 12, the storage medium storing instructions that when executed by the processor-based system cause the processor-based system to: expose at least one query resource to test whether the user is attempting unauthorized access to the database and selectively generate an alert based at least in part on use of the at least one query resource by the user.
2,400
9,015
9,015
15,230,824
2,448
Methods, systems, and computer program products for processor node load balancing are described. A request for processing is received from a client hardware device, the request having a session identifier. A movable status of a session corresponding to the request is determined using one or more hardware processors, the session executing on a first hardware processor node of a plurality of hardware processor nodes. A load status of the first hardware processor node corresponding to the session is determined using the one or more hardware processors. The request is forwarded to a selected hardware processor node selected from the plurality of hardware processor nodes based on the movable status and the load status.
1. A computerized method for processor node load balancing comprising: receiving, from a client hardware device, a request for processing, the request having a session identifier; determining, using one or more hardware processors, a movable status of a session corresponding to the request, the session executing on a first hardware processor node of a plurality of hardware processor nodes; determining, using the one or more hardware processors, a load status of the first hardware processor node corresponding to the session; and forwarding the request to a selected hardware processor node selected from the plurality of hardware processor nodes based on the movable status and the load status. 2. The computerized method of claim 1, wherein the movable status is non-movable and the first hardware processor node is assigned to be the selected hardware processor node. 3. The computerized method of claim 1, wherein the movable status is movable and the first hardware processor node is assigned to be the selected hardware processor node. 4. The computerized method of claim 1, wherein the movable status is movable and another hardware processor node of the plurality of hardware processor nodes is assigned to be the selected hardware processor node based on the load status. 5. The computerized method of claim 4, wherein the another hardware processor node has a lighter load than the first hardware processor node. 6. The computerized method of claim 5, wherein the load is based on a count of open requests and a non-active, non-movable parameter, the non-active, non-movable parameter based on a count of non-active, non-movable sessions. 7. The computerized method of claim 6, wherein the non-active, non-movable parameter is based on the count of non-active, non-movable sessions adjusted by a probability factor, the probability factor based on an amount of time since a last request was received. 8. The computerized method of claim 4, further comprising issuing a close session request to the first hardware processor node and dispatching the request to the another hardware processor node. 9. The computerized method of claim 4, further comprising receiving a response from the another hardware processor node, the response comprising a new session identifier. 10. The computerized method of claim 1, further comprising: receiving a second request from the client hardware device, the request lacking a session identifier, and dispatching the second request to a hardware processor node having a least number of open sessions. 11. The computerized method of claim 1, further comprising tracking a movable status of the session corresponding to the request. 12. The computerized method of claim 1, further comprising tracking a count of open requests and a time of a last request of the session corresponding to the request. 13. The computerized method of claim 11, wherein the movable status is updated in response to receiving a response from the first hardware processor node. 14. An apparatus for processor node load balancing, the apparatus comprising: one or more processors; memory to store instructions that, when executed by the one or more hardware processors perform operations comprising: receiving, from a client hardware device, a request for processing, the request having a session identifier; determining, using one or more hardware processors, a movable status of a session corresponding to the request, the session executing on a first hardware processor node of a plurality of hardware processor nodes; determining, using the one or more hardware processors, a load status of the first hardware processor node corresponding to the session; and forwarding the request to a selected hardware processor node selected from the plurality of hardware processor nodes based on the movable status and the load status. 15. The apparatus of claim 14, wherein the movable status is non-movable and the first hardware processor node is assigned to be the selected hardware processor node. 16. The apparatus of claim 14, wherein the movable status is movable and the first hardware processor node is assigned to be the selected hardware processor node. 17. The apparatus of claim 14, wherein the movable status is movable and another hardware processor node of the plurality of hardware processor nodes is assigned to be the selected hardware processor node based on the load status. 18. The apparatus of claim 14, wherein the load is based on a count of open requests and a non-active, non-movable parameter, the non-active, non-movable parameter based on a count of non-active, non-movable sessions. 19. The apparatus of claim 14, further comprising: receiving a second request from the client hardware device, the request lacking a session identifier; and dispatching the second request to a hardware processor node having a least number of open sessions. 20. A non-transitory machine-readable storage medium comprising instructions, which when implemented by one or more machines, cause the one or more machines to perform operations comprising: receiving, from a client hardware device, a request for processing, the request having a session identifier; determining, using one or more hardware processors, a movable status of a session corresponding to the request, the session executing on a first hardware processor node of a plurality of hardware processor nodes; determining, using the one or more hardware processors, a load status of the first hardware processor node corresponding to the session; and forwarding the request to a selected hardware processor node selected from the plurality of hardware processor nodes based on the movable status and the load status.
Methods, systems, and computer program products for processor node load balancing are described. A request for processing is received from a client hardware device, the request having a session identifier. A movable status of a session corresponding to the request is determined using one or more hardware processors, the session executing on a first hardware processor node of a plurality of hardware processor nodes. A load status of the first hardware processor node corresponding to the session is determined using the one or more hardware processors. The request is forwarded to a selected hardware processor node selected from the plurality of hardware processor nodes based on the movable status and the load status.1. A computerized method for processor node load balancing comprising: receiving, from a client hardware device, a request for processing, the request having a session identifier; determining, using one or more hardware processors, a movable status of a session corresponding to the request, the session executing on a first hardware processor node of a plurality of hardware processor nodes; determining, using the one or more hardware processors, a load status of the first hardware processor node corresponding to the session; and forwarding the request to a selected hardware processor node selected from the plurality of hardware processor nodes based on the movable status and the load status. 2. The computerized method of claim 1, wherein the movable status is non-movable and the first hardware processor node is assigned to be the selected hardware processor node. 3. The computerized method of claim 1, wherein the movable status is movable and the first hardware processor node is assigned to be the selected hardware processor node. 4. The computerized method of claim 1, wherein the movable status is movable and another hardware processor node of the plurality of hardware processor nodes is assigned to be the selected hardware processor node based on the load status. 5. The computerized method of claim 4, wherein the another hardware processor node has a lighter load than the first hardware processor node. 6. The computerized method of claim 5, wherein the load is based on a count of open requests and a non-active, non-movable parameter, the non-active, non-movable parameter based on a count of non-active, non-movable sessions. 7. The computerized method of claim 6, wherein the non-active, non-movable parameter is based on the count of non-active, non-movable sessions adjusted by a probability factor, the probability factor based on an amount of time since a last request was received. 8. The computerized method of claim 4, further comprising issuing a close session request to the first hardware processor node and dispatching the request to the another hardware processor node. 9. The computerized method of claim 4, further comprising receiving a response from the another hardware processor node, the response comprising a new session identifier. 10. The computerized method of claim 1, further comprising: receiving a second request from the client hardware device, the request lacking a session identifier, and dispatching the second request to a hardware processor node having a least number of open sessions. 11. The computerized method of claim 1, further comprising tracking a movable status of the session corresponding to the request. 12. The computerized method of claim 1, further comprising tracking a count of open requests and a time of a last request of the session corresponding to the request. 13. The computerized method of claim 11, wherein the movable status is updated in response to receiving a response from the first hardware processor node. 14. An apparatus for processor node load balancing, the apparatus comprising: one or more processors; memory to store instructions that, when executed by the one or more hardware processors perform operations comprising: receiving, from a client hardware device, a request for processing, the request having a session identifier; determining, using one or more hardware processors, a movable status of a session corresponding to the request, the session executing on a first hardware processor node of a plurality of hardware processor nodes; determining, using the one or more hardware processors, a load status of the first hardware processor node corresponding to the session; and forwarding the request to a selected hardware processor node selected from the plurality of hardware processor nodes based on the movable status and the load status. 15. The apparatus of claim 14, wherein the movable status is non-movable and the first hardware processor node is assigned to be the selected hardware processor node. 16. The apparatus of claim 14, wherein the movable status is movable and the first hardware processor node is assigned to be the selected hardware processor node. 17. The apparatus of claim 14, wherein the movable status is movable and another hardware processor node of the plurality of hardware processor nodes is assigned to be the selected hardware processor node based on the load status. 18. The apparatus of claim 14, wherein the load is based on a count of open requests and a non-active, non-movable parameter, the non-active, non-movable parameter based on a count of non-active, non-movable sessions. 19. The apparatus of claim 14, further comprising: receiving a second request from the client hardware device, the request lacking a session identifier; and dispatching the second request to a hardware processor node having a least number of open sessions. 20. A non-transitory machine-readable storage medium comprising instructions, which when implemented by one or more machines, cause the one or more machines to perform operations comprising: receiving, from a client hardware device, a request for processing, the request having a session identifier; determining, using one or more hardware processors, a movable status of a session corresponding to the request, the session executing on a first hardware processor node of a plurality of hardware processor nodes; determining, using the one or more hardware processors, a load status of the first hardware processor node corresponding to the session; and forwarding the request to a selected hardware processor node selected from the plurality of hardware processor nodes based on the movable status and the load status.
2,400
9,016
9,016
13,706,838
2,484
A method and apparatus for digital image correlation. A camera system is used to obtain larger scale images of a larger scale dot pattern on a surface of a workpiece and smaller scale images of a smaller scale dot pattern on the surface of the same workpiece. The smaller scale dot pattern forms a larger dot in the larger scale dot pattern in the larger scale images. The larger scale images and the smaller scale images may be used to determine a measurement of the workpiece.
1. A workpiece, comprising: a first plurality of dots on a surface of the workpiece forming a first dot pattern, wherein the first plurality of dots comprises a first dot and wherein the first dot comprises a second plurality of dots forming a second dot pattern. 2. The workpiece of claim 1, wherein the first plurality of dots comprise a plurality of substantially solid dots. 3. The workpiece of claim 1, wherein: positions of the first plurality of dots on the surface are defined by a template comprising a plurality of apertures; and the second plurality of dots are formed in areas on the surface defined by a number of selected apertures in the plurality of apertures. 4. The workpiece of claim 3, wherein the second plurality of dots are applied on the surface by airbrush spraying in the number of selected apertures. 5. The workpiece of claim 1, wherein the second plurality of dots are applied on the surface by printing the second dot pattern on the surface. 6. The workpiece of claim 1, wherein the second plurality of dots comprises a second dot and wherein the second dot comprises a third plurality of dots forming a third dot pattern. 7. A method for applying a multiple-scale dot pattern on a workpiece, comprising: applying a plurality of smaller dots on a surface of the workpiece to form a smaller scale dot pattern, wherein the plurality of smaller dots form a larger dot in a larger scale dot pattern on the surface; and applying a plurality of larger dots on the surface to form the larger scale dot pattern. 8. The method of claim 7, wherein the plurality of larger dots comprise a plurality of substantially solid dots. 9. The method of claim 7 further comprising: placing a template comprising a plurality of apertures on the surface; applying the plurality of smaller dots in an area on the surface defined by a number of selected apertures in the plurality of apertures; and applying the plurality of larger dots on the surface in areas defined by the plurality of apertures. 10. The method of claim 9, wherein applying the plurality of smaller dots comprises airbrush spraying in the number of selected apertures. 11. The method of claim 7, wherein applying the plurality of smaller dots comprises printing the smaller scale dot pattern on the surface. 12. The method of claim 7 further comprising: obtaining, by a camera system, larger scale images of the larger scale dot pattern; obtaining, by the camera system, smaller scale images of the smaller scale dot pattern; and using the larger scale images and the smaller scale images to determine a measurement of the workpiece. 13. The method of claim 12, wherein the larger scale images and the smaller scale images are obtained at a same time by the camera system. 14. The method of claim 12, wherein the measurement is selected from a measurement of a displacement of the workpiece and a measurement of a strain on the workpiece. 15. A method for digital image correlation, comprising: obtaining, by a camera system, larger scale images of a larger scale dot pattern on a surface of a workpiece; obtaining, by the camera system, smaller scale images of a smaller scale dot pattern on the surface of the workpiece, wherein the smaller scale dot pattern forms a larger dot in the larger scale dot pattern in the larger scale images; and using the larger scale images and the smaller scale images to determine a measurement of the workpiece. 16. The method of claim 15, wherein the larger scale images and the smaller scale images are obtained at a same time by the camera system. 17. The method of claim 16, wherein: the camera system comprises a first set of cameras configured to obtain the larger scale images; and the camera system comprises a second set of cameras configured to obtain the smaller scale images. 18. The method of claim 15, wherein: the camera system comprises a single set of cameras configured to obtain the larger scale images; and further comprising changing a configuration of the single set of cameras to obtain the smaller scale images. 19. The method of claim 15, wherein the larger scale dot pattern comprises a plurality of substantially solid dots. 20. The method of claim 15 further comprising: obtaining, by the camera system, images of a dot pattern on the surface of the workpiece, wherein the dot pattern forms a smaller dot in the smaller scale dot pattern in the smaller scale images; and using the images to determine a measurement of the workpiece.
A method and apparatus for digital image correlation. A camera system is used to obtain larger scale images of a larger scale dot pattern on a surface of a workpiece and smaller scale images of a smaller scale dot pattern on the surface of the same workpiece. The smaller scale dot pattern forms a larger dot in the larger scale dot pattern in the larger scale images. The larger scale images and the smaller scale images may be used to determine a measurement of the workpiece.1. A workpiece, comprising: a first plurality of dots on a surface of the workpiece forming a first dot pattern, wherein the first plurality of dots comprises a first dot and wherein the first dot comprises a second plurality of dots forming a second dot pattern. 2. The workpiece of claim 1, wherein the first plurality of dots comprise a plurality of substantially solid dots. 3. The workpiece of claim 1, wherein: positions of the first plurality of dots on the surface are defined by a template comprising a plurality of apertures; and the second plurality of dots are formed in areas on the surface defined by a number of selected apertures in the plurality of apertures. 4. The workpiece of claim 3, wherein the second plurality of dots are applied on the surface by airbrush spraying in the number of selected apertures. 5. The workpiece of claim 1, wherein the second plurality of dots are applied on the surface by printing the second dot pattern on the surface. 6. The workpiece of claim 1, wherein the second plurality of dots comprises a second dot and wherein the second dot comprises a third plurality of dots forming a third dot pattern. 7. A method for applying a multiple-scale dot pattern on a workpiece, comprising: applying a plurality of smaller dots on a surface of the workpiece to form a smaller scale dot pattern, wherein the plurality of smaller dots form a larger dot in a larger scale dot pattern on the surface; and applying a plurality of larger dots on the surface to form the larger scale dot pattern. 8. The method of claim 7, wherein the plurality of larger dots comprise a plurality of substantially solid dots. 9. The method of claim 7 further comprising: placing a template comprising a plurality of apertures on the surface; applying the plurality of smaller dots in an area on the surface defined by a number of selected apertures in the plurality of apertures; and applying the plurality of larger dots on the surface in areas defined by the plurality of apertures. 10. The method of claim 9, wherein applying the plurality of smaller dots comprises airbrush spraying in the number of selected apertures. 11. The method of claim 7, wherein applying the plurality of smaller dots comprises printing the smaller scale dot pattern on the surface. 12. The method of claim 7 further comprising: obtaining, by a camera system, larger scale images of the larger scale dot pattern; obtaining, by the camera system, smaller scale images of the smaller scale dot pattern; and using the larger scale images and the smaller scale images to determine a measurement of the workpiece. 13. The method of claim 12, wherein the larger scale images and the smaller scale images are obtained at a same time by the camera system. 14. The method of claim 12, wherein the measurement is selected from a measurement of a displacement of the workpiece and a measurement of a strain on the workpiece. 15. A method for digital image correlation, comprising: obtaining, by a camera system, larger scale images of a larger scale dot pattern on a surface of a workpiece; obtaining, by the camera system, smaller scale images of a smaller scale dot pattern on the surface of the workpiece, wherein the smaller scale dot pattern forms a larger dot in the larger scale dot pattern in the larger scale images; and using the larger scale images and the smaller scale images to determine a measurement of the workpiece. 16. The method of claim 15, wherein the larger scale images and the smaller scale images are obtained at a same time by the camera system. 17. The method of claim 16, wherein: the camera system comprises a first set of cameras configured to obtain the larger scale images; and the camera system comprises a second set of cameras configured to obtain the smaller scale images. 18. The method of claim 15, wherein: the camera system comprises a single set of cameras configured to obtain the larger scale images; and further comprising changing a configuration of the single set of cameras to obtain the smaller scale images. 19. The method of claim 15, wherein the larger scale dot pattern comprises a plurality of substantially solid dots. 20. The method of claim 15 further comprising: obtaining, by the camera system, images of a dot pattern on the surface of the workpiece, wherein the dot pattern forms a smaller dot in the smaller scale dot pattern in the smaller scale images; and using the images to determine a measurement of the workpiece.
2,400
9,017
9,017
16,049,154
2,476
Some embodiments of the invention provide a load balancer for distributing packet flows that are addressed to a group of data compute nodes (DCNs) amongst the DCNs of the group. In some embodiments, the load balancer includes a connection data storage comprising several different destination network address translation (DNAT) tables. Each particular DNAT table is defined at a particular instance in time and stores the identity of a plurality DCNs that are part of the group at the particular instance in time. Each time a DCN is added to the group, the load balancer of some embodiments creates a new DNAT table in the connection data storage for processing new packet flows, while using previously created DNAT tables to process packets that are part of previously processed packet flows.
1. A load balancer for distributing packet flows that are addressed to a group of data compute nodes (DCNs) amongst the DCNs of the group, the load balancer comprising: a connection data storage comprising a plurality of different destination network address translation (DNAT) tables; wherein each particular DNAT table is defined at a particular instance in time and stores the identity of a plurality DCNs that are part of the group at the particular instance in time; wherein each time a DCN is added to the group, a new DNAT table is created in the connection data storage for processing new packet flows, while previously created DNAT tables are used to process packets that are part of previously processed packet flows. 2. The load balancer of claim 1, wherein each DNAT table stores a plurality of network addresses for a plurality of DCNs; wherein each packet within a set of packet flows are addressed to a virtual address of the group; wherein for each packet of a particular packet flow within the set of packet flows, the connection data storage provides a network address to replace the virtual address specified in the packet. 3. The load balancer of 2, wherein the virtual address is a virtual Internet Protocol (VIP) address, and the network addresses of the DCNs are destination Internet Protocol (DIP) addresses. 4. The load balancer of claim 2, wherein the DNAT table that is designated for processing the particular packet flow is the DNAT table that is designated as a current DNAT table when the packet flow is initially received by the load balancer for processing. 5. The load balancer of claim 1 further comprising: a packet processor for receiving packets that are addressed to the DCN group and directing at least two different packets that are part of two different packet data flows to two different DCNs in the group; wherein the packet processor directs a particular packet to a particular DCN by (i) directing the connection data storage to retrieve from one DNAT table a network address for the particular DCN, and (ii) replacing a virtual group address in a header of the particular packet with the retrieved network address. 6. The load balancer of claim 1, wherein each DNAT table is a resilient DNAT table that directs a packet flow to a new DCN when the packet flow is initially being directed to another DCN that is subsequently removed from the DCN group. 7. The load balancer of claim 1, wherein a DCN is removed from the DCN group when the DCN fails or is affirmatively removed by an administrator. 8. The load balancer of claim 1, wherein each time a DCN is removed from the DCN group, a new DNAT table is created in the connection data storage for processing new packet flows, while previously created DNAT tables are used to process packets that are part of previously processed packet flows. 9. The load balancer of claim 1, wherein the connection data storage further comprises a hash table for storing records that (i) identify the packet flows that the connection data storage has previously received for processing and (ii) for each identified packet flow, identify the DNAT table that is used to process the packet flow. 10. The load balancer of claim 9, wherein the hash table stores a set of flow attributes that is to be matched against a set of flow attributes that is extracted from a packet. 11. The load balancer of claim 9, wherein the hash table is a proxy hash table that stores a hash of a set of flow attributes, said stored hash for matching against a hash of a set of flow attributes that is extracted from a packet. 12. A method for distributing packet flows that are addressed to a group of data compute nodes (DCNs) amongst the DCNs of the group, the method comprising: storing a plurality of different destination network address translation (DNAT) tables, wherein each particular DNAT table is defined at a particular instance in time and stores the identity of a plurality DCNs that are part of the group at the particular instance in time; and after addition of a DCN to the group, creating a new DNAT table for processing new packet flows, while using previously created DNAT tables to process packets that are part of previously processed packet flows. 13. The method of claim 12, wherein each DNAT table stores a plurality of network addresses for a plurality of DCNs, and each packet within a set of packet flows are addressed to a virtual address of the group, the method further comprising: for each packet of a particular packet flow within the set of packet flows, retrieving a network address from the DNAT table that is designated for processing the particular packet flow; and replacing the virtual address specified in the packet by the retrieved network address. 14. The method of 13, wherein the virtual address is a virtual Internet Protocol (VIP) address, and the network addresses of the DCNs are destination Internet Protocol (DIP) addresses. 15. The method of claim 13, wherein the DNAT table that is designated for processing the particular packet flow is the DNAT table that is designated as a current DNAT table when the packet flow is initially received by the load balancer for processing. 16. The method of claim 12, wherein each DNAT table is a resilient DNAT table that directs a packet flow to a new DCN when the packet flow is initially being directed to another DCN that is subsequently removed from the DCN group. 17. The method of claim 12 further comprising: each time a DCN is removed from the DCN group, creating a new DNAT table for processing new packet flows, while using previously created DNAT tables to process packets that are part of previously processed packet flows. 18. The method of claim 12 further comprising: using a hash table to store records that (i) identify the packet flows that were previously processed using the DNAT tables, and (ii) for each identified packet flow, identify the DNAT table that is used to process the packet flow. 19. The method of claim 18, wherein the hash table stores a set of flow attributes that is to be matched against a set of flow attributes that is extracted from a packet. 20. The method of claim 19, wherein the hash table is a proxy hash table that stores a hash of a set of flow attributes, said stored hash for matching against a hash of a set of flow attributes that is extracted from a packet. 21. The method of claim 12, wherein creating the new DNAT table is upon the addition of the DCN to the group. 23. The method of claim 12, wherein creating the new DNAT table is a time period after the addition of the DCN to the group.
Some embodiments of the invention provide a load balancer for distributing packet flows that are addressed to a group of data compute nodes (DCNs) amongst the DCNs of the group. In some embodiments, the load balancer includes a connection data storage comprising several different destination network address translation (DNAT) tables. Each particular DNAT table is defined at a particular instance in time and stores the identity of a plurality DCNs that are part of the group at the particular instance in time. Each time a DCN is added to the group, the load balancer of some embodiments creates a new DNAT table in the connection data storage for processing new packet flows, while using previously created DNAT tables to process packets that are part of previously processed packet flows.1. A load balancer for distributing packet flows that are addressed to a group of data compute nodes (DCNs) amongst the DCNs of the group, the load balancer comprising: a connection data storage comprising a plurality of different destination network address translation (DNAT) tables; wherein each particular DNAT table is defined at a particular instance in time and stores the identity of a plurality DCNs that are part of the group at the particular instance in time; wherein each time a DCN is added to the group, a new DNAT table is created in the connection data storage for processing new packet flows, while previously created DNAT tables are used to process packets that are part of previously processed packet flows. 2. The load balancer of claim 1, wherein each DNAT table stores a plurality of network addresses for a plurality of DCNs; wherein each packet within a set of packet flows are addressed to a virtual address of the group; wherein for each packet of a particular packet flow within the set of packet flows, the connection data storage provides a network address to replace the virtual address specified in the packet. 3. The load balancer of 2, wherein the virtual address is a virtual Internet Protocol (VIP) address, and the network addresses of the DCNs are destination Internet Protocol (DIP) addresses. 4. The load balancer of claim 2, wherein the DNAT table that is designated for processing the particular packet flow is the DNAT table that is designated as a current DNAT table when the packet flow is initially received by the load balancer for processing. 5. The load balancer of claim 1 further comprising: a packet processor for receiving packets that are addressed to the DCN group and directing at least two different packets that are part of two different packet data flows to two different DCNs in the group; wherein the packet processor directs a particular packet to a particular DCN by (i) directing the connection data storage to retrieve from one DNAT table a network address for the particular DCN, and (ii) replacing a virtual group address in a header of the particular packet with the retrieved network address. 6. The load balancer of claim 1, wherein each DNAT table is a resilient DNAT table that directs a packet flow to a new DCN when the packet flow is initially being directed to another DCN that is subsequently removed from the DCN group. 7. The load balancer of claim 1, wherein a DCN is removed from the DCN group when the DCN fails or is affirmatively removed by an administrator. 8. The load balancer of claim 1, wherein each time a DCN is removed from the DCN group, a new DNAT table is created in the connection data storage for processing new packet flows, while previously created DNAT tables are used to process packets that are part of previously processed packet flows. 9. The load balancer of claim 1, wherein the connection data storage further comprises a hash table for storing records that (i) identify the packet flows that the connection data storage has previously received for processing and (ii) for each identified packet flow, identify the DNAT table that is used to process the packet flow. 10. The load balancer of claim 9, wherein the hash table stores a set of flow attributes that is to be matched against a set of flow attributes that is extracted from a packet. 11. The load balancer of claim 9, wherein the hash table is a proxy hash table that stores a hash of a set of flow attributes, said stored hash for matching against a hash of a set of flow attributes that is extracted from a packet. 12. A method for distributing packet flows that are addressed to a group of data compute nodes (DCNs) amongst the DCNs of the group, the method comprising: storing a plurality of different destination network address translation (DNAT) tables, wherein each particular DNAT table is defined at a particular instance in time and stores the identity of a plurality DCNs that are part of the group at the particular instance in time; and after addition of a DCN to the group, creating a new DNAT table for processing new packet flows, while using previously created DNAT tables to process packets that are part of previously processed packet flows. 13. The method of claim 12, wherein each DNAT table stores a plurality of network addresses for a plurality of DCNs, and each packet within a set of packet flows are addressed to a virtual address of the group, the method further comprising: for each packet of a particular packet flow within the set of packet flows, retrieving a network address from the DNAT table that is designated for processing the particular packet flow; and replacing the virtual address specified in the packet by the retrieved network address. 14. The method of 13, wherein the virtual address is a virtual Internet Protocol (VIP) address, and the network addresses of the DCNs are destination Internet Protocol (DIP) addresses. 15. The method of claim 13, wherein the DNAT table that is designated for processing the particular packet flow is the DNAT table that is designated as a current DNAT table when the packet flow is initially received by the load balancer for processing. 16. The method of claim 12, wherein each DNAT table is a resilient DNAT table that directs a packet flow to a new DCN when the packet flow is initially being directed to another DCN that is subsequently removed from the DCN group. 17. The method of claim 12 further comprising: each time a DCN is removed from the DCN group, creating a new DNAT table for processing new packet flows, while using previously created DNAT tables to process packets that are part of previously processed packet flows. 18. The method of claim 12 further comprising: using a hash table to store records that (i) identify the packet flows that were previously processed using the DNAT tables, and (ii) for each identified packet flow, identify the DNAT table that is used to process the packet flow. 19. The method of claim 18, wherein the hash table stores a set of flow attributes that is to be matched against a set of flow attributes that is extracted from a packet. 20. The method of claim 19, wherein the hash table is a proxy hash table that stores a hash of a set of flow attributes, said stored hash for matching against a hash of a set of flow attributes that is extracted from a packet. 21. The method of claim 12, wherein creating the new DNAT table is upon the addition of the DCN to the group. 23. The method of claim 12, wherein creating the new DNAT table is a time period after the addition of the DCN to the group.
2,400
9,018
9,018
15,335,072
2,443
Processing electronic mail can include receiving, within an electronic mail server, an electronic mail from a sender client system, sending acceptance criteria for a recipient of the electronic mail to the sender client system responsive to receiving the electronic mail, and receiving, within the electronic mail server, acceptance criteria values from the sender client system in response to the acceptance criteria for the recipient. Using a processor of the electronic mail server, a determination is made whether the acceptance criteria values comply with the acceptance criteria. Responsive to determining that the acceptance criteria values are non-compliant with the acceptance criteria, the electronic mail server rejects the electronic mail, wherein the electronic mail is not delivered to the recipient, and providing, to the sender client system, an indication of rejection of the electronic mail including a reason for non-compliance.
1-20. (canceled) 21. A computer-implemented method performed within an electronic mail server, comprising: sending, responsive to receiving an electronic mail from a sender client system, acceptance criteria for a recipient of the electronic mail to the sender client system; receiving, from the sender client system and in response to the acceptance criteria, acceptance criteria values; rejecting the electronic mail upon a determination that the acceptance criteria values are non-compliant with the acceptance criteria; and providing, to the sender client system, a reason as to non-compliance of the electronic mail. 22. The method of claim 21, further comprising: receiving, from the sender client system, a modified acceptance criteria value; and sending the electronic mail to the recipient responsive to a determination that the acceptance criteria values comply with the acceptance criteria. 23. The method of claim 21, further comprising: identifying acceptance criteria for each of a plurality of recipients of the electronic mail; and sending, to the sender client system, a union of acceptance criteria for the plurality of recipients. 24. The method of claim 21, wherein the acceptance criteria comprise a date range during which the recipient is out of the office and a delegate for the recipient. 25. The method of claim 24, wherein the rejecting includes providing, to the sender client system, an out of office electronic mail handling option for the rejected electronic mail. 26. The method of claim 25, wherein the out of office electronic mail handling option schedules the electronic mail to be sent to the recipient after an ending date of the date range. 27. The method of claim 25, wherein the out of office electronic mail handling option cancels sending of the electronic mail. 28. An electronic mail server, comprising: a hardware processor programmed to initiate the following executable operations: sending, responsive to receiving an electronic mail from a sender client system, acceptance criteria for a recipient of the electronic mail to the sender client system; receiving, from the sender client system and in response to the acceptance criteria, acceptance criteria values; rejecting the electronic mail upon a determination that the acceptance criteria values are non-compliant with the acceptance criteria; and providing, to the sender client system, a reason as to non-compliance of the electronic mail. 29. The server of claim 28, wherein the hardware processor is further configured to initiate the following executable operations: receiving, from the sender client system, a modified acceptance criteria value; and sending the electronic mail to the recipient responsive to a determination that the acceptance criteria values comply with the acceptance criteria. 30. The server of claim 28, wherein the hardware processor is further configured to initiate the following executable operations: identifying acceptance criteria for each of a plurality of recipients of the electronic mail; and sending, to the sender client system, a union of acceptance criteria for the plurality of recipients. 31. The server of claim 28, wherein the acceptance criteria comprise a date range during which the recipient is out of the office and a delegate for the recipient. 32. The server of claim 31, wherein the rejecting includes providing, to the sender client system, an out of office electronic mail handling option for the rejected electronic mail. 33. The server of claim 32, wherein the out of office electronic mail handling option schedules the electronic mail to be sent to the recipient after an ending date of the date range. 34. The server of claim 32, wherein the out of office electronic mail handling option cancels sending of the electronic mail. 35. A computer program product, comprising a computer readable storage medium having program code stored thereon, the program code executable, which when executed by an electronic mail server, causes the electronic mail server to perform: sending, responsive to receiving an electronic mail from a sender client system, acceptance criteria for a recipient of the electronic mail to the sender client system; receiving, from the sender client system and in response to the acceptance criteria, acceptance criteria values; rejecting the electronic mail upon a determination that the acceptance criteria values are non-compliant with the acceptance criteria; and providing, to the sender client system, a reason as to non-compliance of the electronic mail. 36. The computer program product of claim 35, wherein the program code executable further causes the electronic mail server to perform: receiving, from the sender client system, a modified acceptance criteria value; and sending the electronic mail to the recipient responsive to a determination that the acceptance criteria values comply with the acceptance criteria. 37. The computer program product of claim 35, wherein the program code executable further causes the electronic mail server to perform: identifying acceptance criteria for each of a plurality of recipients of the electronic mail; and sending, to the sender client system, a union of acceptance criteria for the plurality of recipients. 38. The computer program product of claim 35, wherein the acceptance criteria comprise a date range during which the recipient is out of the office and a delegate for the recipient. 39. The computer program product of claim 38, wherein the rejecting includes providing, to the sender client system, an out of office electronic mail handling option for the rejected electronic mail. 40. The computer program product of claim 39, wherein the out of office electronic mail handling option schedules the electronic mail to be sent to the recipient after an ending date of the date range.
Processing electronic mail can include receiving, within an electronic mail server, an electronic mail from a sender client system, sending acceptance criteria for a recipient of the electronic mail to the sender client system responsive to receiving the electronic mail, and receiving, within the electronic mail server, acceptance criteria values from the sender client system in response to the acceptance criteria for the recipient. Using a processor of the electronic mail server, a determination is made whether the acceptance criteria values comply with the acceptance criteria. Responsive to determining that the acceptance criteria values are non-compliant with the acceptance criteria, the electronic mail server rejects the electronic mail, wherein the electronic mail is not delivered to the recipient, and providing, to the sender client system, an indication of rejection of the electronic mail including a reason for non-compliance.1-20. (canceled) 21. A computer-implemented method performed within an electronic mail server, comprising: sending, responsive to receiving an electronic mail from a sender client system, acceptance criteria for a recipient of the electronic mail to the sender client system; receiving, from the sender client system and in response to the acceptance criteria, acceptance criteria values; rejecting the electronic mail upon a determination that the acceptance criteria values are non-compliant with the acceptance criteria; and providing, to the sender client system, a reason as to non-compliance of the electronic mail. 22. The method of claim 21, further comprising: receiving, from the sender client system, a modified acceptance criteria value; and sending the electronic mail to the recipient responsive to a determination that the acceptance criteria values comply with the acceptance criteria. 23. The method of claim 21, further comprising: identifying acceptance criteria for each of a plurality of recipients of the electronic mail; and sending, to the sender client system, a union of acceptance criteria for the plurality of recipients. 24. The method of claim 21, wherein the acceptance criteria comprise a date range during which the recipient is out of the office and a delegate for the recipient. 25. The method of claim 24, wherein the rejecting includes providing, to the sender client system, an out of office electronic mail handling option for the rejected electronic mail. 26. The method of claim 25, wherein the out of office electronic mail handling option schedules the electronic mail to be sent to the recipient after an ending date of the date range. 27. The method of claim 25, wherein the out of office electronic mail handling option cancels sending of the electronic mail. 28. An electronic mail server, comprising: a hardware processor programmed to initiate the following executable operations: sending, responsive to receiving an electronic mail from a sender client system, acceptance criteria for a recipient of the electronic mail to the sender client system; receiving, from the sender client system and in response to the acceptance criteria, acceptance criteria values; rejecting the electronic mail upon a determination that the acceptance criteria values are non-compliant with the acceptance criteria; and providing, to the sender client system, a reason as to non-compliance of the electronic mail. 29. The server of claim 28, wherein the hardware processor is further configured to initiate the following executable operations: receiving, from the sender client system, a modified acceptance criteria value; and sending the electronic mail to the recipient responsive to a determination that the acceptance criteria values comply with the acceptance criteria. 30. The server of claim 28, wherein the hardware processor is further configured to initiate the following executable operations: identifying acceptance criteria for each of a plurality of recipients of the electronic mail; and sending, to the sender client system, a union of acceptance criteria for the plurality of recipients. 31. The server of claim 28, wherein the acceptance criteria comprise a date range during which the recipient is out of the office and a delegate for the recipient. 32. The server of claim 31, wherein the rejecting includes providing, to the sender client system, an out of office electronic mail handling option for the rejected electronic mail. 33. The server of claim 32, wherein the out of office electronic mail handling option schedules the electronic mail to be sent to the recipient after an ending date of the date range. 34. The server of claim 32, wherein the out of office electronic mail handling option cancels sending of the electronic mail. 35. A computer program product, comprising a computer readable storage medium having program code stored thereon, the program code executable, which when executed by an electronic mail server, causes the electronic mail server to perform: sending, responsive to receiving an electronic mail from a sender client system, acceptance criteria for a recipient of the electronic mail to the sender client system; receiving, from the sender client system and in response to the acceptance criteria, acceptance criteria values; rejecting the electronic mail upon a determination that the acceptance criteria values are non-compliant with the acceptance criteria; and providing, to the sender client system, a reason as to non-compliance of the electronic mail. 36. The computer program product of claim 35, wherein the program code executable further causes the electronic mail server to perform: receiving, from the sender client system, a modified acceptance criteria value; and sending the electronic mail to the recipient responsive to a determination that the acceptance criteria values comply with the acceptance criteria. 37. The computer program product of claim 35, wherein the program code executable further causes the electronic mail server to perform: identifying acceptance criteria for each of a plurality of recipients of the electronic mail; and sending, to the sender client system, a union of acceptance criteria for the plurality of recipients. 38. The computer program product of claim 35, wherein the acceptance criteria comprise a date range during which the recipient is out of the office and a delegate for the recipient. 39. The computer program product of claim 38, wherein the rejecting includes providing, to the sender client system, an out of office electronic mail handling option for the rejected electronic mail. 40. The computer program product of claim 39, wherein the out of office electronic mail handling option schedules the electronic mail to be sent to the recipient after an ending date of the date range.
2,400
9,019
9,019
16,257,929
2,455
A system and method for improving network storage accessibility, the method including: sending at least a first request for a data block to be sent from a storage device to a client device over a network connection; determining if the network is congested; initiating a client-specific buffer when it is determined that the network is congested, wherein the requested data block is stored in the client-specific buffer; and sending at least a second request for the data block stored within the client-specific buffer to be sent to the client device.
1. A method for improving network storage accessibility, the method comprising: sending at least a first request for a data block to be sent from a storage device to a client device over a network connection; determining if the network is congested; initiating a client-specific buffer when it is determined that the network is congested, wherein the requested data block is stored in the client-specific buffer; and sending at least a second request for the data block stored within the client-specific buffer to be sent to the client device. 2. The method of claim 1, wherein the client-specific buffer is initiated within at least one of: the storage device and a switch. 3. The method of claim 1, wherein the data block is sent to the client device via a switch that includes a first memory buffer for ingress network traffic and a second memory buffer for egress network traffic. 4. The method of claim 3, wherein determining if the network is congested further comprises: determining that the first memory buffer or the second memory buffer is full. 5. The method of claim 4, wherein determining that the first memory buffer or the second memory buffer further comprises: determining a rate at which the client device sends requests for data. 6. The method of claim 1, wherein determining if the network is congested further comprises: determining a growth in network response times as exceeding a predetermined threshold. 7. The method of claim 1, wherein the client specific buffer is initiated by at least one of: the client device, the storage device, and a switch. 8. The method of claim 1, wherein the client specific buffer is shared by a plurality of client devices. 9. The method of claim 1, wherein a client device has one or more client-specific buffers. 10. A non-transitory computer readable medium having stored thereon instructions for causing a processing circuitry to perform a process, the process comprising: sending at least a first request for a data block to be sent from a storage device to a client device over a network connection; determining if the network is congested; initiating a client-specific buffer when it is determined that the network is congested, wherein the requested data block is stored in the client-specific buffer; and sending at least a second request for the data block stored within the client-specific buffer to be sent to the client device. 11. A system for improving network storage accessibility, comprising: a processing circuitry; and a memory, the memory containing instructions that, when executed by the processing circuitry, configure the system to: send at least a first request for a data block to be sent from a storage device to a client device over a network connection; determine if the network is congested; initiate a client-specific buffer when it is determined that the network is congested, wherein the requested data block is stored in the client-specific buffer; and send at least a second request for the data block stored within the client-specific buffer to be sent to the client device. 12. The system of claim 11, wherein the client-specific buffer is initiated within at least one of: the storage device and a switch. 13. The system of claim 11, wherein the data block is sent to the client device via a switch that includes a first memory buffer for ingress network traffic and a second memory buffer for egress network traffic. 14. The system of claim 13, wherein the system if further configured to: determine that the first memory buffer or the second memory buffer is full. 15. The system of claim 14, wherein the system if further configured to: determine a rate at which the client device sends requests for data. 16. The system of claim 11, wherein the system if further configured to: determine a growth in network response times as exceeding a predetermined threshold. 17. The system of claim 11, wherein the client specific buffer is initiated by at least one of: the client device, the storage device, and a switch. 18. The system of claim 11, wherein the client specific buffer is shared by a plurality of client devices. 19. The system of claim 11, wherein a client device has one or more client-specific buffers.
A system and method for improving network storage accessibility, the method including: sending at least a first request for a data block to be sent from a storage device to a client device over a network connection; determining if the network is congested; initiating a client-specific buffer when it is determined that the network is congested, wherein the requested data block is stored in the client-specific buffer; and sending at least a second request for the data block stored within the client-specific buffer to be sent to the client device.1. A method for improving network storage accessibility, the method comprising: sending at least a first request for a data block to be sent from a storage device to a client device over a network connection; determining if the network is congested; initiating a client-specific buffer when it is determined that the network is congested, wherein the requested data block is stored in the client-specific buffer; and sending at least a second request for the data block stored within the client-specific buffer to be sent to the client device. 2. The method of claim 1, wherein the client-specific buffer is initiated within at least one of: the storage device and a switch. 3. The method of claim 1, wherein the data block is sent to the client device via a switch that includes a first memory buffer for ingress network traffic and a second memory buffer for egress network traffic. 4. The method of claim 3, wherein determining if the network is congested further comprises: determining that the first memory buffer or the second memory buffer is full. 5. The method of claim 4, wherein determining that the first memory buffer or the second memory buffer further comprises: determining a rate at which the client device sends requests for data. 6. The method of claim 1, wherein determining if the network is congested further comprises: determining a growth in network response times as exceeding a predetermined threshold. 7. The method of claim 1, wherein the client specific buffer is initiated by at least one of: the client device, the storage device, and a switch. 8. The method of claim 1, wherein the client specific buffer is shared by a plurality of client devices. 9. The method of claim 1, wherein a client device has one or more client-specific buffers. 10. A non-transitory computer readable medium having stored thereon instructions for causing a processing circuitry to perform a process, the process comprising: sending at least a first request for a data block to be sent from a storage device to a client device over a network connection; determining if the network is congested; initiating a client-specific buffer when it is determined that the network is congested, wherein the requested data block is stored in the client-specific buffer; and sending at least a second request for the data block stored within the client-specific buffer to be sent to the client device. 11. A system for improving network storage accessibility, comprising: a processing circuitry; and a memory, the memory containing instructions that, when executed by the processing circuitry, configure the system to: send at least a first request for a data block to be sent from a storage device to a client device over a network connection; determine if the network is congested; initiate a client-specific buffer when it is determined that the network is congested, wherein the requested data block is stored in the client-specific buffer; and send at least a second request for the data block stored within the client-specific buffer to be sent to the client device. 12. The system of claim 11, wherein the client-specific buffer is initiated within at least one of: the storage device and a switch. 13. The system of claim 11, wherein the data block is sent to the client device via a switch that includes a first memory buffer for ingress network traffic and a second memory buffer for egress network traffic. 14. The system of claim 13, wherein the system if further configured to: determine that the first memory buffer or the second memory buffer is full. 15. The system of claim 14, wherein the system if further configured to: determine a rate at which the client device sends requests for data. 16. The system of claim 11, wherein the system if further configured to: determine a growth in network response times as exceeding a predetermined threshold. 17. The system of claim 11, wherein the client specific buffer is initiated by at least one of: the client device, the storage device, and a switch. 18. The system of claim 11, wherein the client specific buffer is shared by a plurality of client devices. 19. The system of claim 11, wherein a client device has one or more client-specific buffers.
2,400
9,020
9,020
15,125,208
2,483
A test apparatus for checking container products ( 13 ) which are preferably composed of plastic materials and are produced using the blow-moulding, filling and sealing methods, which are filled with fluid which, for production-related reasons, can contain particulate contamination which is deposited on the container wall when the container ( 13 ) is still and which floats freely in the fluid when the container ( 13 ) is moving and/or which changes position owing to the movement and in this way can be detected by means of a sensor device ( 37 ), is characterized in that, by means of a vibration device ( 23 ), the respective container ( 13 ) can be made to oscillate at a prespecifiable excitation frequency in such a way that the respective particulate contamination ( 47 ) in the fluid can be detected.
1. A test apparatus for checking container products (13) which are preferably composed of plastic materials and are produced using the blow-molding, filling and sealing methods, which are filled with fluid which, for production-related reasons, can contain particulate contamination which is deposited on the container wall when the container (13) is still and which appears floating freely in the fluid when the container (13) is moving and/or which changes its position as a result of the motion and in this way can be detected by means of a sensor device (37), characterized in that, by means of a vibration device (23), the respective container (13) can be oscillated at a pre-specifiable excitation frequency in such a way that the respective particulate contamination (47) in the fluid can be detected. 2. The test apparatus according to claim 1, characterized in that the vibration plane of the oscillating motion extends along the longitudinal direction, preferably along the midplane of the container (13). 3. The test apparatus according to claim 1, characterized in that the container (13) is a component of a multiple container arrangement connected like cards (14). 4. The test apparatus according to claim 1, characterized in that the excitation frequency is selected such that, depending on the viscosity of the fluid contents of the container, larger air bubbles remain stationary in the fluid, and the particulate contamination (47) to be detected moves in the fluid. 5. The test apparatus according to claim 1, characterized in that the sensor device has at least one emitter (35), which emits rays such as visible light, infrared light, laser light or X-rays, which pass through at least the container wall and the fluid and which, after striking a detector (37) disposed on the opposite side, generate a measurement signal which can be evaluated by means of an evaluation device. 6. The test apparatus according to claim 1, characterized in that, after the container (13) filled with fluid has been oscillated, a detector formed as a camera/recording device (37) takes several pictures of the particulate contamination (47), which is moving in the fluid, and in that the evaluation unit compares image sections captured once without particulate contamination (47) and once with particulate contamination (47). 7. The test apparatus according to claim 1, characterized in that a handling device (3, 5, 7, 9) is provided, which takes the respective container (13) to be tested to a horizontal position in a station (31), in which the detector (37) is disposed below and the emitter (35) is disposed above the container (13), and which also takes it to a second station (33), in which the detector (37) is disposed above and the emitter (35) is disposed below the container (13). 8. The test apparatus according to claim 1, characterized in that, by means of the handling device (5, 7), the container (13) is held for a pre-specifiable rest period in a rest position until the fluid in the container (13) has settled. 9. The test apparatus according to claim 1, characterized in that, by means of the handling device (3, 5, 7, 9) and its handling aids (1) disposed in the manner of a carousel, container products (13) can be loaded onto and unloaded from the production line. 10. The test apparatus according to claim 1, characterized in that the evaluation unit uses computerized image processing methods such as grey value transformation, point operators and/or blending methods for the evaluation of the measurement signals.
A test apparatus for checking container products ( 13 ) which are preferably composed of plastic materials and are produced using the blow-moulding, filling and sealing methods, which are filled with fluid which, for production-related reasons, can contain particulate contamination which is deposited on the container wall when the container ( 13 ) is still and which floats freely in the fluid when the container ( 13 ) is moving and/or which changes position owing to the movement and in this way can be detected by means of a sensor device ( 37 ), is characterized in that, by means of a vibration device ( 23 ), the respective container ( 13 ) can be made to oscillate at a prespecifiable excitation frequency in such a way that the respective particulate contamination ( 47 ) in the fluid can be detected.1. A test apparatus for checking container products (13) which are preferably composed of plastic materials and are produced using the blow-molding, filling and sealing methods, which are filled with fluid which, for production-related reasons, can contain particulate contamination which is deposited on the container wall when the container (13) is still and which appears floating freely in the fluid when the container (13) is moving and/or which changes its position as a result of the motion and in this way can be detected by means of a sensor device (37), characterized in that, by means of a vibration device (23), the respective container (13) can be oscillated at a pre-specifiable excitation frequency in such a way that the respective particulate contamination (47) in the fluid can be detected. 2. The test apparatus according to claim 1, characterized in that the vibration plane of the oscillating motion extends along the longitudinal direction, preferably along the midplane of the container (13). 3. The test apparatus according to claim 1, characterized in that the container (13) is a component of a multiple container arrangement connected like cards (14). 4. The test apparatus according to claim 1, characterized in that the excitation frequency is selected such that, depending on the viscosity of the fluid contents of the container, larger air bubbles remain stationary in the fluid, and the particulate contamination (47) to be detected moves in the fluid. 5. The test apparatus according to claim 1, characterized in that the sensor device has at least one emitter (35), which emits rays such as visible light, infrared light, laser light or X-rays, which pass through at least the container wall and the fluid and which, after striking a detector (37) disposed on the opposite side, generate a measurement signal which can be evaluated by means of an evaluation device. 6. The test apparatus according to claim 1, characterized in that, after the container (13) filled with fluid has been oscillated, a detector formed as a camera/recording device (37) takes several pictures of the particulate contamination (47), which is moving in the fluid, and in that the evaluation unit compares image sections captured once without particulate contamination (47) and once with particulate contamination (47). 7. The test apparatus according to claim 1, characterized in that a handling device (3, 5, 7, 9) is provided, which takes the respective container (13) to be tested to a horizontal position in a station (31), in which the detector (37) is disposed below and the emitter (35) is disposed above the container (13), and which also takes it to a second station (33), in which the detector (37) is disposed above and the emitter (35) is disposed below the container (13). 8. The test apparatus according to claim 1, characterized in that, by means of the handling device (5, 7), the container (13) is held for a pre-specifiable rest period in a rest position until the fluid in the container (13) has settled. 9. The test apparatus according to claim 1, characterized in that, by means of the handling device (3, 5, 7, 9) and its handling aids (1) disposed in the manner of a carousel, container products (13) can be loaded onto and unloaded from the production line. 10. The test apparatus according to claim 1, characterized in that the evaluation unit uses computerized image processing methods such as grey value transformation, point operators and/or blending methods for the evaluation of the measurement signals.
2,400
9,021
9,021
15,792,014
2,435
Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment. The method further provides analyzing the information to determine a plurality of exposure characteristics for the user. The method provides determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics.
1. A method of determining user reputation regarding data object exposure in a cloud computing environment, comprising: receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment; analyzing the information to determine a plurality of exposure characteristics for the user; and determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics. 2. The method of claim 1, wherein determining a reputation of the user for exposing data objects in the cloud computing environment, comprises: applying a plurality of rules to the plurality of exposure characteristics; and determining the reputation based on how well the plurality of exposure characteristics comply with the plurality of rules. 3. The method of claim 1, wherein the information includes accessibility settings for a plurality of data objects associated with the user in the cloud computing environment. 4. The method of claim 1, wherein the information includes classifications for each of a plurality of data objects associated with the user. 5. The method of claim 1, wherein receiving the information comprises: using Application Programming Interface (API) calls for the cloud computing environment to request the information. 6. The method of claim 5, wherein using API calls for the cloud computing environment to request the information comprises: impersonating a user associated with the data object, wherein the API calls comprise API calls only available to the user. 7. The method of claim 1, further comprising: generating a notification indicating the reputation and remedial actions that will compensate for the reputation. 8. The method of claim 1, wherein the cloud computing environment includes at least two cloud computing services associated with the user and wherein receiving the information comprises: receiving first information regarding behavior of the user from a first cloud computing service of the cloud computing services; and receiving second information regarding behavior of the user from a second cloud computing service of the cloud computing services. 9. The method of claim 1, wherein determining the reputation comprises: lowering a current reputation if the plurality of exposure characteristics indicates a higher risk of exposure than a risk of exposure indicated by the current reputation. 10. A computer readable storage medium having instructions stored thereon for operating a reputation analysis system to determine user reputation regarding data object exposure in a cloud computing environment, the instructions, when executed by the reputation analysis system, direct the reputation analysis system to: receive, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment; analyze the information to determine a plurality of exposure characteristics for the user; and determine a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics. 11. The computer readable storage medium of claim 10, wherein the instructions that direct the reputation analysis system to determine the reputation of the user comprise instructions that direct the reputation analysis system to: apply a plurality of rules to the plurality of exposure characteristics; and determine the reputation based on how well the plurality of exposure characteristics comply with the plurality of rules. 12. The computer readable storage medium of claim 10, wherein the information includes accessibility settings for a plurality of data objects associated with the user in the cloud computing environment. 13. The computer readable storage medium of claim 10, wherein the information includes classifications for each of a plurality of data objects associated with the user. 14. The computer readable storage medium of claim 10, wherein the instructions that direct the reputation analysis system to receive the information comprise instruction that direct the reputation analysis system to: use Application Programming Interface (API) calls for the cloud computing environment to request the information. 15. The computer readable storage medium of claim 14, wherein the instructions that direct the reputation analysis system to using API calls for the cloud computing environment to request the information comprise instructions that direct the reputation analysis system to: impersonate a user associated with the data object, wherein the API calls comprise API calls only available to the user. 16. The method of claim 10, wherein the instructions further direct the reputation analysis system to: generate a notification indicating the reputation and remedial actions that will compensate for the reputation. 17. The method of claim 10, wherein the cloud computing environment includes at least two cloud computing services associated with the user and wherein the instructions that direct the reputation analysis system to receive the information comprise instruction that direct the reputation analysis system to: receive first information regarding behavior of the user from a first cloud computing service of the cloud computing services; and receive second information regarding behavior of the user from a second cloud computing service of the cloud computing services. 18. The method of claim 1, wherein the instructions that direct the reputation analysis system to determine the reputation comprise instructions that direct the reputation analysis system to: lower a current reputation if the plurality of exposure characteristics indicates a higher risk of exposure than a risk of exposure indicated by the current reputation. 19. A reputation analysis system for determining user reputation regarding data object exposure in a cloud computing environment, comprising: a network communication interface configured to receive, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment; and a processing system configured to analyze the information to determine a plurality of exposure characteristics for the user and determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics. 20. The method of claim 19, wherein the processing system configured to determine a reputation of the user for exposing data objects in the cloud computing environment, comprises: the processing system configured to apply a plurality of rules to the plurality of exposure characteristics and determine the reputation based on how well the plurality of exposure characteristics comply with the plurality of rules.
Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment. The method further provides analyzing the information to determine a plurality of exposure characteristics for the user. The method provides determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics.1. A method of determining user reputation regarding data object exposure in a cloud computing environment, comprising: receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment; analyzing the information to determine a plurality of exposure characteristics for the user; and determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics. 2. The method of claim 1, wherein determining a reputation of the user for exposing data objects in the cloud computing environment, comprises: applying a plurality of rules to the plurality of exposure characteristics; and determining the reputation based on how well the plurality of exposure characteristics comply with the plurality of rules. 3. The method of claim 1, wherein the information includes accessibility settings for a plurality of data objects associated with the user in the cloud computing environment. 4. The method of claim 1, wherein the information includes classifications for each of a plurality of data objects associated with the user. 5. The method of claim 1, wherein receiving the information comprises: using Application Programming Interface (API) calls for the cloud computing environment to request the information. 6. The method of claim 5, wherein using API calls for the cloud computing environment to request the information comprises: impersonating a user associated with the data object, wherein the API calls comprise API calls only available to the user. 7. The method of claim 1, further comprising: generating a notification indicating the reputation and remedial actions that will compensate for the reputation. 8. The method of claim 1, wherein the cloud computing environment includes at least two cloud computing services associated with the user and wherein receiving the information comprises: receiving first information regarding behavior of the user from a first cloud computing service of the cloud computing services; and receiving second information regarding behavior of the user from a second cloud computing service of the cloud computing services. 9. The method of claim 1, wherein determining the reputation comprises: lowering a current reputation if the plurality of exposure characteristics indicates a higher risk of exposure than a risk of exposure indicated by the current reputation. 10. A computer readable storage medium having instructions stored thereon for operating a reputation analysis system to determine user reputation regarding data object exposure in a cloud computing environment, the instructions, when executed by the reputation analysis system, direct the reputation analysis system to: receive, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment; analyze the information to determine a plurality of exposure characteristics for the user; and determine a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics. 11. The computer readable storage medium of claim 10, wherein the instructions that direct the reputation analysis system to determine the reputation of the user comprise instructions that direct the reputation analysis system to: apply a plurality of rules to the plurality of exposure characteristics; and determine the reputation based on how well the plurality of exposure characteristics comply with the plurality of rules. 12. The computer readable storage medium of claim 10, wherein the information includes accessibility settings for a plurality of data objects associated with the user in the cloud computing environment. 13. The computer readable storage medium of claim 10, wherein the information includes classifications for each of a plurality of data objects associated with the user. 14. The computer readable storage medium of claim 10, wherein the instructions that direct the reputation analysis system to receive the information comprise instruction that direct the reputation analysis system to: use Application Programming Interface (API) calls for the cloud computing environment to request the information. 15. The computer readable storage medium of claim 14, wherein the instructions that direct the reputation analysis system to using API calls for the cloud computing environment to request the information comprise instructions that direct the reputation analysis system to: impersonate a user associated with the data object, wherein the API calls comprise API calls only available to the user. 16. The method of claim 10, wherein the instructions further direct the reputation analysis system to: generate a notification indicating the reputation and remedial actions that will compensate for the reputation. 17. The method of claim 10, wherein the cloud computing environment includes at least two cloud computing services associated with the user and wherein the instructions that direct the reputation analysis system to receive the information comprise instruction that direct the reputation analysis system to: receive first information regarding behavior of the user from a first cloud computing service of the cloud computing services; and receive second information regarding behavior of the user from a second cloud computing service of the cloud computing services. 18. The method of claim 1, wherein the instructions that direct the reputation analysis system to determine the reputation comprise instructions that direct the reputation analysis system to: lower a current reputation if the plurality of exposure characteristics indicates a higher risk of exposure than a risk of exposure indicated by the current reputation. 19. A reputation analysis system for determining user reputation regarding data object exposure in a cloud computing environment, comprising: a network communication interface configured to receive, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment; and a processing system configured to analyze the information to determine a plurality of exposure characteristics for the user and determining a reputation of the user for exposing data objects in the cloud computing environment based on the plurality of exposure characteristics. 20. The method of claim 19, wherein the processing system configured to determine a reputation of the user for exposing data objects in the cloud computing environment, comprises: the processing system configured to apply a plurality of rules to the plurality of exposure characteristics and determine the reputation based on how well the plurality of exposure characteristics comply with the plurality of rules.
2,400
9,022
9,022
13,198,848
2,491
Methods and systems are provided that provide a portable, cryptographic hardware-software device allowing balancing of the needed heightened security while maintaining the modified communication device's original features and value. The system comprises a single chip comprising a self-contained security boundary and cryptographic processing, and is enabled to quickly and easily connect to and modify an existing, commercial, off the shelf mobile communication device. The systems may be enabled to modify the existing device by being contained in hardware, for example the battery of a smart phone. Then, the system may be connected to the existing device's interface, for example via a “micro-USB” or other suitable connection, and subsequently provide cryptographic functionality to the existing device.
1. A mobile communication device, comprising: the mobile communication device; a battery for the mobile communication device configured to attach to the cryptographic chip; and a cryptographic chip attachable to the battery, and configured to connect to the mobile communication device to provide encrypted communication between the mobile communication device and another communication device. 2. The mobile communication device of claim 1, wherein the cryptographic chip comprises a processor configured to encrypt communication. 3. The mobile communication device of claim 1, wherein the cryptographic chip further comprises: a mini-USB connector configured to connect to the mobile communication device; and the mobile communication device comprises a mini-USB connector configured to connect to the cryptographic chip. 4. The mobile communication device of claim 3, wherein the mini-USB connector is configured to connect to the mobile communication device using a flex print cable with landing pads. 5. The mobile communication device of claim 1, wherein the cryptographic chip is configured to be activated by the mobile communication device. 6. The mobile communication device of claim 1, wherein the mobile communication device is one of (1) a cell phone, (2) a smart phone, (3) a PDA, and (4) a walkie-talkie radio. 7. The mobile communication device of claim 1, wherein the cryptographic chip provides encrypted one of (1) encrypted data communication and (2) encrypted voice communication between the mobile communication device and the other communication device. 8. A mobile communication device, comprising: the mobile communication device; and a cryptographic chip attachable to the mobile communication device, and configured to connect to the mobile communication device to provide encrypted communication between the mobile communication device and another communication device. 9. The mobile communication device of claim 1, wherein the cryptographic chip comprises a processor configured to encrypt communication. 10. The mobile communication device of claim 1, wherein the cryptographic chip further comprises: a mini-USB connector configured to connect to the mobile communication device; and the mobile communication device comprises a mini-USB connector configured to connect to the cryptographic chip. 11. The mobile communication device of claim 10, wherein the mini-USB connector is configured to connect to the mobile communication device using a flex print cable with landing pads. 12. The mobile communication device of claim 1, wherein the cryptographic chip is configured to be activated by the mobile communication device. 13. The mobile communication device of claim 1, wherein the mobile communication device is one of (1) a cell phone, (2) a smart phone, (3) a PDA, and (4) a walkie-talkie radio. 14. The mobile communication device of claim 1, wherein the cryptographic chip provides encrypted one of (1) encrypted data communication and (2) encrypted voice communication between the mobile communication device and the other communication device. 15. A method in a mobile communication device, comprising: connecting, to a mobile communication device, a cryptographic chip attached to the battery of the mobile communication device; connecting a phone call from with a second communication device; activating the cryptographic chip in response to the connected phone call; encrypting data to be transferred between the mobile communication device and the second communication device; and transmitting encrypted data between the mobile communication device and the second communication device. 16. The method of claim 15, further comprising connecting the cryptographic chip to the mobile device via a mini-USB connection. 17. The method of claim 16, wherein the mobile communication device is one of: (1) a cell phone, (2) a smart phone, (3) a tablet, (4) PDA, and (5) a walkie-talkie radio. 18. The method of claim 15, further comprising transmitting encrypted voice date between the mobile communication device and the second communication device.
Methods and systems are provided that provide a portable, cryptographic hardware-software device allowing balancing of the needed heightened security while maintaining the modified communication device's original features and value. The system comprises a single chip comprising a self-contained security boundary and cryptographic processing, and is enabled to quickly and easily connect to and modify an existing, commercial, off the shelf mobile communication device. The systems may be enabled to modify the existing device by being contained in hardware, for example the battery of a smart phone. Then, the system may be connected to the existing device's interface, for example via a “micro-USB” or other suitable connection, and subsequently provide cryptographic functionality to the existing device.1. A mobile communication device, comprising: the mobile communication device; a battery for the mobile communication device configured to attach to the cryptographic chip; and a cryptographic chip attachable to the battery, and configured to connect to the mobile communication device to provide encrypted communication between the mobile communication device and another communication device. 2. The mobile communication device of claim 1, wherein the cryptographic chip comprises a processor configured to encrypt communication. 3. The mobile communication device of claim 1, wherein the cryptographic chip further comprises: a mini-USB connector configured to connect to the mobile communication device; and the mobile communication device comprises a mini-USB connector configured to connect to the cryptographic chip. 4. The mobile communication device of claim 3, wherein the mini-USB connector is configured to connect to the mobile communication device using a flex print cable with landing pads. 5. The mobile communication device of claim 1, wherein the cryptographic chip is configured to be activated by the mobile communication device. 6. The mobile communication device of claim 1, wherein the mobile communication device is one of (1) a cell phone, (2) a smart phone, (3) a PDA, and (4) a walkie-talkie radio. 7. The mobile communication device of claim 1, wherein the cryptographic chip provides encrypted one of (1) encrypted data communication and (2) encrypted voice communication between the mobile communication device and the other communication device. 8. A mobile communication device, comprising: the mobile communication device; and a cryptographic chip attachable to the mobile communication device, and configured to connect to the mobile communication device to provide encrypted communication between the mobile communication device and another communication device. 9. The mobile communication device of claim 1, wherein the cryptographic chip comprises a processor configured to encrypt communication. 10. The mobile communication device of claim 1, wherein the cryptographic chip further comprises: a mini-USB connector configured to connect to the mobile communication device; and the mobile communication device comprises a mini-USB connector configured to connect to the cryptographic chip. 11. The mobile communication device of claim 10, wherein the mini-USB connector is configured to connect to the mobile communication device using a flex print cable with landing pads. 12. The mobile communication device of claim 1, wherein the cryptographic chip is configured to be activated by the mobile communication device. 13. The mobile communication device of claim 1, wherein the mobile communication device is one of (1) a cell phone, (2) a smart phone, (3) a PDA, and (4) a walkie-talkie radio. 14. The mobile communication device of claim 1, wherein the cryptographic chip provides encrypted one of (1) encrypted data communication and (2) encrypted voice communication between the mobile communication device and the other communication device. 15. A method in a mobile communication device, comprising: connecting, to a mobile communication device, a cryptographic chip attached to the battery of the mobile communication device; connecting a phone call from with a second communication device; activating the cryptographic chip in response to the connected phone call; encrypting data to be transferred between the mobile communication device and the second communication device; and transmitting encrypted data between the mobile communication device and the second communication device. 16. The method of claim 15, further comprising connecting the cryptographic chip to the mobile device via a mini-USB connection. 17. The method of claim 16, wherein the mobile communication device is one of: (1) a cell phone, (2) a smart phone, (3) a tablet, (4) PDA, and (5) a walkie-talkie radio. 18. The method of claim 15, further comprising transmitting encrypted voice date between the mobile communication device and the second communication device.
2,400
9,023
9,023
15,704,990
2,477
Methods and systems are provided for increasing application performance and accelerating data communications in a WAN environment. According to one embodiment, packets are received at a flow classification module operating at the Internet Protocol (IP) layer of a first wide area network (WAN) acceleration device via a private tunnel, which is operable to convey application layer data for connection-oriented applications between WAN acceleration devices. The packets are passed to a WAN socket operating at the transport layer. Based on the application protocol, the packets are passed to an application handler of multiple application handlers operating at the application layer each of which implements one or more application acceleration techniques for a particular application layer protocol known to behave poorly within a WAN environment. The existing connection-oriented flow is securely accelerated by performing one or more application acceleration techniques and applying one or more security functions.
1. A computer-implemented method comprising: establishing, between a first wide are network (WAN) acceleration device operable within a WAN of an enterprise at a branch office location of the enterprise and a second WAN acceleration device operable at a centralized data center, which hosts file servers on behalf of the enterprise, a private tunnel, wherein the private tunnel is used by the first and second WAN acceleration devices to convey application layer data for a plurality of connection-oriented application layer protocols known to behave poorly within a WAN environment and that are capable of being accelerated by the first and second WAN acceleration devices, wherein the plurality of connection-oriented application protocols include Common Internet File System (CIFS); receiving, by a flow classification module executing on the second WAN acceleration device at an Internet Protocol (IP) layer of a protocol stack of the second WAN acceleration device, a file-sharing protocol request originated by a client associated with the branch office location and transmitted to the second WAN acceleration device by the first WAN acceleration device via the private tunnel; passing, by the flow classification module, the file-sharing protocol request to a transport layer of the protocol stack via a WAN socket executing on the first WAN acceleration device at the transport layer, wherein the WAN socket represents an interface between the first and second WAN acceleration devices for connection-oriented application layer protocol traffic; responsive to determining the file-sharing protocol request comprises a CIFS request, passing, by the WAN socket, the file-sharing protocol request to a CIFS application handler of a plurality of application handlers executing on the second WAN acceleration device at an application layer of the protocol stack, each of the plurality of application handlers implementing one or more application acceleration techniques for an associated application layer protocol of the plurality of connection-oriented application layer protocols; and securely accelerating application layer data traffic transfer relating to the CIFS request, by the CIFS application handler, by performing the one or more application acceleration techniques and applying one or more security functions. 2. The method of claim 1, wherein the one or more application acceleration techniques include one or more of (i) transaction prediction, (ii) pre-population and (iii) classification of data streams into different stages to facilitate one or more of data reduction, data compression and quality of service. 3. The method of claim 1, further comprising applying a hierarchical data reference reduction algorithm and a variable length data reference reduction algorithm to data tagged as stable. 4. The method of claim 1, further comprising applying a memory based data reference reduction algorithm to data tagged as repeatable but not stable. 5. The method of claim 1, further comprising foregoing application of data reference reduction algorithms to data tagged as unlikely repeatable. 6. The method of claim 1, further comprising performing transport acceleration techniques used to improve performance of Transport Control Protocol (TCP) across high latency or high loss links including one or more of TCP connection pooling, TCP window scaling, selective acknowledgement (SACK), round-trip measurement and HighSpeed TCP. 7. A wide area network (WAN) traffic acceleration system comprising: one or more computer processors operable to collectively execute at least: a protocol stack; a plurality of application handlers, including a Common Internet File System (CIFS) application handler, wherein each of the plurality of application handlers are operable to securely accelerate a connection-oriented flow between the WAN traffic acceleration system and a peer WAN traffic acceleration system by implementing (i) one or more security functions and (ii) one or more application acceleration techniques for a particular application layer protocol of a plurality of application layer protocols that are operable at an application layer of the protocol stack and known to behave poorly within a WAN environment; a WAN socket operable at a transport layer of the protocol stack to pass packets to an appropriate application handler of the plurality of application handlers based on the application layer protocol of the plurality of application layer protocols with which the packets are associated; and a flow classification module operable to: receive, at an Internet Protocol (IP) layer of the protocol stack, a file-sharing protocol request from the peer WAN traffic acceleration system via a private tunnel established between the WAN traffic acceleration system and the peer WAN traffic acceleration system, wherein the private tunnel is operable to convey application layer data for a Common Internet File System (CIFS) flow between the WAN traffic acceleration system and the peer WAN traffic acceleration system; and responsive to classifying the file-sharing protocol request as being associated with CIFS, a connection-oriented flow capable of being accelerated by one of the plurality of application handlers, passing the file-sharing protocol request to the WAN socket. 8. The system of claim 7, wherein the one or more application acceleration techniques include one or more of (i) transaction prediction, (ii) pre-population and (iii) classification of data streams into different stages to facilitate one or more of data reduction, data compression and quality of service. 9. The system of claim 7, wherein the classification of data streams into different stages includes classifying and tagging a data stream as being at a stage in which associated data is unlikely repeatable, repeatable but not stable or stable. 10. The system of claim 7, wherein one or more of the application handlers are operable to apply a hierarchical data reference reduction algorithm and a variable length data reference reduction algorithm to data tagged as stable. 11. The system of claim 7, wherein one or more of the application handlers are operable to apply a memory based data reference reduction algorithm to data tagged as repeatable but not stable. 12. The system of claim 7, wherein one or more of the application handlers are operable to forego application of data reference reduction algorithms to data tagged as unlikely repeatable. 13. The system of claim 7, wherein transport acceleration techniques are used to improve performance of Transport Control Protocol (TCP) across high latency or high loss links including one or more of TCP connection pooling, TCP window scaling, selective acknowledgement (SACK), round-trip measurement and HighSpeed TCP.
Methods and systems are provided for increasing application performance and accelerating data communications in a WAN environment. According to one embodiment, packets are received at a flow classification module operating at the Internet Protocol (IP) layer of a first wide area network (WAN) acceleration device via a private tunnel, which is operable to convey application layer data for connection-oriented applications between WAN acceleration devices. The packets are passed to a WAN socket operating at the transport layer. Based on the application protocol, the packets are passed to an application handler of multiple application handlers operating at the application layer each of which implements one or more application acceleration techniques for a particular application layer protocol known to behave poorly within a WAN environment. The existing connection-oriented flow is securely accelerated by performing one or more application acceleration techniques and applying one or more security functions.1. A computer-implemented method comprising: establishing, between a first wide are network (WAN) acceleration device operable within a WAN of an enterprise at a branch office location of the enterprise and a second WAN acceleration device operable at a centralized data center, which hosts file servers on behalf of the enterprise, a private tunnel, wherein the private tunnel is used by the first and second WAN acceleration devices to convey application layer data for a plurality of connection-oriented application layer protocols known to behave poorly within a WAN environment and that are capable of being accelerated by the first and second WAN acceleration devices, wherein the plurality of connection-oriented application protocols include Common Internet File System (CIFS); receiving, by a flow classification module executing on the second WAN acceleration device at an Internet Protocol (IP) layer of a protocol stack of the second WAN acceleration device, a file-sharing protocol request originated by a client associated with the branch office location and transmitted to the second WAN acceleration device by the first WAN acceleration device via the private tunnel; passing, by the flow classification module, the file-sharing protocol request to a transport layer of the protocol stack via a WAN socket executing on the first WAN acceleration device at the transport layer, wherein the WAN socket represents an interface between the first and second WAN acceleration devices for connection-oriented application layer protocol traffic; responsive to determining the file-sharing protocol request comprises a CIFS request, passing, by the WAN socket, the file-sharing protocol request to a CIFS application handler of a plurality of application handlers executing on the second WAN acceleration device at an application layer of the protocol stack, each of the plurality of application handlers implementing one or more application acceleration techniques for an associated application layer protocol of the plurality of connection-oriented application layer protocols; and securely accelerating application layer data traffic transfer relating to the CIFS request, by the CIFS application handler, by performing the one or more application acceleration techniques and applying one or more security functions. 2. The method of claim 1, wherein the one or more application acceleration techniques include one or more of (i) transaction prediction, (ii) pre-population and (iii) classification of data streams into different stages to facilitate one or more of data reduction, data compression and quality of service. 3. The method of claim 1, further comprising applying a hierarchical data reference reduction algorithm and a variable length data reference reduction algorithm to data tagged as stable. 4. The method of claim 1, further comprising applying a memory based data reference reduction algorithm to data tagged as repeatable but not stable. 5. The method of claim 1, further comprising foregoing application of data reference reduction algorithms to data tagged as unlikely repeatable. 6. The method of claim 1, further comprising performing transport acceleration techniques used to improve performance of Transport Control Protocol (TCP) across high latency or high loss links including one or more of TCP connection pooling, TCP window scaling, selective acknowledgement (SACK), round-trip measurement and HighSpeed TCP. 7. A wide area network (WAN) traffic acceleration system comprising: one or more computer processors operable to collectively execute at least: a protocol stack; a plurality of application handlers, including a Common Internet File System (CIFS) application handler, wherein each of the plurality of application handlers are operable to securely accelerate a connection-oriented flow between the WAN traffic acceleration system and a peer WAN traffic acceleration system by implementing (i) one or more security functions and (ii) one or more application acceleration techniques for a particular application layer protocol of a plurality of application layer protocols that are operable at an application layer of the protocol stack and known to behave poorly within a WAN environment; a WAN socket operable at a transport layer of the protocol stack to pass packets to an appropriate application handler of the plurality of application handlers based on the application layer protocol of the plurality of application layer protocols with which the packets are associated; and a flow classification module operable to: receive, at an Internet Protocol (IP) layer of the protocol stack, a file-sharing protocol request from the peer WAN traffic acceleration system via a private tunnel established between the WAN traffic acceleration system and the peer WAN traffic acceleration system, wherein the private tunnel is operable to convey application layer data for a Common Internet File System (CIFS) flow between the WAN traffic acceleration system and the peer WAN traffic acceleration system; and responsive to classifying the file-sharing protocol request as being associated with CIFS, a connection-oriented flow capable of being accelerated by one of the plurality of application handlers, passing the file-sharing protocol request to the WAN socket. 8. The system of claim 7, wherein the one or more application acceleration techniques include one or more of (i) transaction prediction, (ii) pre-population and (iii) classification of data streams into different stages to facilitate one or more of data reduction, data compression and quality of service. 9. The system of claim 7, wherein the classification of data streams into different stages includes classifying and tagging a data stream as being at a stage in which associated data is unlikely repeatable, repeatable but not stable or stable. 10. The system of claim 7, wherein one or more of the application handlers are operable to apply a hierarchical data reference reduction algorithm and a variable length data reference reduction algorithm to data tagged as stable. 11. The system of claim 7, wherein one or more of the application handlers are operable to apply a memory based data reference reduction algorithm to data tagged as repeatable but not stable. 12. The system of claim 7, wherein one or more of the application handlers are operable to forego application of data reference reduction algorithms to data tagged as unlikely repeatable. 13. The system of claim 7, wherein transport acceleration techniques are used to improve performance of Transport Control Protocol (TCP) across high latency or high loss links including one or more of TCP connection pooling, TCP window scaling, selective acknowledgement (SACK), round-trip measurement and HighSpeed TCP.
2,400
9,024
9,024
15,845,862
2,485
A method of processing video data includes receiving 360-degree video data, receiving one or more first syntax elements indicating preferred regions-of-interest or preferred viewports of the 360-degree video data, receiving one or more second syntax elements that indicate a preferred rendering operation for rendering the preferred regions-of-interest or preferred viewports, and rendering the 360-degree video data based on the preferred rendering operations.
1. A method of processing video data, the method comprising: receiving 360-degree video data; receiving one or more first syntax elements indicating preferred regions-of-interest or preferred viewports of the 360-degree video data; receiving one or more second syntax elements that indicate a preferred rendering operation for rendering the preferred regions-of-interest or preferred viewports; and rendering the 360-degree video data based on the preferred rendering operations. 2. The method of claim 1, further comprising: decoding the received 360-degree video data. 3. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports without changing an aspect ratio of the preferred regions-of-interest or preferred viewports, and wherein rendering the 360-degree video data rendering the preferred regions-of-interest or preferred viewports without changing the aspect ratio of the preferred regions-of-interest or preferred viewports. 4. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports, and wherein rendering the 360-degree video data comprises rendering the preferred regions-of-interest or preferred viewports by minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports. 5. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by cropping the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display, and wherein rendering the 360-degree video data comprises rendering the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by cropping the preferred regions-of-interest or preferred viewports to fit the aspect ratio of the display. 6. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by rendering adjacent regions of the 360-degree video to fit an aspect ratio of a display, and wherein rendering the 360-degree video data comprises rendering the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by rendering adjacent regions of the 360-degree video to fit the aspect ratio of the display. 7. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by adding banners to the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display, and wherein rendering the 360-degree video data comprises rendering the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by adding banners to the preferred regions-of-interest or preferred viewports to fit the aspect ratio of the display. 8. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by modifying an aspect ratio of the preferred regions-of-interest or preferred viewports using non-linear warping techniques to fit an aspect ratio of a display, and wherein rendering the 360-degree video data comprises rendering the 360-degree video data by modifying the aspect ratio of the preferred regions-of-interest or preferred viewports using non-linear warping techniques to fit the aspect ratio of the display. 9. The method of claim 1, wherein receiving the one or more second syntax elements comprises receiving a preferred_rendering_operation syntax element in an omnidirectional viewport supplemental enhancement information (SEI) message, wherein a value of the preferred_rendering_operation syntax element indicates one of an unspecified rendering preference, rendering adjacent regions of the preferred regions-of-interest or preferred viewports, adding banners around the preferred regions-of-interest or preferred viewports, or cropping the preferred regions-of-interest or preferred viewports. 10. An apparatus configured to process video data, the apparatus comprising: a memory configured to store 360-degree video data; and one or more processors in communication with the memory, the apparatus configured to: receive 360-degree video data; receive one or more first syntax elements indicating preferred regions-of-interest or preferred viewports of the 360-degree video data; receive one or more second syntax elements that indicate a preferred rendering operation for rendering the preferred regions-of-interest or preferred viewports; and render the 360-degree video data based on the preferred rendering operations. 11. The apparatus of claim 10, wherein the one or more processors are further configured to: decode the received 360-degree video data. 12. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports without changing an aspect ratio of the preferred regions-of-interest or preferred viewports, and wherein the one or more processors are further configured to render the preferred regions-of-interest or preferred viewports without changing the aspect ratio of the preferred regions-of-interest or preferred viewports. 13. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports, and wherein the one or more processors are further configured to render the preferred regions-of-interest or preferred viewports by minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports. 14. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by cropping the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display, and wherein the one or more processors are further configured to render the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by cropping the preferred regions-of-interest or preferred viewports to fit the aspect ratio of the display. 15. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by rendering adjacent regions of the 360-degree video to fit an aspect ratio of a display, and wherein the one or more processors are further configured to render the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by rendering adjacent regions of the 360-degree video to fit the aspect ratio of the display. 16. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by adding banners to the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display, and wherein the one or more processors are further configured to render the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by adding banners to the preferred regions-of-interest or preferred viewports to fit the aspect ratio of the display. 17. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by modifying an aspect ratio of the preferred regions-of-interest or preferred viewports using non-linear warping techniques to fit an aspect ratio of a display, and wherein the one or more processors are further configured to render the 360-degree video data by modifying the aspect ratio of the preferred regions-of-interest or preferred viewports using non-linear warping techniques to fit the aspect ratio of the display. 18. The apparatus of claim 10, wherein to receive the one or more second syntax elements, the one or more processors are configured to receive a preferred_rendering_operation syntax element in an omnidirectional viewport supplemental enhancement information (SEI) message, wherein a value of the preferred_rendering_operation syntax element indicates one of an unspecified rendering preference, rendering adjacent regions of the preferred regions-of-interest or preferred viewports, adding banners around the preferred regions-of-interest or preferred viewports, or cropping the preferred regions-of-interest or preferred viewports. 19. The apparatus of claim 10, wherein the one or more processors include one of a graphics processing unit (GPU) or a display processor configured to render the render the 360-degree video data based on the preferred rendering operations. 20. The apparatus of claim 10, further comprising: a display configured to display the rendered 360-degree video data. 21. A non-transitory computer-readable storage medium storing instructions that, when executed, causes one or more processors of a device configured to process video data to: receive 360-degree video data; receive one or more first syntax elements indicating preferred regions-of-interest or preferred viewports of the 360-degree video data; receive one or more second syntax elements that indicate a preferred rendering operation for rendering the preferred regions-of-interest or preferred viewports; and render the 360-degree video data based on the preferred rendering operations. 22. A method of processing video data, the method comprising: encoding 360-degree video data; generating one or more first syntax elements indicating preferred regions-of-interest or preferred viewports of the 360-degree video data; generating one or more second syntax elements that indicate a preferred rendering operation for rendering the preferred regions-of-interest or preferred viewports; and signalling the one or more first syntax elements and the one or more second syntax elements with the encoded 360-degree video data. 23. The method of claim 22, further comprising: determining the preferred regions-of-interest or preferred viewports of the 360-degree video data. 24. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports without changing an aspect ratio of the preferred regions-of-interest or preferred viewports. 25. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports. 26. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by cropping the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display. 27. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by rendering adjacent regions of the 360-degree video to fit an aspect ratio of a display. 28. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by adding banners to the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display. 29. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by modifying an aspect ratio of the preferred regions-of-interest or preferred viewports using non-linear warping techniques to fit an aspect ratio of a display. 30. The method of claim 22, wherein generating the one or more second syntax elements comprises generating a preferred_rendering_operation syntax element in an omnidirectional viewport supplemental enhancement information (SEI) message, wherein a value of the preferred_rendering_operation syntax element indicates one of an unspecified rendering preference, rendering adjacent regions of the preferred regions-of-interest or preferred viewports, adding banners around the preferred regions-of-interest or preferred viewports, or cropping the preferred regions-of-interest or preferred viewports.
A method of processing video data includes receiving 360-degree video data, receiving one or more first syntax elements indicating preferred regions-of-interest or preferred viewports of the 360-degree video data, receiving one or more second syntax elements that indicate a preferred rendering operation for rendering the preferred regions-of-interest or preferred viewports, and rendering the 360-degree video data based on the preferred rendering operations.1. A method of processing video data, the method comprising: receiving 360-degree video data; receiving one or more first syntax elements indicating preferred regions-of-interest or preferred viewports of the 360-degree video data; receiving one or more second syntax elements that indicate a preferred rendering operation for rendering the preferred regions-of-interest or preferred viewports; and rendering the 360-degree video data based on the preferred rendering operations. 2. The method of claim 1, further comprising: decoding the received 360-degree video data. 3. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports without changing an aspect ratio of the preferred regions-of-interest or preferred viewports, and wherein rendering the 360-degree video data rendering the preferred regions-of-interest or preferred viewports without changing the aspect ratio of the preferred regions-of-interest or preferred viewports. 4. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports, and wherein rendering the 360-degree video data comprises rendering the preferred regions-of-interest or preferred viewports by minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports. 5. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by cropping the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display, and wherein rendering the 360-degree video data comprises rendering the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by cropping the preferred regions-of-interest or preferred viewports to fit the aspect ratio of the display. 6. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by rendering adjacent regions of the 360-degree video to fit an aspect ratio of a display, and wherein rendering the 360-degree video data comprises rendering the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by rendering adjacent regions of the 360-degree video to fit the aspect ratio of the display. 7. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by adding banners to the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display, and wherein rendering the 360-degree video data comprises rendering the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by adding banners to the preferred regions-of-interest or preferred viewports to fit the aspect ratio of the display. 8. The method of claim 1, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by modifying an aspect ratio of the preferred regions-of-interest or preferred viewports using non-linear warping techniques to fit an aspect ratio of a display, and wherein rendering the 360-degree video data comprises rendering the 360-degree video data by modifying the aspect ratio of the preferred regions-of-interest or preferred viewports using non-linear warping techniques to fit the aspect ratio of the display. 9. The method of claim 1, wherein receiving the one or more second syntax elements comprises receiving a preferred_rendering_operation syntax element in an omnidirectional viewport supplemental enhancement information (SEI) message, wherein a value of the preferred_rendering_operation syntax element indicates one of an unspecified rendering preference, rendering adjacent regions of the preferred regions-of-interest or preferred viewports, adding banners around the preferred regions-of-interest or preferred viewports, or cropping the preferred regions-of-interest or preferred viewports. 10. An apparatus configured to process video data, the apparatus comprising: a memory configured to store 360-degree video data; and one or more processors in communication with the memory, the apparatus configured to: receive 360-degree video data; receive one or more first syntax elements indicating preferred regions-of-interest or preferred viewports of the 360-degree video data; receive one or more second syntax elements that indicate a preferred rendering operation for rendering the preferred regions-of-interest or preferred viewports; and render the 360-degree video data based on the preferred rendering operations. 11. The apparatus of claim 10, wherein the one or more processors are further configured to: decode the received 360-degree video data. 12. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports without changing an aspect ratio of the preferred regions-of-interest or preferred viewports, and wherein the one or more processors are further configured to render the preferred regions-of-interest or preferred viewports without changing the aspect ratio of the preferred regions-of-interest or preferred viewports. 13. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports, and wherein the one or more processors are further configured to render the preferred regions-of-interest or preferred viewports by minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports. 14. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by cropping the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display, and wherein the one or more processors are further configured to render the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by cropping the preferred regions-of-interest or preferred viewports to fit the aspect ratio of the display. 15. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by rendering adjacent regions of the 360-degree video to fit an aspect ratio of a display, and wherein the one or more processors are further configured to render the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by rendering adjacent regions of the 360-degree video to fit the aspect ratio of the display. 16. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by adding banners to the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display, and wherein the one or more processors are further configured to render the 360-degree video data by keeping the aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by adding banners to the preferred regions-of-interest or preferred viewports to fit the aspect ratio of the display. 17. The apparatus of claim 10, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by modifying an aspect ratio of the preferred regions-of-interest or preferred viewports using non-linear warping techniques to fit an aspect ratio of a display, and wherein the one or more processors are further configured to render the 360-degree video data by modifying the aspect ratio of the preferred regions-of-interest or preferred viewports using non-linear warping techniques to fit the aspect ratio of the display. 18. The apparatus of claim 10, wherein to receive the one or more second syntax elements, the one or more processors are configured to receive a preferred_rendering_operation syntax element in an omnidirectional viewport supplemental enhancement information (SEI) message, wherein a value of the preferred_rendering_operation syntax element indicates one of an unspecified rendering preference, rendering adjacent regions of the preferred regions-of-interest or preferred viewports, adding banners around the preferred regions-of-interest or preferred viewports, or cropping the preferred regions-of-interest or preferred viewports. 19. The apparatus of claim 10, wherein the one or more processors include one of a graphics processing unit (GPU) or a display processor configured to render the render the 360-degree video data based on the preferred rendering operations. 20. The apparatus of claim 10, further comprising: a display configured to display the rendered 360-degree video data. 21. A non-transitory computer-readable storage medium storing instructions that, when executed, causes one or more processors of a device configured to process video data to: receive 360-degree video data; receive one or more first syntax elements indicating preferred regions-of-interest or preferred viewports of the 360-degree video data; receive one or more second syntax elements that indicate a preferred rendering operation for rendering the preferred regions-of-interest or preferred viewports; and render the 360-degree video data based on the preferred rendering operations. 22. A method of processing video data, the method comprising: encoding 360-degree video data; generating one or more first syntax elements indicating preferred regions-of-interest or preferred viewports of the 360-degree video data; generating one or more second syntax elements that indicate a preferred rendering operation for rendering the preferred regions-of-interest or preferred viewports; and signalling the one or more first syntax elements and the one or more second syntax elements with the encoded 360-degree video data. 23. The method of claim 22, further comprising: determining the preferred regions-of-interest or preferred viewports of the 360-degree video data. 24. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports without changing an aspect ratio of the preferred regions-of-interest or preferred viewports. 25. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports. 26. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by cropping the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display. 27. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by rendering adjacent regions of the 360-degree video to fit an aspect ratio of a display. 28. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by keeping an aspect ratio of the preferred regions-of-interest or preferred viewports unchanged and minimizing rendered parts of the 360-degree video data that are not covered by the preferred regions-of-interest or preferred viewports by adding banners to the preferred regions-of-interest or preferred viewports to fit an aspect ratio of a display. 29. The method of claim 22, wherein the one or more second syntax elements include an indication that the preferred rendering operation includes rendering the preferred regions-of-interest or preferred viewports by modifying an aspect ratio of the preferred regions-of-interest or preferred viewports using non-linear warping techniques to fit an aspect ratio of a display. 30. The method of claim 22, wherein generating the one or more second syntax elements comprises generating a preferred_rendering_operation syntax element in an omnidirectional viewport supplemental enhancement information (SEI) message, wherein a value of the preferred_rendering_operation syntax element indicates one of an unspecified rendering preference, rendering adjacent regions of the preferred regions-of-interest or preferred viewports, adding banners around the preferred regions-of-interest or preferred viewports, or cropping the preferred regions-of-interest or preferred viewports.
2,400
9,025
9,025
15,941,381
2,467
Logic may store at least a portion of an incoming packet at a memory location in a host device in response to a communication from the host device. Logic may compare the incoming packet to a digest in an entry of a primary array. When the incoming packet matches the digest, logic may retrieve a full entry from the secondary array and compare the full entry with the first incoming packet. When the full entry matches the first incoming packet, logic may store at least a portion of the first incoming packet at the memory location. And, in the absence of a match between the first incoming packet and the digest or full entry, logic may compare the first incoming packet to subsequent entries in the primary array to identify a full entry in the secondary array that matches the first incoming packet.
1. An apparatus, comprising: corresponding logic circuitry to couple with receive buffers to compare a first incoming packet to a first digest in a first entry of a primary array to determine whether the first incoming packet matches the first digest; when the first incoming packet matches the first digest, the logic circuitry to retrieve a first full entry from a secondary array, the first full entry to correspond to the first entry, and to compare the first full entry with the first incoming packet; when the first full entry matches the first incoming packet, the logic circuitry to store at least a portion of the first incoming packet at a first memory location, wherein entries in the secondary array comprise at least data and a memory location at which to store at least a portion of one of the incoming packets; and in the absence of a match between the first incoming packet and the first digest or between the first incoming packet and the first full entry, the logic circuitry to compare the first incoming packet to subsequent entries in the primary array to identify a full entry in the secondary array that matches the first incoming packet. 2. The apparatus of claim 1, further comprising the receive buffers to comprise the first incoming packet and other incoming packets and cache to comprise the primary array and the secondary array. 3. The apparatus of claim 1, wherein the logic circuitry is configured to compare more than one incoming packets with more than one digests in parallel. 4. The apparatus of claim 1, wherein the logic circuitry is configured to determine the first digest based on a communication from a host device, wherein the communication comprises data to identify the first incoming packet and the first digest comprises a compressed representation of the data to identify the first incoming packet. 5. The apparatus of claim 4, wherein the first digest comprises at least one of combined portions of the data to identify the first incoming packet, selected portions of the data to identify the first incoming packet, a hash of at least a portion of the data to identify the first incoming packet, an encoding of the data to identify the first incoming packet, randomly-selected portions of the data to identify the first incoming packet, and a summary of bits of the data to identify the first incoming packet. 6. The apparatus of claim 4, the logic circuitry to determine the first digest by selection of a process to generate the first digest from more than one process, wherein selection of the process is based on the data to identify the first incoming packet. 7. The apparatus of claim 1, wherein the logic circuitry is configured to receive communications from a host device to assign memory locations to incoming packets. 8. The apparatus of claim 7, the logic circuitry to couple with memory to store entries in the primary array for each assignment of a memory location, wherein entries in the primary array comprise a tag, a digest, and a next pointer, the digest to represent data in a full entry of the secondary array and the next pointer to identify a subsequent entry in the primary array. 9. The apparatus of claim 7, the first full entry in the secondary array to comprise data to identify at least one of the incoming packets and a memory location at which to store the at least one of the incoming packets. 10. The apparatus of claim 1, wherein the logic circuitry comprises an application specific integrated circuit (ASIC), a general-purpose processor and code, or a specific-purpose processor and code, or a combination thereof. 11. A method, comprising: comparing, by a search acceleration logic circuitry, a first incoming packet of the incoming packets to a digest of a first entry in the primary array to determine whether the first incoming packet matches the digest of the first entry; when the first incoming packet matches the digest of the first entry in the primary array, retrieving, by the search acceleration logic circuitry, a first full entry from a secondary array, the first full entry to correspond to the first entry, and comparing the first full entry with the first incoming packet; when the first full entry matches the first incoming packet, storing, by the search acceleration logic circuitry, at least a portion of the first incoming packet at the first memory location; and in the absence of a match between the first incoming packet and the first digest or the first full entry, comparing, by the search acceleration logic circuitry, the first incoming packet to subsequent entries in the primary array of entries and the secondary array of entries to identify a full entry in the secondary array of entries that matches the first incoming packet. 12. The method of claim 11, further comprising: receiving communications to associate incoming packets with memory locations; storing entries for the communications in a primary array, each entry in the primary array comprising a tag, a digest, and a next pointer to identify a subsequent entry in the primary array; and storing entries for the communications in a secondary array, each entry in the secondary array comprising data to identify one of the incoming packets and a memory location of the memory locations that is associated with the one of the incoming packets. 13. The method of claim 11, further comprising storing the incoming packets in the receive buffers, storing the primary array in a cache, and storing the secondary array in the cache. 14. The method of claim 11, wherein storing the primary array in the cache comprises storing the entries in the primary array as a linked list, wherein a new entry is added to an end of the primary array as a linked list element and the first entry is removed from the primary array after the first entry is matched to the one of the incoming packets. 15. The method of claim 11, further comprising comparing a second incoming packet of the incoming packets with the first digest in parallel with comparing the first incoming packet with the first digest. 16. A system comprising: a memory; one or more network interface ports coupled with the memory to store incoming packets in the memory; search acceleration logic circuitry coupled with the memory to compare a first incoming packet to a first digest in a first entry of a primary array to determine whether the first incoming packet matches the first digest; when the first incoming packet matches the first digest, the search acceleration logic circuitry to retrieve a first full entry from a secondary array, the first full entry to correspond to the first entry, and to compare the first full entry with the first incoming packet; when the first full entry matches the first incoming packet, the search acceleration logic circuitry to store at least a portion of the first incoming packet at a first memory location, wherein entries in the secondary array comprise at least data and a memory location at which to store at least a portion of one of the incoming packets; and in the absence of a match between the first incoming packet and the first digest or between the first incoming packet and the first full entry, the logic circuitry to compare the first incoming packet to subsequent entries in the primary array to identify a full entry in the secondary array that matches the first incoming packet. 17. The system of claim 16, wherein the search acceleration logic circuitry comprises an application specific integrated circuit (ASIC), a general-purpose processor and code, or a specific-purpose processor and code, or a combination thereof. 18. The system of claim 16, wherein the memory comprises receive buffers to store incoming packets and cache to store the primary array and the secondary array. 19. The system of claim 18, wherein the search acceleration logic circuitry is configured to receive communications to associate incoming packets with memory locations; store entries for the communications in a primary array, each entry in the primary array comprising a tag, a digest, and a next pointer to identify a subsequent entry in the primary array; and store entries for the communications in a secondary array, each entry in the secondary array comprising data to identify one of the incoming packets and a memory location of the memory locations that is associated with the one of the incoming packets. 20. The system of claim 19, wherein the search acceleration logic circuitry is configured to store the incoming packets in the receive buffers, store the primary array in a cache, and store the secondary array in the cache. 21. A non-transitory machine-readable medium containing instructions, which when executed by a processor, cause the processor to perform operations, the operations comprising: comparing a first incoming packet of the incoming packets to a digest of a first entry in the primary array to determine whether the first incoming packet matches the digest of the first entry; when the first incoming packet matches the digest of the first entry in the primary array, retrieving a first full entry from a secondary array, the first full entry to correspond to the first entry, and comparing the first full entry with the first incoming packet; when the first full entry matches the first incoming packet, storing at least a portion of the first incoming packet at the first memory location; and in the absence of a match between the first incoming packet and the first digest or the first full entry, comparing the first incoming packet to subsequent entries in the primary array of entries and the secondary array of entries to identify a full entry in the secondary array of entries that matches the first incoming packet. 22. The machine-readable medium of claim 21, wherein the operations further comprise: receiving communications to associate incoming packets with memory locations; storing entries for the communications in a primary array, each entry in the primary array comprising a tag, a digest, and a next pointer to identify a subsequent entry in the primary array; and storing entries for the communications in a secondary array, each entry in the secondary array comprising data to identify one of the incoming packets and a memory location of the memory locations that is associated with the one of the incoming packets. 23. The machine-readable medium of claim 21, wherein the operations further comprise storing the incoming packets in the receive buffers, storing the primary array in a cache, and storing the secondary array in the cache. 24. The machine-readable medium of claim 21, wherein storing the primary array in the cache comprises storing the entries in the primary array as a linked list. 25. The machine-readable medium of claim 21, wherein the operations further comprise performing a matching function for more than one incoming packets in parallel.
Logic may store at least a portion of an incoming packet at a memory location in a host device in response to a communication from the host device. Logic may compare the incoming packet to a digest in an entry of a primary array. When the incoming packet matches the digest, logic may retrieve a full entry from the secondary array and compare the full entry with the first incoming packet. When the full entry matches the first incoming packet, logic may store at least a portion of the first incoming packet at the memory location. And, in the absence of a match between the first incoming packet and the digest or full entry, logic may compare the first incoming packet to subsequent entries in the primary array to identify a full entry in the secondary array that matches the first incoming packet.1. An apparatus, comprising: corresponding logic circuitry to couple with receive buffers to compare a first incoming packet to a first digest in a first entry of a primary array to determine whether the first incoming packet matches the first digest; when the first incoming packet matches the first digest, the logic circuitry to retrieve a first full entry from a secondary array, the first full entry to correspond to the first entry, and to compare the first full entry with the first incoming packet; when the first full entry matches the first incoming packet, the logic circuitry to store at least a portion of the first incoming packet at a first memory location, wherein entries in the secondary array comprise at least data and a memory location at which to store at least a portion of one of the incoming packets; and in the absence of a match between the first incoming packet and the first digest or between the first incoming packet and the first full entry, the logic circuitry to compare the first incoming packet to subsequent entries in the primary array to identify a full entry in the secondary array that matches the first incoming packet. 2. The apparatus of claim 1, further comprising the receive buffers to comprise the first incoming packet and other incoming packets and cache to comprise the primary array and the secondary array. 3. The apparatus of claim 1, wherein the logic circuitry is configured to compare more than one incoming packets with more than one digests in parallel. 4. The apparatus of claim 1, wherein the logic circuitry is configured to determine the first digest based on a communication from a host device, wherein the communication comprises data to identify the first incoming packet and the first digest comprises a compressed representation of the data to identify the first incoming packet. 5. The apparatus of claim 4, wherein the first digest comprises at least one of combined portions of the data to identify the first incoming packet, selected portions of the data to identify the first incoming packet, a hash of at least a portion of the data to identify the first incoming packet, an encoding of the data to identify the first incoming packet, randomly-selected portions of the data to identify the first incoming packet, and a summary of bits of the data to identify the first incoming packet. 6. The apparatus of claim 4, the logic circuitry to determine the first digest by selection of a process to generate the first digest from more than one process, wherein selection of the process is based on the data to identify the first incoming packet. 7. The apparatus of claim 1, wherein the logic circuitry is configured to receive communications from a host device to assign memory locations to incoming packets. 8. The apparatus of claim 7, the logic circuitry to couple with memory to store entries in the primary array for each assignment of a memory location, wherein entries in the primary array comprise a tag, a digest, and a next pointer, the digest to represent data in a full entry of the secondary array and the next pointer to identify a subsequent entry in the primary array. 9. The apparatus of claim 7, the first full entry in the secondary array to comprise data to identify at least one of the incoming packets and a memory location at which to store the at least one of the incoming packets. 10. The apparatus of claim 1, wherein the logic circuitry comprises an application specific integrated circuit (ASIC), a general-purpose processor and code, or a specific-purpose processor and code, or a combination thereof. 11. A method, comprising: comparing, by a search acceleration logic circuitry, a first incoming packet of the incoming packets to a digest of a first entry in the primary array to determine whether the first incoming packet matches the digest of the first entry; when the first incoming packet matches the digest of the first entry in the primary array, retrieving, by the search acceleration logic circuitry, a first full entry from a secondary array, the first full entry to correspond to the first entry, and comparing the first full entry with the first incoming packet; when the first full entry matches the first incoming packet, storing, by the search acceleration logic circuitry, at least a portion of the first incoming packet at the first memory location; and in the absence of a match between the first incoming packet and the first digest or the first full entry, comparing, by the search acceleration logic circuitry, the first incoming packet to subsequent entries in the primary array of entries and the secondary array of entries to identify a full entry in the secondary array of entries that matches the first incoming packet. 12. The method of claim 11, further comprising: receiving communications to associate incoming packets with memory locations; storing entries for the communications in a primary array, each entry in the primary array comprising a tag, a digest, and a next pointer to identify a subsequent entry in the primary array; and storing entries for the communications in a secondary array, each entry in the secondary array comprising data to identify one of the incoming packets and a memory location of the memory locations that is associated with the one of the incoming packets. 13. The method of claim 11, further comprising storing the incoming packets in the receive buffers, storing the primary array in a cache, and storing the secondary array in the cache. 14. The method of claim 11, wherein storing the primary array in the cache comprises storing the entries in the primary array as a linked list, wherein a new entry is added to an end of the primary array as a linked list element and the first entry is removed from the primary array after the first entry is matched to the one of the incoming packets. 15. The method of claim 11, further comprising comparing a second incoming packet of the incoming packets with the first digest in parallel with comparing the first incoming packet with the first digest. 16. A system comprising: a memory; one or more network interface ports coupled with the memory to store incoming packets in the memory; search acceleration logic circuitry coupled with the memory to compare a first incoming packet to a first digest in a first entry of a primary array to determine whether the first incoming packet matches the first digest; when the first incoming packet matches the first digest, the search acceleration logic circuitry to retrieve a first full entry from a secondary array, the first full entry to correspond to the first entry, and to compare the first full entry with the first incoming packet; when the first full entry matches the first incoming packet, the search acceleration logic circuitry to store at least a portion of the first incoming packet at a first memory location, wherein entries in the secondary array comprise at least data and a memory location at which to store at least a portion of one of the incoming packets; and in the absence of a match between the first incoming packet and the first digest or between the first incoming packet and the first full entry, the logic circuitry to compare the first incoming packet to subsequent entries in the primary array to identify a full entry in the secondary array that matches the first incoming packet. 17. The system of claim 16, wherein the search acceleration logic circuitry comprises an application specific integrated circuit (ASIC), a general-purpose processor and code, or a specific-purpose processor and code, or a combination thereof. 18. The system of claim 16, wherein the memory comprises receive buffers to store incoming packets and cache to store the primary array and the secondary array. 19. The system of claim 18, wherein the search acceleration logic circuitry is configured to receive communications to associate incoming packets with memory locations; store entries for the communications in a primary array, each entry in the primary array comprising a tag, a digest, and a next pointer to identify a subsequent entry in the primary array; and store entries for the communications in a secondary array, each entry in the secondary array comprising data to identify one of the incoming packets and a memory location of the memory locations that is associated with the one of the incoming packets. 20. The system of claim 19, wherein the search acceleration logic circuitry is configured to store the incoming packets in the receive buffers, store the primary array in a cache, and store the secondary array in the cache. 21. A non-transitory machine-readable medium containing instructions, which when executed by a processor, cause the processor to perform operations, the operations comprising: comparing a first incoming packet of the incoming packets to a digest of a first entry in the primary array to determine whether the first incoming packet matches the digest of the first entry; when the first incoming packet matches the digest of the first entry in the primary array, retrieving a first full entry from a secondary array, the first full entry to correspond to the first entry, and comparing the first full entry with the first incoming packet; when the first full entry matches the first incoming packet, storing at least a portion of the first incoming packet at the first memory location; and in the absence of a match between the first incoming packet and the first digest or the first full entry, comparing the first incoming packet to subsequent entries in the primary array of entries and the secondary array of entries to identify a full entry in the secondary array of entries that matches the first incoming packet. 22. The machine-readable medium of claim 21, wherein the operations further comprise: receiving communications to associate incoming packets with memory locations; storing entries for the communications in a primary array, each entry in the primary array comprising a tag, a digest, and a next pointer to identify a subsequent entry in the primary array; and storing entries for the communications in a secondary array, each entry in the secondary array comprising data to identify one of the incoming packets and a memory location of the memory locations that is associated with the one of the incoming packets. 23. The machine-readable medium of claim 21, wherein the operations further comprise storing the incoming packets in the receive buffers, storing the primary array in a cache, and storing the secondary array in the cache. 24. The machine-readable medium of claim 21, wherein storing the primary array in the cache comprises storing the entries in the primary array as a linked list. 25. The machine-readable medium of claim 21, wherein the operations further comprise performing a matching function for more than one incoming packets in parallel.
2,400
9,026
9,026
16,021,991
2,424
Systems and methods for organizing and controlling the display of content, then measuring the effectiveness of that content in modifying behavior, within a particular temporal and special dimension, so as to minimize or eliminate confounding effects.
1. A computer-implemented method for controlling the display of content on a plurality of content delivery channels to mitigate potential confounds, comprising: receiving temporal reach data for each content delivery channel, wherein the temporal reach data relates to the period of time over which content may influence behavior of a content recipient; receiving spatial reach data for each content delivery channel, wherein the spatial reach data relates to the region in which the content recipient will likely take action after receiving content from the content delivery channel; defining at a plurality of hierarchical temporal-spatial units (HTSUs) based on the temporal reach data and the spatial reach data; receiving content data comprising information about a plurality of different pieces of content; receiving confound data for at least some of the plurality of different pieces of content, wherein confound data includes data about which pieces of content are being compared against one another; using a processor of a computer, assigning the plurality of different pieces of content to the plurality of content delivery channels, wherein the plurality pieces of content are assigned such that two pieces of content being compared against one another are not assigned one of the plurality of HTSUs. 2. The computer-implemented method of claim 1, further comprising: causing the selected content to be displayed on the channel for content delivery consistent with the content assignment. 3. The computer-implemented method of claim 2, further comprising: receiving response data indicative of the effects of the displayed content. 4. The computer-implemented method of claim 3, further comprising: determining the effectiveness of the displayed content. 5. The computer-implemented method of claim 4, wherein determining the effectiveness of the displayed content comprises thinning the response data to create a subset of response data that are unconfounded by spacial and temporal carryover effects. 6. The computer-implemented method of claim 5, further comprising analyzing the subset of response data using statistical computing rules. 7. The computer-implemented method of claim 1, further comprising: receiving behavior data within the response area of the HTSU during at least a portion of the response duration. 8. The computer-implemented method of claim 7, wherein the collecting of behavior data is associated with a location other than the location associated with the presenting of the displayed content. 9. The computer-implemented method of claim 4, further comprising: parsing the received effectiveness data by dividing it up by the time and location and types of content being displayed. 10. The computer-implemented method of claim 1, wherein the content delivery channel comprises fixed-location digital displays, digital billboards, mobile devices, or web pages. 11. The computer-implemented method of claim 1, wherein the response duration is computed by doubling the data that defines the temporal reach data. 12. The computer-implemented method of claim 3, wherein response data is collected during the second half of the response duration. 13. The computer-implemented method of claim 1, wherein the content comprises rendered files, instructions for procedural generation of content, rules constraining content creation, or elements for use in content creation or percentages of play for content pieces. 14. The computer-implemented method of claim 1, wherein the content is assigned to content delivery channels using randomization constraint data, wherein the randomization contstraint data references the content in other experimental units to implement balancing and counterbalancing. 15. A computer-implemented system for displaying content in accordance with hierarchical temporal-spatial units (HTSU's) to mitigate potential confounds, comprising: a plurality of content delivery channels, each content delivery channel comprising at least one display; a computer data store having temporal reach data and a spatial reach data for the content delivery channel, wherein the temporal reach data relates to the period of time over which content may influence behavior of a content recipient; and the spatial reach data relates to the region in which a content recipient will likely take action after receiving content from at least one of the content delivery channels; information defining a plurality of different content pieces; a processor communicatively coupled to the data store and configured to execute instructions that: define a plurality of HTSUs based on the temporal reach data and the spatial reach data; receive confound data for at least some of the plurality of different pieces of content, wherein confound data includes data about which pieces of content are being compared against one another; assign the plurality of different pieces of content to the plurality of content delivery channels, wherein the plurality pieces of content are assigned such that two pieces of content being compared against one another are not assigned to one of the plurality of HTSUs; distribute a piece of content and the additional pieces of content to the content delivery channel. 16. The system of claim 15 wherein the content delivery channels comprise at least one of: fixed-location digital displays, digital billboards, mobile devices, and web pages. 17. The system of claim 15, further comprising sensors, communicatively coupled to the processor, for collecting behavior data. 18. The system of claim 15, wherein the sensors for collecting behavior data are located at locations other than those associated with the content delivery channel. 19. The system of claim 17, wherein the processor is further configured to execute instructions that cause the processor to receive behavior-related data associated with the HTSU, and parse the data based on the location of the HTSU and the time that the content was displayed and the behavior data was collected. 20. The system of claim 17, wherein the sensors for collecting behavior data comprise intermediate variable sensors that are particular to the content delivery channel, and ultimate variable sensors configured to measure a variable influenced by a plurality of content delivery channels.
Systems and methods for organizing and controlling the display of content, then measuring the effectiveness of that content in modifying behavior, within a particular temporal and special dimension, so as to minimize or eliminate confounding effects.1. A computer-implemented method for controlling the display of content on a plurality of content delivery channels to mitigate potential confounds, comprising: receiving temporal reach data for each content delivery channel, wherein the temporal reach data relates to the period of time over which content may influence behavior of a content recipient; receiving spatial reach data for each content delivery channel, wherein the spatial reach data relates to the region in which the content recipient will likely take action after receiving content from the content delivery channel; defining at a plurality of hierarchical temporal-spatial units (HTSUs) based on the temporal reach data and the spatial reach data; receiving content data comprising information about a plurality of different pieces of content; receiving confound data for at least some of the plurality of different pieces of content, wherein confound data includes data about which pieces of content are being compared against one another; using a processor of a computer, assigning the plurality of different pieces of content to the plurality of content delivery channels, wherein the plurality pieces of content are assigned such that two pieces of content being compared against one another are not assigned one of the plurality of HTSUs. 2. The computer-implemented method of claim 1, further comprising: causing the selected content to be displayed on the channel for content delivery consistent with the content assignment. 3. The computer-implemented method of claim 2, further comprising: receiving response data indicative of the effects of the displayed content. 4. The computer-implemented method of claim 3, further comprising: determining the effectiveness of the displayed content. 5. The computer-implemented method of claim 4, wherein determining the effectiveness of the displayed content comprises thinning the response data to create a subset of response data that are unconfounded by spacial and temporal carryover effects. 6. The computer-implemented method of claim 5, further comprising analyzing the subset of response data using statistical computing rules. 7. The computer-implemented method of claim 1, further comprising: receiving behavior data within the response area of the HTSU during at least a portion of the response duration. 8. The computer-implemented method of claim 7, wherein the collecting of behavior data is associated with a location other than the location associated with the presenting of the displayed content. 9. The computer-implemented method of claim 4, further comprising: parsing the received effectiveness data by dividing it up by the time and location and types of content being displayed. 10. The computer-implemented method of claim 1, wherein the content delivery channel comprises fixed-location digital displays, digital billboards, mobile devices, or web pages. 11. The computer-implemented method of claim 1, wherein the response duration is computed by doubling the data that defines the temporal reach data. 12. The computer-implemented method of claim 3, wherein response data is collected during the second half of the response duration. 13. The computer-implemented method of claim 1, wherein the content comprises rendered files, instructions for procedural generation of content, rules constraining content creation, or elements for use in content creation or percentages of play for content pieces. 14. The computer-implemented method of claim 1, wherein the content is assigned to content delivery channels using randomization constraint data, wherein the randomization contstraint data references the content in other experimental units to implement balancing and counterbalancing. 15. A computer-implemented system for displaying content in accordance with hierarchical temporal-spatial units (HTSU's) to mitigate potential confounds, comprising: a plurality of content delivery channels, each content delivery channel comprising at least one display; a computer data store having temporal reach data and a spatial reach data for the content delivery channel, wherein the temporal reach data relates to the period of time over which content may influence behavior of a content recipient; and the spatial reach data relates to the region in which a content recipient will likely take action after receiving content from at least one of the content delivery channels; information defining a plurality of different content pieces; a processor communicatively coupled to the data store and configured to execute instructions that: define a plurality of HTSUs based on the temporal reach data and the spatial reach data; receive confound data for at least some of the plurality of different pieces of content, wherein confound data includes data about which pieces of content are being compared against one another; assign the plurality of different pieces of content to the plurality of content delivery channels, wherein the plurality pieces of content are assigned such that two pieces of content being compared against one another are not assigned to one of the plurality of HTSUs; distribute a piece of content and the additional pieces of content to the content delivery channel. 16. The system of claim 15 wherein the content delivery channels comprise at least one of: fixed-location digital displays, digital billboards, mobile devices, and web pages. 17. The system of claim 15, further comprising sensors, communicatively coupled to the processor, for collecting behavior data. 18. The system of claim 15, wherein the sensors for collecting behavior data are located at locations other than those associated with the content delivery channel. 19. The system of claim 17, wherein the processor is further configured to execute instructions that cause the processor to receive behavior-related data associated with the HTSU, and parse the data based on the location of the HTSU and the time that the content was displayed and the behavior data was collected. 20. The system of claim 17, wherein the sensors for collecting behavior data comprise intermediate variable sensors that are particular to the content delivery channel, and ultimate variable sensors configured to measure a variable influenced by a plurality of content delivery channels.
2,400
9,027
9,027
15,664,006
2,441
A computer implemented method, device and computer program device are provided that are under the control of one or more processors having instructions. The method, device, and system identifies a communication event and a delivery attribute associated with the communication event, identifies electronic devices available to provide a notification alert, selects at least one of the electronic devices based on the delivery attribute, generates the notification alert based on the communication event, communicates the notification alert to the at least one of the electronic devices selected.
1. A method, comprising: under control of one or more processors configured with executable instructions; identifying a communication event and a delivery attribute associated with the communication event; identifying electronic devices available to provide a notification alert; selecting at least one of the electronic devices based on the delivery attribute; generating the notification alert based on the communication event; and communicating the notification alert to the at least one of the electronic devices selected. 2. The method of claim 1, wherein at least a portion of the identifying, selecting, generating and communicating is performed by a digital personal assistant (DPA) device. 3. The method of claim 2, further comprising determining the delivery attribute based on a presence of non-users within a predetermined range of the DPA device. 4. The method of claim 2, further comprising determining the delivery attribute based on a characteristic of an environment that the user is located, or proximity of the user to the DPA device. 5. The method of claim 2, further comprising determining the delivery attribute based on a characteristic of a user environment that impedes detection of the notification alert. 6. The method of claim 2, further comprising determining the delivery attribute based on one or more of a user history or user settings maintained at the DPA device. 7. The method of claim 2, further comprising determining the delivery attribute based on status conditions of the electronic devices. 8. The method of claim 2, further comprising determining a priority list of the electronic devices based on the delivery attribute, and selecting a priority electronic device from the priority list based on the delivery attribute. 9. A digital personal assistant (DPA) device, comprising: a processor; a user interface; a memory having executable instructions accessible by the processor; wherein, responsive to execution of the instructions, the processor to: identify a communication event and a delivery attribute associated with the communication event; identify electronic devices available to provide a notification alert; select at least one of the electronic devices based on the delivery attribute; generate the notification alert based on the communication event; and communicate the notification alert from the DPA device to the at least one of the electronic devices. 10. The device of claim 9, wherein the executable instructions are executable by the processor to determine the delivery attribute based on a characteristic of an environment that the user is located, or proximity of the user to the DPA device. 11. The device of claim 9, wherein the executable instructions are executable by the processor to determine the delivery attribute based on a characteristic of a user environment that impedes detection of the notification alert. 12. The device of claim 9, wherein the executable instructions are executable by the processor to determine the delivery attribute based on a user history or user settings maintained at the DPA device. 13. The device of claim 9, wherein the executable instructions are executable by the processor to determine the delivery attribute based on status conditions of the electronic devices. 14. The device of claim 9, wherein the executable instructions are executable by the processor to determine a priority list of the electronic devices based on the delivery attribute, and select a priority electronic device from the priority list based on the delivery attribute. 15. A digital personal assistant (DPA) device comprising executable code to: identify a communication event and a delivery attribute associated with the communication event; identify a delivery attribute associated with one or more of the communication events; identify electronic devices available to provide a notification alert; select at least one of the electronic devices based on the delivery attribute; generate the notification alert based on the communication event; and communicate the notification alert from the DPA device to the at least one of the electronic devices. 16. The device of claim 15, further comprising executable code to determine the delivery attribute based on a characteristic of an environment that the user is located, or proximity of the user to the DPA device. 17. The device of claim 15, further comprising executable code to determine the delivery attribute based on a characteristic of a user environment that impedes detection of the notification alert. 18. The device of claim 15, further comprising executable code to determine the delivery attribute based on one or more of a user history or user settings maintained at the DPA device 19. The device of claim 15, further comprising executable code to determine the delivery attribute based on status conditions of the electronic devices. 20. The device of claim 15, further comprising executable code to determine a priority list of the electronic devices based on the delivery attribute and select a priority electronic device from the priority list based on the delivery attribute.
A computer implemented method, device and computer program device are provided that are under the control of one or more processors having instructions. The method, device, and system identifies a communication event and a delivery attribute associated with the communication event, identifies electronic devices available to provide a notification alert, selects at least one of the electronic devices based on the delivery attribute, generates the notification alert based on the communication event, communicates the notification alert to the at least one of the electronic devices selected.1. A method, comprising: under control of one or more processors configured with executable instructions; identifying a communication event and a delivery attribute associated with the communication event; identifying electronic devices available to provide a notification alert; selecting at least one of the electronic devices based on the delivery attribute; generating the notification alert based on the communication event; and communicating the notification alert to the at least one of the electronic devices selected. 2. The method of claim 1, wherein at least a portion of the identifying, selecting, generating and communicating is performed by a digital personal assistant (DPA) device. 3. The method of claim 2, further comprising determining the delivery attribute based on a presence of non-users within a predetermined range of the DPA device. 4. The method of claim 2, further comprising determining the delivery attribute based on a characteristic of an environment that the user is located, or proximity of the user to the DPA device. 5. The method of claim 2, further comprising determining the delivery attribute based on a characteristic of a user environment that impedes detection of the notification alert. 6. The method of claim 2, further comprising determining the delivery attribute based on one or more of a user history or user settings maintained at the DPA device. 7. The method of claim 2, further comprising determining the delivery attribute based on status conditions of the electronic devices. 8. The method of claim 2, further comprising determining a priority list of the electronic devices based on the delivery attribute, and selecting a priority electronic device from the priority list based on the delivery attribute. 9. A digital personal assistant (DPA) device, comprising: a processor; a user interface; a memory having executable instructions accessible by the processor; wherein, responsive to execution of the instructions, the processor to: identify a communication event and a delivery attribute associated with the communication event; identify electronic devices available to provide a notification alert; select at least one of the electronic devices based on the delivery attribute; generate the notification alert based on the communication event; and communicate the notification alert from the DPA device to the at least one of the electronic devices. 10. The device of claim 9, wherein the executable instructions are executable by the processor to determine the delivery attribute based on a characteristic of an environment that the user is located, or proximity of the user to the DPA device. 11. The device of claim 9, wherein the executable instructions are executable by the processor to determine the delivery attribute based on a characteristic of a user environment that impedes detection of the notification alert. 12. The device of claim 9, wherein the executable instructions are executable by the processor to determine the delivery attribute based on a user history or user settings maintained at the DPA device. 13. The device of claim 9, wherein the executable instructions are executable by the processor to determine the delivery attribute based on status conditions of the electronic devices. 14. The device of claim 9, wherein the executable instructions are executable by the processor to determine a priority list of the electronic devices based on the delivery attribute, and select a priority electronic device from the priority list based on the delivery attribute. 15. A digital personal assistant (DPA) device comprising executable code to: identify a communication event and a delivery attribute associated with the communication event; identify a delivery attribute associated with one or more of the communication events; identify electronic devices available to provide a notification alert; select at least one of the electronic devices based on the delivery attribute; generate the notification alert based on the communication event; and communicate the notification alert from the DPA device to the at least one of the electronic devices. 16. The device of claim 15, further comprising executable code to determine the delivery attribute based on a characteristic of an environment that the user is located, or proximity of the user to the DPA device. 17. The device of claim 15, further comprising executable code to determine the delivery attribute based on a characteristic of a user environment that impedes detection of the notification alert. 18. The device of claim 15, further comprising executable code to determine the delivery attribute based on one or more of a user history or user settings maintained at the DPA device 19. The device of claim 15, further comprising executable code to determine the delivery attribute based on status conditions of the electronic devices. 20. The device of claim 15, further comprising executable code to determine a priority list of the electronic devices based on the delivery attribute and select a priority electronic device from the priority list based on the delivery attribute.
2,400
9,028
9,028
14,806,054
2,477
A method and an arrangement in a radio network node for reconfiguring mappings from Carrier Indicator Field-values to component carriers are provided. Each CIF-value is mapped to a respective component carrier comprising a respective shared data channel. Each respective shared data channel corresponds to at least one downlink control channel carrying said each CIF-value. The radio network node reconfigures mappings from CIF-values to component carriers, while at least one mapping of CIF-value to component carrier is maintained. The component carrier of said at least one mapping from CIF-value to component carrier comprises said at least one downlink control channel and a shared data channel corresponding to said at least one downlink control channel. The radio network node sends at least one of the reconfigured mappings from CIF-values to component carriers to the user equipment.
1. A method in a radio network node for reconfiguring mappings from Carrier Indicator Field-values, referred to as “CIF-values”, to component carriers, wherein each CIF-value is mapped to a respective component carrier comprising a respective shared data channel, wherein each respective shared data channel corresponds to at least one downlink control channel carrying said each CIF-value, and the component carriers are managed by the radio network node, wherein the radio network node and the user equipment are comprised in a multi-carrier radio communication system, wherein the method comprises reconfiguring mappings from CIF-values to component carriers, while maintaining at least one mapping of CIF-value to component carrier and changing at least one mapping of CIF-value to component carrier to a mapping to another component carrier, wherein the component carrier of said at least one mapping from CIF-value to component carrier comprises said at least one downlink control channel and a shared data channel corresponding to said at least one downlink control channel, and sending at least one of the reconfigured mappings from CIF-values to component carriers to the user equipment. 2. The method according to claim 1, wherein the component carrier of said at least one maintained mapping from CIF-value to component carrier corresponds to a primary cell, wherein the primary cell is one of the component carriers managed by the radio network node. 3. The method according to claim 1, wherein the CIF-value of said at least one maintained mapping from CIF-value to component carrier is equal to zero. 4. The method according to claim 1, wherein sending the configured mapping further comprises refraining from sending said at least one maintained mapping from CIF-value to component carrier to the user equipment. 5. The method according to claim 1, wherein the control channel is PDCCH and the shared data channel is PDSCH or PUSCH. 6. The method according to claim 1, wherein the step of sending at least some of the reconfigured mappings is performed using Radio Resource Control protocol. 7. An arrangement in a radio network node for reconfiguring mappings from Carrier Indicator Field-values, referred to as “CIF-values”, to component carriers, wherein each CIF-value is mapped to a respective component carrier comprising a respective shared data channel, wherein each respective shared data channel corresponds to at least one downlink control channel carrying said each CIF-value, and the component carriers are managed by the radio network node, wherein the radio network node and the user equipment are comprised in a multi-carrier radio communication system, wherein the arrangement comprises a reconfiguring circuit configured to reconfigure mappings from CIF-values to component carriers, while maintaining at least one mapping of CIF-value to component carrier and changing at least one mapping of CIF-value to component carrier to a mapping to another component carrier, wherein the component carrier of said at least one mapping from CIF-value to component carrier comprises said at least one downlink control channel and a shared data channel corresponding to said at least one downlink control channel, and a transceiver configured to send at least one of the reconfigured mappings from CIF-values to component carriers to the user equipment. 8. The arrangement according to claim 7, wherein the component carrier of said at least one maintained mapping from CIF-value to component carrier corresponds to a primary cell, wherein the primary cell is one of the component carriers managed by the radio network node. 9. The arrangement according to claim 7, wherein the CIF-value of said at least one maintained mapping from CIF-value to component carrier is equal to zero. 10. The arrangement according to claim 7, wherein the transceiver further is configured to refrain from sending said at least one maintained mapping from CIF-value to component carrier to the user equipment. 11. The arrangement according to claim 7, wherein the control channel is PDCCH and the shared data channel is PDSCH or PUSCH. 12. The arrangement according to claim 7, wherein the transceiver is configured to use Radio Resource Control protocol when sending at least some of the reconfigured mappings to the user equipment. 13. A method in a User Equipment, UE, for reconfiguring mappings from Carrier Indicator Field-values, referred to as “CIF-values”, to component carriers wherein each CIF-value is mapped to a respective component carrier comprising a respective shared data channel, wherein each respective shared data channel corresponds to at least one downlink control channel carrying said each CIF-value, wherein the UE and a radio network node, which manages the component carriers, are comprised in a multi-carrier radio communication system, wherein the method comprises: receiving reconfigured mappings from CIF-values to component carriers, wherein the reconfigured mappings include at least one maintained mapping of CIF-value to component carrier and at least one changed mapping of CIF-value to component carrier, from the radio network node, wherein the component carrier of at least one mapping from CIF-value to component carrier comprises said at least one downlink control channel and a shared data channel corresponding to said at least one downlink control channel, and reconfiguring the mappings from CIF-values to component carriers according to the received reconfigured mappings. 14. The method according to claim 13, wherein the at least one maintained mapping of CIF-value to component carrier, which are included in the received reconfigured mappings, corresponds to a primary cell, wherein the primary cell is one of the component carriers which are managed by the radio network node. 15. The method according to claim 13, wherein the CIF-value of the at least one maintained mapping of CIF value to component carrier, which are included in the received reconfigured mappings, is equal to zero. 16. The method according to claim 13, wherein the control channel is PDCCH and the shared data channel is PDSCH or PUSCH. 17. The method according to claim 13, wherein receiving the reconfigured mapping is performed using Radio Resource Control protocol. 18. A User Equipment, UE, configured for reconfiguring mappings from Carrier Indicator Field-values, referred to as “CIF-values”, to component carriers wherein each CIF-value is mapped to a respective component carrier comprising a respective shared data channel, wherein each respective shared data channel corresponds to at least one downlink control channel carrying said each CIF-value, wherein the UE and a radio network node, which manages the component carriers, are comprised in a multi-carrier radio communication system, wherein the UE comprising: a receiver circuit configured to receiving reconfigured mappings from CIF-values to component carriers wherein the reconfigured mappings include at least one maintained mapping of CIF-value to component carrier and at least one changed mapping of CIF-value to component carrier, from the radio network node, wherein the component carrier of at least one mapping from CIF-value to component carrier comprises said at least one downlink control channel and a shared data channel corresponding to said at least one downlink control channel, and a reconfiguring circuit configured to reconfiguring the mappings from CIF-values to component carriers according to the received reconfigured mappings which include at least one maintained mapping of CIF-value to component carrier and at least one changed mapping of CIF-value to component carrier. 19. The UE according to claim 18, wherein the at least one maintained mapping of CIF-value to component carrier, which are included in the received reconfigured mappings received by the receiver circuit, corresponds to a primary cell, wherein the primary cell is one of the component carriers which are managed by the radio network node. 20. The UE according to claim 18, wherein the CIF-value of the at least one maintained mapping of CIF-value to component carrier, which are included in the received reconfigured mappings received by the receiver circuit, is equal to zero. 21. The UE according to claim 18, wherein the control channel is PDCCH and the shared data channel is PDSCH or PUSCH. 22. The UE according to claim 18, wherein the receiver circuit is configured for receiving the reconfigured mapping by using Radio Resource Control protocol.
A method and an arrangement in a radio network node for reconfiguring mappings from Carrier Indicator Field-values to component carriers are provided. Each CIF-value is mapped to a respective component carrier comprising a respective shared data channel. Each respective shared data channel corresponds to at least one downlink control channel carrying said each CIF-value. The radio network node reconfigures mappings from CIF-values to component carriers, while at least one mapping of CIF-value to component carrier is maintained. The component carrier of said at least one mapping from CIF-value to component carrier comprises said at least one downlink control channel and a shared data channel corresponding to said at least one downlink control channel. The radio network node sends at least one of the reconfigured mappings from CIF-values to component carriers to the user equipment.1. A method in a radio network node for reconfiguring mappings from Carrier Indicator Field-values, referred to as “CIF-values”, to component carriers, wherein each CIF-value is mapped to a respective component carrier comprising a respective shared data channel, wherein each respective shared data channel corresponds to at least one downlink control channel carrying said each CIF-value, and the component carriers are managed by the radio network node, wherein the radio network node and the user equipment are comprised in a multi-carrier radio communication system, wherein the method comprises reconfiguring mappings from CIF-values to component carriers, while maintaining at least one mapping of CIF-value to component carrier and changing at least one mapping of CIF-value to component carrier to a mapping to another component carrier, wherein the component carrier of said at least one mapping from CIF-value to component carrier comprises said at least one downlink control channel and a shared data channel corresponding to said at least one downlink control channel, and sending at least one of the reconfigured mappings from CIF-values to component carriers to the user equipment. 2. The method according to claim 1, wherein the component carrier of said at least one maintained mapping from CIF-value to component carrier corresponds to a primary cell, wherein the primary cell is one of the component carriers managed by the radio network node. 3. The method according to claim 1, wherein the CIF-value of said at least one maintained mapping from CIF-value to component carrier is equal to zero. 4. The method according to claim 1, wherein sending the configured mapping further comprises refraining from sending said at least one maintained mapping from CIF-value to component carrier to the user equipment. 5. The method according to claim 1, wherein the control channel is PDCCH and the shared data channel is PDSCH or PUSCH. 6. The method according to claim 1, wherein the step of sending at least some of the reconfigured mappings is performed using Radio Resource Control protocol. 7. An arrangement in a radio network node for reconfiguring mappings from Carrier Indicator Field-values, referred to as “CIF-values”, to component carriers, wherein each CIF-value is mapped to a respective component carrier comprising a respective shared data channel, wherein each respective shared data channel corresponds to at least one downlink control channel carrying said each CIF-value, and the component carriers are managed by the radio network node, wherein the radio network node and the user equipment are comprised in a multi-carrier radio communication system, wherein the arrangement comprises a reconfiguring circuit configured to reconfigure mappings from CIF-values to component carriers, while maintaining at least one mapping of CIF-value to component carrier and changing at least one mapping of CIF-value to component carrier to a mapping to another component carrier, wherein the component carrier of said at least one mapping from CIF-value to component carrier comprises said at least one downlink control channel and a shared data channel corresponding to said at least one downlink control channel, and a transceiver configured to send at least one of the reconfigured mappings from CIF-values to component carriers to the user equipment. 8. The arrangement according to claim 7, wherein the component carrier of said at least one maintained mapping from CIF-value to component carrier corresponds to a primary cell, wherein the primary cell is one of the component carriers managed by the radio network node. 9. The arrangement according to claim 7, wherein the CIF-value of said at least one maintained mapping from CIF-value to component carrier is equal to zero. 10. The arrangement according to claim 7, wherein the transceiver further is configured to refrain from sending said at least one maintained mapping from CIF-value to component carrier to the user equipment. 11. The arrangement according to claim 7, wherein the control channel is PDCCH and the shared data channel is PDSCH or PUSCH. 12. The arrangement according to claim 7, wherein the transceiver is configured to use Radio Resource Control protocol when sending at least some of the reconfigured mappings to the user equipment. 13. A method in a User Equipment, UE, for reconfiguring mappings from Carrier Indicator Field-values, referred to as “CIF-values”, to component carriers wherein each CIF-value is mapped to a respective component carrier comprising a respective shared data channel, wherein each respective shared data channel corresponds to at least one downlink control channel carrying said each CIF-value, wherein the UE and a radio network node, which manages the component carriers, are comprised in a multi-carrier radio communication system, wherein the method comprises: receiving reconfigured mappings from CIF-values to component carriers, wherein the reconfigured mappings include at least one maintained mapping of CIF-value to component carrier and at least one changed mapping of CIF-value to component carrier, from the radio network node, wherein the component carrier of at least one mapping from CIF-value to component carrier comprises said at least one downlink control channel and a shared data channel corresponding to said at least one downlink control channel, and reconfiguring the mappings from CIF-values to component carriers according to the received reconfigured mappings. 14. The method according to claim 13, wherein the at least one maintained mapping of CIF-value to component carrier, which are included in the received reconfigured mappings, corresponds to a primary cell, wherein the primary cell is one of the component carriers which are managed by the radio network node. 15. The method according to claim 13, wherein the CIF-value of the at least one maintained mapping of CIF value to component carrier, which are included in the received reconfigured mappings, is equal to zero. 16. The method according to claim 13, wherein the control channel is PDCCH and the shared data channel is PDSCH or PUSCH. 17. The method according to claim 13, wherein receiving the reconfigured mapping is performed using Radio Resource Control protocol. 18. A User Equipment, UE, configured for reconfiguring mappings from Carrier Indicator Field-values, referred to as “CIF-values”, to component carriers wherein each CIF-value is mapped to a respective component carrier comprising a respective shared data channel, wherein each respective shared data channel corresponds to at least one downlink control channel carrying said each CIF-value, wherein the UE and a radio network node, which manages the component carriers, are comprised in a multi-carrier radio communication system, wherein the UE comprising: a receiver circuit configured to receiving reconfigured mappings from CIF-values to component carriers wherein the reconfigured mappings include at least one maintained mapping of CIF-value to component carrier and at least one changed mapping of CIF-value to component carrier, from the radio network node, wherein the component carrier of at least one mapping from CIF-value to component carrier comprises said at least one downlink control channel and a shared data channel corresponding to said at least one downlink control channel, and a reconfiguring circuit configured to reconfiguring the mappings from CIF-values to component carriers according to the received reconfigured mappings which include at least one maintained mapping of CIF-value to component carrier and at least one changed mapping of CIF-value to component carrier. 19. The UE according to claim 18, wherein the at least one maintained mapping of CIF-value to component carrier, which are included in the received reconfigured mappings received by the receiver circuit, corresponds to a primary cell, wherein the primary cell is one of the component carriers which are managed by the radio network node. 20. The UE according to claim 18, wherein the CIF-value of the at least one maintained mapping of CIF-value to component carrier, which are included in the received reconfigured mappings received by the receiver circuit, is equal to zero. 21. The UE according to claim 18, wherein the control channel is PDCCH and the shared data channel is PDSCH or PUSCH. 22. The UE according to claim 18, wherein the receiver circuit is configured for receiving the reconfigured mapping by using Radio Resource Control protocol.
2,400
9,029
9,029
15,653,269
2,492
Methods and systems are directed to automatically analyzing the behavior of event sources, detecting anomalies in the behavior of event sources, and generating recommendations to correct the detected anomalies. An event source can be an application program, an operating system, a virtual machine, a container, or any other source of event messages in a computer system. Method quantify the event messages generated over time to form property time series data, which is metadata regarding the event messages generated by the event source. Methods compute a threshold from the property time series data. Methods detect abnormal states of the event source when property data points of the property time series data violate the threshold. A systems administrator may be notified by a property digression alert displayed on a system console. Methods also generate a recommendation to correct the anomalous behavior and optimize performance of the event source.
1. An automated method stored in one or more data-storage devices and executed using one or more processors of a management server computer of a distributed computing system to detect anomalous behavior of an event source from event messages generated by the event source, the method comprising: quantifying the event messages to generate property time series data, the property time series data representing a property of the event source; computing a threshold from the property time series data generated over time, the threshold representing a normalcy bound for normal operation of the event source; detecting an abnormal state of the event source based on one or more property data points of the property time series data that violate the threshold, the abnormal state indicating anomalous behavior by the event source; displaying a property digression alert on a system console, the property digression alert indicating anomalous behavior of the event source; and generating a recommendation to correct the anomalous behavior of the event source. 2. The method of claim 1 wherein quantifying the event messages to generate property time series data comprises: determining a volume of event messages recorded in the event log within each time interval of a series of adjacent time intervals; determining a velocity of event messages based on the volumes of event messages within each time interval of the series of adjacent time intervals; determining an acceleration of event messages based on the velocities of event messages within each time interval of the series of adjacent time intervals; and determining a variety of event messages within each time interval of the series of adjacent time intervals. 3. The method of claim 1 wherein detecting the abnormal state of the event source comprises for each property data point of the property time series data, generating a property digression alert when the property data point violates the threshold. 4. The method of claim 4 further comprises: for each resource of a computer system that runs the event source, reading resource time series data generated within a property alert time window centered at a time of the property digression alert; and displaying an alert that the resource is correlated with the anomalous behavior of the event source, when the resource violates an associated threshold within the property alert time window. 5. The method of claim 1 wherein detecting the abnormal state of the event source comprises: for each property data point of the property time series data recorded over a period time, recording a property digression alert that corresponds to when the property data point violated the threshold within the period of time; and displaying each property digression alert on the system console. 6. The method of claim 5 further comprises: for each resource of a computer system that runs the event source, reading resource time series data recorded over the period of time in a data-storage device; determining threshold violations of the resource time series data over the period of time; counting resource violations that occur within time windows of the property digression alerts; and displaying an alert on the system console that the resource is correlated with historical anomalous behavior of the event source, when the count of resource violations that occur within the time windows of the property digression alerts is greater than a minimum correlation. 7. The method of claim 1 wherein detecting the abnormal state of the event source comprises: determining event type distributions of the event messages within a series of time intervals; computing an entropy for each event type distribution associated with each time interval; displaying an alert on the system console when the entropy violates an entropy threshold; and displaying a recommendation to move the workload of the event source to a different computer system with a minimum standard deviation of entropies of event sources that run on the computer system. 8. The method of claim 1 further comprising: computing a distance between each pair of coordinate data points in a cluster of coordinate data points formed from two or more sequence of property time series data; computing a nearest neighbor distance for each coordinate data point; determining a distance neighborhood for each coordinate data point of the cluster based on the nearest neighbor distance of each coordinate data point; computing a local reachability density for each coordinate data point based on the distance neighborhood of each coordinate data point; computing a local outlier factor for each coordinate data point based on the local reachability density of coordinate data point within the distance neighborhood; and identifying a coordinate data point in the cluster as outlier when the local outlier factor of is greater than the local outlier factor threshold. 9. A system to detect anomalous behavior of an event source from event messages generated by the event source, the system comprising: one or more processors; one or more data-storage devices; and machine-readable instructions stored in the one or more data-storage devices that when executed using the one or more processors controls the system to carry out quantifying the event messages to generate property time series data, the property time series data representing a property of the event source; computing a threshold from the property time series data generated over time, the threshold representing a normalcy bound for normal operation of the event source; detecting an abnormal state of the event source based on one or more property data points of the property time series data that violate the threshold, the abnormal state indicating anomalous behavior by the event source; displaying a property digression alert on a system console, the property digression alert indicating anomalous behavior of the event source; and generating a recommendation to correct the anomalous behavior of the event source. 10. The system of claim 9 wherein quantifying the event messages to generate property time series data comprises: determining a volume of event messages recorded in the event log within each time interval of a series of adjacent time intervals; determining a velocity of event messages based on the volumes of event messages within each time interval of the series of adjacent time intervals; determining an acceleration of event messages based on the velocities of event messages within each time interval of the series of adjacent time intervals; and determining a variety of event messages within each time interval of the series of adjacent time intervals. 11. The system of claim 9 wherein detecting the abnormal state of the event source comprises for each property data point of the property time series data, generating a property digression alert when the property data point violates the threshold. 12. The system of claim 11 further comprises: for each resource of a computer system that runs the event source, reading resource time series data generated within a property alert time window centered at a time of the property digression alert; and displaying an alert that the resource is correlated with the anomalous behavior of the event source, when the resource violates an associated threshold within the property alert time window. 13. The system of claim 9 wherein detecting the abnormal state of the event source comprises: for each property data point of the property time series data recorded over a period time, recording a property digression alert that corresponds to when the property data point violated the threshold within the period of time; and displaying each property digression alert on the system console. 14. The system of claim 13 further comprises: for each resource of a computer system that runs the event source, reading resource time series data recorded over the period of time in a data-storage device; determining threshold violations of the resource time series data over the period of time; counting resource violations that occur within time windows of the property digression alerts; and displaying an alert on the system console that the resource is correlated with historical anomalous behavior of the event source, when the count of resource violations that occur within the time windows of the property digression alerts is greater than a minimum correlation. 15. The system of claim 9 wherein detecting the abnormal state of the event source comprises: determining event type distributions of the event messages within a series of time intervals; computing an entropy for each event type distribution associated with each time interval; displaying an alert on the system console when the entropy violates an entropy threshold; and displaying a recommendation to move the workload of the event source to a different computer system with a minimum standard deviation of entropies of event sources that run on the computer system. 16. The system of claim 9 further comprising: computing a distance between each pair of coordinate data points in a cluster of coordinate data points formed from two or more sequence of property time series data; computing a nearest neighbor distance for each coordinate data point; determining a distance neighborhood for each coordinate data point of the cluster based on the nearest neighbor distance of each coordinate data point; computing a local reachability density for each coordinate data point based on the distance neighborhood of each coordinate data point; computing a local outlier factor for each coordinate data point based on the local reachability density of coordinate data point within the distance neighborhood; and identifying a coordinate data point in the cluster as outlier when the local outlier factor of is greater than the local outlier factor threshold. 17. A non-transitory computer-readable medium encoded with machine-readable instructions that implement a method carried out by one or more processors of a computer system to perform the operations of quantifying the event messages to generate property time series data, the property time series data representing a property of the event source; computing a threshold from the property time series data generated over time, the threshold representing a normalcy bound for normal operation of the event source; detecting an abnormal state of the event source based on one or more property data points of the property time series data that violate the threshold, the abnormal state indicating anomalous behavior by the event source; displaying a property digression alert on a system console, the property digression alert indicating anomalous behavior of the event source; and generating a recommendation to correct the anomalous behavior of the event source. 18. The medium of claim 17 wherein quantifying the event messages to generate property time series data comprises: determining a volume of event messages recorded in the event log within each time interval of a series of adjacent time intervals; determining a velocity of event messages based on the volumes of event messages within each time interval of the series of adjacent time intervals; determining an acceleration of event messages based on the velocities of event messages within each time interval of the series of adjacent time intervals; and determining a variety of event messages within each time interval of the series of adjacent time intervals. 19. The medium of claim 17 wherein detecting the abnormal state of the event source comprises for each property data point of the property time series data, generating a property digression alert when the property data point violates the threshold. 20. The medium of claim 19 further comprises: for each resource of a computer system that runs the event source, reading resource time series data generated within a property alert time window centered at a time of the property digression alert; and displaying an alert that the resource is correlated with the anomalous behavior of the event source, when the resource violates an associated threshold within the property alert time window. 21. The medium of claim 17 wherein detecting the abnormal state of the event source comprises: for each property data point of the property time series data recorded over a period time, recording a property digression alert that corresponds to when the property data point violated the threshold within the period of time; and displaying each property digression alert on the system console. 22. The medium of claim 21 further comprises: for each resource of a computer system that runs the event source, reading resource time series data recorded over the period of time in a data-storage device; determining threshold violations of the resource time series data over the period of time; counting resource violations that occur within time windows of the property digression alerts; and displaying an alert on the system console that the resource is correlated with historical anomalous behavior of the event source, when the count of resource violations that occur within the time windows of the property digression alerts is greater than a minimum correlation. 23. The medium of claim 17 wherein detecting the abnormal state of the event source comprises: determining event type distributions of the event messages within a series of time intervals; computing an entropy for each event type distribution associated with each time interval; displaying an alert on the system console when the entropy violates an entropy threshold; and displaying a recommendation to move the workload of the event source to a different computer system with a minimum standard deviation of entropies of event sources that run on the computer system. 24. The medium of claim 17 further comprising: computing a distance between each pair of coordinate data points in a cluster of coordinate data points formed from two or more sequence of property time series data; computing a nearest neighbor distance for each coordinate data point; determining a distance neighborhood for each coordinate data point of the cluster based on the nearest neighbor distance of each coordinate data point; computing a local reachability density for each coordinate data point based on the distance neighborhood of each coordinate data point; computing a local outlier factor for each coordinate data point based on the local reachability density of coordinate data point within the distance neighborhood; and identifying a coordinate data point in the cluster as outlier when the local outlier factor of is greater than the local outlier factor threshold.
Methods and systems are directed to automatically analyzing the behavior of event sources, detecting anomalies in the behavior of event sources, and generating recommendations to correct the detected anomalies. An event source can be an application program, an operating system, a virtual machine, a container, or any other source of event messages in a computer system. Method quantify the event messages generated over time to form property time series data, which is metadata regarding the event messages generated by the event source. Methods compute a threshold from the property time series data. Methods detect abnormal states of the event source when property data points of the property time series data violate the threshold. A systems administrator may be notified by a property digression alert displayed on a system console. Methods also generate a recommendation to correct the anomalous behavior and optimize performance of the event source.1. An automated method stored in one or more data-storage devices and executed using one or more processors of a management server computer of a distributed computing system to detect anomalous behavior of an event source from event messages generated by the event source, the method comprising: quantifying the event messages to generate property time series data, the property time series data representing a property of the event source; computing a threshold from the property time series data generated over time, the threshold representing a normalcy bound for normal operation of the event source; detecting an abnormal state of the event source based on one or more property data points of the property time series data that violate the threshold, the abnormal state indicating anomalous behavior by the event source; displaying a property digression alert on a system console, the property digression alert indicating anomalous behavior of the event source; and generating a recommendation to correct the anomalous behavior of the event source. 2. The method of claim 1 wherein quantifying the event messages to generate property time series data comprises: determining a volume of event messages recorded in the event log within each time interval of a series of adjacent time intervals; determining a velocity of event messages based on the volumes of event messages within each time interval of the series of adjacent time intervals; determining an acceleration of event messages based on the velocities of event messages within each time interval of the series of adjacent time intervals; and determining a variety of event messages within each time interval of the series of adjacent time intervals. 3. The method of claim 1 wherein detecting the abnormal state of the event source comprises for each property data point of the property time series data, generating a property digression alert when the property data point violates the threshold. 4. The method of claim 4 further comprises: for each resource of a computer system that runs the event source, reading resource time series data generated within a property alert time window centered at a time of the property digression alert; and displaying an alert that the resource is correlated with the anomalous behavior of the event source, when the resource violates an associated threshold within the property alert time window. 5. The method of claim 1 wherein detecting the abnormal state of the event source comprises: for each property data point of the property time series data recorded over a period time, recording a property digression alert that corresponds to when the property data point violated the threshold within the period of time; and displaying each property digression alert on the system console. 6. The method of claim 5 further comprises: for each resource of a computer system that runs the event source, reading resource time series data recorded over the period of time in a data-storage device; determining threshold violations of the resource time series data over the period of time; counting resource violations that occur within time windows of the property digression alerts; and displaying an alert on the system console that the resource is correlated with historical anomalous behavior of the event source, when the count of resource violations that occur within the time windows of the property digression alerts is greater than a minimum correlation. 7. The method of claim 1 wherein detecting the abnormal state of the event source comprises: determining event type distributions of the event messages within a series of time intervals; computing an entropy for each event type distribution associated with each time interval; displaying an alert on the system console when the entropy violates an entropy threshold; and displaying a recommendation to move the workload of the event source to a different computer system with a minimum standard deviation of entropies of event sources that run on the computer system. 8. The method of claim 1 further comprising: computing a distance between each pair of coordinate data points in a cluster of coordinate data points formed from two or more sequence of property time series data; computing a nearest neighbor distance for each coordinate data point; determining a distance neighborhood for each coordinate data point of the cluster based on the nearest neighbor distance of each coordinate data point; computing a local reachability density for each coordinate data point based on the distance neighborhood of each coordinate data point; computing a local outlier factor for each coordinate data point based on the local reachability density of coordinate data point within the distance neighborhood; and identifying a coordinate data point in the cluster as outlier when the local outlier factor of is greater than the local outlier factor threshold. 9. A system to detect anomalous behavior of an event source from event messages generated by the event source, the system comprising: one or more processors; one or more data-storage devices; and machine-readable instructions stored in the one or more data-storage devices that when executed using the one or more processors controls the system to carry out quantifying the event messages to generate property time series data, the property time series data representing a property of the event source; computing a threshold from the property time series data generated over time, the threshold representing a normalcy bound for normal operation of the event source; detecting an abnormal state of the event source based on one or more property data points of the property time series data that violate the threshold, the abnormal state indicating anomalous behavior by the event source; displaying a property digression alert on a system console, the property digression alert indicating anomalous behavior of the event source; and generating a recommendation to correct the anomalous behavior of the event source. 10. The system of claim 9 wherein quantifying the event messages to generate property time series data comprises: determining a volume of event messages recorded in the event log within each time interval of a series of adjacent time intervals; determining a velocity of event messages based on the volumes of event messages within each time interval of the series of adjacent time intervals; determining an acceleration of event messages based on the velocities of event messages within each time interval of the series of adjacent time intervals; and determining a variety of event messages within each time interval of the series of adjacent time intervals. 11. The system of claim 9 wherein detecting the abnormal state of the event source comprises for each property data point of the property time series data, generating a property digression alert when the property data point violates the threshold. 12. The system of claim 11 further comprises: for each resource of a computer system that runs the event source, reading resource time series data generated within a property alert time window centered at a time of the property digression alert; and displaying an alert that the resource is correlated with the anomalous behavior of the event source, when the resource violates an associated threshold within the property alert time window. 13. The system of claim 9 wherein detecting the abnormal state of the event source comprises: for each property data point of the property time series data recorded over a period time, recording a property digression alert that corresponds to when the property data point violated the threshold within the period of time; and displaying each property digression alert on the system console. 14. The system of claim 13 further comprises: for each resource of a computer system that runs the event source, reading resource time series data recorded over the period of time in a data-storage device; determining threshold violations of the resource time series data over the period of time; counting resource violations that occur within time windows of the property digression alerts; and displaying an alert on the system console that the resource is correlated with historical anomalous behavior of the event source, when the count of resource violations that occur within the time windows of the property digression alerts is greater than a minimum correlation. 15. The system of claim 9 wherein detecting the abnormal state of the event source comprises: determining event type distributions of the event messages within a series of time intervals; computing an entropy for each event type distribution associated with each time interval; displaying an alert on the system console when the entropy violates an entropy threshold; and displaying a recommendation to move the workload of the event source to a different computer system with a minimum standard deviation of entropies of event sources that run on the computer system. 16. The system of claim 9 further comprising: computing a distance between each pair of coordinate data points in a cluster of coordinate data points formed from two or more sequence of property time series data; computing a nearest neighbor distance for each coordinate data point; determining a distance neighborhood for each coordinate data point of the cluster based on the nearest neighbor distance of each coordinate data point; computing a local reachability density for each coordinate data point based on the distance neighborhood of each coordinate data point; computing a local outlier factor for each coordinate data point based on the local reachability density of coordinate data point within the distance neighborhood; and identifying a coordinate data point in the cluster as outlier when the local outlier factor of is greater than the local outlier factor threshold. 17. A non-transitory computer-readable medium encoded with machine-readable instructions that implement a method carried out by one or more processors of a computer system to perform the operations of quantifying the event messages to generate property time series data, the property time series data representing a property of the event source; computing a threshold from the property time series data generated over time, the threshold representing a normalcy bound for normal operation of the event source; detecting an abnormal state of the event source based on one or more property data points of the property time series data that violate the threshold, the abnormal state indicating anomalous behavior by the event source; displaying a property digression alert on a system console, the property digression alert indicating anomalous behavior of the event source; and generating a recommendation to correct the anomalous behavior of the event source. 18. The medium of claim 17 wherein quantifying the event messages to generate property time series data comprises: determining a volume of event messages recorded in the event log within each time interval of a series of adjacent time intervals; determining a velocity of event messages based on the volumes of event messages within each time interval of the series of adjacent time intervals; determining an acceleration of event messages based on the velocities of event messages within each time interval of the series of adjacent time intervals; and determining a variety of event messages within each time interval of the series of adjacent time intervals. 19. The medium of claim 17 wherein detecting the abnormal state of the event source comprises for each property data point of the property time series data, generating a property digression alert when the property data point violates the threshold. 20. The medium of claim 19 further comprises: for each resource of a computer system that runs the event source, reading resource time series data generated within a property alert time window centered at a time of the property digression alert; and displaying an alert that the resource is correlated with the anomalous behavior of the event source, when the resource violates an associated threshold within the property alert time window. 21. The medium of claim 17 wherein detecting the abnormal state of the event source comprises: for each property data point of the property time series data recorded over a period time, recording a property digression alert that corresponds to when the property data point violated the threshold within the period of time; and displaying each property digression alert on the system console. 22. The medium of claim 21 further comprises: for each resource of a computer system that runs the event source, reading resource time series data recorded over the period of time in a data-storage device; determining threshold violations of the resource time series data over the period of time; counting resource violations that occur within time windows of the property digression alerts; and displaying an alert on the system console that the resource is correlated with historical anomalous behavior of the event source, when the count of resource violations that occur within the time windows of the property digression alerts is greater than a minimum correlation. 23. The medium of claim 17 wherein detecting the abnormal state of the event source comprises: determining event type distributions of the event messages within a series of time intervals; computing an entropy for each event type distribution associated with each time interval; displaying an alert on the system console when the entropy violates an entropy threshold; and displaying a recommendation to move the workload of the event source to a different computer system with a minimum standard deviation of entropies of event sources that run on the computer system. 24. The medium of claim 17 further comprising: computing a distance between each pair of coordinate data points in a cluster of coordinate data points formed from two or more sequence of property time series data; computing a nearest neighbor distance for each coordinate data point; determining a distance neighborhood for each coordinate data point of the cluster based on the nearest neighbor distance of each coordinate data point; computing a local reachability density for each coordinate data point based on the distance neighborhood of each coordinate data point; computing a local outlier factor for each coordinate data point based on the local reachability density of coordinate data point within the distance neighborhood; and identifying a coordinate data point in the cluster as outlier when the local outlier factor of is greater than the local outlier factor threshold.
2,400
9,030
9,030
14,603,501
2,416
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a packet at a node. The packet includes a bit string. The node selects forwarding information based on a flow value associated with the packet. The forwarding information includes a forwarding bit mask. The node then forwards the packet based on the bit string and the forwarding information.
1. A method comprising: receiving a packet at a node, wherein the packet comprises a bit string; selecting a first set of forwarding information from a plurality of sets of forwarding information, wherein the selecting is based on a flow value, and the first set of forwarding information comprises a forwarding bit mask; and forwarding the packet based on the bit string and the first set forwarding information. 2. The method of claim 1, further comprising: determining the maximum number of equal cost multi-path (ECMP) paths identified in a single set of forwarding information. 3. The method of claim 2, further comprising: generating the plurality of sets of forwarding information, wherein the generating comprises converting the single set of forwarding information into the plurality of sets of forwarding information. 4. The method of claim 1, wherein the packet comprises the flow value. 5. The method of claim 1, further comprising: modifying the flow value. 6. The method of claim 1, further comprising: generating the flow value, wherein the generating comprises calculating a hash of an address associated with a multicast group. 7. The method of claim 1, wherein each set of the plurality of sets comprises a forwarding table. 8. The method of claim 1, wherein each set of the plurality of sets comprises a forwarding table entry. 9. A network device comprising: a memory storing a plurality of sets of forwarding information; a network interface configured to receive a packet, wherein the packet comprises a bit string; and a processor configured to select a first set of forwarding information from the plurality of sets of forwarding information, wherein selecting the first set of forwarding information is based on a flow value, and the first set of forwarding information comprises a forwarding bit mask, and forward the packet based on the bit string and the first set forwarding information. 10. The network device of claim 9, wherein the processor is further configured to: determine the maximum number of equal cost multi-path (ECMP) paths identified in a single set of forwarding information. 11. The network device of claim 10, wherein the processor is further configured to: generate the plurality of sets of forwarding information, wherein generating the plurality of sets of forwarding information comprises converting the single set of forwarding information into the plurality of sets of forwarding information. 12. The network device of claim 9, wherein the packet comprises the flow value. 13. The network device of claim 10, wherein the processor is further configured to: modify the flow value. 14. The network device of claim 10, wherein the processor is further configured to: generate the flow value, wherein generating the flow value comprises calculating a hash of an address associated with a multicast group. 15. The network device of claim 10, wherein each set of the plurality of sets comprises a forwarding table. 16. A system comprising: storage means for storing a plurality of sets of forwarding information; network interface network interface means for receiving a packet, wherein the packet comprises a bit string; and processing means for selecting a first set of forwarding information from the plurality of sets of forwarding information, wherein the selecting the first set of forwarding information is based on a flow value, and the first set of forwarding information comprises a forwarding bit mask, and forwarding the packet based on the bit string and the first set forwarding information. 17. The system of claim 16, wherein the processing means is further configured to: determine the maximum number of equal cost multi-path (ECMP) paths identified in a single set of forwarding information. 18. The system of claim 17, wherein the processing means is further configured to: generate the plurality of sets of forwarding information, wherein generating the plurality of sets of forwarding information comprises converting the single set of forwarding information into the plurality of sets of forwarding information. 19. The system of claim 16, wherein the packet comprises the flow value. 20. The system of claim 16, wherein the processing means is further configured to: generate the flow value, wherein generating the flow value comprises calculating a hash of an address associated with a multicast group.
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a packet at a node. The packet includes a bit string. The node selects forwarding information based on a flow value associated with the packet. The forwarding information includes a forwarding bit mask. The node then forwards the packet based on the bit string and the forwarding information.1. A method comprising: receiving a packet at a node, wherein the packet comprises a bit string; selecting a first set of forwarding information from a plurality of sets of forwarding information, wherein the selecting is based on a flow value, and the first set of forwarding information comprises a forwarding bit mask; and forwarding the packet based on the bit string and the first set forwarding information. 2. The method of claim 1, further comprising: determining the maximum number of equal cost multi-path (ECMP) paths identified in a single set of forwarding information. 3. The method of claim 2, further comprising: generating the plurality of sets of forwarding information, wherein the generating comprises converting the single set of forwarding information into the plurality of sets of forwarding information. 4. The method of claim 1, wherein the packet comprises the flow value. 5. The method of claim 1, further comprising: modifying the flow value. 6. The method of claim 1, further comprising: generating the flow value, wherein the generating comprises calculating a hash of an address associated with a multicast group. 7. The method of claim 1, wherein each set of the plurality of sets comprises a forwarding table. 8. The method of claim 1, wherein each set of the plurality of sets comprises a forwarding table entry. 9. A network device comprising: a memory storing a plurality of sets of forwarding information; a network interface configured to receive a packet, wherein the packet comprises a bit string; and a processor configured to select a first set of forwarding information from the plurality of sets of forwarding information, wherein selecting the first set of forwarding information is based on a flow value, and the first set of forwarding information comprises a forwarding bit mask, and forward the packet based on the bit string and the first set forwarding information. 10. The network device of claim 9, wherein the processor is further configured to: determine the maximum number of equal cost multi-path (ECMP) paths identified in a single set of forwarding information. 11. The network device of claim 10, wherein the processor is further configured to: generate the plurality of sets of forwarding information, wherein generating the plurality of sets of forwarding information comprises converting the single set of forwarding information into the plurality of sets of forwarding information. 12. The network device of claim 9, wherein the packet comprises the flow value. 13. The network device of claim 10, wherein the processor is further configured to: modify the flow value. 14. The network device of claim 10, wherein the processor is further configured to: generate the flow value, wherein generating the flow value comprises calculating a hash of an address associated with a multicast group. 15. The network device of claim 10, wherein each set of the plurality of sets comprises a forwarding table. 16. A system comprising: storage means for storing a plurality of sets of forwarding information; network interface network interface means for receiving a packet, wherein the packet comprises a bit string; and processing means for selecting a first set of forwarding information from the plurality of sets of forwarding information, wherein the selecting the first set of forwarding information is based on a flow value, and the first set of forwarding information comprises a forwarding bit mask, and forwarding the packet based on the bit string and the first set forwarding information. 17. The system of claim 16, wherein the processing means is further configured to: determine the maximum number of equal cost multi-path (ECMP) paths identified in a single set of forwarding information. 18. The system of claim 17, wherein the processing means is further configured to: generate the plurality of sets of forwarding information, wherein generating the plurality of sets of forwarding information comprises converting the single set of forwarding information into the plurality of sets of forwarding information. 19. The system of claim 16, wherein the packet comprises the flow value. 20. The system of claim 16, wherein the processing means is further configured to: generate the flow value, wherein generating the flow value comprises calculating a hash of an address associated with a multicast group.
2,400
9,031
9,031
15,513,264
2,412
There is provided mechanisms for handling beam link failure. A method is performed by a network node. The method comprises detecting a beam link failure of a direct radio link between a transmission point of the network node and a first wireless device. The first wireless device is served by the transmission point on the direct radio link and has an indirect radio link to the transmission point via a second wireless device. The method comprises configuring, in response to detecting the beam link failure. The first wireless device with control signalling using the indirect radio link
1. A method for handling beam link failure, the method being performed by a network node, the method comprising: detecting a beam link failure of a direct radio link between a transmission point of the network node and a first wireless device, wherein the first wireless device is served by the transmission point on the direct radio link and has an indirect radio link to the transmission point via a second wireless device; and configuring, in response to detecting the beam link failure, the first wireless device with control signaling using the indirect radio link. 2. The method of claim 1, further comprising: performing an action for the first wireless device, wherein the action is associated with the control signaling. 3. The method of claim 1, further comprising: configuring the indirect radio link between the first wireless device and the second wireless device before detecting the beam link failure of the direct radio link. 4. The method of claim 1, wherein detecting the beam link failure comprises: obtaining a notification of the beam link failure from the first wireless device on the indirect radio link via the second wireless device. 5. The method of claim 1, wherein detecting the beam link failure comprises: determining absence of a response from the first wireless device on the direct radio link. 6. A method for operation during beam link failure, the method being performed by a first wireless device, the method comprising: establishing a direct radio link between the first wireless device and a transmission point of a network node for the network node to serve the first wireless device on the direct radio link; establishing an indirect radio link to the transmission point via a second wireless device; and receiving control signaling on the indirect radio link from the network node upon a beam link failure of the direct radio link. 7. The method of claim 6, further comprising: performing an action associated with the control signaling. 8. The method of claim 6, further comprising: detecting the beam link failure of the direct radio link; and providing, in response to detecting the beam link failure, a notification of the beam link failure to the network node on the indirect radio link via the second wireless device. 9. The method of claim 6, wherein the control signaling relates to the first wireless device initiating at least one of mobility measurements of a beam finding procedure, a handover, and/or exchange of data with the network node using the indirect radio link. 10. The method of claim 9, wherein the handover is to another beam of the transmission point or to a beam of another transmission point. 11. The method of claim 9, wherein the control signaling instructs the first wireless device to exchange of data with the network node using the indirect radio link only in case of failed mobility measurements or failed handover. 12. The method of claim 6, wherein the beam link failure is caused by at least one of movement of the first wireless device, rotation of the first wireless device, blocking of the direct radio link, and directed radio interference affecting the direct radio link. 13. (canceled) 14. A network node for handling beam link failure, the network node comprising: processing circuitry; and a storage medium storing instructions that, when executed by the processing circuitry, cause the network node to: detect a beam link failure of a direct radio link between a transmission point of the network node and a first wireless device, wherein the first wireless device is served by the transmission point on the direct radio link and has an indirect radio link to the transmission point via a second wireless device; and configure, in response to detecting the beam link failure, the first wireless device with control signaling using the indirect radio link. 15. (canceled) 16. (canceled) 17. A wireless device for operation during beam link failure, the wireless device comprising: processing circuitry; and a storage medium storing instructions that, when executed by the processing circuitry, cause the wireless device to: establish a direct radio link between the wireless device and a transmission point of a network node for the network node to serve the wireless device on the direct radio link; establish an indirect radio link to the transmission point via a second wireless device; and receive control signaling on the indirect radio link from the network node upon a beam link failure of the direct radio link. 18. (canceled) 19. A computer program product comprising a non-transitory computer readable medium storing a computer program for handling beam link failure, the computer program comprising computer code which, when run on processing circuitry of a network node, causes the network node to: detect a beam link failure of a direct radio link between a transmission point of the network node and a first wireless device, wherein the first wireless device is served by the transmission point on the direct radio link and has an indirect radio link to the transmission point via a second wireless device; and configure, in response to detecting the beam link failure, the first wireless device with control signaling using the indirect radio link. 20. A computer program product comprising a non-transitory computer readable medium storing a computer program for operation during beam link failure, the computer program comprising computer code which, when run on processing circuitry of a wireless device, causes the wireless device to: establish a direct radio link between the wireless device and a transmission point of a network node for the network node to serve the wireless device on the direct radio link; establish an indirect radio link to the transmission point via a second wireless device; and receive control signaling on the indirect radio link from the network node upon a beam link failure of the direct radio link. 21. (canceled)
There is provided mechanisms for handling beam link failure. A method is performed by a network node. The method comprises detecting a beam link failure of a direct radio link between a transmission point of the network node and a first wireless device. The first wireless device is served by the transmission point on the direct radio link and has an indirect radio link to the transmission point via a second wireless device. The method comprises configuring, in response to detecting the beam link failure. The first wireless device with control signalling using the indirect radio link1. A method for handling beam link failure, the method being performed by a network node, the method comprising: detecting a beam link failure of a direct radio link between a transmission point of the network node and a first wireless device, wherein the first wireless device is served by the transmission point on the direct radio link and has an indirect radio link to the transmission point via a second wireless device; and configuring, in response to detecting the beam link failure, the first wireless device with control signaling using the indirect radio link. 2. The method of claim 1, further comprising: performing an action for the first wireless device, wherein the action is associated with the control signaling. 3. The method of claim 1, further comprising: configuring the indirect radio link between the first wireless device and the second wireless device before detecting the beam link failure of the direct radio link. 4. The method of claim 1, wherein detecting the beam link failure comprises: obtaining a notification of the beam link failure from the first wireless device on the indirect radio link via the second wireless device. 5. The method of claim 1, wherein detecting the beam link failure comprises: determining absence of a response from the first wireless device on the direct radio link. 6. A method for operation during beam link failure, the method being performed by a first wireless device, the method comprising: establishing a direct radio link between the first wireless device and a transmission point of a network node for the network node to serve the first wireless device on the direct radio link; establishing an indirect radio link to the transmission point via a second wireless device; and receiving control signaling on the indirect radio link from the network node upon a beam link failure of the direct radio link. 7. The method of claim 6, further comprising: performing an action associated with the control signaling. 8. The method of claim 6, further comprising: detecting the beam link failure of the direct radio link; and providing, in response to detecting the beam link failure, a notification of the beam link failure to the network node on the indirect radio link via the second wireless device. 9. The method of claim 6, wherein the control signaling relates to the first wireless device initiating at least one of mobility measurements of a beam finding procedure, a handover, and/or exchange of data with the network node using the indirect radio link. 10. The method of claim 9, wherein the handover is to another beam of the transmission point or to a beam of another transmission point. 11. The method of claim 9, wherein the control signaling instructs the first wireless device to exchange of data with the network node using the indirect radio link only in case of failed mobility measurements or failed handover. 12. The method of claim 6, wherein the beam link failure is caused by at least one of movement of the first wireless device, rotation of the first wireless device, blocking of the direct radio link, and directed radio interference affecting the direct radio link. 13. (canceled) 14. A network node for handling beam link failure, the network node comprising: processing circuitry; and a storage medium storing instructions that, when executed by the processing circuitry, cause the network node to: detect a beam link failure of a direct radio link between a transmission point of the network node and a first wireless device, wherein the first wireless device is served by the transmission point on the direct radio link and has an indirect radio link to the transmission point via a second wireless device; and configure, in response to detecting the beam link failure, the first wireless device with control signaling using the indirect radio link. 15. (canceled) 16. (canceled) 17. A wireless device for operation during beam link failure, the wireless device comprising: processing circuitry; and a storage medium storing instructions that, when executed by the processing circuitry, cause the wireless device to: establish a direct radio link between the wireless device and a transmission point of a network node for the network node to serve the wireless device on the direct radio link; establish an indirect radio link to the transmission point via a second wireless device; and receive control signaling on the indirect radio link from the network node upon a beam link failure of the direct radio link. 18. (canceled) 19. A computer program product comprising a non-transitory computer readable medium storing a computer program for handling beam link failure, the computer program comprising computer code which, when run on processing circuitry of a network node, causes the network node to: detect a beam link failure of a direct radio link between a transmission point of the network node and a first wireless device, wherein the first wireless device is served by the transmission point on the direct radio link and has an indirect radio link to the transmission point via a second wireless device; and configure, in response to detecting the beam link failure, the first wireless device with control signaling using the indirect radio link. 20. A computer program product comprising a non-transitory computer readable medium storing a computer program for operation during beam link failure, the computer program comprising computer code which, when run on processing circuitry of a wireless device, causes the wireless device to: establish a direct radio link between the wireless device and a transmission point of a network node for the network node to serve the wireless device on the direct radio link; establish an indirect radio link to the transmission point via a second wireless device; and receive control signaling on the indirect radio link from the network node upon a beam link failure of the direct radio link. 21. (canceled)
2,400
9,032
9,032
15,333,984
2,485
A system and method for object location notification in a fire alarm system is disclosed. The fire alarm system includes a fire alarm panel and fire alarm devices deployed within a premises that capture audio and/or image information, The fire alarm panel generates alarm signals and provides notifications of the existence of objects of interest from the audio and/or image information captured by the fire alarm devices. In examples, the fire alarm devices include alarm notification devices that generate an audible and/or visible fire alarm to occupants of the premises such as sirens and strobe lights, and fire sensor devices such as flame sensor devices and smoke sensor devices that monitor for flame and smoke as the indications of fire, respectively. In one embodiment, an analytics system is integrated within the fire alarm devices that determines the existence of the objects of interest from the captured audio and/or image information.
1. A fire alarm system, comprising: fire alarm devices deployed within a premises that capture audio and/or image information; and a fire alarm panel that generates alarm signals and provides notifications of the existence of objects of interest from the audio and/or image information captured by the fire alarm devices. 2. The system of claim 1, wherein the fire alarm devices include alarm notification devices that generate an audible and/or visible fire alarm to occupants of the premises. 3. The system of claim 1, wherein the fire alarm devices include fire sensor devices that monitor for indications of fire. 4. The system of claim 1, wherein the fire alarm devices include smoke sensor devices that monitor for smoke as an indication of fire. 5. The system of claim 1, wherein the fire alarm devices include heat sensor devices that monitor for heat as an indication of fire. 6. The system of claim 1, wherein the fire alarm devices include carbon monoxide sensor devices that monitor for carbon monoxide as an indication of fire. 7. The system of claim 1, wherein the fire alarm devices include an analytics system that determines the existence of the objects of interest from the captured audio and/or image information. 8. The system of claim 1, wherein the fire alarm panel includes an analytics system that determines the existence of the objects of interest from the audio and/or image information captured by the fire alarm devices and transmitted to the fire alarm panel. 9. The system of claim 1, wherein the objects of interest include persons and pets. 10. The system of claim 1, wherein the fire alarm panel generates a floorplan graphic of the premises that includes location information of the fire alarm devices and the objects of interest. 11. The system of claim 1, wherein the fire alarm panel includes a touch screen display that provides a floorplan graphic of the premises that includes location information of the fire alarm devices and/or the objects of interest. 12. The system of claim 1, wherein the fire alarm system additionally determines locations of the objects of interest relative to the areas in the premises within which the fire alarm devices are deployed, from the audio and/or image information captured by the fire alarm devices. 13. An alarm notification device, comprising: a housing; one or more notification systems that generate an audible and/or visible fire alarm for occupants of the premises; one or more auxiliary detection systems located on or within the housing for capturing audio and/or image information; and a communications interface located on or within the housing for communicating with a fire alarm panel that provides notifications of existence of objects of interest from the audio and/or image information captured by e one or more auxiliary detection systems. 14. A fire sensor device, comprising: a housing; one or more fire detection systems located on or within the housing for detecting indications of fire: one or more auxiliary detection systems located on or within the housing for capturing audio and/or image information; and a communications interface located on or within the housing for communicating with a fire alarm panel that provides notifications of existence of objects of interest from the audio and/or image information captured by the one or more auxiliary detection systems. 15. A fire alarm panel, comprising: a touch screen display; a network interface that enables communications with fire alarm devices that capture audio and/or image information; a panel controller that receives the audio and/or image information from the fire alarm devices via the network interface; and an analytics system that determines the existence of objects of interest from the audio and/or image information received by the device controller. 16. A method for a fire alarm system, the method comprising: fire alarm devices deployed within a premises capturing audio and/or image information; determining the existence of objects of interest from the audio and/or image information captured by the fire alarm devices; and providing notifications of the existence of the objects of interest. 17. The method of claim 16, further comprising alarm notification devices of the fire alarm devices capturing the audio and/or image information. 18. The method of claim 16, further comprising alarm notification devices of the fire alarm devices generating an audible and/or visible fire alarm to occupants of the premises. 19. The method of claim 16, further comprising fire sensors of the fire alarm devices monitoring for indications of fire. 20. The method of claim 16, further comprising the fire alarm devices including smoke sensors that monitor for smoke as an indication of fire. 21. The method of claim 16, further comprising the fire alarm devices including heat sensors that monitor for heat as an indication of fire. 22. The method of claim 16, wherein in response to one or more of the fire alarm devices detecting an indication of fire: the one or more of the fire alarm devices sending the indication of fire to a fire alarm panel of the fire alarm system; and the fire alarm panel sending messages to the fire alarm devices requesting the capturing of the audio and/or image information. 23. The method of claim 16, wherein determining the existence of objects of interest from the audio and/or image information captured by the fire alarm devices comprises an analytics system applying audio and/or image detection algorithms to the audio and/or image information. 24. The method of claim 23, further comprising the analytics system being located within the fire alarm devices. 25. The method of claim 23, further comprising the analytics system being located within a fire alarm panel of the fire alarm system. 26. The method of claim 23, further comprising the analytics system being located within a network that is remote to the fire alarm system. 27. The method of claim 16, wherein providing notifications of the existence of the objects of interest comprises the fire alarm devices sending a list of the objects of interest to a user device. 28. The method of claim 16, wherein providing notifications of the existence of the objects of interest comprises a fire alarm panel of the fire alarm system presenting location information of the fire alarm devices and the objects of interest on a touch screen display of the fire alarm panel. 29. The method of claim 16, wherein providing notifications of the existence of the objects of interest comprises: generating a floorplan graphic of the premises that includes location information of the fire alarm devices and the objects of interest; and sending the floorplan graphic for presentation within a display screen of a user device. 30. The method of claim 16, wherein providing notifications of the existence of the objects of interest comprises a fire alarm panel of the fire alarm system generating a floorplan graphic of the premises that includes location information of the fire alarm devices and the objects of interest, and presenting the floorplan graphic on a touch screen display of the fire alarm panel.
A system and method for object location notification in a fire alarm system is disclosed. The fire alarm system includes a fire alarm panel and fire alarm devices deployed within a premises that capture audio and/or image information, The fire alarm panel generates alarm signals and provides notifications of the existence of objects of interest from the audio and/or image information captured by the fire alarm devices. In examples, the fire alarm devices include alarm notification devices that generate an audible and/or visible fire alarm to occupants of the premises such as sirens and strobe lights, and fire sensor devices such as flame sensor devices and smoke sensor devices that monitor for flame and smoke as the indications of fire, respectively. In one embodiment, an analytics system is integrated within the fire alarm devices that determines the existence of the objects of interest from the captured audio and/or image information.1. A fire alarm system, comprising: fire alarm devices deployed within a premises that capture audio and/or image information; and a fire alarm panel that generates alarm signals and provides notifications of the existence of objects of interest from the audio and/or image information captured by the fire alarm devices. 2. The system of claim 1, wherein the fire alarm devices include alarm notification devices that generate an audible and/or visible fire alarm to occupants of the premises. 3. The system of claim 1, wherein the fire alarm devices include fire sensor devices that monitor for indications of fire. 4. The system of claim 1, wherein the fire alarm devices include smoke sensor devices that monitor for smoke as an indication of fire. 5. The system of claim 1, wherein the fire alarm devices include heat sensor devices that monitor for heat as an indication of fire. 6. The system of claim 1, wherein the fire alarm devices include carbon monoxide sensor devices that monitor for carbon monoxide as an indication of fire. 7. The system of claim 1, wherein the fire alarm devices include an analytics system that determines the existence of the objects of interest from the captured audio and/or image information. 8. The system of claim 1, wherein the fire alarm panel includes an analytics system that determines the existence of the objects of interest from the audio and/or image information captured by the fire alarm devices and transmitted to the fire alarm panel. 9. The system of claim 1, wherein the objects of interest include persons and pets. 10. The system of claim 1, wherein the fire alarm panel generates a floorplan graphic of the premises that includes location information of the fire alarm devices and the objects of interest. 11. The system of claim 1, wherein the fire alarm panel includes a touch screen display that provides a floorplan graphic of the premises that includes location information of the fire alarm devices and/or the objects of interest. 12. The system of claim 1, wherein the fire alarm system additionally determines locations of the objects of interest relative to the areas in the premises within which the fire alarm devices are deployed, from the audio and/or image information captured by the fire alarm devices. 13. An alarm notification device, comprising: a housing; one or more notification systems that generate an audible and/or visible fire alarm for occupants of the premises; one or more auxiliary detection systems located on or within the housing for capturing audio and/or image information; and a communications interface located on or within the housing for communicating with a fire alarm panel that provides notifications of existence of objects of interest from the audio and/or image information captured by e one or more auxiliary detection systems. 14. A fire sensor device, comprising: a housing; one or more fire detection systems located on or within the housing for detecting indications of fire: one or more auxiliary detection systems located on or within the housing for capturing audio and/or image information; and a communications interface located on or within the housing for communicating with a fire alarm panel that provides notifications of existence of objects of interest from the audio and/or image information captured by the one or more auxiliary detection systems. 15. A fire alarm panel, comprising: a touch screen display; a network interface that enables communications with fire alarm devices that capture audio and/or image information; a panel controller that receives the audio and/or image information from the fire alarm devices via the network interface; and an analytics system that determines the existence of objects of interest from the audio and/or image information received by the device controller. 16. A method for a fire alarm system, the method comprising: fire alarm devices deployed within a premises capturing audio and/or image information; determining the existence of objects of interest from the audio and/or image information captured by the fire alarm devices; and providing notifications of the existence of the objects of interest. 17. The method of claim 16, further comprising alarm notification devices of the fire alarm devices capturing the audio and/or image information. 18. The method of claim 16, further comprising alarm notification devices of the fire alarm devices generating an audible and/or visible fire alarm to occupants of the premises. 19. The method of claim 16, further comprising fire sensors of the fire alarm devices monitoring for indications of fire. 20. The method of claim 16, further comprising the fire alarm devices including smoke sensors that monitor for smoke as an indication of fire. 21. The method of claim 16, further comprising the fire alarm devices including heat sensors that monitor for heat as an indication of fire. 22. The method of claim 16, wherein in response to one or more of the fire alarm devices detecting an indication of fire: the one or more of the fire alarm devices sending the indication of fire to a fire alarm panel of the fire alarm system; and the fire alarm panel sending messages to the fire alarm devices requesting the capturing of the audio and/or image information. 23. The method of claim 16, wherein determining the existence of objects of interest from the audio and/or image information captured by the fire alarm devices comprises an analytics system applying audio and/or image detection algorithms to the audio and/or image information. 24. The method of claim 23, further comprising the analytics system being located within the fire alarm devices. 25. The method of claim 23, further comprising the analytics system being located within a fire alarm panel of the fire alarm system. 26. The method of claim 23, further comprising the analytics system being located within a network that is remote to the fire alarm system. 27. The method of claim 16, wherein providing notifications of the existence of the objects of interest comprises the fire alarm devices sending a list of the objects of interest to a user device. 28. The method of claim 16, wherein providing notifications of the existence of the objects of interest comprises a fire alarm panel of the fire alarm system presenting location information of the fire alarm devices and the objects of interest on a touch screen display of the fire alarm panel. 29. The method of claim 16, wherein providing notifications of the existence of the objects of interest comprises: generating a floorplan graphic of the premises that includes location information of the fire alarm devices and the objects of interest; and sending the floorplan graphic for presentation within a display screen of a user device. 30. The method of claim 16, wherein providing notifications of the existence of the objects of interest comprises a fire alarm panel of the fire alarm system generating a floorplan graphic of the premises that includes location information of the fire alarm devices and the objects of interest, and presenting the floorplan graphic on a touch screen display of the fire alarm panel.
2,400
9,033
9,033
16,392,901
2,497
A method, system and computer program product relating to an application server operable to manage a microservice-based application, i.e. app, on behalf of clients, the clients being available for use by system actors who may be, for example, end users, bots, developers or other apps. A permissions validator is used to compute effective permissions in response to client requests. The requests are granted or denied conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. The effective permissions are computed from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions.
1. A computer automated method to support management of an application for clients, the clients being available for use by system actors, and the application providing one or more resources for clients, each resource being associated with at least one app, and each app comprising a plurality of microservices, the method comprising: receiving a request by a client, made under instruction of a system actor, to access a resource in order to perform a function; computing, by a processor, a set of effective permissions in response to the request from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions, the actor permissions being permissions assigned to a system actor, the client permissions being permissions assigned to a client for said system actor; and the resource permissions being permissions assigned to the resource's requestable functions for said system actor; and granting or denying, by the processor, the request conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. 2. The method as recited in claim 1 further comprising: generating a client-accessible permissions credential which stores an intersection of the set of actor permissions and the set of client permissions, wherein for computing the set of effective permissions, the permissions credential is read to extract the intersection of actor and client permissions, and then intersected with the resource permissions to arrive at the effective permissions. 3. The method as recited in claim 2, wherein at least one actor type has rights to manage permissions credentials. 4. The method as recited in claim 3, wherein said rights include at least one of: a right to request generation of a permissions credential, a right to revoke a permissions credential, and a right to show permissions credentials currently in existence. 5. The method as recited in claim 2, wherein the permissions credential is a token. 6. The method as recited in claim 5, wherein the token is a JSON web token. 7. The method as recited in claim 2, wherein a permissions validator computes the set of effective permissions, wherein the permissions validator is itself delivered as a microservice available to be called by the plurality of microservices.
A method, system and computer program product relating to an application server operable to manage a microservice-based application, i.e. app, on behalf of clients, the clients being available for use by system actors who may be, for example, end users, bots, developers or other apps. A permissions validator is used to compute effective permissions in response to client requests. The requests are granted or denied conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. The effective permissions are computed from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions.1. A computer automated method to support management of an application for clients, the clients being available for use by system actors, and the application providing one or more resources for clients, each resource being associated with at least one app, and each app comprising a plurality of microservices, the method comprising: receiving a request by a client, made under instruction of a system actor, to access a resource in order to perform a function; computing, by a processor, a set of effective permissions in response to the request from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions, the actor permissions being permissions assigned to a system actor, the client permissions being permissions assigned to a client for said system actor; and the resource permissions being permissions assigned to the resource's requestable functions for said system actor; and granting or denying, by the processor, the request conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. 2. The method as recited in claim 1 further comprising: generating a client-accessible permissions credential which stores an intersection of the set of actor permissions and the set of client permissions, wherein for computing the set of effective permissions, the permissions credential is read to extract the intersection of actor and client permissions, and then intersected with the resource permissions to arrive at the effective permissions. 3. The method as recited in claim 2, wherein at least one actor type has rights to manage permissions credentials. 4. The method as recited in claim 3, wherein said rights include at least one of: a right to request generation of a permissions credential, a right to revoke a permissions credential, and a right to show permissions credentials currently in existence. 5. The method as recited in claim 2, wherein the permissions credential is a token. 6. The method as recited in claim 5, wherein the token is a JSON web token. 7. The method as recited in claim 2, wherein a permissions validator computes the set of effective permissions, wherein the permissions validator is itself delivered as a microservice available to be called by the plurality of microservices.
2,400
9,034
9,034
12,998,041
2,483
A delivery arrangement for linear TV programs uses SVC in which encoded enhancement layer video data is pre-downloaded to a STB and encoded base layer video data is live broadcasted to the STB at viewing time Pre-downloading of the enhancement layer data is done during off-peak viewing periods taking advantage of an abundance of network bandwidth while reducing bandwidth demand during peak viewing periods by broadcasting only the base layer data The enhancement layer data is downloaded in a modified MP4 file and stored in the STB for later synchronization and combination with the base layer, which is sent to the STB in a real time protocol (RTP) stream The combined base and enhancement layer data is SVC decoded for presentation to the enduser The pre-downloaded enhancement video file may be provided with digital rights management (DRM) protection, thereby providing conditional access to the enhanced video
1. A method of reproducing an encoded digital video signal transmitted in first and second layers, wherein the second layer comprises information for enhancing at least one of a resolution, frame rate and quality of the first layer, the method comprising: receiving data units of the second layer; storing the received data units of the second layer; receiving data units of the first layer corresponding to the data units of the second layer; combining the data units of the first layer with corresponding data units of the second layer while receiving further data units of the first layer, wherein the data units of the second layer are received and stored before any corresponding data units of the first layer are received; and generating output video frames by decoding the combined data units. 2. The method of claim 1, wherein the data units of the second layer are stored if an indicator indicates that decoding of the combined data units is allowed. 3. The method of claim 2, further comprising steps of: receiving a user input to set the indicator to one of allowing to decode the combined data units or disallowing to decode the combined data units. 4. The method of claim 1, further comprising steps of: identifying a file containing the stored data units of the second layer responsive to receiving data units of the first layer; and accessing the file for retrieving the data units of the second layer. 5. The method of claim 1, wherein the data units of the first and second layers comprise digital samples and the combining step includes: identifying digital samples in the first layer and digital samples in the second layer having matching synchronization information. 6. The method of claim 1, wherein the data units of the second layer are contained in a media container file. 7. The method of claim 6, wherein the media container file is an MP4 file. 8. The method of claim 1, wherein the data units of the first layer are transmitted in a stream of packets in accordance with a Real-Time Protocol (RTP). 9. The method of claim 1, wherein the digital video signal is encoded in accordance with Scalable Video Coding (SVC), the first layer being a base layer and the second layer being an enhancement layer. 10. The method of claim 9, wherein the base layer conveys standard definition (SD) video and the enhancement layer conveys high definition (HD) video. 11. Apparatus for reproducing an encoded digital video signal transmitted in first and second layers, wherein the second layer comprises information for enhancing at least one of a resolution, frame rate and quality of the first layer, the apparatus comprising: a receiver for receiving data units of the first and second layers; a memory for storing the received data units of the second layer; a combiner for combining the data units of the first layer with corresponding data units of the second layer while receiving further data units of the first layer, wherein the data units of the second layer are received and stored before any corresponding data units of the first layer are received; and a decoder for generating output video frames by decoding the combined data units. 12. The apparatus of claim 11, wherein the data units of the second layer are stored if an indicator indicates that decoding of the combined data units is allowed. 13. The apparatus of claim 12, further comprising: an interface for receiving a user input to set the indicator to one of allowing to decode the combined data units or disallowing to decode the combined data units. 14. The apparatus of claim 11, further comprising: a file reader for identifying a file containing the stored data units of the second layer responsive to receiving data units of the first layer and accessing the file for retrieving the data units of the second layer. 15. The apparatus of claim 11, wherein the data units of the first and second layers comprise digital samples and the apparatus includes: a synchronizer for identifying digital samples in the first layer and digital samples in the second layer having matching synchronization information. 16. The apparatus of claim 11, wherein the data units of the second layer are contained in a media container file. 17. The apparatus of claim 16, wherein the media container file is an MP4 file. 18. The apparatus of claim 11, wherein the data units of the first layer are transmitted to the receiver in a stream of packets in accordance with a Real-Time Protocol (RTP). 19. The apparatus of claim 11, wherein the digital video signal is encoded in accordance with Scalable Video Coding (SVC), the first layer being a base layer and the second layer being an enhancement layer. 20. The apparatus of claim 19, wherein the base layer conveys standard definition (SD) video and the enhancement layer conveys high definition (HD) video. 21-30. (canceled)
A delivery arrangement for linear TV programs uses SVC in which encoded enhancement layer video data is pre-downloaded to a STB and encoded base layer video data is live broadcasted to the STB at viewing time Pre-downloading of the enhancement layer data is done during off-peak viewing periods taking advantage of an abundance of network bandwidth while reducing bandwidth demand during peak viewing periods by broadcasting only the base layer data The enhancement layer data is downloaded in a modified MP4 file and stored in the STB for later synchronization and combination with the base layer, which is sent to the STB in a real time protocol (RTP) stream The combined base and enhancement layer data is SVC decoded for presentation to the enduser The pre-downloaded enhancement video file may be provided with digital rights management (DRM) protection, thereby providing conditional access to the enhanced video1. A method of reproducing an encoded digital video signal transmitted in first and second layers, wherein the second layer comprises information for enhancing at least one of a resolution, frame rate and quality of the first layer, the method comprising: receiving data units of the second layer; storing the received data units of the second layer; receiving data units of the first layer corresponding to the data units of the second layer; combining the data units of the first layer with corresponding data units of the second layer while receiving further data units of the first layer, wherein the data units of the second layer are received and stored before any corresponding data units of the first layer are received; and generating output video frames by decoding the combined data units. 2. The method of claim 1, wherein the data units of the second layer are stored if an indicator indicates that decoding of the combined data units is allowed. 3. The method of claim 2, further comprising steps of: receiving a user input to set the indicator to one of allowing to decode the combined data units or disallowing to decode the combined data units. 4. The method of claim 1, further comprising steps of: identifying a file containing the stored data units of the second layer responsive to receiving data units of the first layer; and accessing the file for retrieving the data units of the second layer. 5. The method of claim 1, wherein the data units of the first and second layers comprise digital samples and the combining step includes: identifying digital samples in the first layer and digital samples in the second layer having matching synchronization information. 6. The method of claim 1, wherein the data units of the second layer are contained in a media container file. 7. The method of claim 6, wherein the media container file is an MP4 file. 8. The method of claim 1, wherein the data units of the first layer are transmitted in a stream of packets in accordance with a Real-Time Protocol (RTP). 9. The method of claim 1, wherein the digital video signal is encoded in accordance with Scalable Video Coding (SVC), the first layer being a base layer and the second layer being an enhancement layer. 10. The method of claim 9, wherein the base layer conveys standard definition (SD) video and the enhancement layer conveys high definition (HD) video. 11. Apparatus for reproducing an encoded digital video signal transmitted in first and second layers, wherein the second layer comprises information for enhancing at least one of a resolution, frame rate and quality of the first layer, the apparatus comprising: a receiver for receiving data units of the first and second layers; a memory for storing the received data units of the second layer; a combiner for combining the data units of the first layer with corresponding data units of the second layer while receiving further data units of the first layer, wherein the data units of the second layer are received and stored before any corresponding data units of the first layer are received; and a decoder for generating output video frames by decoding the combined data units. 12. The apparatus of claim 11, wherein the data units of the second layer are stored if an indicator indicates that decoding of the combined data units is allowed. 13. The apparatus of claim 12, further comprising: an interface for receiving a user input to set the indicator to one of allowing to decode the combined data units or disallowing to decode the combined data units. 14. The apparatus of claim 11, further comprising: a file reader for identifying a file containing the stored data units of the second layer responsive to receiving data units of the first layer and accessing the file for retrieving the data units of the second layer. 15. The apparatus of claim 11, wherein the data units of the first and second layers comprise digital samples and the apparatus includes: a synchronizer for identifying digital samples in the first layer and digital samples in the second layer having matching synchronization information. 16. The apparatus of claim 11, wherein the data units of the second layer are contained in a media container file. 17. The apparatus of claim 16, wherein the media container file is an MP4 file. 18. The apparatus of claim 11, wherein the data units of the first layer are transmitted to the receiver in a stream of packets in accordance with a Real-Time Protocol (RTP). 19. The apparatus of claim 11, wherein the digital video signal is encoded in accordance with Scalable Video Coding (SVC), the first layer being a base layer and the second layer being an enhancement layer. 20. The apparatus of claim 19, wherein the base layer conveys standard definition (SD) video and the enhancement layer conveys high definition (HD) video. 21-30. (canceled)
2,400
9,035
9,035
15,832,195
2,472
In one embodiment, a method is provided. The method of this embodiment provides storing a packet header at a set of at least one page of memory allocated to storing packet headers, and storing the packet header and a packet payload at a location not in the set of at least one page of memory allocated to storing packet headers.
1. An apparatus, comprising: a processor; a port to receive a packet comprising a header of a particular protocol and a payload; and programmable logic to: receive the packet, and split the packet to cause the header to be pushed into a first portion of computer memory and the payload to be pushed directly into a second, different portion of the computer memory; wherein the first portion of the computer memory comprises a cache of the processor. 2. The apparatus of claim 1, further comprising the computer memory. 3. The apparatus of claim 2, wherein the computer memory comprises off-chip memory. 4. The apparatus of claim 1, further comprising a graphic processing unit (GPU). 5. The apparatus of claim 1, further comprising a coprocessor. 6. The apparatus of claim 1, further comprising a network interface controller (NIC). 7. The apparatus of claim 1, wherein the payload is pushed directly to the second portion of the computer memory via a direct memory access. 8. The apparatus of claim 1, wherein the second portion of the computer memory comprises system memory. 9. The apparatus of claim 1, wherein the particular protocol comprises an Ethernet-based protocol. 10. The apparatus of claim 1, wherein the packet comprises a Transmission Control Protocol/Internet Protocol (TCP/IP) packet. 11. The apparatus of claim 10, wherein the header comprises a TCP/IP header. 12. A method, comprising: receiving a packet comprising a header of a particular protocol and a payload; and splitting the packet to cause the header to be pushed into a first portion of a memory and the payload to be pushed directly into a second, different portion of the memory; wherein the first portion of the memory comprises a processor cache. 13. The method of claim 12, wherein the payload is pushed directly to the second portion of the memory via a direct memory access. 14. The method of claim 12, wherein the second portion of the memory comprises system memory. 15. The method of claim 12, wherein the particular protocol comprises an Ethernet-based protocol. 16. The method of claim 12, wherein the packet comprises a Transmission Control Protocol/Internet Protocol (TCP/IP) packet. 17. The method of claim 16, wherein the header comprises a TCP/IP header. 18. A system, comprising: an integrated circuit, comprising: a processor; a port to receive a packet comprising a header of a particular protocol and a payload; and programmable logic to: receive the packet, and split the packet to cause the header to be pushed into a first portion of a memory and the payload to be pushed directly into a second, different portion of the memory, wherein the first portion of the memory comprises a cache of the processor; and at least one other component coupled to the processor. 19. The system of claim 18, wherein the other component comprises a graphics processing unit. 20. The system of claim 18, further comprising off-chip memory. 21. A system, comprising: means for receiving a packet comprising a header of a particular protocol and a payload; and means for splitting the packet to cause the header to be pushed into a first portion of computer memory and the payload to be pushed directly into a second, different portion of the computer memory; wherein the first portion of the computer memory comprises a cache of a processor.
In one embodiment, a method is provided. The method of this embodiment provides storing a packet header at a set of at least one page of memory allocated to storing packet headers, and storing the packet header and a packet payload at a location not in the set of at least one page of memory allocated to storing packet headers.1. An apparatus, comprising: a processor; a port to receive a packet comprising a header of a particular protocol and a payload; and programmable logic to: receive the packet, and split the packet to cause the header to be pushed into a first portion of computer memory and the payload to be pushed directly into a second, different portion of the computer memory; wherein the first portion of the computer memory comprises a cache of the processor. 2. The apparatus of claim 1, further comprising the computer memory. 3. The apparatus of claim 2, wherein the computer memory comprises off-chip memory. 4. The apparatus of claim 1, further comprising a graphic processing unit (GPU). 5. The apparatus of claim 1, further comprising a coprocessor. 6. The apparatus of claim 1, further comprising a network interface controller (NIC). 7. The apparatus of claim 1, wherein the payload is pushed directly to the second portion of the computer memory via a direct memory access. 8. The apparatus of claim 1, wherein the second portion of the computer memory comprises system memory. 9. The apparatus of claim 1, wherein the particular protocol comprises an Ethernet-based protocol. 10. The apparatus of claim 1, wherein the packet comprises a Transmission Control Protocol/Internet Protocol (TCP/IP) packet. 11. The apparatus of claim 10, wherein the header comprises a TCP/IP header. 12. A method, comprising: receiving a packet comprising a header of a particular protocol and a payload; and splitting the packet to cause the header to be pushed into a first portion of a memory and the payload to be pushed directly into a second, different portion of the memory; wherein the first portion of the memory comprises a processor cache. 13. The method of claim 12, wherein the payload is pushed directly to the second portion of the memory via a direct memory access. 14. The method of claim 12, wherein the second portion of the memory comprises system memory. 15. The method of claim 12, wherein the particular protocol comprises an Ethernet-based protocol. 16. The method of claim 12, wherein the packet comprises a Transmission Control Protocol/Internet Protocol (TCP/IP) packet. 17. The method of claim 16, wherein the header comprises a TCP/IP header. 18. A system, comprising: an integrated circuit, comprising: a processor; a port to receive a packet comprising a header of a particular protocol and a payload; and programmable logic to: receive the packet, and split the packet to cause the header to be pushed into a first portion of a memory and the payload to be pushed directly into a second, different portion of the memory, wherein the first portion of the memory comprises a cache of the processor; and at least one other component coupled to the processor. 19. The system of claim 18, wherein the other component comprises a graphics processing unit. 20. The system of claim 18, further comprising off-chip memory. 21. A system, comprising: means for receiving a packet comprising a header of a particular protocol and a payload; and means for splitting the packet to cause the header to be pushed into a first portion of computer memory and the payload to be pushed directly into a second, different portion of the computer memory; wherein the first portion of the computer memory comprises a cache of a processor.
2,400
9,036
9,036
15,963,423
2,462
In one of its aspects the technology disclosed herein concerns a communications system comprising an access node ( 22 ) and a wireless terminal ( 26 ). The wireless terminal comprises receiver circuitry ( 40 ) and transmitter circuitry ( 44 ) as well as processor circuitry ( 40 ). The receiver circuitry ( 40 ) is configured receiver circuitry configured to receive from a base station apparatus configuration parameters for a random access procedure. The configuration parameters include a set of random access preambles and physical random access channel (PRACH) resources reserved for a request of system information. The processor circuitry ( 40 ) is configured to select a random access preamble and PRACH resource from the set of random access preambles and the PRACH resources in a case of requesting the system information. The transmitter circuitry ( 44 ) is configured to transmit the random access preamble using the PRACH resource.
1. A user equipment comprising: receiver circuitry configured to receive from a base station apparatus configuration parameters for a random access procedure, wherein the configuration parameters include a set of random access preambles and physical random access channel (PRACH) resources reserved for a request of system information; processor circuitry configured to select a random access preamble and PRACH resource from the set of random access preambles and the PRACH resources in a case of requesting the system information; and transmitter circuitry configured to transmit the random access preamble using the PRACH resource. 2. The user equipment of claim 1, wherein the request of system information requests from the base station apparatus an on-demand delivery of a system information block (SIB) or a group of SIBs. 3. The user equipment of claim 2, wherein the configuration parameters comprise a list of information elements, each information element comprising identification(s) of the SIBs or the group of SIBs. 4. The user equipment of claim 3, wherein the information element further comprises one or more random access preambles, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 5. The user equipment of claim 3, wherein the information element further comprises one or more PRACH resources, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 6. A base station apparatus comprising: receiver circuitry and transmitter circuitry configured to communicate across a radio interface with a user equipment; processor circuitry configured to: broadcast configuration parameters for a random access procedure, wherein the configuration parameters include a set of random access preambles and physical random access channel (PRACH) resources reserved for a request of system information; receive a preamble sequence associated with one of the random access preambles on one of the PRACH resources; identify and process a request of system information from the user equipment. 7. The base station apparatus of claim 6, wherein the request of system information requests from the base station apparatus an on-demand delivery of a system information block (SIB) or a group of SIBs. 8. The base station apparatus of claim 7, wherein the configuration parameters comprise a list of information elements, each information element comprising identification(s) of the SIBs or the group of SIBs. 9. The base station apparatus of claim 8, wherein the information element further comprises one or more random access preambles, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 10. The base station apparatus of claim 8, wherein the information element further comprises one or more PRACH resources, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 11. A method for a user equipment comprising: receiving, from a base station apparatus, configuration parameters for a random access procedure, wherein the configuration parameters include a set of random access preambles and PRACH resources reserved for a request of system information, selecting a random access preamble and physical random access channel (PRACH) resource from the set of random access preambles and the PRACH resources in a case of requesting the system information; and transmitting the random access preamble using the PRACH resource. 12. The method of claim 11, wherein the request of system information requests from the base station apparatus an on-demand delivery of a system information block (SIB) or a group of SIBs. 13. The method of claim 12, wherein the configuration parameters comprise a list of information elements, each information element comprising identification(s) of the SIBs or the group of SIBs. 14. The method of claim 13, wherein the information element further comprises one or more random access preamble indices, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 15. The method of claim 13, wherein the information element further comprises one or more PRACH resources, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 16. A method for a base station apparatus comprising: using receiver circuitry and transmitter circuitry to communicate across a radio interface with a user equipment; using processor circuitry to: broadcast configuration parameters for a random access procedure, wherein the configuration parameters include a set of random access preambles and physical random access channel (PRACH) resources reserved for a request of system information; receive a preamble sequence associated with one of the random access preambles on one of the PRACH resources; identify and process a request of system information from the user equipment. 17. The method of claim 16, wherein the request of system information requests from the base station apparatus an on-demand delivery of a system information block (SIB) or a group of SIBs. 18. The method of claim 17, wherein the configuration parameters comprise a list of information elements, each information element comprising identification(s) of the SIBs or the group of SIBs. 19. The method of claim 18, wherein the information element further comprises one or more random access preambles, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 20. The method of claim 18, wherein the information element further comprises one or more PRACH resources, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element.
In one of its aspects the technology disclosed herein concerns a communications system comprising an access node ( 22 ) and a wireless terminal ( 26 ). The wireless terminal comprises receiver circuitry ( 40 ) and transmitter circuitry ( 44 ) as well as processor circuitry ( 40 ). The receiver circuitry ( 40 ) is configured receiver circuitry configured to receive from a base station apparatus configuration parameters for a random access procedure. The configuration parameters include a set of random access preambles and physical random access channel (PRACH) resources reserved for a request of system information. The processor circuitry ( 40 ) is configured to select a random access preamble and PRACH resource from the set of random access preambles and the PRACH resources in a case of requesting the system information. The transmitter circuitry ( 44 ) is configured to transmit the random access preamble using the PRACH resource.1. A user equipment comprising: receiver circuitry configured to receive from a base station apparatus configuration parameters for a random access procedure, wherein the configuration parameters include a set of random access preambles and physical random access channel (PRACH) resources reserved for a request of system information; processor circuitry configured to select a random access preamble and PRACH resource from the set of random access preambles and the PRACH resources in a case of requesting the system information; and transmitter circuitry configured to transmit the random access preamble using the PRACH resource. 2. The user equipment of claim 1, wherein the request of system information requests from the base station apparatus an on-demand delivery of a system information block (SIB) or a group of SIBs. 3. The user equipment of claim 2, wherein the configuration parameters comprise a list of information elements, each information element comprising identification(s) of the SIBs or the group of SIBs. 4. The user equipment of claim 3, wherein the information element further comprises one or more random access preambles, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 5. The user equipment of claim 3, wherein the information element further comprises one or more PRACH resources, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 6. A base station apparatus comprising: receiver circuitry and transmitter circuitry configured to communicate across a radio interface with a user equipment; processor circuitry configured to: broadcast configuration parameters for a random access procedure, wherein the configuration parameters include a set of random access preambles and physical random access channel (PRACH) resources reserved for a request of system information; receive a preamble sequence associated with one of the random access preambles on one of the PRACH resources; identify and process a request of system information from the user equipment. 7. The base station apparatus of claim 6, wherein the request of system information requests from the base station apparatus an on-demand delivery of a system information block (SIB) or a group of SIBs. 8. The base station apparatus of claim 7, wherein the configuration parameters comprise a list of information elements, each information element comprising identification(s) of the SIBs or the group of SIBs. 9. The base station apparatus of claim 8, wherein the information element further comprises one or more random access preambles, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 10. The base station apparatus of claim 8, wherein the information element further comprises one or more PRACH resources, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 11. A method for a user equipment comprising: receiving, from a base station apparatus, configuration parameters for a random access procedure, wherein the configuration parameters include a set of random access preambles and PRACH resources reserved for a request of system information, selecting a random access preamble and physical random access channel (PRACH) resource from the set of random access preambles and the PRACH resources in a case of requesting the system information; and transmitting the random access preamble using the PRACH resource. 12. The method of claim 11, wherein the request of system information requests from the base station apparatus an on-demand delivery of a system information block (SIB) or a group of SIBs. 13. The method of claim 12, wherein the configuration parameters comprise a list of information elements, each information element comprising identification(s) of the SIBs or the group of SIBs. 14. The method of claim 13, wherein the information element further comprises one or more random access preamble indices, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 15. The method of claim 13, wherein the information element further comprises one or more PRACH resources, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 16. A method for a base station apparatus comprising: using receiver circuitry and transmitter circuitry to communicate across a radio interface with a user equipment; using processor circuitry to: broadcast configuration parameters for a random access procedure, wherein the configuration parameters include a set of random access preambles and physical random access channel (PRACH) resources reserved for a request of system information; receive a preamble sequence associated with one of the random access preambles on one of the PRACH resources; identify and process a request of system information from the user equipment. 17. The method of claim 16, wherein the request of system information requests from the base station apparatus an on-demand delivery of a system information block (SIB) or a group of SIBs. 18. The method of claim 17, wherein the configuration parameters comprise a list of information elements, each information element comprising identification(s) of the SIBs or the group of SIBs. 19. The method of claim 18, wherein the information element further comprises one or more random access preambles, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element. 20. The method of claim 18, wherein the information element further comprises one or more PRACH resources, one of which is selected for the request of the SIB or the group of SIBs indicated in the information element.
2,400
9,037
9,037
15,795,048
2,497
A method, system and computer program product relating to an application server operable to manage a microservice-based application, i.e. app, on behalf of clients, the clients being available for use by system actors who may be, for example, end users, bots, developers or other apps. A permissions validator is used to compute effective permissions in response to client requests. The requests are granted or denied conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. The effective permissions are computed from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions.
1. A computer automated method to support management of an application for clients, the clients being available for use by system actors, and the application providing one or more resources for clients, each resource being associated with at least one app, and each app comprising a plurality of microservices, the method comprising: receiving a request by a client, made under instruction of a system actor, to access a resource in order to perform a function; computing, by a processor, a set of effective permissions in response to the request from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions, the actor permissions being permissions assigned to a system actor, the client permissions being permissions assigned to a client for said system actor; and the resource permissions being permissions assigned to the resource's requestable functions for said system actor; and granting or denying, by the processor, the request conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. 2. The method as recited in claim 1 further comprising: generating a client-accessible permissions credential which stores an intersection of the set of actor permissions and the set of client permissions, wherein for computing the set of effective permissions, the permissions credential is read to extract the intersection of actor and client permissions, and then intersected with the resource permissions to arrive at the effective permissions. 3. The method as recited in claim 2, wherein at least one actor type has rights to manage permissions credentials. 4. The method as recited in claim 3, wherein said rights include at least one of: a right to request generation of a permissions credential, a right to revoke a permissions credential, and a right to show permissions credentials currently in existence. 5. The method as recited in claim 2, wherein the permissions credential is a token. 6. The method as recited in claim 5, wherein the token is a JSON web token. 7. The method as recited in claim 2, wherein a permissions validator computes the set of effective permissions, wherein the permissions validator is itself delivered as a microservice available to be called by the plurality of microservices. 8. A computer program product to support management of an application for clients, the clients being available for use by system actors, and the application providing one or more resources for clients, each resource being associated with at least one app, and each app comprising a plurality of microservices, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code comprising the programming instructions for: receiving a request by a client, made under instruction of a system actor, to access a resource in order to perform a function; computing a set of effective permissions in response to the request from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions, the actor permissions being permissions assigned to a system actor, the client permissions being permissions assigned to a client for said system actor; and the resource permissions being permissions assigned to the resource's requestable functions for said system actor; and granting or denying the request conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. 9. The computer program product as recited in claim 8, wherein the program code further comprises the programming instructions for: generating a client-accessible permissions credential which stores an intersection of the set of actor permissions and the set of client permissions, wherein for computing the set of effective permissions, the permissions credential is read to extract the intersection of actor and client permissions, and then intersected with the resource permissions to arrive at the effective permissions. 10. The computer program product as recited in claim 9, wherein at least one actor type has rights to manage permissions credentials. 11. The computer program product as recited in claim 10, wherein said rights include at least one of: a right to request generation of a permissions credential, a right to revoke a permissions credential, and a right to show permissions credentials currently in existence. 12. The computer program product as recited in claim 9, wherein the permissions credential is a token. 13. The computer program product as recited in claim 12, wherein the token is a JSON web token. 14. The computer program product as recited in claim 9, wherein a permissions validator computes the set of effective permissions, wherein the permissions validator is itself delivered as a microservice available to be called by the plurality of microservices. 15. A system, comprising: a memory unit for storing a computer program to support management of an application for clients, the clients being available for use by system actors, and the application providing one or more resources for clients, each resource being associated with at least one app, and each app comprising a plurality of microservices; and a processor coupled to the memory unit, wherein the processor is configured to execute the program instructions of the computer program comprising: receiving a request by a client, made under instruction of a system actor, to access a resource in order to perform a function; computing a set of effective permissions in response to the request from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions, the actor permissions being permissions assigned to a system actor, the client permissions being permissions assigned to a client for said system actor; and the resource permissions being permissions assigned to the resource's requestable functions for said system actor; and granting or denying the request conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. 16. The system as recited in claim 15, wherein the program instructions of the computer program further comprise: generating a client-accessible permissions credential which stores an intersection of the set of actor permissions and the set of client permissions, wherein for computing the set of effective permissions, the permissions credential is read to extract the intersection of actor and client permissions, and then intersected with the resource permissions to arrive at the effective permissions. 17. The system as recited in claim 16, wherein at least one actor type has rights to manage permissions credentials. 18. The system as recited in claim 17, wherein said rights include at least one of: a right to request generation of a permissions credential, a right to revoke a permissions credential, and a right to show permissions credentials currently in existence. 19. The system as recited in claim 16, wherein the permissions credential is a token. 20. The system as recited in claim 19, wherein the token is a JSON web token.
A method, system and computer program product relating to an application server operable to manage a microservice-based application, i.e. app, on behalf of clients, the clients being available for use by system actors who may be, for example, end users, bots, developers or other apps. A permissions validator is used to compute effective permissions in response to client requests. The requests are granted or denied conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. The effective permissions are computed from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions.1. A computer automated method to support management of an application for clients, the clients being available for use by system actors, and the application providing one or more resources for clients, each resource being associated with at least one app, and each app comprising a plurality of microservices, the method comprising: receiving a request by a client, made under instruction of a system actor, to access a resource in order to perform a function; computing, by a processor, a set of effective permissions in response to the request from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions, the actor permissions being permissions assigned to a system actor, the client permissions being permissions assigned to a client for said system actor; and the resource permissions being permissions assigned to the resource's requestable functions for said system actor; and granting or denying, by the processor, the request conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. 2. The method as recited in claim 1 further comprising: generating a client-accessible permissions credential which stores an intersection of the set of actor permissions and the set of client permissions, wherein for computing the set of effective permissions, the permissions credential is read to extract the intersection of actor and client permissions, and then intersected with the resource permissions to arrive at the effective permissions. 3. The method as recited in claim 2, wherein at least one actor type has rights to manage permissions credentials. 4. The method as recited in claim 3, wherein said rights include at least one of: a right to request generation of a permissions credential, a right to revoke a permissions credential, and a right to show permissions credentials currently in existence. 5. The method as recited in claim 2, wherein the permissions credential is a token. 6. The method as recited in claim 5, wherein the token is a JSON web token. 7. The method as recited in claim 2, wherein a permissions validator computes the set of effective permissions, wherein the permissions validator is itself delivered as a microservice available to be called by the plurality of microservices. 8. A computer program product to support management of an application for clients, the clients being available for use by system actors, and the application providing one or more resources for clients, each resource being associated with at least one app, and each app comprising a plurality of microservices, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code comprising the programming instructions for: receiving a request by a client, made under instruction of a system actor, to access a resource in order to perform a function; computing a set of effective permissions in response to the request from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions, the actor permissions being permissions assigned to a system actor, the client permissions being permissions assigned to a client for said system actor; and the resource permissions being permissions assigned to the resource's requestable functions for said system actor; and granting or denying the request conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. 9. The computer program product as recited in claim 8, wherein the program code further comprises the programming instructions for: generating a client-accessible permissions credential which stores an intersection of the set of actor permissions and the set of client permissions, wherein for computing the set of effective permissions, the permissions credential is read to extract the intersection of actor and client permissions, and then intersected with the resource permissions to arrive at the effective permissions. 10. The computer program product as recited in claim 9, wherein at least one actor type has rights to manage permissions credentials. 11. The computer program product as recited in claim 10, wherein said rights include at least one of: a right to request generation of a permissions credential, a right to revoke a permissions credential, and a right to show permissions credentials currently in existence. 12. The computer program product as recited in claim 9, wherein the permissions credential is a token. 13. The computer program product as recited in claim 12, wherein the token is a JSON web token. 14. The computer program product as recited in claim 9, wherein a permissions validator computes the set of effective permissions, wherein the permissions validator is itself delivered as a microservice available to be called by the plurality of microservices. 15. A system, comprising: a memory unit for storing a computer program to support management of an application for clients, the clients being available for use by system actors, and the application providing one or more resources for clients, each resource being associated with at least one app, and each app comprising a plurality of microservices; and a processor coupled to the memory unit, wherein the processor is configured to execute the program instructions of the computer program comprising: receiving a request by a client, made under instruction of a system actor, to access a resource in order to perform a function; computing a set of effective permissions in response to the request from an intersection of a set of actor permissions, a set of client permissions and a set of resource permissions, the actor permissions being permissions assigned to a system actor, the client permissions being permissions assigned to a client for said system actor; and the resource permissions being permissions assigned to the resource's requestable functions for said system actor; and granting or denying the request conditional on the effective permissions being at least a subset of the permissions required to be given by any of the app's microservices that are needed for the resource being requested. 16. The system as recited in claim 15, wherein the program instructions of the computer program further comprise: generating a client-accessible permissions credential which stores an intersection of the set of actor permissions and the set of client permissions, wherein for computing the set of effective permissions, the permissions credential is read to extract the intersection of actor and client permissions, and then intersected with the resource permissions to arrive at the effective permissions. 17. The system as recited in claim 16, wherein at least one actor type has rights to manage permissions credentials. 18. The system as recited in claim 17, wherein said rights include at least one of: a right to request generation of a permissions credential, a right to revoke a permissions credential, and a right to show permissions credentials currently in existence. 19. The system as recited in claim 16, wherein the permissions credential is a token. 20. The system as recited in claim 19, wherein the token is a JSON web token.
2,400
9,038
9,038
15,460,037
2,488
A method for derivation of a temporal motion data (TMD) candidate for a prediction unit (PU) in video encoding or video decoding is provided. The derived TMD candidate is for inclusion in an inter-prediction candidate list for the PU. The method includes determining a primary TMD position relative to a co-located PU in a co-located largest coding unit (LCU), wherein the co-located PU is a block in a reference picture having a same size, shape, and coordinates as the PU, and selecting at least some motion data of a secondary TMD position as the TMD candidate when the primary TMD position is in a bottom neighboring LCU or in a bottom right neighboring LCU of the co-located LCU, wherein the secondary TMD position is determined relative to the co-located PU.
1. A method for derivation of a temporal motion data (TMD) candidate for a prediction unit (PU) in video encoding or video decoding, the TMD candidate for inclusion in an inter-prediction candidate list for the PU, the method comprising: determining a primary TMD position relative to a co-located PU in a co-located largest coding unit (LCU), wherein the co-located PU is a block in a reference picture having a same size, shape, and coordinates as the PU; selecting at least some motion data of a secondary TMD position as the TMD candidate when the primary TMD position is in a bottom neighboring LCU or in a bottom right neighboring LCU of the co-located LCU, wherein the secondary TMD position is determined relative to the co-located PU. 2. The method of claim 1, further comprising: determining an alternative TMD position relative to the co-located PU when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU; and selecting at least some motion data of the alternative TMD position as the TMD candidate when the motion data of the alternative TMD position is available, wherein selecting at least some motion data of a secondary TMD position comprises selecting at least some of the motion data of the secondary TMD position as the TMD candidate when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU of the co-located LCU and when the motion data of the alternative TMD position is not available. 3. The method of claim 1, wherein the primary TMD position is a bottom right neighboring position outside the co-located PU, and the secondary TMD position is inside the co-located PU. 4. The method of claim 3, wherein the secondary TMD position is one selected from an upper left central position inside the co-located PU and a bottom right central position inside the co-located PU. 5. The method of claim 2, wherein the primary TMD position is a bottom right neighboring position outside the co-located PU, the secondary TMD position is inside the co-located PU, and the alternative TMD position is one selected from a bottom right neighboring position outside the co-located PU and inside the co-located LCU row and a bottom right position inside the co-located PU. 6. The method of claim 1, wherein the TMD candidate is one selected from a group consisting of a temporal merging candidate and a temporal motion vector predictor (MVP) candidate. 7. A method for derivation of a temporal merging candidate for a prediction unit (PU) in video encoding or video decoding, the temporal merging candidate for inclusion in a merging candidate list for the PU, the method comprising: determining a primary temporal motion data (TMD) position relative to a co-located PU in a co-located largest coding unit (LCU), wherein the co-located PU is a block in a reference picture having a same size, shape, and coordinates as the PU and the primary TMD position is a bottom right neighboring position outside the co-located PU; and selecting motion data of a secondary TMD position as the temporal merging candidate when the primary TMD position is in a bottom neighboring LCU or in a bottom right neighboring LCU of the co-located LCU, wherein the secondary TMD position is inside the co-located PU. 8. The method of claim 7, further comprising: determining an alternative TMD position relative to the co-located PU when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU, wherein the alternative TMD position is one selected from a bottom right neighboring position outside the co-located PU and inside the co-located LCU row and a bottom right position inside the co-located PU; and selecting motion data of the alternative TMD position as the temporal merging candidate when the motion data of the alternative TMD position is available, wherein selecting motion data of a secondary TMD position comprises selecting the motion data of the secondary TMD position as the temporal merging candidate when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU of the co-located LCU and when the motion data of the alternative TMD position is not available. 9. The method of claim 7, wherein the secondary TMD position is one selected from an upper left central position inside the co-located PU and a bottom right central position inside the co-located PU. 10. A method for derivation of a temporal motion vector predictor (MVP) candidate for a prediction unit (PU) in video encoding or video decoding, the temporal MVP candidate for inclusion in an advanced MVP (AMVP) candidate list for the PU, the method comprising: determining a primary temporal motion data (TMD) position relative to a co-located PU in a co-located largest coding unit (LCU), wherein the co-located PU is a block in a reference picture having a same size, shape, and coordinates as the PU and the primary TMD position is a bottom right neighboring position outside the co-located PU; and selecting motion vector data from motion data of a secondary TMD position as the temporal MVP candidate when the primary TMD position is in a bottom neighboring LCU or in a bottom right neighboring LCU of the co-located LCU, wherein the secondary TMD position is inside the co-located PU. 11. The method of claim 10, further comprising: determining an alternative TMD position relative to the co-located PU when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU, wherein the alternative TMD position is one selected from a bottom right neighboring position outside the co-located PU and inside the co-located LCU row and a bottom right position inside the co-located PU; and selecting motion data of the alternative TMD position as the temporal MVP candidate when the motion data of the alternative TMD position is available, wherein selecting motion data of a secondary TMD position comprises selecting the motion data of the secondary TMD position as the temporal MVP candidate when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU of the co-located LCU and when the motion data of the alternative TMD position is not available. 12. The method of claim 10, wherein the secondary TMD position is one selected from an upper left central position inside the co-located PU and a bottom right central position inside the co-located PU.
A method for derivation of a temporal motion data (TMD) candidate for a prediction unit (PU) in video encoding or video decoding is provided. The derived TMD candidate is for inclusion in an inter-prediction candidate list for the PU. The method includes determining a primary TMD position relative to a co-located PU in a co-located largest coding unit (LCU), wherein the co-located PU is a block in a reference picture having a same size, shape, and coordinates as the PU, and selecting at least some motion data of a secondary TMD position as the TMD candidate when the primary TMD position is in a bottom neighboring LCU or in a bottom right neighboring LCU of the co-located LCU, wherein the secondary TMD position is determined relative to the co-located PU.1. A method for derivation of a temporal motion data (TMD) candidate for a prediction unit (PU) in video encoding or video decoding, the TMD candidate for inclusion in an inter-prediction candidate list for the PU, the method comprising: determining a primary TMD position relative to a co-located PU in a co-located largest coding unit (LCU), wherein the co-located PU is a block in a reference picture having a same size, shape, and coordinates as the PU; selecting at least some motion data of a secondary TMD position as the TMD candidate when the primary TMD position is in a bottom neighboring LCU or in a bottom right neighboring LCU of the co-located LCU, wherein the secondary TMD position is determined relative to the co-located PU. 2. The method of claim 1, further comprising: determining an alternative TMD position relative to the co-located PU when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU; and selecting at least some motion data of the alternative TMD position as the TMD candidate when the motion data of the alternative TMD position is available, wherein selecting at least some motion data of a secondary TMD position comprises selecting at least some of the motion data of the secondary TMD position as the TMD candidate when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU of the co-located LCU and when the motion data of the alternative TMD position is not available. 3. The method of claim 1, wherein the primary TMD position is a bottom right neighboring position outside the co-located PU, and the secondary TMD position is inside the co-located PU. 4. The method of claim 3, wherein the secondary TMD position is one selected from an upper left central position inside the co-located PU and a bottom right central position inside the co-located PU. 5. The method of claim 2, wherein the primary TMD position is a bottom right neighboring position outside the co-located PU, the secondary TMD position is inside the co-located PU, and the alternative TMD position is one selected from a bottom right neighboring position outside the co-located PU and inside the co-located LCU row and a bottom right position inside the co-located PU. 6. The method of claim 1, wherein the TMD candidate is one selected from a group consisting of a temporal merging candidate and a temporal motion vector predictor (MVP) candidate. 7. A method for derivation of a temporal merging candidate for a prediction unit (PU) in video encoding or video decoding, the temporal merging candidate for inclusion in a merging candidate list for the PU, the method comprising: determining a primary temporal motion data (TMD) position relative to a co-located PU in a co-located largest coding unit (LCU), wherein the co-located PU is a block in a reference picture having a same size, shape, and coordinates as the PU and the primary TMD position is a bottom right neighboring position outside the co-located PU; and selecting motion data of a secondary TMD position as the temporal merging candidate when the primary TMD position is in a bottom neighboring LCU or in a bottom right neighboring LCU of the co-located LCU, wherein the secondary TMD position is inside the co-located PU. 8. The method of claim 7, further comprising: determining an alternative TMD position relative to the co-located PU when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU, wherein the alternative TMD position is one selected from a bottom right neighboring position outside the co-located PU and inside the co-located LCU row and a bottom right position inside the co-located PU; and selecting motion data of the alternative TMD position as the temporal merging candidate when the motion data of the alternative TMD position is available, wherein selecting motion data of a secondary TMD position comprises selecting the motion data of the secondary TMD position as the temporal merging candidate when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU of the co-located LCU and when the motion data of the alternative TMD position is not available. 9. The method of claim 7, wherein the secondary TMD position is one selected from an upper left central position inside the co-located PU and a bottom right central position inside the co-located PU. 10. A method for derivation of a temporal motion vector predictor (MVP) candidate for a prediction unit (PU) in video encoding or video decoding, the temporal MVP candidate for inclusion in an advanced MVP (AMVP) candidate list for the PU, the method comprising: determining a primary temporal motion data (TMD) position relative to a co-located PU in a co-located largest coding unit (LCU), wherein the co-located PU is a block in a reference picture having a same size, shape, and coordinates as the PU and the primary TMD position is a bottom right neighboring position outside the co-located PU; and selecting motion vector data from motion data of a secondary TMD position as the temporal MVP candidate when the primary TMD position is in a bottom neighboring LCU or in a bottom right neighboring LCU of the co-located LCU, wherein the secondary TMD position is inside the co-located PU. 11. The method of claim 10, further comprising: determining an alternative TMD position relative to the co-located PU when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU, wherein the alternative TMD position is one selected from a bottom right neighboring position outside the co-located PU and inside the co-located LCU row and a bottom right position inside the co-located PU; and selecting motion data of the alternative TMD position as the temporal MVP candidate when the motion data of the alternative TMD position is available, wherein selecting motion data of a secondary TMD position comprises selecting the motion data of the secondary TMD position as the temporal MVP candidate when the primary TMD position is in the bottom neighboring LCU or in the bottom right neighboring LCU of the co-located LCU and when the motion data of the alternative TMD position is not available. 12. The method of claim 10, wherein the secondary TMD position is one selected from an upper left central position inside the co-located PU and a bottom right central position inside the co-located PU.
2,400
9,039
9,039
16,120,660
2,495
Described herein are methods, systems, and software to handle verification information in a content node. In one example, a method of operating a content node includes receiving a secure content request from an end user device and determining the availability of verification information stored on the content node to service the secure content request. The method further provides, if the verification information is available, verifying the end user device based on the verification information. The method also includes, if the verification information is unavailable, querying an origin server to verify the end user device.
1. A method of operating a content node that caches content in a content delivery network, the method comprising: receiving a secure content request from an end user device; determining availability of verification information stored on the content node to service the secure content request; if the verification information is available, verifying the end user device based on the verification information; and if the verification information is unavailable, querying an origin server to verify the end user device, receiving new verification information from the origin server to verify the end user device, and caching the new verification information for the end user device. 2. The method of claim 1 further comprising: in response to verifying the end user device based on the verification information, transferring content corresponding to the secure content request to the end user device. 3. The method of claim 1 further comprising: in response to querying the origin server to verify the end user device, transferring content corresponding to the secure content request to the end user device. 4. The method of claim 1 further comprising: receiving a second secure content request from the end user device; and in response to the second secure content request, verifying the end user device based on the new verification information. 5. The method of claim 4 further comprising: in response verifying the end user device based on the new verification information, transferring content corresponding to the second secure content request to the end user device. 6. The method of claim 1 wherein verifying the end user device based on the verification information comprises comparing security information from the end user device with the verification information. 7. The method of claim 1 wherein the verification information comprises cookie data. 8. The method of claim 1 wherein the secure content request comprises a request to access content in association with a paywall. 9. The method of claim 1 further comprising: receiving a verification purge request; and responsive to the verification purge request, purging the verification information. 10. A computer apparatus to operate a content node in a content delivery network, the computer apparatus comprising: processing instructions that direct the content node, when executed by the content node, to: receive a secure content request from an end user device; determine availability of verification information stored on the content node to service the secure content request; if the verification information is available, verify the end user device based on the verification information; and if the verification information is unavailable, querying an origin server to verify the end user device; and one or more non-transitory computer readable media that store the processing instructions. 11. The computer apparatus of claim 10 wherein the processing instructions further direct the content node to: in response to verifying the end user device based on the verification information, transferring content corresponding to the secure content request to the end user device. 12. The computer apparatus of claim 10 wherein the processing instructions further direct the content node to: in response to querying the origin server to verify the end user device, receive new verification information from the origin server to verify the end user device and cache the new verification information for the end user device. 13. The computer apparatus of claim 12 wherein the processing instructions further direct the content node to: receive a second secure content request from the end user device; and in response to the second secure content request, verify the end user device based on the new verification information. 14. The computer apparatus of claim 13 wherein the processing instructions further direct the content node to: in response to verifying the end user device based on the new verification information, transfer content corresponding to the second secure content request to the end user device. 15. The computer apparatus of claim 10 wherein the processing instructions to verify the end user device based on the verification information direct the content node to compare security information from the end user device with the verification information. 16. The computer apparatus of claim 10 wherein the verification information comprises cookie data. 17. The computer apparatus of claim 10 wherein the secure content request comprises a request to access content in association with a paywall. 18. The computer apparatus of claim 10 wherein the processing instructions further direct the content node to: receive a verification purge request; responsive to the verification purge request, purge the verification information 19. A content node for caching content in a content delivery network, the content node comprising: a communication interface configured to: receive a secure content request from an end user device; and transfer the secure content request to a processing system; and the processing system configured to: receive the secure content request; determine availability of verification information stored on the content node to service the secure content request; if the verification information is available, verify the end user device based on the verification information; and if the verification information is unavailable, query an origin server to verify the end user device, receive new verification information from the origin server to verify the end user device, and cache the new verification information for the end user device. 20. The content node of claim 19 wherein the verification information comprises cookie data.
Described herein are methods, systems, and software to handle verification information in a content node. In one example, a method of operating a content node includes receiving a secure content request from an end user device and determining the availability of verification information stored on the content node to service the secure content request. The method further provides, if the verification information is available, verifying the end user device based on the verification information. The method also includes, if the verification information is unavailable, querying an origin server to verify the end user device.1. A method of operating a content node that caches content in a content delivery network, the method comprising: receiving a secure content request from an end user device; determining availability of verification information stored on the content node to service the secure content request; if the verification information is available, verifying the end user device based on the verification information; and if the verification information is unavailable, querying an origin server to verify the end user device, receiving new verification information from the origin server to verify the end user device, and caching the new verification information for the end user device. 2. The method of claim 1 further comprising: in response to verifying the end user device based on the verification information, transferring content corresponding to the secure content request to the end user device. 3. The method of claim 1 further comprising: in response to querying the origin server to verify the end user device, transferring content corresponding to the secure content request to the end user device. 4. The method of claim 1 further comprising: receiving a second secure content request from the end user device; and in response to the second secure content request, verifying the end user device based on the new verification information. 5. The method of claim 4 further comprising: in response verifying the end user device based on the new verification information, transferring content corresponding to the second secure content request to the end user device. 6. The method of claim 1 wherein verifying the end user device based on the verification information comprises comparing security information from the end user device with the verification information. 7. The method of claim 1 wherein the verification information comprises cookie data. 8. The method of claim 1 wherein the secure content request comprises a request to access content in association with a paywall. 9. The method of claim 1 further comprising: receiving a verification purge request; and responsive to the verification purge request, purging the verification information. 10. A computer apparatus to operate a content node in a content delivery network, the computer apparatus comprising: processing instructions that direct the content node, when executed by the content node, to: receive a secure content request from an end user device; determine availability of verification information stored on the content node to service the secure content request; if the verification information is available, verify the end user device based on the verification information; and if the verification information is unavailable, querying an origin server to verify the end user device; and one or more non-transitory computer readable media that store the processing instructions. 11. The computer apparatus of claim 10 wherein the processing instructions further direct the content node to: in response to verifying the end user device based on the verification information, transferring content corresponding to the secure content request to the end user device. 12. The computer apparatus of claim 10 wherein the processing instructions further direct the content node to: in response to querying the origin server to verify the end user device, receive new verification information from the origin server to verify the end user device and cache the new verification information for the end user device. 13. The computer apparatus of claim 12 wherein the processing instructions further direct the content node to: receive a second secure content request from the end user device; and in response to the second secure content request, verify the end user device based on the new verification information. 14. The computer apparatus of claim 13 wherein the processing instructions further direct the content node to: in response to verifying the end user device based on the new verification information, transfer content corresponding to the second secure content request to the end user device. 15. The computer apparatus of claim 10 wherein the processing instructions to verify the end user device based on the verification information direct the content node to compare security information from the end user device with the verification information. 16. The computer apparatus of claim 10 wherein the verification information comprises cookie data. 17. The computer apparatus of claim 10 wherein the secure content request comprises a request to access content in association with a paywall. 18. The computer apparatus of claim 10 wherein the processing instructions further direct the content node to: receive a verification purge request; responsive to the verification purge request, purge the verification information 19. A content node for caching content in a content delivery network, the content node comprising: a communication interface configured to: receive a secure content request from an end user device; and transfer the secure content request to a processing system; and the processing system configured to: receive the secure content request; determine availability of verification information stored on the content node to service the secure content request; if the verification information is available, verify the end user device based on the verification information; and if the verification information is unavailable, query an origin server to verify the end user device, receive new verification information from the origin server to verify the end user device, and cache the new verification information for the end user device. 20. The content node of claim 19 wherein the verification information comprises cookie data.
2,400
9,040
9,040
15,843,912
2,442
A single content region in a chat history display is used to display entries representative of a plurality of messages corresponding to all chat histories for all of chat threads currently engaged in by a given mobile terminal. Additionally, a buddy list display supports management of chat buddies, a detail view display allows otherwise truncated messages to be displayed, and a text message editor display supports the composition of text messages. Each chat user may designate public display identifiers for purposes of identification to other chat users. Additionally, each user may designate private display identifiers for each of his/her buddies, which private display identifiers may be used to replace the public display identifiers for that user's buddies when displayed on the user's mobile terminal. In this manner, the use of speech and text based group chatting and similar services in wireless communication environments is more readily enabled.
1-22. (canceled) 23. A method for displaying a chat thread on a display of wireless mobile terminal comprising the display and a user input device, the chat thread comprising a plurality of sent and received chat thread messages, each of the plurality of sent and received chat thread messages comprising message content, the method comprising: receiving an inbound chat thread message from a chat thread recipient, the received inbound chat thread message further comprising speech content; receiving a selection from the user input device of the chat thread; in response to the received selection, displaying in a common interface: the plurality of sent and received chat thread messages; an option to send an outbound chat thread message; and the received inbound chat thread message as one of the plurality of received chat thread messages, the displayed received inbound chat thread message comprising an indication that the received inbound chat thread message comprises speech content, the indication visually distinguishing the received inbound chat thread message comprising speech content from received chat messages of the chat thread not comprising speech content. 24. The method of claim 23, wherein the indication that the inbound chat thread message comprises speech content is an icon. 25. The method of claim 23, further comprising: displaying in the common interface an option to play the speech content of the received inbound chat message. 26. The method of claim 23, further comprising: transmitting a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receiving, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising the speech content of the transmitted chat thread message. 27. The method of claim 23, further comprising: transmitting a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receiving, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising a text portion of the transmitted chat thread message and does not comprise the speech content. 28. The method of claim 23, further comprising: determining, in response to receiving the inbound chat thread message, that the common interface is not visible to the user; queuing the speech content of the received inbound chat thread in response to determining that the common interface is not visible to the user. 29. The method of claim 28, further comprising: determining that received inbound chat thread message is currently visible to the user in the common interface; and automatically playing the queued speech content in response to the received inbound chat thread message being currently visible to the user in the common interface. 30. The method of claim 29, further comprising: automatically stopping playback of the queued speech content in response to determining that the user has requested to record speech content for a chat thread message. 31. A non-transitory computer-readable medium for displaying a chat thread on a display of wireless mobile terminal comprising the display and a user input device, the chat thread comprising a plurality of sent and received chat thread messages, each of the plurality of sent and received chat thread messages comprising message content, the non-transitory computer-readable medium comprising instructions for: receiving an inbound chat thread message from a chat thread recipient, the received inbound chat thread message further comprising speech content; receiving a selection from the user input device of the chat thread; in response to the received selection, displaying in a common interface: the plurality of sent and received chat thread messages; an option to send an outbound chat thread message; and the received inbound chat thread message as one of the plurality of received chat thread messages, the displayed received inbound chat thread message comprising an indication that the received inbound chat thread message comprises speech content, the indication visually distinguishing the received inbound chat thread message comprising speech content from received chat messages of the chat thread not comprising speech content. 32. The computer-readable medium of claim 31, wherein the indication that the inbound chat thread message comprises speech content is an icon. 33. The computer-readable medium of claim 31, the non-transitory computer-readable medium further comprising instructions for: displaying in the common interface an option to play the speech content of the received inbound chat message. 34. The computer-readable medium of claim 31, the non-transitory computer-readable medium further comprising instructions for: transmitting a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receiving, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising the speech content of the transmitted chat thread message. 35. The computer-readable medium of claim 31, the non-transitory computer-readable medium further comprising instructions for: transmitting a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receiving, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising a text portion of the transmitted chat thread message and does not comprise the speech content. 36. The computer-readable medium of claim 31, the non-transitory computer-readable medium further comprising instructions for: determining, in response to receiving the inbound chat thread message, that the common interface is not visible to the user; queuing the speech content of the received inbound chat thread in response to determining that the common interface is not visible to the user. 37. The computer-readable medium of claim 36, the non-transitory computer-readable medium further comprising instructions for: determining that received inbound chat thread message is currently visible to the user in the common interface; and automatically playing the queued speech content in response to the received inbound chat thread message being currently visible to the user in the common interface. 38. A wireless mobile terminal, comprising: a processor; a display, coupled to the processor; at least one input device, coupled to the processor; and a storage device, coupled to the processor, having stored thereon executable instructions that, when executed by the processor, cause the processor to at least receive an inbound chat thread message from a chat thread recipient, the received inbound chat thread message further comprising speech content; receive a selection from the user input device of the chat thread; in response to the received selection, display in a common interface: the plurality of sent and received chat thread messages; an option to send an outbound chat thread message; and the received inbound chat thread message as one of the plurality of received chat thread messages, the displayed received inbound chat thread message comprising an indication that the received inbound chat thread message comprises speech content, the indication visually distinguishing the received inbound chat thread message comprising speech content from received chat messages of the chat thread not comprising speech content. 39. The wireless mobile terminal of claim 38, wherein the indication that the inbound chat thread message comprises speech content is an icon. 40. The wireless mobile terminal of claim 38, wherein the executable instructions further cause the processor to: display in the common interface an option to play the speech content of the received inbound chat message. 41. The wireless mobile terminal of claim 38, wherein the executable instructions further cause the processor to: transmit a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receive, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising the speech content of the transmitted chat thread message. 42. The wireless mobile terminal of claim 38, wherein the executable instructions further cause the processor to: transmitting a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receiving, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising a text portion of the transmitted chat thread message and does not comprise the speech content.
A single content region in a chat history display is used to display entries representative of a plurality of messages corresponding to all chat histories for all of chat threads currently engaged in by a given mobile terminal. Additionally, a buddy list display supports management of chat buddies, a detail view display allows otherwise truncated messages to be displayed, and a text message editor display supports the composition of text messages. Each chat user may designate public display identifiers for purposes of identification to other chat users. Additionally, each user may designate private display identifiers for each of his/her buddies, which private display identifiers may be used to replace the public display identifiers for that user's buddies when displayed on the user's mobile terminal. In this manner, the use of speech and text based group chatting and similar services in wireless communication environments is more readily enabled.1-22. (canceled) 23. A method for displaying a chat thread on a display of wireless mobile terminal comprising the display and a user input device, the chat thread comprising a plurality of sent and received chat thread messages, each of the plurality of sent and received chat thread messages comprising message content, the method comprising: receiving an inbound chat thread message from a chat thread recipient, the received inbound chat thread message further comprising speech content; receiving a selection from the user input device of the chat thread; in response to the received selection, displaying in a common interface: the plurality of sent and received chat thread messages; an option to send an outbound chat thread message; and the received inbound chat thread message as one of the plurality of received chat thread messages, the displayed received inbound chat thread message comprising an indication that the received inbound chat thread message comprises speech content, the indication visually distinguishing the received inbound chat thread message comprising speech content from received chat messages of the chat thread not comprising speech content. 24. The method of claim 23, wherein the indication that the inbound chat thread message comprises speech content is an icon. 25. The method of claim 23, further comprising: displaying in the common interface an option to play the speech content of the received inbound chat message. 26. The method of claim 23, further comprising: transmitting a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receiving, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising the speech content of the transmitted chat thread message. 27. The method of claim 23, further comprising: transmitting a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receiving, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising a text portion of the transmitted chat thread message and does not comprise the speech content. 28. The method of claim 23, further comprising: determining, in response to receiving the inbound chat thread message, that the common interface is not visible to the user; queuing the speech content of the received inbound chat thread in response to determining that the common interface is not visible to the user. 29. The method of claim 28, further comprising: determining that received inbound chat thread message is currently visible to the user in the common interface; and automatically playing the queued speech content in response to the received inbound chat thread message being currently visible to the user in the common interface. 30. The method of claim 29, further comprising: automatically stopping playback of the queued speech content in response to determining that the user has requested to record speech content for a chat thread message. 31. A non-transitory computer-readable medium for displaying a chat thread on a display of wireless mobile terminal comprising the display and a user input device, the chat thread comprising a plurality of sent and received chat thread messages, each of the plurality of sent and received chat thread messages comprising message content, the non-transitory computer-readable medium comprising instructions for: receiving an inbound chat thread message from a chat thread recipient, the received inbound chat thread message further comprising speech content; receiving a selection from the user input device of the chat thread; in response to the received selection, displaying in a common interface: the plurality of sent and received chat thread messages; an option to send an outbound chat thread message; and the received inbound chat thread message as one of the plurality of received chat thread messages, the displayed received inbound chat thread message comprising an indication that the received inbound chat thread message comprises speech content, the indication visually distinguishing the received inbound chat thread message comprising speech content from received chat messages of the chat thread not comprising speech content. 32. The computer-readable medium of claim 31, wherein the indication that the inbound chat thread message comprises speech content is an icon. 33. The computer-readable medium of claim 31, the non-transitory computer-readable medium further comprising instructions for: displaying in the common interface an option to play the speech content of the received inbound chat message. 34. The computer-readable medium of claim 31, the non-transitory computer-readable medium further comprising instructions for: transmitting a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receiving, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising the speech content of the transmitted chat thread message. 35. The computer-readable medium of claim 31, the non-transitory computer-readable medium further comprising instructions for: transmitting a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receiving, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising a text portion of the transmitted chat thread message and does not comprise the speech content. 36. The computer-readable medium of claim 31, the non-transitory computer-readable medium further comprising instructions for: determining, in response to receiving the inbound chat thread message, that the common interface is not visible to the user; queuing the speech content of the received inbound chat thread in response to determining that the common interface is not visible to the user. 37. The computer-readable medium of claim 36, the non-transitory computer-readable medium further comprising instructions for: determining that received inbound chat thread message is currently visible to the user in the common interface; and automatically playing the queued speech content in response to the received inbound chat thread message being currently visible to the user in the common interface. 38. A wireless mobile terminal, comprising: a processor; a display, coupled to the processor; at least one input device, coupled to the processor; and a storage device, coupled to the processor, having stored thereon executable instructions that, when executed by the processor, cause the processor to at least receive an inbound chat thread message from a chat thread recipient, the received inbound chat thread message further comprising speech content; receive a selection from the user input device of the chat thread; in response to the received selection, display in a common interface: the plurality of sent and received chat thread messages; an option to send an outbound chat thread message; and the received inbound chat thread message as one of the plurality of received chat thread messages, the displayed received inbound chat thread message comprising an indication that the received inbound chat thread message comprises speech content, the indication visually distinguishing the received inbound chat thread message comprising speech content from received chat messages of the chat thread not comprising speech content. 39. The wireless mobile terminal of claim 38, wherein the indication that the inbound chat thread message comprises speech content is an icon. 40. The wireless mobile terminal of claim 38, wherein the executable instructions further cause the processor to: display in the common interface an option to play the speech content of the received inbound chat message. 41. The wireless mobile terminal of claim 38, wherein the executable instructions further cause the processor to: transmit a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receive, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising the speech content of the transmitted chat thread message. 42. The wireless mobile terminal of claim 38, wherein the executable instructions further cause the processor to: transmitting a chat thread message from the wireless mobile terminal to at least one user-selected recipient, the transmitted chat thread message comprising at least speech content; and receiving, in response to transmitting the chat thread message, a copy of the transmitted chat thread message, the copy of the transmitted chat thread message comprising a text portion of the transmitted chat thread message and does not comprise the speech content.
2,400
9,041
9,041
15,986,567
2,423
Improved systems and methods to navigate, browse, search and/or playback digital media assets (e.g., media items) hosted on a media server are disclosed. One embodiment of the invention pertains to a user interface arrangement, such as a hierarchical menu system, that facilitates navigation, browsing and playing of media items remotely stored on a media server. The user interface arrangement enables user scrolling or browsing with respect to a list or set of information pertaining to media items, where the list or set can be expanded to include information for additional media items that are subsequently acquired. The user interface arrangement can also present and permit navigation of categorized media items. The user interface arrangement can be presented on a display device associated with a client device. In one embodiment, the display device can be a television and the client device can be an electronic apparatus that can couple to the media server via a network.
1. A method for media searching comprising: receiving a first selection of a search item from a first menu of video access categories from a video access category screen; causing a search screen to be displayed in response to the first selection; after receipt of a first one or more characters of a search string having a plurality of characters and before receiving a second one or more characters of the search string: causing a search query to be generated based on a received first one or more characters of the plurality of characters; transmitting the search query to a media server; receiving search results associated with the search query from the media server, the search results including media information related to a plurality of media items available from the media server, the media information including an image associated with each respective media item of the plurality of media items; and causing to be displayed, in response to receiving search results, a listing of the plurality of media items based on the search results, the listing including a respective image associated with each media item listed. 2. The method of claim 1, wherein the search screen includes a character selection region and the receipt of the first one or more characters comprises receiving a second selection of a character from the character selection region. 3. The method of claim 2, further comprising: receiving a third selection, from the listing of the plurality of media items, of a first media item of the plurality of media items; and causing to be displayed, in response to receiving the third selection of the first media item, detailed information for the first media item the detailed information based on the received search results, wherein the detailed information is different than the listing for the first media item. 4. The method of claim 3, further comprising: causing to be displayed, in response to receiving the third selection, a video item associated with the first media item; receiving a fourth selection of the video item; and causing to be played, in response to receiving the fourth selection, the video item. 5. The method of claim 3, wherein causing to be displayed detailed information for the first media item comprises causing the character selection region to be replaced by the detailed information for the first media item. 6. The method of claim 2, further comprising: receiving an indication to continue searching; and causing to be displayed, in response to receiving the indication to continue searching, the listing of the plurality of media items, the character selection region, and the received first one or more characters of the plurality of characters. 7. The method of claim 1, further comprising: receiving the second one or more characters of the search string, wherein the search string is an ordered string and the second one or more characters comprising characters that directly follow the first one or more characters; generating an updated search query based on the first one or more characters and second one or more characters; transmitting the updated search query to the media server; receiving updated search results associated with the updated search query; and updating the listing of the plurality of media items based on the updated search results. 8. An apparatus comprising: one or more processors; and at least one computer-readable storage medium storing instructions which, when executed by the one or more processors, cause the one or more processors to: receive a first selection of a search item from a first menu of video access categories from a video access category screen; cause a search screen to be displayed in response to the first selection; after receipt of a first one or more characters of a search string having a plurality of characters and before receiving a second one or more characters of the search string: cause a search query to be generated based on a received first one or more characters of the plurality of characters; transmit the search query to a media server; receive search results associated with the search query from the media server, the search results including media information related to a plurality of media items available from the media server, the media information including an image associated with each respective media item of the plurality of media items; and cause to be displayed, in response to receiving search results, a listing of the plurality of media items based on the search results, the listing including a respective image associated with each media item listed. 9. The apparatus as recited in claim 8, wherein the search screen includes a character selection region and the receipt of the first one or more characters comprises receiving a second selection of a character from the character selection region. 10. The apparatus as recited in claim 9, wherein the at least one computer-readable storage medium stores instructions which, when executed by the one or more processors, further cause the one or more processors to: receive a third selection, from the listing of the plurality of media items, of a first media item of the plurality of media items; and cause to be displayed, in response to receiving the third selection of the first media item, detailed information for the first media item the detailed information based on the received search results, wherein the detailed information is different than the listing for the first media item. 11. The apparatus as recited in claim 10, wherein the at least one computer-readable storage medium stores instructions which, when executed by the one or more processors, further cause the one or more processors to: cause to be displayed, in response to receiving the third selection, a video item associated with the first media item; receive a fourth selection of the video item; and cause to be played, in response to receiving the fourth selection, the video item. 12. The apparatus as recited in claim 10, wherein the instructions which, when executed by the one or more processors, cause the one or more processors to cause to be displayed detailed information for the first media item comprise instructions which, when executed by the one or more processors, cause the one or more processors to cause the character selection region to be replaced by the detailed information for the first media item. 13. The apparatus as recited in claim 9, wherein the at least one computer-readable storage medium stores instructions which, when executed by the one or more processors, further cause the one or more processors to: receive an indication to continue searching; and cause to be displayed, in response to receiving the indication to continue searching, the listing of the plurality of media items, the character selection region, and the received first one or more characters of the plurality of characters. 14. The apparatus as recited in claim 8, wherein the at least one computer-readable storage medium stores instructions which, when executed by the one or more processors, further cause the one or more processors to: receive the second one or more characters of the search string, wherein the search string is an ordered string and the second one or more characters comprising characters that directly follow the first one or more characters; generate an updated search query based on the first one or more characters and second one or more characters; transmit the updated search query to the media server; receive updated search results associated with the updated search query; and update the listing of the plurality of media items based on the updated search results. 15. A non-transitory computer-readable medium comprising: instructions stored therein which, when executed by one or more processors, cause the one or more processors to: receive a first selection of a search item from a first menu of video access categories from a video access category screen; cause a search screen to be displayed in response to the first selection; after receipt of a first one or more characters of a search string having a plurality of characters and before receiving a second one or more characters of the search string: cause a search query to be generated based on a received first one or more characters of the plurality of characters; transmit the search query to a media server; receive search results associated with the search query from the media server, the search results including media information related to a plurality of media items available from the media server, the media information including an image associated with each respective media item of the plurality of media items; and cause to be displayed, in response to receiving search results, a listing of the plurality of media items based on the search results, the listing including a respective image associated with each media item listed. 16. The non-transitory computer-readable medium as recited in claim 15, wherein the search screen includes a character selection region and the receipt of the first one or more characters comprises receiving a second selection of a character from the character selection region. 17. The non-transitory computer-readable medium as recited in claim 16, wherein the instructions which, when executed by the one or more processors, further cause the one or more processors to: receive a third selection, from the listing of the plurality of media items, of a first media item of the plurality of media items; and cause to be displayed, in response to receiving the third selection of the first media item, detailed information for the first media item the detailed information based on the received search results, wherein the detailed information is different than the listing for the first media item. 18. The non-transitory computer-readable medium as recited in claim 17, wherein the instructions which, when executed by the one or more processors, cause the one or more processors to cause to be displayed detailed information for the first media item comprise instructions which, when executed by the one or more processors, cause the one or more processors to cause the character selection region to be replaced by the detailed information for the first media item. 19. The non-transitory computer-readable medium as recited in claim 16, wherein the instructions which, when executed by the one or more processors, further cause the one or more processors to: receive an indication to continue searching; and cause to be displayed, in response to receiving the indication to continue searching, the listing of the plurality of media items, the character selection region, and the received first one or more characters of the plurality of characters. 20. The non-transitory computer readable medium as recited in claim 15, wherein the instructions which, when executed by the one or more processors, further cause the one or more processors to: receive the second one or more characters of the search string, wherein the search string is an ordered string and the second one or more characters comprising characters that directly follow the first one or more characters; generate an updated search query based on the first one or more characters and second one or more characters; transmit the updated search query to the media server; receive updated search results associated with the updated search query; and update the listing of the plurality of media items based on the updated search results.
Improved systems and methods to navigate, browse, search and/or playback digital media assets (e.g., media items) hosted on a media server are disclosed. One embodiment of the invention pertains to a user interface arrangement, such as a hierarchical menu system, that facilitates navigation, browsing and playing of media items remotely stored on a media server. The user interface arrangement enables user scrolling or browsing with respect to a list or set of information pertaining to media items, where the list or set can be expanded to include information for additional media items that are subsequently acquired. The user interface arrangement can also present and permit navigation of categorized media items. The user interface arrangement can be presented on a display device associated with a client device. In one embodiment, the display device can be a television and the client device can be an electronic apparatus that can couple to the media server via a network.1. A method for media searching comprising: receiving a first selection of a search item from a first menu of video access categories from a video access category screen; causing a search screen to be displayed in response to the first selection; after receipt of a first one or more characters of a search string having a plurality of characters and before receiving a second one or more characters of the search string: causing a search query to be generated based on a received first one or more characters of the plurality of characters; transmitting the search query to a media server; receiving search results associated with the search query from the media server, the search results including media information related to a plurality of media items available from the media server, the media information including an image associated with each respective media item of the plurality of media items; and causing to be displayed, in response to receiving search results, a listing of the plurality of media items based on the search results, the listing including a respective image associated with each media item listed. 2. The method of claim 1, wherein the search screen includes a character selection region and the receipt of the first one or more characters comprises receiving a second selection of a character from the character selection region. 3. The method of claim 2, further comprising: receiving a third selection, from the listing of the plurality of media items, of a first media item of the plurality of media items; and causing to be displayed, in response to receiving the third selection of the first media item, detailed information for the first media item the detailed information based on the received search results, wherein the detailed information is different than the listing for the first media item. 4. The method of claim 3, further comprising: causing to be displayed, in response to receiving the third selection, a video item associated with the first media item; receiving a fourth selection of the video item; and causing to be played, in response to receiving the fourth selection, the video item. 5. The method of claim 3, wherein causing to be displayed detailed information for the first media item comprises causing the character selection region to be replaced by the detailed information for the first media item. 6. The method of claim 2, further comprising: receiving an indication to continue searching; and causing to be displayed, in response to receiving the indication to continue searching, the listing of the plurality of media items, the character selection region, and the received first one or more characters of the plurality of characters. 7. The method of claim 1, further comprising: receiving the second one or more characters of the search string, wherein the search string is an ordered string and the second one or more characters comprising characters that directly follow the first one or more characters; generating an updated search query based on the first one or more characters and second one or more characters; transmitting the updated search query to the media server; receiving updated search results associated with the updated search query; and updating the listing of the plurality of media items based on the updated search results. 8. An apparatus comprising: one or more processors; and at least one computer-readable storage medium storing instructions which, when executed by the one or more processors, cause the one or more processors to: receive a first selection of a search item from a first menu of video access categories from a video access category screen; cause a search screen to be displayed in response to the first selection; after receipt of a first one or more characters of a search string having a plurality of characters and before receiving a second one or more characters of the search string: cause a search query to be generated based on a received first one or more characters of the plurality of characters; transmit the search query to a media server; receive search results associated with the search query from the media server, the search results including media information related to a plurality of media items available from the media server, the media information including an image associated with each respective media item of the plurality of media items; and cause to be displayed, in response to receiving search results, a listing of the plurality of media items based on the search results, the listing including a respective image associated with each media item listed. 9. The apparatus as recited in claim 8, wherein the search screen includes a character selection region and the receipt of the first one or more characters comprises receiving a second selection of a character from the character selection region. 10. The apparatus as recited in claim 9, wherein the at least one computer-readable storage medium stores instructions which, when executed by the one or more processors, further cause the one or more processors to: receive a third selection, from the listing of the plurality of media items, of a first media item of the plurality of media items; and cause to be displayed, in response to receiving the third selection of the first media item, detailed information for the first media item the detailed information based on the received search results, wherein the detailed information is different than the listing for the first media item. 11. The apparatus as recited in claim 10, wherein the at least one computer-readable storage medium stores instructions which, when executed by the one or more processors, further cause the one or more processors to: cause to be displayed, in response to receiving the third selection, a video item associated with the first media item; receive a fourth selection of the video item; and cause to be played, in response to receiving the fourth selection, the video item. 12. The apparatus as recited in claim 10, wherein the instructions which, when executed by the one or more processors, cause the one or more processors to cause to be displayed detailed information for the first media item comprise instructions which, when executed by the one or more processors, cause the one or more processors to cause the character selection region to be replaced by the detailed information for the first media item. 13. The apparatus as recited in claim 9, wherein the at least one computer-readable storage medium stores instructions which, when executed by the one or more processors, further cause the one or more processors to: receive an indication to continue searching; and cause to be displayed, in response to receiving the indication to continue searching, the listing of the plurality of media items, the character selection region, and the received first one or more characters of the plurality of characters. 14. The apparatus as recited in claim 8, wherein the at least one computer-readable storage medium stores instructions which, when executed by the one or more processors, further cause the one or more processors to: receive the second one or more characters of the search string, wherein the search string is an ordered string and the second one or more characters comprising characters that directly follow the first one or more characters; generate an updated search query based on the first one or more characters and second one or more characters; transmit the updated search query to the media server; receive updated search results associated with the updated search query; and update the listing of the plurality of media items based on the updated search results. 15. A non-transitory computer-readable medium comprising: instructions stored therein which, when executed by one or more processors, cause the one or more processors to: receive a first selection of a search item from a first menu of video access categories from a video access category screen; cause a search screen to be displayed in response to the first selection; after receipt of a first one or more characters of a search string having a plurality of characters and before receiving a second one or more characters of the search string: cause a search query to be generated based on a received first one or more characters of the plurality of characters; transmit the search query to a media server; receive search results associated with the search query from the media server, the search results including media information related to a plurality of media items available from the media server, the media information including an image associated with each respective media item of the plurality of media items; and cause to be displayed, in response to receiving search results, a listing of the plurality of media items based on the search results, the listing including a respective image associated with each media item listed. 16. The non-transitory computer-readable medium as recited in claim 15, wherein the search screen includes a character selection region and the receipt of the first one or more characters comprises receiving a second selection of a character from the character selection region. 17. The non-transitory computer-readable medium as recited in claim 16, wherein the instructions which, when executed by the one or more processors, further cause the one or more processors to: receive a third selection, from the listing of the plurality of media items, of a first media item of the plurality of media items; and cause to be displayed, in response to receiving the third selection of the first media item, detailed information for the first media item the detailed information based on the received search results, wherein the detailed information is different than the listing for the first media item. 18. The non-transitory computer-readable medium as recited in claim 17, wherein the instructions which, when executed by the one or more processors, cause the one or more processors to cause to be displayed detailed information for the first media item comprise instructions which, when executed by the one or more processors, cause the one or more processors to cause the character selection region to be replaced by the detailed information for the first media item. 19. The non-transitory computer-readable medium as recited in claim 16, wherein the instructions which, when executed by the one or more processors, further cause the one or more processors to: receive an indication to continue searching; and cause to be displayed, in response to receiving the indication to continue searching, the listing of the plurality of media items, the character selection region, and the received first one or more characters of the plurality of characters. 20. The non-transitory computer readable medium as recited in claim 15, wherein the instructions which, when executed by the one or more processors, further cause the one or more processors to: receive the second one or more characters of the search string, wherein the search string is an ordered string and the second one or more characters comprising characters that directly follow the first one or more characters; generate an updated search query based on the first one or more characters and second one or more characters; transmit the updated search query to the media server; receive updated search results associated with the updated search query; and update the listing of the plurality of media items based on the updated search results.
2,400
9,042
9,042
14,527,332
2,424
A mechanism is described for facilitating multiple multimedia viewing planes in media display systems according to one embodiment of the invention. A method of embodiments of the invention includes using a plurality of multimedia planes corresponding to a plurality of multimedia content types. The plurality of multimedia planes may be integrated to be presented through an integrated user interface at a media processing device. The method may further include selecting, via the integrated user interface, one or more content categories from a plurality of multimedia content categories, and presenting, via a multimedia plane of the plurality of multimedia planes, contents associated with the one or more selected content categories.
1-40. (canceled) 41. A method for presenting a plurality of multimedia planes on a media processing device having a plurality of processes, comprising: combining a plurality of multimedia planes into an integrated set of multimedia planes to be presented through an integrated user interface at the media processing device, wherein the plurality of multimedia planes correspond to a plurality of content types; and in response to a user selection via the integrated user interface, presenting one or more multimedia content types from the plurality of content types, wherein the integrated user interface serves as a unified access point for presenting multimedia contents corresponding to the plurality of content types, wherein one or more of the integrated set of multimedia planes serve as one or more selection areas, the one or more selection areas to be displayed as running horizontally or vertically. 42. The method as recited in claim 41, further comprising: facilitating interprocess communication between a first process associated with a first multimedia plane and a second process associated with a second multimedia plane. 43. The method as recited in claim 42, wherein the interprocess communication is via messaging. 44. The method as recited in claim 42, further comprising simultaneously displaying two or more of a category selection area, a media object selection area, an information panel, and an action panel, wherein the two or more multimedia planes to facilitate simultaneous rendering of two or more of the plurality of content types including one or more of an audio content, a video content, a graphics content, and a webpage content. 45. The method as recited in claim 41, wherein content types include at least one of web content, television programming, media streaming, multimedia streaming, video streams, navigation ribbon, category ribbon, information panel, action menu, media object ribbon, DVD-based media, name/symbol/logo/icon, and a channel guide. 46. The method as recited in claim 41, wherein the one or more selection areas include a category selection area listing categories associated with the multimedia contents, and a media object selection area listing media objects associated with the categories. 47. At least one computer readable storage medium for presenting a plurality of multimedia planes on a media processing device having a plurality of processes, the medium having instructions stored thereon, the instructions when executed on the media processing device cause the device to: combine a plurality of multimedia planes into an integrated set of multimedia planes to be presented through an integrated user interface at the media processing device, wherein the plurality of multimedia planes correspond to a plurality of content types; and in response to a user selection via the integrated user interface, present one or more multimedia content types from the plurality of content types, wherein the integrated user interface serves as a unified access point for presenting multimedia contents corresponding to the plurality of content types, wherein one or more of the integrated set of multimedia planes serve as one or more selection areas, the one or more selection areas to be displayed as running horizontally or vertically. 48. The medium as recited in claim 47, further comprising instructions to: facilitate interprocess communication between a first process associated with a first multimedia plane and a second process associated with a second multimedia plane. 49. The medium as recited in claim 48, wherein the interprocess communication is via messaging. 50. The medium as recited in claim 48, further comprising instructions to simultaneously display two or more of a category selection area, a media object selection area, an information panel, and an action panel, wherein the two or more multimedia planes to facilitate simultaneous rendering of two or more of the plurality of content types including one or more of an audio content, a video content, a graphics content, and a webpage content. 51. The medium as recited in claim 47, wherein content types include at least one of web content, television programming, media streaming, multimedia streaming, video streams, navigation ribbon, category ribbon, information panel, action menu, media object ribbon, DVD-based media, name/symbol/logo/icon, and a channel guide. 52. The medium as recited in claim 47, wherein the one or more selection areas include a category selection area listing categories associated with the multimedia contents, and a media object selection area listing media objects associated with the categories. 53. A media processing device having a plurality of processes the device to present a plurality of multimedia planes, comprising: an integrated user interface to combine a plurality of multimedia planes into an integrated set of multimedia planes to be presented through the integrated user interface at the media processing device, wherein the plurality of multimedia planes correspond to a plurality of content types; and presentation logic to, in response to a user selection via the integrated user interface, present one or more multimedia content types from the plurality of content types, wherein the integrated user interface serves as a unified access point for presenting multimedia contents corresponding to the plurality of content types, wherein one or more of the integrated set of multimedia planes serve as one or more selection areas, the one or more selection areas to be displayed as running horizontally or vertically. 54. The media processing device as recited in claim 53, further comprising: communication logic to facilitate interprocess communication between a first process associated with a first multimedia plane and a second process associated with a second multimedia plane. 55. The media processing device as recited in claim 54, wherein the interprocess communication is via messaging. 56. The media processing device as recited in claim 54, wherein the presentation logic is to simultaneously display two or more of a category selection area, a media object selection area, an information panel, and an action panel, wherein the two or more multimedia planes to facilitate simultaneous rendering of two or more of the plurality of content types including one or more of an audio content, a video content, a graphics content, and a webpage content. 57. The media processing device as recited in claim 53, wherein content types include at least one of web content, television programming, media streaming, multimedia streaming, video streams, navigation ribbon, category ribbon, information panel, action menu, media object ribbon, DVD-based media, name/symbol/logo/icon, and a channel guide. 58. The media processing device as recited in claim 53, wherein the one or more selection areas include a category selection area listing categories associated with the multimedia contents, and a media object selection area listing media objects associated with the categories.
A mechanism is described for facilitating multiple multimedia viewing planes in media display systems according to one embodiment of the invention. A method of embodiments of the invention includes using a plurality of multimedia planes corresponding to a plurality of multimedia content types. The plurality of multimedia planes may be integrated to be presented through an integrated user interface at a media processing device. The method may further include selecting, via the integrated user interface, one or more content categories from a plurality of multimedia content categories, and presenting, via a multimedia plane of the plurality of multimedia planes, contents associated with the one or more selected content categories.1-40. (canceled) 41. A method for presenting a plurality of multimedia planes on a media processing device having a plurality of processes, comprising: combining a plurality of multimedia planes into an integrated set of multimedia planes to be presented through an integrated user interface at the media processing device, wherein the plurality of multimedia planes correspond to a plurality of content types; and in response to a user selection via the integrated user interface, presenting one or more multimedia content types from the plurality of content types, wherein the integrated user interface serves as a unified access point for presenting multimedia contents corresponding to the plurality of content types, wherein one or more of the integrated set of multimedia planes serve as one or more selection areas, the one or more selection areas to be displayed as running horizontally or vertically. 42. The method as recited in claim 41, further comprising: facilitating interprocess communication between a first process associated with a first multimedia plane and a second process associated with a second multimedia plane. 43. The method as recited in claim 42, wherein the interprocess communication is via messaging. 44. The method as recited in claim 42, further comprising simultaneously displaying two or more of a category selection area, a media object selection area, an information panel, and an action panel, wherein the two or more multimedia planes to facilitate simultaneous rendering of two or more of the plurality of content types including one or more of an audio content, a video content, a graphics content, and a webpage content. 45. The method as recited in claim 41, wherein content types include at least one of web content, television programming, media streaming, multimedia streaming, video streams, navigation ribbon, category ribbon, information panel, action menu, media object ribbon, DVD-based media, name/symbol/logo/icon, and a channel guide. 46. The method as recited in claim 41, wherein the one or more selection areas include a category selection area listing categories associated with the multimedia contents, and a media object selection area listing media objects associated with the categories. 47. At least one computer readable storage medium for presenting a plurality of multimedia planes on a media processing device having a plurality of processes, the medium having instructions stored thereon, the instructions when executed on the media processing device cause the device to: combine a plurality of multimedia planes into an integrated set of multimedia planes to be presented through an integrated user interface at the media processing device, wherein the plurality of multimedia planes correspond to a plurality of content types; and in response to a user selection via the integrated user interface, present one or more multimedia content types from the plurality of content types, wherein the integrated user interface serves as a unified access point for presenting multimedia contents corresponding to the plurality of content types, wherein one or more of the integrated set of multimedia planes serve as one or more selection areas, the one or more selection areas to be displayed as running horizontally or vertically. 48. The medium as recited in claim 47, further comprising instructions to: facilitate interprocess communication between a first process associated with a first multimedia plane and a second process associated with a second multimedia plane. 49. The medium as recited in claim 48, wherein the interprocess communication is via messaging. 50. The medium as recited in claim 48, further comprising instructions to simultaneously display two or more of a category selection area, a media object selection area, an information panel, and an action panel, wherein the two or more multimedia planes to facilitate simultaneous rendering of two or more of the plurality of content types including one or more of an audio content, a video content, a graphics content, and a webpage content. 51. The medium as recited in claim 47, wherein content types include at least one of web content, television programming, media streaming, multimedia streaming, video streams, navigation ribbon, category ribbon, information panel, action menu, media object ribbon, DVD-based media, name/symbol/logo/icon, and a channel guide. 52. The medium as recited in claim 47, wherein the one or more selection areas include a category selection area listing categories associated with the multimedia contents, and a media object selection area listing media objects associated with the categories. 53. A media processing device having a plurality of processes the device to present a plurality of multimedia planes, comprising: an integrated user interface to combine a plurality of multimedia planes into an integrated set of multimedia planes to be presented through the integrated user interface at the media processing device, wherein the plurality of multimedia planes correspond to a plurality of content types; and presentation logic to, in response to a user selection via the integrated user interface, present one or more multimedia content types from the plurality of content types, wherein the integrated user interface serves as a unified access point for presenting multimedia contents corresponding to the plurality of content types, wherein one or more of the integrated set of multimedia planes serve as one or more selection areas, the one or more selection areas to be displayed as running horizontally or vertically. 54. The media processing device as recited in claim 53, further comprising: communication logic to facilitate interprocess communication between a first process associated with a first multimedia plane and a second process associated with a second multimedia plane. 55. The media processing device as recited in claim 54, wherein the interprocess communication is via messaging. 56. The media processing device as recited in claim 54, wherein the presentation logic is to simultaneously display two or more of a category selection area, a media object selection area, an information panel, and an action panel, wherein the two or more multimedia planes to facilitate simultaneous rendering of two or more of the plurality of content types including one or more of an audio content, a video content, a graphics content, and a webpage content. 57. The media processing device as recited in claim 53, wherein content types include at least one of web content, television programming, media streaming, multimedia streaming, video streams, navigation ribbon, category ribbon, information panel, action menu, media object ribbon, DVD-based media, name/symbol/logo/icon, and a channel guide. 58. The media processing device as recited in claim 53, wherein the one or more selection areas include a category selection area listing categories associated with the multimedia contents, and a media object selection area listing media objects associated with the categories.
2,400
9,043
9,043
14,789,301
2,477
Techniques for transmitting and receiving wireless communications over an unlicensed radio frequency spectrum band are disclosed, including techniques for transmitting and receiving service information blocks over the unlicensed radio frequency spectrum band, techniques for gaining access to the unlicensed radio frequency spectrum band by performing extended clear channel assessments (eCCAs), techniques for transmitting and receiving synchronization signals and reference signals over the unlicensed radio frequency spectrum band, techniques for communicating locations of reference signals, and techniques for communicating availability of certain resources to be combined across multiple different transmissions.
1. A method of wireless communication, comprising: generating a system information block (SIB) comprising a plurality of parameters related to a base station; transmitting the SIB via a control channel over an unlicensed radio frequency spectrum band; and transmitting a reference signal indicating a portion of the control channel that includes the SIB. 2. The method of claim 1, wherein the control channel comprises a plurality of resource blocks, and wherein the reference signal indicates a subset of the plurality of resource blocks that include the SIB. 3. The method of claim 2, wherein the reference signal comprises a physical cell identity (PCI), and wherein the subset of the plurality of resource blocks are mapped to the PCI. 4. The method of claim 2, wherein the subset of the plurality of resource blocks are predetermined based on a timing of the reference signal. 5. The method of claim 2, wherein the reference signal comprises information indicating a location of the subset of resource blocks. 6. The method of claim 1, wherein the SIB is transmitted over the unlicensed radio frequency spectrum band during a clear channel assessment (CCA)-exempt transmission (CET) subframe associated with the base station. 7. The method of claim 1, further comprising: performing a clear channel assessment (CCA) prior to a non-CCA-exempt transmission (non-CET) subframe associated with opportunistic system information block transmissions; and transmitting the SIB on the non-CET subframe when the CCA is successful. 8. The method of claim 1, wherein the plurality of parameters comprise a system frame number (SFN). 9. The method of claim 8, wherein the reference signal is transmitted with a periodicity that exceeds a length of a radio frame. 10. The method of claim 9, wherein the periodicity corresponds to a time period for incrementing the SFN. 11. A method of wireless communication, comprising: receiving a reference signal over an unlicensed radio frequency spectrum band, the reference signal indicating a portion of a control channel that includes a system information block (SIB), the SIB comprising a plurality of parameters related to a base station; receiving the control channel; and decoding the SIB based on the indicated portion of the control channel that includes the SIB. 12. The method of claim 11, wherein the control channel comprises a plurality of resource blocks, and wherein the reference signal indicates a subset of the plurality of resource blocks that include the SIB. 13. The method of claim 12, wherein the reference signal comprises a physical cell identity (PCI), and wherein the subset of the plurality of resource blocks are mapped to the PCI. 14. The method of claim 12, wherein the reference signal comprises information indicating a location of the subset of resource blocks. 15. The method of claim 11, wherein the plurality of parameters comprise a system frame number (SFN). 16. The method of claim 15, wherein the reference signal is transmitted with a periodicity that exceeds a length of a radio frame. 17. The method of claim 16, wherein the periodicity corresponds to a time period for incrementing the SFN. 18. The method of claim 17, wherein the decoding comprises: combining a plurality of resource blocks including a plurality of transmissions of the SIB; and decoding the combined plurality of resource blocks to generate the SIB. 19. An apparatus for wireless communication, comprising: a processor; and memory coupled to the processor, wherein the processor is configured to: generate a system information block (SIB) comprising a plurality of parameters related to a base station; transmit the SIB via a control channel over an unlicensed radio frequency spectrum band; and transmit a reference signal indicating a portion of the control channel that includes the SIB. 20. The apparatus of claim 19, wherein the control channel comprises a plurality of resource blocks, and wherein the reference signal indicates a subset of the plurality of resource blocks that include the SIB. 21. The apparatus of claim 20, wherein the reference signal comprises a physical cell identity (PCI), and wherein the subset of the plurality of resource blocks are mapped to the PCI. 22. The apparatus of claim 20, wherein the subset of the plurality of resource blocks are predetermined based on a timing of the reference signal. 23. The apparatus of claim 19, wherein the SIB is transmitted over the unlicensed radio frequency spectrum band during a clear channel assessment (CCA)-exempt transmission (CET) subframe associated with the base station. 24. The apparatus of claim 19, wherein the processor is further configured to: perform a clear channel assessment (CCA) prior to a non-CCA-exempt transmission (non-CET) subframe associated with opportunistic system information block transmissions; and transmit the SIB on the non-CET subframe when the CCA is successful. 25. The apparatus of claim 19, wherein the plurality of parameters comprise a system frame number (SFN). 26. An apparatus for wireless communication, comprising: a processor; and memory coupled to the processor, wherein the processor is configured to: receive a reference signal over an unlicensed radio frequency spectrum band, the reference signal indicating a portion of a control channel that includes a system information block (SIB), the SIB comprising a plurality of parameters related to a base station; receive the control channel; and decode the SIB based on the indicated portion of the control channel that includes the SIB. 27. The apparatus of claim 26, wherein the control channel comprises a plurality of resource blocks, and wherein the reference signal indicates a subset of the plurality of resource blocks that include the SIB. 28. The apparatus of claim 27, wherein the reference signal comprises a physical cell identity (PCI), and wherein the subset of the plurality of resource blocks are mapped to the PCI. 29. The apparatus of claim 27, wherein the reference signal comprises information indicating a location of the subset of resource blocks. 30. The apparatus of claim 26, wherein the plurality of parameters comprise a system frame number (SFN).
Techniques for transmitting and receiving wireless communications over an unlicensed radio frequency spectrum band are disclosed, including techniques for transmitting and receiving service information blocks over the unlicensed radio frequency spectrum band, techniques for gaining access to the unlicensed radio frequency spectrum band by performing extended clear channel assessments (eCCAs), techniques for transmitting and receiving synchronization signals and reference signals over the unlicensed radio frequency spectrum band, techniques for communicating locations of reference signals, and techniques for communicating availability of certain resources to be combined across multiple different transmissions.1. A method of wireless communication, comprising: generating a system information block (SIB) comprising a plurality of parameters related to a base station; transmitting the SIB via a control channel over an unlicensed radio frequency spectrum band; and transmitting a reference signal indicating a portion of the control channel that includes the SIB. 2. The method of claim 1, wherein the control channel comprises a plurality of resource blocks, and wherein the reference signal indicates a subset of the plurality of resource blocks that include the SIB. 3. The method of claim 2, wherein the reference signal comprises a physical cell identity (PCI), and wherein the subset of the plurality of resource blocks are mapped to the PCI. 4. The method of claim 2, wherein the subset of the plurality of resource blocks are predetermined based on a timing of the reference signal. 5. The method of claim 2, wherein the reference signal comprises information indicating a location of the subset of resource blocks. 6. The method of claim 1, wherein the SIB is transmitted over the unlicensed radio frequency spectrum band during a clear channel assessment (CCA)-exempt transmission (CET) subframe associated with the base station. 7. The method of claim 1, further comprising: performing a clear channel assessment (CCA) prior to a non-CCA-exempt transmission (non-CET) subframe associated with opportunistic system information block transmissions; and transmitting the SIB on the non-CET subframe when the CCA is successful. 8. The method of claim 1, wherein the plurality of parameters comprise a system frame number (SFN). 9. The method of claim 8, wherein the reference signal is transmitted with a periodicity that exceeds a length of a radio frame. 10. The method of claim 9, wherein the periodicity corresponds to a time period for incrementing the SFN. 11. A method of wireless communication, comprising: receiving a reference signal over an unlicensed radio frequency spectrum band, the reference signal indicating a portion of a control channel that includes a system information block (SIB), the SIB comprising a plurality of parameters related to a base station; receiving the control channel; and decoding the SIB based on the indicated portion of the control channel that includes the SIB. 12. The method of claim 11, wherein the control channel comprises a plurality of resource blocks, and wherein the reference signal indicates a subset of the plurality of resource blocks that include the SIB. 13. The method of claim 12, wherein the reference signal comprises a physical cell identity (PCI), and wherein the subset of the plurality of resource blocks are mapped to the PCI. 14. The method of claim 12, wherein the reference signal comprises information indicating a location of the subset of resource blocks. 15. The method of claim 11, wherein the plurality of parameters comprise a system frame number (SFN). 16. The method of claim 15, wherein the reference signal is transmitted with a periodicity that exceeds a length of a radio frame. 17. The method of claim 16, wherein the periodicity corresponds to a time period for incrementing the SFN. 18. The method of claim 17, wherein the decoding comprises: combining a plurality of resource blocks including a plurality of transmissions of the SIB; and decoding the combined plurality of resource blocks to generate the SIB. 19. An apparatus for wireless communication, comprising: a processor; and memory coupled to the processor, wherein the processor is configured to: generate a system information block (SIB) comprising a plurality of parameters related to a base station; transmit the SIB via a control channel over an unlicensed radio frequency spectrum band; and transmit a reference signal indicating a portion of the control channel that includes the SIB. 20. The apparatus of claim 19, wherein the control channel comprises a plurality of resource blocks, and wherein the reference signal indicates a subset of the plurality of resource blocks that include the SIB. 21. The apparatus of claim 20, wherein the reference signal comprises a physical cell identity (PCI), and wherein the subset of the plurality of resource blocks are mapped to the PCI. 22. The apparatus of claim 20, wherein the subset of the plurality of resource blocks are predetermined based on a timing of the reference signal. 23. The apparatus of claim 19, wherein the SIB is transmitted over the unlicensed radio frequency spectrum band during a clear channel assessment (CCA)-exempt transmission (CET) subframe associated with the base station. 24. The apparatus of claim 19, wherein the processor is further configured to: perform a clear channel assessment (CCA) prior to a non-CCA-exempt transmission (non-CET) subframe associated with opportunistic system information block transmissions; and transmit the SIB on the non-CET subframe when the CCA is successful. 25. The apparatus of claim 19, wherein the plurality of parameters comprise a system frame number (SFN). 26. An apparatus for wireless communication, comprising: a processor; and memory coupled to the processor, wherein the processor is configured to: receive a reference signal over an unlicensed radio frequency spectrum band, the reference signal indicating a portion of a control channel that includes a system information block (SIB), the SIB comprising a plurality of parameters related to a base station; receive the control channel; and decode the SIB based on the indicated portion of the control channel that includes the SIB. 27. The apparatus of claim 26, wherein the control channel comprises a plurality of resource blocks, and wherein the reference signal indicates a subset of the plurality of resource blocks that include the SIB. 28. The apparatus of claim 27, wherein the reference signal comprises a physical cell identity (PCI), and wherein the subset of the plurality of resource blocks are mapped to the PCI. 29. The apparatus of claim 27, wherein the reference signal comprises information indicating a location of the subset of resource blocks. 30. The apparatus of claim 26, wherein the plurality of parameters comprise a system frame number (SFN).
2,400
9,044
9,044
15,180,985
2,483
A method for implementing a deblocking filter including the steps of (A) reading pixel values for a plurality of macroblocks of an unfiltered video frame from an input buffer into a working buffer, where the working buffer has dimensions determined by a predefined input region of the deblocking filter and a portion of the working buffer forms a filter output region of the deblocking filter, (B) sequentially processing the pixel values in the working buffer through a plurality of filter processing stages using an array of software-configurable general purpose parallel processors, where each of the plurality of filter processing stages operates on a respective set of the pixel values in the working buffer, and (C) writing filtered pixel values from the filter output region of the working buffer to an output buffer after the plurality of filter processing stages are completed.
1. A method comprising: processing pixel values in a working buffer in parallel using an array of parallel processors by processing the pixel values in the working buffer through a plurality of filter processing stages including: a first filter processing stage configured to filter pixel values across vertical edges in pixel values in the working buffer; and a second filter processing stage configured to filter pixel values across horizontal edges in pixel values in the working buffer; determining the plurality of filter processing stages have been processed; and writing the filtered pixel values from the working buffer to an output buffer. 2. The method of claim 1, wherein each of the plurality of filter processing stages computes filtered pixel values by applying a predefined filter on the pixel values in the working buffer. 3. The method of claim 1, wherein for the first filter processing stage, the array of parallel processors processes rows of the pixel values within the pixel values in the working buffer concurrently. 4. The method of claim 1, wherein for the second filter processing stage, the array of parallel processors processes columns of the pixel values within the pixel values in the working buffer concurrently. 5. The method of claim 1, wherein each of the filter processing stages writes the filtered pixels back to a respective stage output region of the working buffer. 6. The method of claim 1, wherein each of the filter processing stages processes a different filter region of a plurality of filter regions of the working buffer. 7. The method of claim 1, wherein the wherein the plurality of filter processing stages form a MPEG-4 part 10 compliant deblocking filter and the filtered pixel values are computed using an adaptive multi-tap filter applied at right angles to edges being filtered. 8. An apparatus comprising: a working buffer configured to store pixel values during filter processing; an output buffer configured to store filtered pixel values; and an array of parallel processors, the array of parallel processors being configured to process the pixel values in the working buffer through a plurality of filter processing stages including: a first filter processing stage configured to filter pixel values across vertical edges in pixel values in the working buffer; and a second filter processing stage configured to filter pixel values across horizontal edges in pixel values in the working buffer. 9. The apparatus of claim 8, wherein the array of parallel processors are configured to compute filtered pixel values for each of the plurality of filter processing stages by applying a predefined filter on the pixel values in the working buffer. 10. The apparatus of claim 8, wherein for the first filter processing stage, the array of parallel processors processes rows of pixel values within the pixel values in the working buffer concurrently. 11. The apparatus of claim 8, wherein for the second filter processing stage, the array of parallel processors processes columns of pixel values within the pixel values in the working buffer concurrently. 12. The apparatus of claim 8, wherein the array of parallel processors are configured to write the filtered pixels back to a respective stage output region of the working buffer for each of the plurality of filter processing stages. 13. The apparatus of claim 8, wherein the array of parallel processors are configured to process a different filter region of a plurality of filter regions of the working buffer for each of the plurality of filter processing stages. 14. The apparatus of to claim 8, wherein the plurality of filter processing stages form a MPEG-4 part 10 compliant deblocking filter and the filtered pixel values are computed using an adaptive multi-tap filter applied at right angles to edges being filtered. 15. A computing system comprising: at least one processor; and a memory device including instructions that, when executed by the at least one processor, cause the computing system to: process pixel values in a working buffer in parallel using an array of parallel processors by processing the pixel values in the working buffer through a plurality of filter processing stages including: a first filter processing stage configured to filter pixel values across vertical edges in pixel values in the working buffer; and a second filter processing stage configured to filter pixel values across horizontal edges in pixel values in the working buffer; determine the plurality of filter processing stages have been processed; and write the filtered pixel values from the working buffer to an output buffer. 16. The computing system of claim 15, wherein each of the plurality of filter processing stages computes filtered pixel values by applying a predefined filter on the pixel values in the working buffer. 17. The computing system of claim 15, wherein for the first filter processing stage, the array of parallel processors processes rows of the pixel values within the pixel values in the working buffer concurrently. 18. The computing system of claim 15, wherein for the second filter processing stage, the array of parallel processors processes columns of the pixel values within the pixel values in the working buffer concurrently. 19. The computing system of claim 15, wherein each of the filter processing stages writes the filtered pixels back to a respective stage output region of the working buffer. 20. The computing system of claim 15, wherein the plurality of filter processing stages form a MPEG-4 part 10 compliant deblocking filter and the filtered pixel values are computed using an adaptive multi-tap filter applied at right angles to edges being filtered.
A method for implementing a deblocking filter including the steps of (A) reading pixel values for a plurality of macroblocks of an unfiltered video frame from an input buffer into a working buffer, where the working buffer has dimensions determined by a predefined input region of the deblocking filter and a portion of the working buffer forms a filter output region of the deblocking filter, (B) sequentially processing the pixel values in the working buffer through a plurality of filter processing stages using an array of software-configurable general purpose parallel processors, where each of the plurality of filter processing stages operates on a respective set of the pixel values in the working buffer, and (C) writing filtered pixel values from the filter output region of the working buffer to an output buffer after the plurality of filter processing stages are completed.1. A method comprising: processing pixel values in a working buffer in parallel using an array of parallel processors by processing the pixel values in the working buffer through a plurality of filter processing stages including: a first filter processing stage configured to filter pixel values across vertical edges in pixel values in the working buffer; and a second filter processing stage configured to filter pixel values across horizontal edges in pixel values in the working buffer; determining the plurality of filter processing stages have been processed; and writing the filtered pixel values from the working buffer to an output buffer. 2. The method of claim 1, wherein each of the plurality of filter processing stages computes filtered pixel values by applying a predefined filter on the pixel values in the working buffer. 3. The method of claim 1, wherein for the first filter processing stage, the array of parallel processors processes rows of the pixel values within the pixel values in the working buffer concurrently. 4. The method of claim 1, wherein for the second filter processing stage, the array of parallel processors processes columns of the pixel values within the pixel values in the working buffer concurrently. 5. The method of claim 1, wherein each of the filter processing stages writes the filtered pixels back to a respective stage output region of the working buffer. 6. The method of claim 1, wherein each of the filter processing stages processes a different filter region of a plurality of filter regions of the working buffer. 7. The method of claim 1, wherein the wherein the plurality of filter processing stages form a MPEG-4 part 10 compliant deblocking filter and the filtered pixel values are computed using an adaptive multi-tap filter applied at right angles to edges being filtered. 8. An apparatus comprising: a working buffer configured to store pixel values during filter processing; an output buffer configured to store filtered pixel values; and an array of parallel processors, the array of parallel processors being configured to process the pixel values in the working buffer through a plurality of filter processing stages including: a first filter processing stage configured to filter pixel values across vertical edges in pixel values in the working buffer; and a second filter processing stage configured to filter pixel values across horizontal edges in pixel values in the working buffer. 9. The apparatus of claim 8, wherein the array of parallel processors are configured to compute filtered pixel values for each of the plurality of filter processing stages by applying a predefined filter on the pixel values in the working buffer. 10. The apparatus of claim 8, wherein for the first filter processing stage, the array of parallel processors processes rows of pixel values within the pixel values in the working buffer concurrently. 11. The apparatus of claim 8, wherein for the second filter processing stage, the array of parallel processors processes columns of pixel values within the pixel values in the working buffer concurrently. 12. The apparatus of claim 8, wherein the array of parallel processors are configured to write the filtered pixels back to a respective stage output region of the working buffer for each of the plurality of filter processing stages. 13. The apparatus of claim 8, wherein the array of parallel processors are configured to process a different filter region of a plurality of filter regions of the working buffer for each of the plurality of filter processing stages. 14. The apparatus of to claim 8, wherein the plurality of filter processing stages form a MPEG-4 part 10 compliant deblocking filter and the filtered pixel values are computed using an adaptive multi-tap filter applied at right angles to edges being filtered. 15. A computing system comprising: at least one processor; and a memory device including instructions that, when executed by the at least one processor, cause the computing system to: process pixel values in a working buffer in parallel using an array of parallel processors by processing the pixel values in the working buffer through a plurality of filter processing stages including: a first filter processing stage configured to filter pixel values across vertical edges in pixel values in the working buffer; and a second filter processing stage configured to filter pixel values across horizontal edges in pixel values in the working buffer; determine the plurality of filter processing stages have been processed; and write the filtered pixel values from the working buffer to an output buffer. 16. The computing system of claim 15, wherein each of the plurality of filter processing stages computes filtered pixel values by applying a predefined filter on the pixel values in the working buffer. 17. The computing system of claim 15, wherein for the first filter processing stage, the array of parallel processors processes rows of the pixel values within the pixel values in the working buffer concurrently. 18. The computing system of claim 15, wherein for the second filter processing stage, the array of parallel processors processes columns of the pixel values within the pixel values in the working buffer concurrently. 19. The computing system of claim 15, wherein each of the filter processing stages writes the filtered pixels back to a respective stage output region of the working buffer. 20. The computing system of claim 15, wherein the plurality of filter processing stages form a MPEG-4 part 10 compliant deblocking filter and the filtered pixel values are computed using an adaptive multi-tap filter applied at right angles to edges being filtered.
2,400
9,045
9,045
15,571,387
2,421
The invention concerns a method for setting the level of definition of at least one image of a multimedia programme displayed on a screen of a terminal provided with at least one unit for characterising the multimedia programme and at least one unit for selecting predefined settings. This method comprises the following steps: the characterisation unit automatically acquires metadata attached to said multimedia programme and submits said data to the unit for selecting predefined settings, the unit for selecting predefined settings automatically selects the settings according to pre-recorded rules defined depending on the values of said metadata.
1-13. (canceled) 14. A method for setting the level of definition of at least one image of a multimedia programme displayed on a screen (2) of a terminal (4) provided with at least one unit (10) for characterizing the multimedia programme and at least one unit (14) for selecting predefined settings, in which method, the characterising unit (10) automatically acquires metadata attached to said multimedia programme and submits said metadata to the unit (14) for selecting predefined settings, the characterising unit (10) generates at least one further metadata from an analysis of a displayed image of the current programme, creates, live and on the fly, at least one rule for defining the desired setting of the final rendering of the image as a function of the metadata of the current programme, at least one of the rules thus created being intended to define the desired setting of the final rendering of the image as a function of the further metadata, and submits said metadata to the unit for selecting predefined settings, the unit (14) for selecting predefined settings automatically selects the settings according to pre-recorded rules and/or the live on-the-fly defined rule, characterised in that said further metadata is generated from an object and/or scene type recognition. 15. The method according to claim 14, wherein the metadata attached to said multimedia programme are representative of at least one of the following parameters: a title of multimedia programme, a type of multimedia programme, a genre of multimedia programme, a moral level of multimedia programme, and a summary of multimedia programme. 16. The method according to claim 15, wherein the metadata attached to said multimedia programme are extracted from a broadcast multimedia programme guide (EIT). 17. The method according to claim 15, wherein the metadata relating to said multimedia programme are obtained online from a remote server. 18. The method according to claim 14, further including a step of pre-recording defined rules as a function of values of said metadata. 19. The method according to claim 18, further including a step of manually selecting the setting of the level of definition from a plurality of predefined settings. 20. The method according to claim 18, further including a step of setting the level of definition of at least one audio component of the multimedia programme. 21. A viewing terminal for viewing at least one image of a multimedia programme including a screen (2), at least one unit (10) for characterising the multimedia programme, and at least one unit (14) for selecting predefined settings for said image, wherein the unit (10) for characterising the multimedia programme is adapted to automatically acquire metadata attached to said multimedia programme and to generate at least one further metadata from an analysis of an image displayed of the current programme, to create live and on the fly, at least one rule for defining the desired setting of the final rendering of the image as a function of the metadata of the current programme, at least one of the rules thus created being intended to define the desired setting of the final rendering of the image as a function of the further metadata, and to submit said metadata to the unit (11) for selecting predefined settings, and, the unit (14) for selecting predefined settings is adapted to automatically select the settings according to pre-recorded rules and/or the live on-the-fly defined rule, viewing terminal characterised in that it further includes means for generating at least one further metadata from an analysis of the image. 22. The viewing terminal according to claim 21, further including means for performing manual selection of the setting of the level of definition from a plurality of predefined settings. 23. The viewing terminal according to claim 22, further including means for acquiring, online, the metadata relating to said multimedia programme from a remote server. 24. A computer programme stored on a recording medium including instructions for implementing the steps of the method according to claim 14 when run on a computer.
The invention concerns a method for setting the level of definition of at least one image of a multimedia programme displayed on a screen of a terminal provided with at least one unit for characterising the multimedia programme and at least one unit for selecting predefined settings. This method comprises the following steps: the characterisation unit automatically acquires metadata attached to said multimedia programme and submits said data to the unit for selecting predefined settings, the unit for selecting predefined settings automatically selects the settings according to pre-recorded rules defined depending on the values of said metadata.1-13. (canceled) 14. A method for setting the level of definition of at least one image of a multimedia programme displayed on a screen (2) of a terminal (4) provided with at least one unit (10) for characterizing the multimedia programme and at least one unit (14) for selecting predefined settings, in which method, the characterising unit (10) automatically acquires metadata attached to said multimedia programme and submits said metadata to the unit (14) for selecting predefined settings, the characterising unit (10) generates at least one further metadata from an analysis of a displayed image of the current programme, creates, live and on the fly, at least one rule for defining the desired setting of the final rendering of the image as a function of the metadata of the current programme, at least one of the rules thus created being intended to define the desired setting of the final rendering of the image as a function of the further metadata, and submits said metadata to the unit for selecting predefined settings, the unit (14) for selecting predefined settings automatically selects the settings according to pre-recorded rules and/or the live on-the-fly defined rule, characterised in that said further metadata is generated from an object and/or scene type recognition. 15. The method according to claim 14, wherein the metadata attached to said multimedia programme are representative of at least one of the following parameters: a title of multimedia programme, a type of multimedia programme, a genre of multimedia programme, a moral level of multimedia programme, and a summary of multimedia programme. 16. The method according to claim 15, wherein the metadata attached to said multimedia programme are extracted from a broadcast multimedia programme guide (EIT). 17. The method according to claim 15, wherein the metadata relating to said multimedia programme are obtained online from a remote server. 18. The method according to claim 14, further including a step of pre-recording defined rules as a function of values of said metadata. 19. The method according to claim 18, further including a step of manually selecting the setting of the level of definition from a plurality of predefined settings. 20. The method according to claim 18, further including a step of setting the level of definition of at least one audio component of the multimedia programme. 21. A viewing terminal for viewing at least one image of a multimedia programme including a screen (2), at least one unit (10) for characterising the multimedia programme, and at least one unit (14) for selecting predefined settings for said image, wherein the unit (10) for characterising the multimedia programme is adapted to automatically acquire metadata attached to said multimedia programme and to generate at least one further metadata from an analysis of an image displayed of the current programme, to create live and on the fly, at least one rule for defining the desired setting of the final rendering of the image as a function of the metadata of the current programme, at least one of the rules thus created being intended to define the desired setting of the final rendering of the image as a function of the further metadata, and to submit said metadata to the unit (11) for selecting predefined settings, and, the unit (14) for selecting predefined settings is adapted to automatically select the settings according to pre-recorded rules and/or the live on-the-fly defined rule, viewing terminal characterised in that it further includes means for generating at least one further metadata from an analysis of the image. 22. The viewing terminal according to claim 21, further including means for performing manual selection of the setting of the level of definition from a plurality of predefined settings. 23. The viewing terminal according to claim 22, further including means for acquiring, online, the metadata relating to said multimedia programme from a remote server. 24. A computer programme stored on a recording medium including instructions for implementing the steps of the method according to claim 14 when run on a computer.
2,400
9,046
9,046
15,660,169
2,426
A method and apparatus for streaming media without installing a plug-in in a web browser are provided. When a JavaScript decoder is used to stream media without installing a plug-in, it is difficult to support decoding of high framerate and high resolution video due to the limitations of JavaScript. When streaming media using a video element of HTML5 without installing a plug-in, a compatibility issue with a conventional video capturing apparatus using RTSP/RTP and an initial delay problem due to a container of MPEG-DASH are inherent. The present disclosure presents an adaptive media streaming method and apparatus capable of performing streaming of high framerate and high resolution video without an initial delay and compatibility issues by addressing these drawbacks.
1. An adaptive media streaming apparatus comprising: a receiver configured to receive media data generated by a media service apparatus using a communication protocol which supports web services; a video web worker configured to determine whether a video codec of video data included in the media data is supported by a first video decoder embedded in a web browser of the adaptive media streaming apparatus; a first video player configured to, in response to the video codec of the video data being unsupported by the first video decoder embedded in the web browser, decode the video data transmitted from the video web worker using a second video decoder written in a script which is supported by the web browser; and a second video player configured to, in response to the video codec of the video data being supported by the first video decoder embedded in the web browser, decode the video data transmitted from the video web worker using the first video decoder embedded in the web browser. 2. The adaptive media streaming apparatus of claim 1, further comprising: an audio web worker configured to determine whether an audio codec of audio data included in the media data is supported by a first audio decoder embedded in the web browser; a first audio player configured to, in response to the audio codec of the audio data being unsupported by the first audio decoder embedded in the web browser, decode the audio data transmitted from the audio web worker using a second audio decoder written in the script; and a second audio player configured to, in response to the audio codec of the audio data being supported by the first audio decoder embedded in the web browser, decode the audio data transmitted from the audio web worker using the first audio decoder embedded in the web browser. 3. The adaptive media streaming apparatus of claim 1, wherein the script is JavaScript. 4. The adaptive media streaming apparatus of claim 2, wherein each of the second video decoder and the second audio decoder is configured to convert native code written in C/C++ into JavaScript using a code converter. 5. The adaptive media streaming apparatus of claim 2, wherein the first video decoder and the first audio decoder are a video tag and an audio tag, respectively, according to a HTML5 standard. 6. The adaptive media streaming apparatus of claim 1, wherein the receiver comprises: a WebSocket client configured to receive the media data from the media service apparatus; and a Real-Time Streaming Protocol (RTSP) client configured to classify the media data received from the WebSocket client into the video data or audio data. 7. The adaptive media streaming apparatus of claim 2, wherein the video web worker is configured to transmit the video data to the first video player or the second video player according to the video codec of the video data, and wherein the audio web worker is configured to transmit the audio data to the first audio player or the second audio player according to the audio codec of the audio data. 8. The adaptive media streaming apparatus of claim 1, wherein the second video player is configured to decode the video data transmitted containers, each container of the containers comprising a plurality of frames. 9. The adaptive media streaming apparatus of claim 8, wherein the video data is packaged in the containers before the decoding by the second video player. 10. The adaptive media streaming apparatus of claim 9, wherein the containers are packaged by a multiplexer (MUX) configured to create Moving Picture Experts Group-Dynamic Adaptive Streaming over Hypertext Transport Protocol (MPEG-DASH)-based containers. 11. The adaptive media streaming apparatus of claim 1, further comprising a decoding time measurer configured to measure a decoding time of the first video player using a frames per second (FPS) meter. 12. The adaptive media streaming apparatus of claim 11, wherein the video web worker is configured to adjust, through machine learning, a threshold value used for determining the decoding time received from the decoding time measurer is acceptable. 13. The adaptive media streaming apparatus of claim 12, wherein the video web worker is further configured to compare the decoding time received from the decoding time measurer with the threshold value, and transmit the video data to the second video player in response to the decoding time exceeding the threshold value and the video codec of the video data being supported by the web browser. 14. An adaptive media streaming apparatus comprising: a receiver configured to receive media data generated by a media service apparatus using a communication protocol which supports web services; a video web worker configured to determine whether a video codec of video data included in the media data is supported by a first video decoder embedded in a web browser of the adaptive media streaming apparatus; a first video player configured to decode the video data transmitted from the video web worker using a second video decoder written in a script which is supported by the web browser; and a second video player configured to, in response to the video codec of the video data being supported by the first video decoder embedded in the web browser and in response to a determination that a decoding delay over a delay threshold has occurred in the first video player, decode the video data using the first video decoder embedded in the web browser. 15. The adaptive media streaming apparatus of claim 14, further comprising a decoding time measurer configured to measure a frame rate of the video data being decoded by the first video player using a frames per second (FPS) meter to determine whether the decoding delay of the first video player is over the delay threshold. 16. The adaptive media streaming apparatus of claim 14, further comprising: an audio web worker configured to determine whether an audio codec of audio data included in the media data is supported by a first audio decoder embedded in the web browser; a first audio player configured to, in response to the audio codec of the audio data being unsupported by the first audio decoder embedded in the web browser, decode the audio data transmitted from the audio web worker using a second audio decoder written in the script; and a second audio player configured to, in response to the audio codec of the audio data being supported by the first audio decoder embedded in the web browser, decode the audio data transmitted from the audio web worker using the first audio decoder embedded in the web browser. 17. The adaptive media streaming apparatus of claim 14, wherein the script is JavaScript. 18. The adaptive media streaming apparatus of claim 16, wherein the first video decoder and the first audio decoder are a video tag and an audio tag, respectively, according to a HTML5 standard. 19. The adaptive media streaming apparatus of claim 16, wherein the video web worker is further configured to transmit the video data to the first video player or the second video player according to the video codec of the video data and whether the decoding delay over the delay threshold has occurred, and wherein the audio web worker is further configured to transmit the audio data to the first audio player or the second audio player according to the audio codec of the audio data. 20. A media service apparatus for transmitting real-time live video or stored video to a media streaming apparatus, the media service apparatus comprising: a module storage configured to store a script module which is supported by a web browser of the media streaming apparatus and is required for playing the real-time live video or the stored video on the web browser; a module transmitter configured to transmit the script module to the media streaming apparatus in response to establishing a connection with the media streaming apparatus; a packetizer configured to packetize the real-time live video or the stored video to generate a transmission packet; and a web server configured to establish a communication session with the media streaming apparatus and transmit the transmission packet to the media streaming apparatus in response to receiving a streaming request from the media streaming apparatus, wherein the script module comprises a process of determining which video decoder of a plurality of video decoders being executed in the media streaming apparatus decodes the transmission packet. 21. The media service apparatus of claim 20, wherein the script module is code written in JavaScript. 22. The media service apparatus of claim 20, wherein the plurality of video decoders include a first video decoder written in a script which is supported by the web browser, and a second video decoder embedded in the web browser. 23. The media service apparatus of claim 22, wherein the process further comprises measuring a decoding time of the first video decoder using a frames per second (FPS) meter. 24. The media service apparatus of claim 23, wherein the process further comprises adjusting, through machine learning, a threshold value for determining whether the decoding time is acceptable. 25. The media service apparatus of claim 24, wherein the process further comprises comparing the decoding time with the threshold value and switching to the second video decoder for decoding the transmission packet in response to the decoding time exceeding the threshold value and a video codec format of the transmission packet being supported by the web browser.
A method and apparatus for streaming media without installing a plug-in in a web browser are provided. When a JavaScript decoder is used to stream media without installing a plug-in, it is difficult to support decoding of high framerate and high resolution video due to the limitations of JavaScript. When streaming media using a video element of HTML5 without installing a plug-in, a compatibility issue with a conventional video capturing apparatus using RTSP/RTP and an initial delay problem due to a container of MPEG-DASH are inherent. The present disclosure presents an adaptive media streaming method and apparatus capable of performing streaming of high framerate and high resolution video without an initial delay and compatibility issues by addressing these drawbacks.1. An adaptive media streaming apparatus comprising: a receiver configured to receive media data generated by a media service apparatus using a communication protocol which supports web services; a video web worker configured to determine whether a video codec of video data included in the media data is supported by a first video decoder embedded in a web browser of the adaptive media streaming apparatus; a first video player configured to, in response to the video codec of the video data being unsupported by the first video decoder embedded in the web browser, decode the video data transmitted from the video web worker using a second video decoder written in a script which is supported by the web browser; and a second video player configured to, in response to the video codec of the video data being supported by the first video decoder embedded in the web browser, decode the video data transmitted from the video web worker using the first video decoder embedded in the web browser. 2. The adaptive media streaming apparatus of claim 1, further comprising: an audio web worker configured to determine whether an audio codec of audio data included in the media data is supported by a first audio decoder embedded in the web browser; a first audio player configured to, in response to the audio codec of the audio data being unsupported by the first audio decoder embedded in the web browser, decode the audio data transmitted from the audio web worker using a second audio decoder written in the script; and a second audio player configured to, in response to the audio codec of the audio data being supported by the first audio decoder embedded in the web browser, decode the audio data transmitted from the audio web worker using the first audio decoder embedded in the web browser. 3. The adaptive media streaming apparatus of claim 1, wherein the script is JavaScript. 4. The adaptive media streaming apparatus of claim 2, wherein each of the second video decoder and the second audio decoder is configured to convert native code written in C/C++ into JavaScript using a code converter. 5. The adaptive media streaming apparatus of claim 2, wherein the first video decoder and the first audio decoder are a video tag and an audio tag, respectively, according to a HTML5 standard. 6. The adaptive media streaming apparatus of claim 1, wherein the receiver comprises: a WebSocket client configured to receive the media data from the media service apparatus; and a Real-Time Streaming Protocol (RTSP) client configured to classify the media data received from the WebSocket client into the video data or audio data. 7. The adaptive media streaming apparatus of claim 2, wherein the video web worker is configured to transmit the video data to the first video player or the second video player according to the video codec of the video data, and wherein the audio web worker is configured to transmit the audio data to the first audio player or the second audio player according to the audio codec of the audio data. 8. The adaptive media streaming apparatus of claim 1, wherein the second video player is configured to decode the video data transmitted containers, each container of the containers comprising a plurality of frames. 9. The adaptive media streaming apparatus of claim 8, wherein the video data is packaged in the containers before the decoding by the second video player. 10. The adaptive media streaming apparatus of claim 9, wherein the containers are packaged by a multiplexer (MUX) configured to create Moving Picture Experts Group-Dynamic Adaptive Streaming over Hypertext Transport Protocol (MPEG-DASH)-based containers. 11. The adaptive media streaming apparatus of claim 1, further comprising a decoding time measurer configured to measure a decoding time of the first video player using a frames per second (FPS) meter. 12. The adaptive media streaming apparatus of claim 11, wherein the video web worker is configured to adjust, through machine learning, a threshold value used for determining the decoding time received from the decoding time measurer is acceptable. 13. The adaptive media streaming apparatus of claim 12, wherein the video web worker is further configured to compare the decoding time received from the decoding time measurer with the threshold value, and transmit the video data to the second video player in response to the decoding time exceeding the threshold value and the video codec of the video data being supported by the web browser. 14. An adaptive media streaming apparatus comprising: a receiver configured to receive media data generated by a media service apparatus using a communication protocol which supports web services; a video web worker configured to determine whether a video codec of video data included in the media data is supported by a first video decoder embedded in a web browser of the adaptive media streaming apparatus; a first video player configured to decode the video data transmitted from the video web worker using a second video decoder written in a script which is supported by the web browser; and a second video player configured to, in response to the video codec of the video data being supported by the first video decoder embedded in the web browser and in response to a determination that a decoding delay over a delay threshold has occurred in the first video player, decode the video data using the first video decoder embedded in the web browser. 15. The adaptive media streaming apparatus of claim 14, further comprising a decoding time measurer configured to measure a frame rate of the video data being decoded by the first video player using a frames per second (FPS) meter to determine whether the decoding delay of the first video player is over the delay threshold. 16. The adaptive media streaming apparatus of claim 14, further comprising: an audio web worker configured to determine whether an audio codec of audio data included in the media data is supported by a first audio decoder embedded in the web browser; a first audio player configured to, in response to the audio codec of the audio data being unsupported by the first audio decoder embedded in the web browser, decode the audio data transmitted from the audio web worker using a second audio decoder written in the script; and a second audio player configured to, in response to the audio codec of the audio data being supported by the first audio decoder embedded in the web browser, decode the audio data transmitted from the audio web worker using the first audio decoder embedded in the web browser. 17. The adaptive media streaming apparatus of claim 14, wherein the script is JavaScript. 18. The adaptive media streaming apparatus of claim 16, wherein the first video decoder and the first audio decoder are a video tag and an audio tag, respectively, according to a HTML5 standard. 19. The adaptive media streaming apparatus of claim 16, wherein the video web worker is further configured to transmit the video data to the first video player or the second video player according to the video codec of the video data and whether the decoding delay over the delay threshold has occurred, and wherein the audio web worker is further configured to transmit the audio data to the first audio player or the second audio player according to the audio codec of the audio data. 20. A media service apparatus for transmitting real-time live video or stored video to a media streaming apparatus, the media service apparatus comprising: a module storage configured to store a script module which is supported by a web browser of the media streaming apparatus and is required for playing the real-time live video or the stored video on the web browser; a module transmitter configured to transmit the script module to the media streaming apparatus in response to establishing a connection with the media streaming apparatus; a packetizer configured to packetize the real-time live video or the stored video to generate a transmission packet; and a web server configured to establish a communication session with the media streaming apparatus and transmit the transmission packet to the media streaming apparatus in response to receiving a streaming request from the media streaming apparatus, wherein the script module comprises a process of determining which video decoder of a plurality of video decoders being executed in the media streaming apparatus decodes the transmission packet. 21. The media service apparatus of claim 20, wherein the script module is code written in JavaScript. 22. The media service apparatus of claim 20, wherein the plurality of video decoders include a first video decoder written in a script which is supported by the web browser, and a second video decoder embedded in the web browser. 23. The media service apparatus of claim 22, wherein the process further comprises measuring a decoding time of the first video decoder using a frames per second (FPS) meter. 24. The media service apparatus of claim 23, wherein the process further comprises adjusting, through machine learning, a threshold value for determining whether the decoding time is acceptable. 25. The media service apparatus of claim 24, wherein the process further comprises comparing the decoding time with the threshold value and switching to the second video decoder for decoding the transmission packet in response to the decoding time exceeding the threshold value and a video codec format of the transmission packet being supported by the web browser.
2,400
9,047
9,047
15,543,745
2,432
A technique that includes predicting data acquired by a network of sensors based at least in part on a graphical model of the network, where the graphical model includes true value nodes, observed value nodes and edge factors based at least in part on historical pairwise dependencies for the observed value nodes. The technique includes detecting anomalous sensor data based at least in part on the predicted data.
1. A method comprising: predicting data acquired by a network of sensors based at least in part on a graphical model of the network, the graphical model comprising true value nodes, observed value nodes and edge factors based at least in part on historical pairwise dependencies for the observed value nodes; and detecting anomalous sensor data based at least in part on the predicted data. 2. The method of claim 1, further comprising: modeling the network of sensors as a graph containing one of the true value nodes and one of the observed value nodes for each sensor of the network. 3. The method of claim 1, wherein using the model comprises an undirected graphical model. 4. The method of claim 1, wherein the model comprises a Markov Random Field (MRF)-based graphical model. 5. The method of claim 1, further comprising: determining dependencies between observed pairs of the observed nodes; and determining the edge factors based at least in part on the determined dependencies. 6. The method of claim 1, further comprising: determining values for at least some of the true value nodes of the model using a graphical model inference algorithm. 7. The method of claim 1, further comprising: determining at least one value for at least one of the observed value nodes using a graphical model inference algorithm. 8. An apparatus comprising: a sensor network comprising a plurality of sensors; and an engine comprising a processor to use a graph-based model of the sensor network to detect errant operation for at least one sensor of the sensor network, wherein the model comprises a true value node and an observed value node for each sensor of the plurality of sensors, and the model comprises edge factors determined from dependencies between at least some of the observed value nodes exhibited by historical data. 9. The apparatus of claim 8, wherein the sensor network comprises a model based at least in part on a global dependency structure of the sensor network. 10. The apparatus of claim 8, wherein the engine predicts data for at least one of the sensors using the model. 11. The apparatus of claim 8, wherein the model comprises a Markov Random Field (MRF)-based graphical model. 12. An article comprising a computer readable non-transitory storage medium storing instructions that when executed by a computer cause the computer to: model a network of sensors as a graph containing a true value node and an observed value node for each sensor of the network; and determine edge factors for edges connecting the true value nodes based at least in part on pairwise dependencies exhibited by historical data acquired by the sensor network. 13. The article of claim 11, the storage medium storing instructions that when executed by the computer cause the computer to: for each pair of the sensors, determine a representation of a joint probability distribution of observed data for the pair of sensors; and determine the edge factors based at least in part on the determined joint probability distributions. 14. The article of claim 13, the storage medium storing instructions that when executed by the computer cause the computer to: filter the determined probabilities based at least in part on at least one joint probability distribution metric; and determine the edge factors based at least in part on results of the filtering. 15. The article of claim 12, the storage medium storing instructions that when executed by the computer cause the computer to: model the sensor network as a first pairwise Markov Random Field (MRF) graph; transform the pairwise MRF graph to a second MRF-based graph; and apply a graphical model inference algorithm to the second MRF-based graph to determine the states of the hidden nodes.
A technique that includes predicting data acquired by a network of sensors based at least in part on a graphical model of the network, where the graphical model includes true value nodes, observed value nodes and edge factors based at least in part on historical pairwise dependencies for the observed value nodes. The technique includes detecting anomalous sensor data based at least in part on the predicted data.1. A method comprising: predicting data acquired by a network of sensors based at least in part on a graphical model of the network, the graphical model comprising true value nodes, observed value nodes and edge factors based at least in part on historical pairwise dependencies for the observed value nodes; and detecting anomalous sensor data based at least in part on the predicted data. 2. The method of claim 1, further comprising: modeling the network of sensors as a graph containing one of the true value nodes and one of the observed value nodes for each sensor of the network. 3. The method of claim 1, wherein using the model comprises an undirected graphical model. 4. The method of claim 1, wherein the model comprises a Markov Random Field (MRF)-based graphical model. 5. The method of claim 1, further comprising: determining dependencies between observed pairs of the observed nodes; and determining the edge factors based at least in part on the determined dependencies. 6. The method of claim 1, further comprising: determining values for at least some of the true value nodes of the model using a graphical model inference algorithm. 7. The method of claim 1, further comprising: determining at least one value for at least one of the observed value nodes using a graphical model inference algorithm. 8. An apparatus comprising: a sensor network comprising a plurality of sensors; and an engine comprising a processor to use a graph-based model of the sensor network to detect errant operation for at least one sensor of the sensor network, wherein the model comprises a true value node and an observed value node for each sensor of the plurality of sensors, and the model comprises edge factors determined from dependencies between at least some of the observed value nodes exhibited by historical data. 9. The apparatus of claim 8, wherein the sensor network comprises a model based at least in part on a global dependency structure of the sensor network. 10. The apparatus of claim 8, wherein the engine predicts data for at least one of the sensors using the model. 11. The apparatus of claim 8, wherein the model comprises a Markov Random Field (MRF)-based graphical model. 12. An article comprising a computer readable non-transitory storage medium storing instructions that when executed by a computer cause the computer to: model a network of sensors as a graph containing a true value node and an observed value node for each sensor of the network; and determine edge factors for edges connecting the true value nodes based at least in part on pairwise dependencies exhibited by historical data acquired by the sensor network. 13. The article of claim 11, the storage medium storing instructions that when executed by the computer cause the computer to: for each pair of the sensors, determine a representation of a joint probability distribution of observed data for the pair of sensors; and determine the edge factors based at least in part on the determined joint probability distributions. 14. The article of claim 13, the storage medium storing instructions that when executed by the computer cause the computer to: filter the determined probabilities based at least in part on at least one joint probability distribution metric; and determine the edge factors based at least in part on results of the filtering. 15. The article of claim 12, the storage medium storing instructions that when executed by the computer cause the computer to: model the sensor network as a first pairwise Markov Random Field (MRF) graph; transform the pairwise MRF graph to a second MRF-based graph; and apply a graphical model inference algorithm to the second MRF-based graph to determine the states of the hidden nodes.
2,400
9,048
9,048
15,063,927
2,455
A user can specify particular news weather, traffic, or other perishable content received on a particular Internet radio station or other media channel. The user can customize the station so that wherever the user is currently located, he can receive perishable content related to a preferred geographic location or other category. In some embodiments, a user can specify that a customized station plays local news from one city at the top of the hour, traffic from another city at 10 minutes past the hour, and music or other content at other times. The user can also customize the station to select the perishable content, or other original content, from the personal libraries of specified users. Thus, a user can customize not only the genre of content or select a particular local station, but can also modify the perishable content provided by the customized station.
1. A method of providing a customized media station to a user, the method comprising: obtaining a list including a plurality of media stations from a station server configured to receive perishable media content from the plurality of media stations included in the list, wherein the plurality of media stations are associated with different geographic locations; transmitting a web-page to a user device, the web page configured to present to the user an option to add, to the customized station, selected perishable media content associated with one or more of the plurality of media stations included in the list; receiving, from the user device, user preferences indicating: a particular media station of the plurality of media stations included in the list, the particular media station associated with the selected perishable media content; on-demand options related to playout of the selected perishable media content; obtaining the selected perishable media content from the station server; including the selected perishable media content in the customized media station in accordance with the user preferences; and providing the customized media station to the user via an electronic communications network. 2. The method of claim 1, wherein the different geographic locations include different cities within the United States. 3. The method of claim 1, wherein the on-demand options include an option for expedited delivery of some or all of the perishable media content. 4. The method of claim 1, wherein the on-demand options include an option for designating how often the selected perishable media content is to be played on the customized station. 5. The method of claim 1, wherein the on-demand options include an option allowing the user to override a default number of perishable-content-repeat setting. 6. The method of claim 1, wherein the user preferences further include a user-selected level of access, wherein the user-selected level of access determines a quantity of advertising presented in the customized station. 7. The method of claim 1, wherein the user preferences include: a first selection indicating a first type of perishable content from a first media station; and a second selection indicating a second type of perishable content from a second media station. 8. A system comprising: a central server; a station server coupled to the central server and to a plurality of media stations associated with different geographic locations, the station server configured to receive perishable media content from the plurality of media stations; the central server configured to: transmit a web-page to a user device, the web page presenting to a user an option to add selected perishable media content associated with one or more of the plurality of media stations; receive, from the user device, user preferences indicating: a particular media station associated with the selected perishable media content; on-demand options related to playout of the selected perishable media content; and insert the selected perishable media content into a customized media station provided to the user in accordance with the user preferences. 9. The system of claim 8, wherein the station server aggregates perishable media content from media stations serving different cities. 10. The system of claim 8, wherein the plurality of media stations includes a plurality of over-the-air broadcast radio stations. 11. The system of claim 8, wherein the on-demand options include an option for designating time ranges during which the selected perishable media content is to be presented to the user. 12. The system of claim 8, wherein the on-demand options include an option allowing the user to override a default perishable-content setting. 13. The system of claim 8, wherein the user preferences further include a user selected level of access, the user-selected level of access determining a quantity of advertising presented in the customized media station. 14. The system of claim 8, wherein the user preferences include: selections indicating multiple sources of a particular type of perishable media content. 15. A server device comprising: at least one network interface coupled to a station server and a user device via a communication network; the station server coupled, via the communication network, to a plurality of media broadcast stations broadcasting media content to different geographic locations, the station server configured to obtain perishable media content from the plurality of media broadcast stations; the at least one network interface further configured to: transmit a web-page to the user device, the web page presenting to a user an option to add selected perishable media content associated with one or more of the plurality of media stations; receive, from the user device, user preferences indicating on-demand options related to selection and playout of the selected perishable media content; and processing circuitry configured to insert the selected perishable media content into a customized media station provided to the user in accordance with the user preferences. 16. The server device of claim 15, wherein the user preferences further indicate one or more specific media stations as a source of the perishable media content. 17. The server device of claim 15, wherein the different geographic locations include different cities. 18. The server device of claim 15, wherein the on-demand options include an option for designating how often the selected perishable media content is to be played on the customized station. 19. The server device of claim 15, wherein the on-demand options include an option allowing the user to override a default number of perishable-content-repeat setting. 20. The server device of claim 15, wherein the user preferences further include a user selected level of access, wherein the user-selected level of access determines a quantity of advertising presented in the customized station.
A user can specify particular news weather, traffic, or other perishable content received on a particular Internet radio station or other media channel. The user can customize the station so that wherever the user is currently located, he can receive perishable content related to a preferred geographic location or other category. In some embodiments, a user can specify that a customized station plays local news from one city at the top of the hour, traffic from another city at 10 minutes past the hour, and music or other content at other times. The user can also customize the station to select the perishable content, or other original content, from the personal libraries of specified users. Thus, a user can customize not only the genre of content or select a particular local station, but can also modify the perishable content provided by the customized station.1. A method of providing a customized media station to a user, the method comprising: obtaining a list including a plurality of media stations from a station server configured to receive perishable media content from the plurality of media stations included in the list, wherein the plurality of media stations are associated with different geographic locations; transmitting a web-page to a user device, the web page configured to present to the user an option to add, to the customized station, selected perishable media content associated with one or more of the plurality of media stations included in the list; receiving, from the user device, user preferences indicating: a particular media station of the plurality of media stations included in the list, the particular media station associated with the selected perishable media content; on-demand options related to playout of the selected perishable media content; obtaining the selected perishable media content from the station server; including the selected perishable media content in the customized media station in accordance with the user preferences; and providing the customized media station to the user via an electronic communications network. 2. The method of claim 1, wherein the different geographic locations include different cities within the United States. 3. The method of claim 1, wherein the on-demand options include an option for expedited delivery of some or all of the perishable media content. 4. The method of claim 1, wherein the on-demand options include an option for designating how often the selected perishable media content is to be played on the customized station. 5. The method of claim 1, wherein the on-demand options include an option allowing the user to override a default number of perishable-content-repeat setting. 6. The method of claim 1, wherein the user preferences further include a user-selected level of access, wherein the user-selected level of access determines a quantity of advertising presented in the customized station. 7. The method of claim 1, wherein the user preferences include: a first selection indicating a first type of perishable content from a first media station; and a second selection indicating a second type of perishable content from a second media station. 8. A system comprising: a central server; a station server coupled to the central server and to a plurality of media stations associated with different geographic locations, the station server configured to receive perishable media content from the plurality of media stations; the central server configured to: transmit a web-page to a user device, the web page presenting to a user an option to add selected perishable media content associated with one or more of the plurality of media stations; receive, from the user device, user preferences indicating: a particular media station associated with the selected perishable media content; on-demand options related to playout of the selected perishable media content; and insert the selected perishable media content into a customized media station provided to the user in accordance with the user preferences. 9. The system of claim 8, wherein the station server aggregates perishable media content from media stations serving different cities. 10. The system of claim 8, wherein the plurality of media stations includes a plurality of over-the-air broadcast radio stations. 11. The system of claim 8, wherein the on-demand options include an option for designating time ranges during which the selected perishable media content is to be presented to the user. 12. The system of claim 8, wherein the on-demand options include an option allowing the user to override a default perishable-content setting. 13. The system of claim 8, wherein the user preferences further include a user selected level of access, the user-selected level of access determining a quantity of advertising presented in the customized media station. 14. The system of claim 8, wherein the user preferences include: selections indicating multiple sources of a particular type of perishable media content. 15. A server device comprising: at least one network interface coupled to a station server and a user device via a communication network; the station server coupled, via the communication network, to a plurality of media broadcast stations broadcasting media content to different geographic locations, the station server configured to obtain perishable media content from the plurality of media broadcast stations; the at least one network interface further configured to: transmit a web-page to the user device, the web page presenting to a user an option to add selected perishable media content associated with one or more of the plurality of media stations; receive, from the user device, user preferences indicating on-demand options related to selection and playout of the selected perishable media content; and processing circuitry configured to insert the selected perishable media content into a customized media station provided to the user in accordance with the user preferences. 16. The server device of claim 15, wherein the user preferences further indicate one or more specific media stations as a source of the perishable media content. 17. The server device of claim 15, wherein the different geographic locations include different cities. 18. The server device of claim 15, wherein the on-demand options include an option for designating how often the selected perishable media content is to be played on the customized station. 19. The server device of claim 15, wherein the on-demand options include an option allowing the user to override a default number of perishable-content-repeat setting. 20. The server device of claim 15, wherein the user preferences further include a user selected level of access, wherein the user-selected level of access determines a quantity of advertising presented in the customized station.
2,400
9,049
9,049
15,398,129
2,447
System and methods for enforcing service level agreements (SLAs) between computing platforms engaged in (e.g., Internet-of-Things) data exchange via peer-to-peer (P2P) connections are described. In accordance with various embodiments, data traffic via the P2P connections is monitored, and if an SLA violation is detected, data streams are rerouted to cure the violation.
1. A system comprising: a server comprising one or more processors and being communicatively coupled to a plurality of computing platforms engaged in data exchange via peer-to-peer connections, the server configured to perform operations comprising: receiving, from the plurality of computing platforms, data-traffic information about data traffic over the peer-to-peer connections; comparing the data-traffic information against service level agreements to determine whether the service level agreements are met; and upon detection of a violation of a term of a service level agreement associated with a data-producer computing platform and a data-consumer computing platform, reconfiguring the peer-to-peer connections to cure the violation by routing a data stream from the data-producer computing platform to the data-consumer computing platform via at least one additional computing platform having free capacity. 2. The system of claim 1, wherein the server comprises one or more data storage devices storing the service level agreements and configurations associated with the peer-to-peer connections. 3. The system of claim 2, wherein reconfiguring the peer-to-peer connections comprises updating the configurations and distributing updated configuration information to the data-producer computing platform, the data-consumer computing platform, and the at least one additional computing platform. 4. The system of claim 1, further comprising agent applications executing on the plurality of computing platforms, the agent applications configured to monitor data traffic over the peer-to-peer connections and, based on the monitoring, send the data-traffic information to the server. 5. The system of claim 4, wherein the agent applications are further configured to establish the peer-to-peer connections and exchange data via the peer-to-peer connections in accordance with configuration information received from the server. 6. The system of claim 1, wherein the operations further comprise identifying one or more computing platforms having free capacity based on data-traffic information provided by the one or more computing platforms, and selecting the at least one additional computing platform from among the identified one or more computing platforms. 7. The system of claim 1, wherein the operations further comprise providing one or more encryption keys to the data-consumer platform and the data-producer platform, and to the at least one additional computing platform only if it is itself a data consumer of the data stream. 8. The system of claim 1, further comprising one or more computing platforms available for deployment in response to the detection of the violation. 9. The system of claim 1, wherein the operations further comprise restoring an original configuration of the peer-to-peer connections upon determining that the term of the service level agreement can be met without routing the data stream via the at least one additional computing platform. 10. A method comprising: by a server communicatively coupled to a plurality of computing platforms engaged in data exchange via peer-to-peer connections, receiving, from the plurality of computing platforms, data-traffic information about data traffic over the peer-to-peer connections; comparing the data-traffic information against service level agreements to determine whether the service level agreements are met; and upon detection of a violation of a term of a service level agreement associated with a data-producer computing platform and a data-consumer computing platform, reconfiguring the peer-to-peer connections to cure the detected violation by routing a data stream from the data-producer computing platform to the data-consumer computing platform via at least one additional computing platform having free capacity. 11. The method of claim 10, further comprising identifying one or more computing platforms having free capacity based on data-traffic information provided by the one or more computing platform, and selecting the at least one additional computing platform from among the identified one or more computing platforms. 12. The method of claim 10, wherein the at least one additional computing platform is selected from among one or more computing platforms that are themselves data consumers of the data stream. 13. The method of claim 12, further comprising causing the at least one additional computing platform to receive a price discount for the data stream from the data-producing platform. 14. The method of claim 10, wherein the at least one additional computing platform is not itself a data consumer of the data stream, the method further comprising providing one or more encryption keys to the data-consumer platform and the data-producer platform, but not to the at least one additional computing platform. 15. The method of claim 10, wherein the at least one additional computing platform is deployed in response to the detection of the violation. 16. The method of claim 10, further comprising restoring an original configuration of the peer-to-peer connections upon determining that the term of the service level agreement can be met without routing the data stream via the at least one additional computing platform. 17. The method of claim 10, wherein reconfiguring the peer-to-peer connections comprises distributing updated configuration information to the data-producer computing platform, the data-consumer computing platform, and the at least one additional computing platform. 18. One or more tangible computer-readable media storing instructions to control the operation of one or more processors, the instructions, when executed by the one or more processors, causing the one or more processors to perform operations comprising: receiving, from a plurality of computing platforms engaged in data exchange via peer-to-peer connections, data-traffic information about data traffic over the peer-to-peer connections; comparing the data-traffic information against service level agreements to determine whether the service level agreements are met; and upon detection of a violation of a term of a service level agreement associated with a data-producer computing platform and a data-consumer computing platform, reconfiguring the peer-to-peer connections to cure the detected violation by routing a data stream from the data-producer computing platform to the data-consumer computing platform via at least one additional computing platform having free capacity. 19. The one or more tangible computer-readable media of claim 18, wherein the operations further comprise: identifying one or more computing platforms having free capacity based on data-traffic information provided by the one or more computing platforms, and selecting the at least one additional computing platform from among the identified one or more computing platforms. 20. The one or more tangible computer-readable media of claim 18, wherein the operations further comprise: restoring an original configuration of the peer-to-peer connections upon determining that the term of the service level agreement can be met without routing the data stream via the at least one additional computing platform.
System and methods for enforcing service level agreements (SLAs) between computing platforms engaged in (e.g., Internet-of-Things) data exchange via peer-to-peer (P2P) connections are described. In accordance with various embodiments, data traffic via the P2P connections is monitored, and if an SLA violation is detected, data streams are rerouted to cure the violation.1. A system comprising: a server comprising one or more processors and being communicatively coupled to a plurality of computing platforms engaged in data exchange via peer-to-peer connections, the server configured to perform operations comprising: receiving, from the plurality of computing platforms, data-traffic information about data traffic over the peer-to-peer connections; comparing the data-traffic information against service level agreements to determine whether the service level agreements are met; and upon detection of a violation of a term of a service level agreement associated with a data-producer computing platform and a data-consumer computing platform, reconfiguring the peer-to-peer connections to cure the violation by routing a data stream from the data-producer computing platform to the data-consumer computing platform via at least one additional computing platform having free capacity. 2. The system of claim 1, wherein the server comprises one or more data storage devices storing the service level agreements and configurations associated with the peer-to-peer connections. 3. The system of claim 2, wherein reconfiguring the peer-to-peer connections comprises updating the configurations and distributing updated configuration information to the data-producer computing platform, the data-consumer computing platform, and the at least one additional computing platform. 4. The system of claim 1, further comprising agent applications executing on the plurality of computing platforms, the agent applications configured to monitor data traffic over the peer-to-peer connections and, based on the monitoring, send the data-traffic information to the server. 5. The system of claim 4, wherein the agent applications are further configured to establish the peer-to-peer connections and exchange data via the peer-to-peer connections in accordance with configuration information received from the server. 6. The system of claim 1, wherein the operations further comprise identifying one or more computing platforms having free capacity based on data-traffic information provided by the one or more computing platforms, and selecting the at least one additional computing platform from among the identified one or more computing platforms. 7. The system of claim 1, wherein the operations further comprise providing one or more encryption keys to the data-consumer platform and the data-producer platform, and to the at least one additional computing platform only if it is itself a data consumer of the data stream. 8. The system of claim 1, further comprising one or more computing platforms available for deployment in response to the detection of the violation. 9. The system of claim 1, wherein the operations further comprise restoring an original configuration of the peer-to-peer connections upon determining that the term of the service level agreement can be met without routing the data stream via the at least one additional computing platform. 10. A method comprising: by a server communicatively coupled to a plurality of computing platforms engaged in data exchange via peer-to-peer connections, receiving, from the plurality of computing platforms, data-traffic information about data traffic over the peer-to-peer connections; comparing the data-traffic information against service level agreements to determine whether the service level agreements are met; and upon detection of a violation of a term of a service level agreement associated with a data-producer computing platform and a data-consumer computing platform, reconfiguring the peer-to-peer connections to cure the detected violation by routing a data stream from the data-producer computing platform to the data-consumer computing platform via at least one additional computing platform having free capacity. 11. The method of claim 10, further comprising identifying one or more computing platforms having free capacity based on data-traffic information provided by the one or more computing platform, and selecting the at least one additional computing platform from among the identified one or more computing platforms. 12. The method of claim 10, wherein the at least one additional computing platform is selected from among one or more computing platforms that are themselves data consumers of the data stream. 13. The method of claim 12, further comprising causing the at least one additional computing platform to receive a price discount for the data stream from the data-producing platform. 14. The method of claim 10, wherein the at least one additional computing platform is not itself a data consumer of the data stream, the method further comprising providing one or more encryption keys to the data-consumer platform and the data-producer platform, but not to the at least one additional computing platform. 15. The method of claim 10, wherein the at least one additional computing platform is deployed in response to the detection of the violation. 16. The method of claim 10, further comprising restoring an original configuration of the peer-to-peer connections upon determining that the term of the service level agreement can be met without routing the data stream via the at least one additional computing platform. 17. The method of claim 10, wherein reconfiguring the peer-to-peer connections comprises distributing updated configuration information to the data-producer computing platform, the data-consumer computing platform, and the at least one additional computing platform. 18. One or more tangible computer-readable media storing instructions to control the operation of one or more processors, the instructions, when executed by the one or more processors, causing the one or more processors to perform operations comprising: receiving, from a plurality of computing platforms engaged in data exchange via peer-to-peer connections, data-traffic information about data traffic over the peer-to-peer connections; comparing the data-traffic information against service level agreements to determine whether the service level agreements are met; and upon detection of a violation of a term of a service level agreement associated with a data-producer computing platform and a data-consumer computing platform, reconfiguring the peer-to-peer connections to cure the detected violation by routing a data stream from the data-producer computing platform to the data-consumer computing platform via at least one additional computing platform having free capacity. 19. The one or more tangible computer-readable media of claim 18, wherein the operations further comprise: identifying one or more computing platforms having free capacity based on data-traffic information provided by the one or more computing platforms, and selecting the at least one additional computing platform from among the identified one or more computing platforms. 20. The one or more tangible computer-readable media of claim 18, wherein the operations further comprise: restoring an original configuration of the peer-to-peer connections upon determining that the term of the service level agreement can be met without routing the data stream via the at least one additional computing platform.
2,400
9,050
9,050
15,188,312
2,453
Examples include a multi-node cluster having a node with a clustering layer. The clustering layer may be located between an application programming interface (API) layer and a service layer and the multi-node cluster may be associated with a database. In some examples, the clustering layer may discover whether a number of nodes associated with the multi-node cluster has changed. Based, at least in part, on the determination that the number of nodes associated with the multi-node cluster has changed, at the clustering layer, the database may be sharded and a new API call may be issued to the API layer.
1. A node of a multi-node cluster comprising: a processing resource; and a non-transitory machine-readable storage medium comprising instructions executable by the processing resource to: receive, at an application programming interface (API) layer, an API call to access a database and forward the API call to a service layer; intercept the API call from the API layer at a clustering layer between the API layer and the service layer; perform, at the clustering layer, at least one of sharding the database or forwarding the API call; and access the database at a data access object layer. 2. The node of claim 1, wherein the non-transitory machine-readable storage medium further comprises instructions executable by the processing resource to: discover, at the clustering layer, whether a number of nodes associated with the multi-node cluster has changed. 3. The node of claim 2, wherein the non-transitory machine-readable storage medium further comprises instructions executable by the processing resource to: based on the discovery that the number of nodes associated with the multi-node cluster has changed, at the clustering layer, shard the database and issue a new API call to the API layer. 4. The node of claim 1, wherein sharding the database includes load-balancing between each node of the multi-node cluster. 5. The node of claim 1, wherein the non-transitory machine-readable storage medium further comprises instructions executable by the processing resource to: determine whether the API call is at least one of a request to create a database resource in the database, a request to retrieve the database resource in the database, or a request to delete the database resource in the database. 6. The node of claim 5, wherein the non-transitory machine-readable storage medium further comprises instructions executable by the processing resource to: based on the determination that the API call is at least one of the request to create, retrieve, or delete the database resource, determine, at the clustering layer, a location of the database resource. 7. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to create the database resource and based on the determination that the location of the database resource is the node, shard the database and forward the API call to the service layer. 8. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to create the database resource and based on the determination that the location of the database resource is another node of the multi-node cluster, forward the API call to the another node. 9. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to retrieve the database resource and based on the determination that the location of the database resource is the node, forward the API call to the service layer. 10. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to retrieve the database resource and based on the determination that the location of the database resource is another node of the multi-node cluster, forward the API call to the another node. 11. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to retrieve the database resource and based on the determination that the location of the database resource is the unknown, forward the API call to each node of the multi-node cluster and to the service layer. 12. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to delete the database resource and based on the determination that the location of the database resource is the node, forward the API call to the service layer. 13. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to delete the database resource and based on the determination that the location of the database resource is unknown, forward the API call to each node of the multi-node cluster and to the service layer. 14. An article comprising at least one non-transitory machine-readable storage medium comprising instructions executable by a processing resource of a node of a multi-node cluster to: receive, at an API layer, an application programming interface (API) call and forward the API call to a service layer; intercept, at a clustering layer, the API call from the API layer; determine whether the API call is at least one of a request to create a database resource in a database, retrieve the database resource from the database, or delete the database resource from the database; based on the determination that the API call is at least one of the request to create, to retrieve, or to delete the database resource, determine a location of the database resource; based on the determination that the API call is the request to create the database resource and based on the determination that the location of the database resource is the node, at the clustering layer, shard the database and forward the API call to the service layer. 15. The article of claim 14, further comprising instructions executable by the processing resource of the node of the multi-node cluster to: based on the determination that the API call is at least one of the request to retrieve or delete the database resource and based on the determination that the location of the database resource is unknown, at the clustering layer, forward the API call to each node of the multi-node cluster and to the service layer. 16. The article of claim 14, further comprising instructions executable by the processing resource of the node of the multi-node cluster to: discover, at the clustering layer, whether a number of nodes associated with the multi-node cluster has changed; and based on the discovery that the number of nodes associated with the multi-node cluster has changed, at the clustering layer, shard the database and issue a new API call to the API layer. 17. The article of claim 14, further comprising instructions executable by the processing resource of the node of the multi-node cluster to: based on the determination that the API call is the request to create the database resource and the determination that the location of the database resource is another node of the multi-node cluster, forward, at the clustering layer, the API call to the another node of the multi-node cluster. 18. A method comprising: discovering, by a processing resource of a node of a multi-node cluster, at a clustering layer between an application programming interface (API) layer and a service layer, whether a number of nodes associated with the multi-node cluster has changed; and based on the discovery that the number of nodes associated with the multi-node cluster has changed, at the clustering layer, sharding the database and issuing a new API call to the API layer. 19. The method of claim 18, the method further comprising: receiving, at the clustering layer, an API call from an API layer; determining, at the clustering layer, whether the API call is at least one of a request to create a database resource in a database, retrieve the database resource from the database, or delete the database resource from the database; based on the determination that the API call is at least one of the request to create, retrieve, or delete the database resource, determining, at the clustering layer, a location of the database resource; and based on the determination that the API call is at least one of the request to create, to retrieve, or to delete a database resource and the determination of the location of the database resource, performing, at the clustering layer, at least one of sharding the database and forwarding the API call. 20. The method of claim 18, wherein the new API call results in moving the database resource from one node of the multi-node cluster to another node of the multi-node cluster.
Examples include a multi-node cluster having a node with a clustering layer. The clustering layer may be located between an application programming interface (API) layer and a service layer and the multi-node cluster may be associated with a database. In some examples, the clustering layer may discover whether a number of nodes associated with the multi-node cluster has changed. Based, at least in part, on the determination that the number of nodes associated with the multi-node cluster has changed, at the clustering layer, the database may be sharded and a new API call may be issued to the API layer.1. A node of a multi-node cluster comprising: a processing resource; and a non-transitory machine-readable storage medium comprising instructions executable by the processing resource to: receive, at an application programming interface (API) layer, an API call to access a database and forward the API call to a service layer; intercept the API call from the API layer at a clustering layer between the API layer and the service layer; perform, at the clustering layer, at least one of sharding the database or forwarding the API call; and access the database at a data access object layer. 2. The node of claim 1, wherein the non-transitory machine-readable storage medium further comprises instructions executable by the processing resource to: discover, at the clustering layer, whether a number of nodes associated with the multi-node cluster has changed. 3. The node of claim 2, wherein the non-transitory machine-readable storage medium further comprises instructions executable by the processing resource to: based on the discovery that the number of nodes associated with the multi-node cluster has changed, at the clustering layer, shard the database and issue a new API call to the API layer. 4. The node of claim 1, wherein sharding the database includes load-balancing between each node of the multi-node cluster. 5. The node of claim 1, wherein the non-transitory machine-readable storage medium further comprises instructions executable by the processing resource to: determine whether the API call is at least one of a request to create a database resource in the database, a request to retrieve the database resource in the database, or a request to delete the database resource in the database. 6. The node of claim 5, wherein the non-transitory machine-readable storage medium further comprises instructions executable by the processing resource to: based on the determination that the API call is at least one of the request to create, retrieve, or delete the database resource, determine, at the clustering layer, a location of the database resource. 7. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to create the database resource and based on the determination that the location of the database resource is the node, shard the database and forward the API call to the service layer. 8. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to create the database resource and based on the determination that the location of the database resource is another node of the multi-node cluster, forward the API call to the another node. 9. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to retrieve the database resource and based on the determination that the location of the database resource is the node, forward the API call to the service layer. 10. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to retrieve the database resource and based on the determination that the location of the database resource is another node of the multi-node cluster, forward the API call to the another node. 11. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to retrieve the database resource and based on the determination that the location of the database resource is the unknown, forward the API call to each node of the multi-node cluster and to the service layer. 12. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to delete the database resource and based on the determination that the location of the database resource is the node, forward the API call to the service layer. 13. The node of claim 6, wherein the instructions to perform further comprise instructions executable by the processing resource to: based on the determination that the API call is the request to delete the database resource and based on the determination that the location of the database resource is unknown, forward the API call to each node of the multi-node cluster and to the service layer. 14. An article comprising at least one non-transitory machine-readable storage medium comprising instructions executable by a processing resource of a node of a multi-node cluster to: receive, at an API layer, an application programming interface (API) call and forward the API call to a service layer; intercept, at a clustering layer, the API call from the API layer; determine whether the API call is at least one of a request to create a database resource in a database, retrieve the database resource from the database, or delete the database resource from the database; based on the determination that the API call is at least one of the request to create, to retrieve, or to delete the database resource, determine a location of the database resource; based on the determination that the API call is the request to create the database resource and based on the determination that the location of the database resource is the node, at the clustering layer, shard the database and forward the API call to the service layer. 15. The article of claim 14, further comprising instructions executable by the processing resource of the node of the multi-node cluster to: based on the determination that the API call is at least one of the request to retrieve or delete the database resource and based on the determination that the location of the database resource is unknown, at the clustering layer, forward the API call to each node of the multi-node cluster and to the service layer. 16. The article of claim 14, further comprising instructions executable by the processing resource of the node of the multi-node cluster to: discover, at the clustering layer, whether a number of nodes associated with the multi-node cluster has changed; and based on the discovery that the number of nodes associated with the multi-node cluster has changed, at the clustering layer, shard the database and issue a new API call to the API layer. 17. The article of claim 14, further comprising instructions executable by the processing resource of the node of the multi-node cluster to: based on the determination that the API call is the request to create the database resource and the determination that the location of the database resource is another node of the multi-node cluster, forward, at the clustering layer, the API call to the another node of the multi-node cluster. 18. A method comprising: discovering, by a processing resource of a node of a multi-node cluster, at a clustering layer between an application programming interface (API) layer and a service layer, whether a number of nodes associated with the multi-node cluster has changed; and based on the discovery that the number of nodes associated with the multi-node cluster has changed, at the clustering layer, sharding the database and issuing a new API call to the API layer. 19. The method of claim 18, the method further comprising: receiving, at the clustering layer, an API call from an API layer; determining, at the clustering layer, whether the API call is at least one of a request to create a database resource in a database, retrieve the database resource from the database, or delete the database resource from the database; based on the determination that the API call is at least one of the request to create, retrieve, or delete the database resource, determining, at the clustering layer, a location of the database resource; and based on the determination that the API call is at least one of the request to create, to retrieve, or to delete a database resource and the determination of the location of the database resource, performing, at the clustering layer, at least one of sharding the database and forwarding the API call. 20. The method of claim 18, wherein the new API call results in moving the database resource from one node of the multi-node cluster to another node of the multi-node cluster.
2,400
9,051
9,051
15,041,236
2,456
A distributed electronic storage system (DESS) comprises a plurality of computing devices communicatively coupled via one or more network links and having a file system distributed among them. The DESS comprises management circuitry that resides on the first computing device. The management circuitry is operable to generate an indication of a load on a first resource that resides on the first computing device. The management circuitry is operable to receive, via the one or more network links, an indication of a load on a second resource that resides on a second computing device of the plurality of computing devices. The management circuitry is operable to determine a condition of the DESS based on the indication of the load on the first resource and the indication of the load on the second resource.
1. One or more non-transitory machine-readable storage medium having code stored thereon, that, when executed by a first computing device that is communicatively coupled to a second computing device via one or more network links, configures said first computing device to comprise management circuitry of a distributed electronic storage system (DESS), wherein said management circuitry is operable to: generate an indication of a load on a first set of one or more resources that reside on said first computing device, wherein said first set of one or more resources comprises a first network adapter operable to store DESS traffic; receive, via said one or more network links, an indication of a load on a second set of one or more resources that reside on said second computing device, wherein said second set of one or more resources comprises a second network adapter operable to store DESS traffic; determine a condition of said DESS based on said indication of said load on said first set of one or more resources and said indication of said load on said second set of one or more resources; and change a priority of DESS traffic according to said condition of said DESS. 2. The one or more non-transitory machine-readable storage medium of claim 1, wherein said management circuitry is operable to append said indication of said load on said first set of one or more resources to an outgoing file system message, and transmit said file system message on to said one or more network links. 3. The one or more non-transitory machine-readable storage medium of claim 1, wherein said management circuitry is operable to, in response to said condition of said DESS being an overloaded condition, perform automatic provisioning of additional resources of said first computing device for use by said DESS. 4. The one or more non-transitory machine-readable storage medium of claim 3, wherein said automatic provisioning of additional resources comprises one or more of: automatic provisioning of an additional processing core for use by said DESS; automatic provisioning of additional memory for use by said DESS; automatic provisioning of additional network bandwidth for use by said DESS; and automatic provisioning of additional nonvolatile storage for use by said DESS. 5. The one or more non-transitory machine-readable storage medium of claim 1, wherein said management circuitry is operable to, in response to said condition of said DESS being an underloaded condition, perform automatic deprovisioning of resources of said first computing device which were previously provisioned for use by said DESS. 6. The one or more non-transitory machine-readable storage medium of claim 3, wherein said automatic deprovisioning of resources comprises one or more of: automatic deprovisioning of a processing core previously provisioned for use by said DESS; automatic deprovisioning of memory previously provisioned for use by said DESS; automatic deprovisioning of network bandwidth previously provisioned for use by said DESS; and automatic deprovisioning of nonvolatile storage previously provisioned for use by said DESS. 7. The one or more non-transitory machine-readable storage medium of claim 1, wherein each of said indication of said load on said first set of one or more resources and said indication of said load on said second set of one or more resources comprises one or more of: an indication of a load on a network link; an indication of a load on a processing core; an indication of a load on memory; and an indication of a load on a storage device. 8. The one or more non-transitory machine-readable storage medium of claim 1, wherein each of said indication of said load on said first set of one or more resources and said indication of said load on said second set of one or more resources comprises one or both of: an indication of a number of write operations pending; and an indication of a number of read operations pending. 9. The one or more non-transitory machine-readable storage medium of claim 1, wherein said first set of one or more resources comprises a storage device and said indication of said load on said first set of one or more resources is based on a depth of a buffer of said storage device. 10. The one or more non-transitory machine-readable storage medium of claim 1, wherein said first set of one or more resources comprises one or more file system request buffers that reside on said first computing device. 11. The one or more non-transitory machine-readable storage medium of claim 10, wherein: said management circuitry is operable to control a rate at which file system requests stored in said one or more file system buffers are serviced; said control of said rate is based on said determined condition of said DESS. 12. The one or more non-transitory machine-readable storage medium of claim 11, wherein said control of said rate comprises control of one or both of: an interval at which batches of file system requests are fetched from said one or more buffers; and a size of each of said batches of file system requests. 13. The one or more non-transitory machine-readable storage medium of claim 11, wherein said control of said rate comprises separate control of: a rate at which file system data requests stored in said one or more buffers are serviced; and a rate at which file system metadata requests stored in said one or more buffers are serviced. 14. The one or more non-transitory machine-readable storage medium of claim 11, wherein said control of said rate comprises separate control of: a rate at which file system data read requests stored in said one or more buffers are serviced; and a rate at which file system data write requests stored in said one or more buffers are serviced. 15. The one or more non-transitory machine-readable storage medium of claim 1, wherein said determination of said status of said DESS comprises calculation of a choking level which determines a rate at which one or more file system requests are serviced. 16. The one or more non-transitory machine-readable storage medium of claim 1, wherein said management circuitry is operable to: generate an indication of a performance of said DESS; and determine a condition of said DESS based on said indication of said performance of said DESS. 17. The one or more non-transitory machine-readable storage medium of claim 16, wherein said management circuitry is operable to, in response to said condition of said DESS being an underperformance condition, perform automatic provisioning of additional resources of said first computing device for use by said DESS. 18. The one or more non-transitory machine-readable storage medium of claim 17, wherein said automatic provisioning of additional resources comprises one or more of: automatic provisioning of an additional processing core for use by said DESS; automatic provisioning of additional memory for use by said DESS; automatic provisioning of additional network bandwidth for use by said DESS; and automatic provisioning of additional nonvolatile storage for use by said DESS. 19. The one or more non-transitory machine-readable storage medium of claim 16, wherein said management circuitry is operable to, in response to said condition of said DESS being an overperformance condition, perform automatic deprovisioning of resources of said first computing device which were previously provisioned for use by said DESS. 20. The one or more non-transitory machine-readable storage medium of claim 19, wherein said automatic deprovisioning of resources comprises one or more of: automatic deprovisioning of a processing core previously provisioned for use by said DESS; automatic deprovisioning of memory previously provisioned for use by said DESS; automatic deprovisioning of network bandwidth previously provisioned for use by said DESS; and automatic deprovisioning of nonvolatile storage previously provisioned for use by said DESS. 21. A method for managing a distributed electronic storage system (DESS), the method comprising: generating an indication of a load on a first set of one or more resources that reside on said first computing device, wherein said first set of one or more resources comprises a first network adapter operable to store DESS traffic; receiving, via said one or more network links, an indication of a load on a second set of one or more resources that reside on said second computing device, wherein said second set of one or more resources comprises a second network adapter operable to store DESS traffic; determining a condition of said DESS based on said indication of said load on said first set of one or more resources and said indication of said load on said second set of one or more resources; and changing a priority of DESS traffic according to said condition of said DESS. 22. A system comprising: a distributed electronic storage system (DESS) operable to communicate DESS traffic according to a priority, said DESS comprising: a first computing device comprising management circuitry and a first network adapter comprising a first buffer operable to store said DESS traffic, wherein said first buffer is associated with a first depth; and a second computing device comprising a second network adapter comprising a second buffer operable to store said DESS traffic, wherein said second buffer is associated with a second depth, said second computing device being communicatively coupled to said first computing device via one or more network links; wherein said management circuitry is operable to change said priority of said DESS traffic according to said first depth and said second depth.
A distributed electronic storage system (DESS) comprises a plurality of computing devices communicatively coupled via one or more network links and having a file system distributed among them. The DESS comprises management circuitry that resides on the first computing device. The management circuitry is operable to generate an indication of a load on a first resource that resides on the first computing device. The management circuitry is operable to receive, via the one or more network links, an indication of a load on a second resource that resides on a second computing device of the plurality of computing devices. The management circuitry is operable to determine a condition of the DESS based on the indication of the load on the first resource and the indication of the load on the second resource.1. One or more non-transitory machine-readable storage medium having code stored thereon, that, when executed by a first computing device that is communicatively coupled to a second computing device via one or more network links, configures said first computing device to comprise management circuitry of a distributed electronic storage system (DESS), wherein said management circuitry is operable to: generate an indication of a load on a first set of one or more resources that reside on said first computing device, wherein said first set of one or more resources comprises a first network adapter operable to store DESS traffic; receive, via said one or more network links, an indication of a load on a second set of one or more resources that reside on said second computing device, wherein said second set of one or more resources comprises a second network adapter operable to store DESS traffic; determine a condition of said DESS based on said indication of said load on said first set of one or more resources and said indication of said load on said second set of one or more resources; and change a priority of DESS traffic according to said condition of said DESS. 2. The one or more non-transitory machine-readable storage medium of claim 1, wherein said management circuitry is operable to append said indication of said load on said first set of one or more resources to an outgoing file system message, and transmit said file system message on to said one or more network links. 3. The one or more non-transitory machine-readable storage medium of claim 1, wherein said management circuitry is operable to, in response to said condition of said DESS being an overloaded condition, perform automatic provisioning of additional resources of said first computing device for use by said DESS. 4. The one or more non-transitory machine-readable storage medium of claim 3, wherein said automatic provisioning of additional resources comprises one or more of: automatic provisioning of an additional processing core for use by said DESS; automatic provisioning of additional memory for use by said DESS; automatic provisioning of additional network bandwidth for use by said DESS; and automatic provisioning of additional nonvolatile storage for use by said DESS. 5. The one or more non-transitory machine-readable storage medium of claim 1, wherein said management circuitry is operable to, in response to said condition of said DESS being an underloaded condition, perform automatic deprovisioning of resources of said first computing device which were previously provisioned for use by said DESS. 6. The one or more non-transitory machine-readable storage medium of claim 3, wherein said automatic deprovisioning of resources comprises one or more of: automatic deprovisioning of a processing core previously provisioned for use by said DESS; automatic deprovisioning of memory previously provisioned for use by said DESS; automatic deprovisioning of network bandwidth previously provisioned for use by said DESS; and automatic deprovisioning of nonvolatile storage previously provisioned for use by said DESS. 7. The one or more non-transitory machine-readable storage medium of claim 1, wherein each of said indication of said load on said first set of one or more resources and said indication of said load on said second set of one or more resources comprises one or more of: an indication of a load on a network link; an indication of a load on a processing core; an indication of a load on memory; and an indication of a load on a storage device. 8. The one or more non-transitory machine-readable storage medium of claim 1, wherein each of said indication of said load on said first set of one or more resources and said indication of said load on said second set of one or more resources comprises one or both of: an indication of a number of write operations pending; and an indication of a number of read operations pending. 9. The one or more non-transitory machine-readable storage medium of claim 1, wherein said first set of one or more resources comprises a storage device and said indication of said load on said first set of one or more resources is based on a depth of a buffer of said storage device. 10. The one or more non-transitory machine-readable storage medium of claim 1, wherein said first set of one or more resources comprises one or more file system request buffers that reside on said first computing device. 11. The one or more non-transitory machine-readable storage medium of claim 10, wherein: said management circuitry is operable to control a rate at which file system requests stored in said one or more file system buffers are serviced; said control of said rate is based on said determined condition of said DESS. 12. The one or more non-transitory machine-readable storage medium of claim 11, wherein said control of said rate comprises control of one or both of: an interval at which batches of file system requests are fetched from said one or more buffers; and a size of each of said batches of file system requests. 13. The one or more non-transitory machine-readable storage medium of claim 11, wherein said control of said rate comprises separate control of: a rate at which file system data requests stored in said one or more buffers are serviced; and a rate at which file system metadata requests stored in said one or more buffers are serviced. 14. The one or more non-transitory machine-readable storage medium of claim 11, wherein said control of said rate comprises separate control of: a rate at which file system data read requests stored in said one or more buffers are serviced; and a rate at which file system data write requests stored in said one or more buffers are serviced. 15. The one or more non-transitory machine-readable storage medium of claim 1, wherein said determination of said status of said DESS comprises calculation of a choking level which determines a rate at which one or more file system requests are serviced. 16. The one or more non-transitory machine-readable storage medium of claim 1, wherein said management circuitry is operable to: generate an indication of a performance of said DESS; and determine a condition of said DESS based on said indication of said performance of said DESS. 17. The one or more non-transitory machine-readable storage medium of claim 16, wherein said management circuitry is operable to, in response to said condition of said DESS being an underperformance condition, perform automatic provisioning of additional resources of said first computing device for use by said DESS. 18. The one or more non-transitory machine-readable storage medium of claim 17, wherein said automatic provisioning of additional resources comprises one or more of: automatic provisioning of an additional processing core for use by said DESS; automatic provisioning of additional memory for use by said DESS; automatic provisioning of additional network bandwidth for use by said DESS; and automatic provisioning of additional nonvolatile storage for use by said DESS. 19. The one or more non-transitory machine-readable storage medium of claim 16, wherein said management circuitry is operable to, in response to said condition of said DESS being an overperformance condition, perform automatic deprovisioning of resources of said first computing device which were previously provisioned for use by said DESS. 20. The one or more non-transitory machine-readable storage medium of claim 19, wherein said automatic deprovisioning of resources comprises one or more of: automatic deprovisioning of a processing core previously provisioned for use by said DESS; automatic deprovisioning of memory previously provisioned for use by said DESS; automatic deprovisioning of network bandwidth previously provisioned for use by said DESS; and automatic deprovisioning of nonvolatile storage previously provisioned for use by said DESS. 21. A method for managing a distributed electronic storage system (DESS), the method comprising: generating an indication of a load on a first set of one or more resources that reside on said first computing device, wherein said first set of one or more resources comprises a first network adapter operable to store DESS traffic; receiving, via said one or more network links, an indication of a load on a second set of one or more resources that reside on said second computing device, wherein said second set of one or more resources comprises a second network adapter operable to store DESS traffic; determining a condition of said DESS based on said indication of said load on said first set of one or more resources and said indication of said load on said second set of one or more resources; and changing a priority of DESS traffic according to said condition of said DESS. 22. A system comprising: a distributed electronic storage system (DESS) operable to communicate DESS traffic according to a priority, said DESS comprising: a first computing device comprising management circuitry and a first network adapter comprising a first buffer operable to store said DESS traffic, wherein said first buffer is associated with a first depth; and a second computing device comprising a second network adapter comprising a second buffer operable to store said DESS traffic, wherein said second buffer is associated with a second depth, said second computing device being communicatively coupled to said first computing device via one or more network links; wherein said management circuitry is operable to change said priority of said DESS traffic according to said first depth and said second depth.
2,400
9,052
9,052
14,902,348
2,482
Autostereoscopic display device comprising a backlight ( 66 ), a display panel ( 62 ) comprising rows and columns of pixels and a lenticular arrangement ( 60, 64 ), wherein the backlight ( 66 ) provides a striped output comprising stripes in the column direction or offset by an acute angle to the column direction the lenticular arrangement comprises a first lenticular lens array ( 60 ) on the side of the display panel ( 62 ) facing the display output for directing different display panel pixel outputs in different directions and a second lenticular lens array ( 64 ) on the opposite side of the display panel ( 62 ), facing the backlight ( 66 ), for providing collimation of the striped back-light output.
1. An autostereoscopic display device comprising: a backlight; a display panel comprising rows and columns of pixels; and a lenticular arrangement, characterised in that the backlight provides a striped output comprising stripes in the column direction or offset by an acute angle to the column direction, and in that the lenticular arrangement comprises a first lenticular lens array on the side of the display panel facing the display output for directing different display panel pixel outputs in different directions and a second lenticular lens array on the opposite side of the display panel, facing the backlight, for providing collimation of the striped backlight output. 2. A device as claimed in claim 1, wherein the first lenticular arrangement is negative. 3. A device as claimed in claim 1, wherein the second lenticular arrangement is positive. 4. A device as claimed in claim 1, wherein: tan   α 1 = tan   α 2 N , where α1 is the angular spread of light from the lenses of the first lenticular array, and α2 is the angle of the viewing cone of light to the lenses of the second lenticular array to give a collimated output, and N is a positive integer. 5. A device as claimed in claim 4, wherein: C  w 1 p 1 = N  w 2 p 2 . wherein w1 is the width of a sub-pixel of the display panel, p1 is the display panel pixel pitch, and w2 the width of a backlight stripe and p2 is the backlight stripe pitch, and wherein C is 1.0 or less. 6. A device as claimed in claim 5, wherein C is in the range 0.5 to 1.0. 7. A device as claimed in claim 4, wherein N=1. 8. A device as claimed in claim 4, wherein N>1. 9. A device as claimed in claim 8, wherein N=2. 10. A device as claimed in claim 8, further comprising a controller, which is adapted to: drive the display panel in a sequence of N subframes, each subframe being synchronised with illumination with a respective set of backlight stripes. 11. A device as claimed in claim 1, wherein the backlight stripes are slanted with respect to the display column direction. 12. A device as claimed in claim 11, wherein the first and second lenticular lens arrays have the lens axes slanted with respect to the display column direction, with the lens axes and the backlight stripes in parallel.
Autostereoscopic display device comprising a backlight ( 66 ), a display panel ( 62 ) comprising rows and columns of pixels and a lenticular arrangement ( 60, 64 ), wherein the backlight ( 66 ) provides a striped output comprising stripes in the column direction or offset by an acute angle to the column direction the lenticular arrangement comprises a first lenticular lens array ( 60 ) on the side of the display panel ( 62 ) facing the display output for directing different display panel pixel outputs in different directions and a second lenticular lens array ( 64 ) on the opposite side of the display panel ( 62 ), facing the backlight ( 66 ), for providing collimation of the striped back-light output.1. An autostereoscopic display device comprising: a backlight; a display panel comprising rows and columns of pixels; and a lenticular arrangement, characterised in that the backlight provides a striped output comprising stripes in the column direction or offset by an acute angle to the column direction, and in that the lenticular arrangement comprises a first lenticular lens array on the side of the display panel facing the display output for directing different display panel pixel outputs in different directions and a second lenticular lens array on the opposite side of the display panel, facing the backlight, for providing collimation of the striped backlight output. 2. A device as claimed in claim 1, wherein the first lenticular arrangement is negative. 3. A device as claimed in claim 1, wherein the second lenticular arrangement is positive. 4. A device as claimed in claim 1, wherein: tan   α 1 = tan   α 2 N , where α1 is the angular spread of light from the lenses of the first lenticular array, and α2 is the angle of the viewing cone of light to the lenses of the second lenticular array to give a collimated output, and N is a positive integer. 5. A device as claimed in claim 4, wherein: C  w 1 p 1 = N  w 2 p 2 . wherein w1 is the width of a sub-pixel of the display panel, p1 is the display panel pixel pitch, and w2 the width of a backlight stripe and p2 is the backlight stripe pitch, and wherein C is 1.0 or less. 6. A device as claimed in claim 5, wherein C is in the range 0.5 to 1.0. 7. A device as claimed in claim 4, wherein N=1. 8. A device as claimed in claim 4, wherein N>1. 9. A device as claimed in claim 8, wherein N=2. 10. A device as claimed in claim 8, further comprising a controller, which is adapted to: drive the display panel in a sequence of N subframes, each subframe being synchronised with illumination with a respective set of backlight stripes. 11. A device as claimed in claim 1, wherein the backlight stripes are slanted with respect to the display column direction. 12. A device as claimed in claim 11, wherein the first and second lenticular lens arrays have the lens axes slanted with respect to the display column direction, with the lens axes and the backlight stripes in parallel.
2,400
9,053
9,053
13,367,770
2,487
A video monitoring and analysis system detect subjects when they are entering and/or exiting from a room. The system enables a user to define a portal, such as doorway of the room. The system then monitors the movement of foreground objects in the room. Objects that appear only in the portal are classified as passing by the portal, e.g., doorway. Objects that initially appear in the portal and then are detected moving within the room are classified as having entered the room. Objects that are in the room and then disappear within the portal are classified as having exited the room. The system further has provisions for generating real-time alerts and performing forensic searches.
1. A method for monitoring a portal of an area being monitored with a video analysis system, comprising: enabling definition of an area of a background model of a scene as a portal; monitoring movement of foreground objects against the background model; and classifying foreground objects that first appear within the portal and then move out of the portal as entering the area being monitored. 2. A method as claimed in claim 1, wherein enabling the definition of the portal comprises an operator using a graphical user interface to identify portal within the scene. 3. A method as claimed in claim 1, wherein enabling the definition of the portal comprises analyzing video data to identify portals through which foreground objects enter and exit the area being monitored. 4. A method as claimed in claim 1, wherein monitoring movement of the foreground objects comprises tracking the foreground objects between frames of the video data and generating vectors indicating movement of the foreground objects. 5. A method as claimed in claim 1, further comprising classifying the foreground objects that first appear within the portal and then disappear within the portal as passing by the portal. 6. A method for monitoring a portal of an area being monitored with a video analysis system, comprising: enabling definition of an area of a background model of a scene as a portal; monitoring movement of foreground objects against the background model; and classifying foreground objects that pass into the portal and then disappear within the portal as exiting the area being monitored. 7. A method as claimed in claim 6, wherein enabling the definition of the portal comprises an operator using a graphical user interface to identify portal within the scene. 8. A method as claimed in claim 6, wherein enabling the definition of the portal comprises analyzing video data to identify portals through which foreground objects enter and exit the area being monitored. 9. A method as claimed in claim 6, wherein monitoring movement of the foreground objects comprises tracking the foreground objects between frames of the video data and generating vectors indicating movement of the foreground objects. 10. A method as claimed in claim 6, further comprising classifying the foreground objects that pass into the portal and then out of the portal but remain within the scene as moving within the area being monitored. 11. A video monitoring and analysis system comprising: at least one video camera generating video data of a scene of an area being monitored; a video data and metadata archive that stores the video data from the at least one video camera; and a video analysis system that receives video data from the at least one video camera and analyzes the video data, the video analysis system enabling definition of an area of a background model of the scene as a portal, and then monitoring movement of foreground objects against the background model, and generating and storing metadata to the video data and metadata archive indicating that the foreground objects have entered the area being monitored when the foreground objects first appear within the portal and then move out of the portal and remain in the scene. 12. A system as claimed in claim 11, wherein the video analysis system enables definition of the portal by an operator using a graphical user interface to identify portal of the area being monitored. 13. A system as claimed in claim 11, wherein the video analysis system analyzes video data from the at least one video camera to identify portals through which foreground objects enter and exit the area being monitored. 14. A system as claimed in claim 11, wherein the video analysis system tracks the foreground objects between frames of the video data and generates vectors indicating movement of the foreground objects in the scene. 15. A system as claimed in claim 11, further comprising classifying the foreground objects that first appear within the portal and then disappear within the portal as passing by the portal. 16. A video monitoring and analysis system comprising: at least one video camera generating video data of a scene of an area being monitored; a video data and metadata archive that stores the video data from the at least one video camera; and a video analysis system that receives video data from the at least one video camera and analyzes the video data, the video analysis system enabling definition of an area of a background model of the scene as a portal, and then monitoring movement of foreground objects against the background model, and generating and storing metadata to the video data and metadata archive indicating that the foreground objects have exited the area being monitored when the foreground objects pass into the portal and then disappear while in the portal. 17. A system as claimed in claim 16, wherein the video analysis system enables the definition of the portal by an operator using a graphical user interface to identify the portal within of the area being monitored. 18. A system as claimed in claim 16, wherein the video analysis system analyzes video data from the at least one video camera to identify portals through which foreground objects enter and exit the area being monitored. 19. A system as claimed in claim 16, wherein the video analysis system tracks the foreground objects between frames of the video data and generates vectors indicating movement of the foreground objects in the scene. 20. A system as claimed in claim 16, wherein the video analysis system classifies the foreground objects that first appear within the portal and then disappear within the portal as passing by the portal. 21. A system as claimed in claim 20, wherein the video analysis system generates metadata indicating that the foreground objects have passed by the portal.
A video monitoring and analysis system detect subjects when they are entering and/or exiting from a room. The system enables a user to define a portal, such as doorway of the room. The system then monitors the movement of foreground objects in the room. Objects that appear only in the portal are classified as passing by the portal, e.g., doorway. Objects that initially appear in the portal and then are detected moving within the room are classified as having entered the room. Objects that are in the room and then disappear within the portal are classified as having exited the room. The system further has provisions for generating real-time alerts and performing forensic searches.1. A method for monitoring a portal of an area being monitored with a video analysis system, comprising: enabling definition of an area of a background model of a scene as a portal; monitoring movement of foreground objects against the background model; and classifying foreground objects that first appear within the portal and then move out of the portal as entering the area being monitored. 2. A method as claimed in claim 1, wherein enabling the definition of the portal comprises an operator using a graphical user interface to identify portal within the scene. 3. A method as claimed in claim 1, wherein enabling the definition of the portal comprises analyzing video data to identify portals through which foreground objects enter and exit the area being monitored. 4. A method as claimed in claim 1, wherein monitoring movement of the foreground objects comprises tracking the foreground objects between frames of the video data and generating vectors indicating movement of the foreground objects. 5. A method as claimed in claim 1, further comprising classifying the foreground objects that first appear within the portal and then disappear within the portal as passing by the portal. 6. A method for monitoring a portal of an area being monitored with a video analysis system, comprising: enabling definition of an area of a background model of a scene as a portal; monitoring movement of foreground objects against the background model; and classifying foreground objects that pass into the portal and then disappear within the portal as exiting the area being monitored. 7. A method as claimed in claim 6, wherein enabling the definition of the portal comprises an operator using a graphical user interface to identify portal within the scene. 8. A method as claimed in claim 6, wherein enabling the definition of the portal comprises analyzing video data to identify portals through which foreground objects enter and exit the area being monitored. 9. A method as claimed in claim 6, wherein monitoring movement of the foreground objects comprises tracking the foreground objects between frames of the video data and generating vectors indicating movement of the foreground objects. 10. A method as claimed in claim 6, further comprising classifying the foreground objects that pass into the portal and then out of the portal but remain within the scene as moving within the area being monitored. 11. A video monitoring and analysis system comprising: at least one video camera generating video data of a scene of an area being monitored; a video data and metadata archive that stores the video data from the at least one video camera; and a video analysis system that receives video data from the at least one video camera and analyzes the video data, the video analysis system enabling definition of an area of a background model of the scene as a portal, and then monitoring movement of foreground objects against the background model, and generating and storing metadata to the video data and metadata archive indicating that the foreground objects have entered the area being monitored when the foreground objects first appear within the portal and then move out of the portal and remain in the scene. 12. A system as claimed in claim 11, wherein the video analysis system enables definition of the portal by an operator using a graphical user interface to identify portal of the area being monitored. 13. A system as claimed in claim 11, wherein the video analysis system analyzes video data from the at least one video camera to identify portals through which foreground objects enter and exit the area being monitored. 14. A system as claimed in claim 11, wherein the video analysis system tracks the foreground objects between frames of the video data and generates vectors indicating movement of the foreground objects in the scene. 15. A system as claimed in claim 11, further comprising classifying the foreground objects that first appear within the portal and then disappear within the portal as passing by the portal. 16. A video monitoring and analysis system comprising: at least one video camera generating video data of a scene of an area being monitored; a video data and metadata archive that stores the video data from the at least one video camera; and a video analysis system that receives video data from the at least one video camera and analyzes the video data, the video analysis system enabling definition of an area of a background model of the scene as a portal, and then monitoring movement of foreground objects against the background model, and generating and storing metadata to the video data and metadata archive indicating that the foreground objects have exited the area being monitored when the foreground objects pass into the portal and then disappear while in the portal. 17. A system as claimed in claim 16, wherein the video analysis system enables the definition of the portal by an operator using a graphical user interface to identify the portal within of the area being monitored. 18. A system as claimed in claim 16, wherein the video analysis system analyzes video data from the at least one video camera to identify portals through which foreground objects enter and exit the area being monitored. 19. A system as claimed in claim 16, wherein the video analysis system tracks the foreground objects between frames of the video data and generates vectors indicating movement of the foreground objects in the scene. 20. A system as claimed in claim 16, wherein the video analysis system classifies the foreground objects that first appear within the portal and then disappear within the portal as passing by the portal. 21. A system as claimed in claim 20, wherein the video analysis system generates metadata indicating that the foreground objects have passed by the portal.
2,400
9,054
9,054
15,368,776
2,456
A detection is made that a first handshake packet has been received from a data processing system at a first system. The first system participates in a load-balanced group managed by a load-balancer. A value is obtained of a metric configured in the first system. from a set of delay functions, a delay function that corresponds to the metric is selected. Using the value of the metric in the selected delay function, a delay period is computed. A transmission of a second handshake packet is delayed for at least the delay period. An intentionally delayed transmission of the second handshake packet is caused after the delay period from the first system to the data processing system.
1. A method comprising: detecting receiving from a data processing system a first handshake packet at a first system, the first system participating in a load-balanced group managed by a load-balancer; obtaining a value of a metric configured in the first system; selecting, from a set of delay functions, a delay function that corresponds to the metric; computing, using the value of the metric in the selected delay function, a delay period; preventing a transmission of a second handshake packet for at least the delay period; and causing, from the first system to the data processing system, an intentionally delayed transmission of the second handshake packet after the delay period. 2. The method of claim 1, wherein the delay period is independent of any delay that is a consequence of a delay-causing condition in the first system. 3. The method of claim 1, wherein the delay period is independent of any delay that is a consequence of a delay-causing condition in a data network path between the first system and the load balancer. 4. The method of claim 1, wherein the set of delay functions comprises a different delay function, wherein the different delay function corresponds to a different metric. 5. The method of claim 1, wherein the selected delay function further corresponds to a range of values of the metric, wherein the obtained value of the metric is in the range of values. 6. The method of claim 1, further comprising: selecting the metric according to a condition prevailing in the first system, wherein the value of the metric is a current value of the metric measured at a present time in the first system. 7. The method of claim 6, wherein the condition prevailing in the first system comprises: a highest priority of a workload being processed by the first system at the present time. 8. The method of claim 6, wherein the condition prevailing in the first system comprises: a restriction in effect at the first system at the present time. 9. The method of claim 6, wherein the condition prevailing in the first system comprises: a utilization level reached by a component of the first system at the present time. 10. The method of claim 1, further comprising: selecting the metric according to a condition forecasted in the first system, wherein the value of the metric is a predicted value of the metric expected at a future time in the first system. 11. The method of claim 10, wherein the condition forecasted in the first system comprises: a highest priority of a workload expected to be processed by the first system at the future time. 12. The method of claim 10, wherein the condition forecasted in the first system comprises: a restriction forecasted to be in effect at the first system at the future time. 13. The method of claim 10, wherein the condition forecasted in the first system comprises: a utilization level predicted to be reached by a component of the first system at the future time. 14. The method of claim 1, wherein the first handshake packet is a synchronization (SYN) request packet used in Transmission Control Protocol (TCP) handshake procedure, and wherein the second handshake packet is a synchronization-acknowledgement (SYN-ACK) request packet used in the TCP handshake procedure. 15. The method of claim 1, wherein the data processing system is the load-balancer. 16. The method of claim 1, further comprising: determining, as a part of obtaining the value of the metric, a previous delay period, wherein the metric comprises the previous delay period, the previous delay period having been set by the first system in a previous second handshake packet at a past time; and computing, as a part of computing the delay period, an adjustment to apply to the previous delay period, the previous delay period and the adjustment together forming the delay period. 17. A computer usable program product comprising one or more computer-readable storage devices, and program instructions stored on at least one of the one or more storage devices, the stored program instructions comprising: program instructions to detect receiving from a data processing system a first handshake packet at a first system, the first system participating in a load-balanced group managed by a load-balancer; program instructions to obtain a value of a metric configured in the first system; program instructions to select, from a set of delay functions, a delay function that corresponds to the metric; program instructions to compute, using the value of the metric in the selected delay function, a delay period; program instructions to prevent a transmission of a second handshake packet for at least the delay period; and program instructions to cause, from the first system to the data processing system, an intentionally delayed transmission of the second handshake packet after the delay period. 18. The computer usable program product of claim 17, wherein the computer usable code is stored in a computer readable storage device in a data processing system, and wherein the computer usable code is transferred over a network from a remote data processing system. 19. The computer usable program product of claim 15, wherein the computer usable code is stored in a computer readable storage device in a server data processing system, and wherein the computer usable code is downloaded over a network to a remote data processing system for use in a computer readable storage device associated with the remote data processing system. 20. A computer system comprising one or more processors, one or more computer-readable memories, and one or more computer-readable storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the stored program instructions comprising: program instructions to detect receiving from a data processing system a first handshake packet at a first system, the first system participating in a load-balanced group managed by a load-balancer; program instructions to obtain a value of a metric configured in the first system; program instructions to select, from a set of delay functions, a delay function that corresponds to the metric; program instructions to compute, using the value of the metric in the selected delay function, a delay period; program instructions to prevent a transmission of a second handshake packet for at least the delay period; and program instructions to cause, from the first system to the data processing system, an intentionally delayed transmission of the second handshake packet after the delay period.
A detection is made that a first handshake packet has been received from a data processing system at a first system. The first system participates in a load-balanced group managed by a load-balancer. A value is obtained of a metric configured in the first system. from a set of delay functions, a delay function that corresponds to the metric is selected. Using the value of the metric in the selected delay function, a delay period is computed. A transmission of a second handshake packet is delayed for at least the delay period. An intentionally delayed transmission of the second handshake packet is caused after the delay period from the first system to the data processing system.1. A method comprising: detecting receiving from a data processing system a first handshake packet at a first system, the first system participating in a load-balanced group managed by a load-balancer; obtaining a value of a metric configured in the first system; selecting, from a set of delay functions, a delay function that corresponds to the metric; computing, using the value of the metric in the selected delay function, a delay period; preventing a transmission of a second handshake packet for at least the delay period; and causing, from the first system to the data processing system, an intentionally delayed transmission of the second handshake packet after the delay period. 2. The method of claim 1, wherein the delay period is independent of any delay that is a consequence of a delay-causing condition in the first system. 3. The method of claim 1, wherein the delay period is independent of any delay that is a consequence of a delay-causing condition in a data network path between the first system and the load balancer. 4. The method of claim 1, wherein the set of delay functions comprises a different delay function, wherein the different delay function corresponds to a different metric. 5. The method of claim 1, wherein the selected delay function further corresponds to a range of values of the metric, wherein the obtained value of the metric is in the range of values. 6. The method of claim 1, further comprising: selecting the metric according to a condition prevailing in the first system, wherein the value of the metric is a current value of the metric measured at a present time in the first system. 7. The method of claim 6, wherein the condition prevailing in the first system comprises: a highest priority of a workload being processed by the first system at the present time. 8. The method of claim 6, wherein the condition prevailing in the first system comprises: a restriction in effect at the first system at the present time. 9. The method of claim 6, wherein the condition prevailing in the first system comprises: a utilization level reached by a component of the first system at the present time. 10. The method of claim 1, further comprising: selecting the metric according to a condition forecasted in the first system, wherein the value of the metric is a predicted value of the metric expected at a future time in the first system. 11. The method of claim 10, wherein the condition forecasted in the first system comprises: a highest priority of a workload expected to be processed by the first system at the future time. 12. The method of claim 10, wherein the condition forecasted in the first system comprises: a restriction forecasted to be in effect at the first system at the future time. 13. The method of claim 10, wherein the condition forecasted in the first system comprises: a utilization level predicted to be reached by a component of the first system at the future time. 14. The method of claim 1, wherein the first handshake packet is a synchronization (SYN) request packet used in Transmission Control Protocol (TCP) handshake procedure, and wherein the second handshake packet is a synchronization-acknowledgement (SYN-ACK) request packet used in the TCP handshake procedure. 15. The method of claim 1, wherein the data processing system is the load-balancer. 16. The method of claim 1, further comprising: determining, as a part of obtaining the value of the metric, a previous delay period, wherein the metric comprises the previous delay period, the previous delay period having been set by the first system in a previous second handshake packet at a past time; and computing, as a part of computing the delay period, an adjustment to apply to the previous delay period, the previous delay period and the adjustment together forming the delay period. 17. A computer usable program product comprising one or more computer-readable storage devices, and program instructions stored on at least one of the one or more storage devices, the stored program instructions comprising: program instructions to detect receiving from a data processing system a first handshake packet at a first system, the first system participating in a load-balanced group managed by a load-balancer; program instructions to obtain a value of a metric configured in the first system; program instructions to select, from a set of delay functions, a delay function that corresponds to the metric; program instructions to compute, using the value of the metric in the selected delay function, a delay period; program instructions to prevent a transmission of a second handshake packet for at least the delay period; and program instructions to cause, from the first system to the data processing system, an intentionally delayed transmission of the second handshake packet after the delay period. 18. The computer usable program product of claim 17, wherein the computer usable code is stored in a computer readable storage device in a data processing system, and wherein the computer usable code is transferred over a network from a remote data processing system. 19. The computer usable program product of claim 15, wherein the computer usable code is stored in a computer readable storage device in a server data processing system, and wherein the computer usable code is downloaded over a network to a remote data processing system for use in a computer readable storage device associated with the remote data processing system. 20. A computer system comprising one or more processors, one or more computer-readable memories, and one or more computer-readable storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the stored program instructions comprising: program instructions to detect receiving from a data processing system a first handshake packet at a first system, the first system participating in a load-balanced group managed by a load-balancer; program instructions to obtain a value of a metric configured in the first system; program instructions to select, from a set of delay functions, a delay function that corresponds to the metric; program instructions to compute, using the value of the metric in the selected delay function, a delay period; program instructions to prevent a transmission of a second handshake packet for at least the delay period; and program instructions to cause, from the first system to the data processing system, an intentionally delayed transmission of the second handshake packet after the delay period.
2,400
9,055
9,055
15,807,622
2,485
Video decoding may include transform coefficient continuity smoothing, which may include coefficient continuity smoothing, defined correlation coefficient smoothing, pixel range projection, and luminance correlated chrominance resampling. Coefficient continuity smoothing may include obtaining encoded block data from the encoded bitstream, the encoded block data corresponding to a current block from the reconstructed frame, and generating reconstructed block data for the current block based on the encoded block data using transform coefficient continuity smoothing. Transform coefficient continuity smoothing may include, for a block boundary of the current block, in response to a determination that adjacent block data corresponding to an adjacent block spatially adjacent to the current block along the block boundary is available, performing transform coefficient continuity smoothing based on the current block, the adjacent block, and the block boundary, and including the reconstructed block data in the reconstructed frame, and outputting the reconstructed frame.
1. A method comprising: generating, by a processor executing instructions stored on a non-transitory computer-readable medium, a reconstructed frame by decoding an encoded bitstream, wherein decoding includes: obtaining encoded block data from the encoded bitstream, the encoded block data corresponding to a current block from the reconstructed frame; generating reconstructed block data for the current block based on the encoded block data using transform coefficient continuity smoothing, wherein transform coefficient continuity smoothing includes: for a block boundary of the current block: in response to a determination that adjacent block data corresponding to an adjacent block spatially adjacent to the current block along the block boundary is available, performing transform coefficient continuity smoothing based on the current block, the adjacent block, and the block boundary; and including the reconstructed block data in the reconstructed frame; and outputting the reconstructed frame. 2. The method of claim 1, wherein: obtaining the encoded block data from the encoded bitstream includes obtaining two-dimensional transform coefficients for the current block from the encoded bitstream; and performing transform coefficient continuity smoothing based on the current block and the adjacent block includes: determining one-dimensional transform coefficients for the current block based on the block boundary and the two-dimensional transform coefficients for the current block; and determining intermediate two-dimensional transform coefficients for the current block based on the two-dimensional transform coefficients for the current block and a difference between the one-dimensional transform coefficients for the current block and one-dimensional transform coefficients for the adjacent block. 3. The method of claim 2, wherein determining the one-dimensional transform coefficients for the current block includes: in response to a determination that the block boundary corresponds with a left edge of the current block, for a current row from the two-dimensional transform coefficients for the current block determining a sum of two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the current block as a left one-dimensional transform coefficient for a corresponding row from the left one-dimensional transform coefficients for the current block; in response to a determination that the block boundary corresponds with a right edge of the current block, for the current row from the two-dimensional transform coefficients for the current block determining the sum of the two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the current block as a right one-dimensional transform coefficient for a corresponding row from the right one-dimensional transform coefficients for the current block using alternating sign summation; in response to a determination that the block boundary corresponds with a top edge of the current block, for a current column from the two-dimensional transform coefficients for the current block determining a sum of two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the current block as a top one-dimensional transform coefficient for a corresponding column from the top one-dimensional transform coefficients for the current block; and in response to a determination that the block boundary corresponds with a bottom edge of the current block, for the current column from the two-dimensional transform coefficients for the current block determining the sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the current block as a bottom one-dimensional transform coefficient for a corresponding column from the bottom one-dimensional transform coefficients for the current block using alternating sign summation. 4. The method of claim 3, wherein performing transform coefficient continuity smoothing based on the current block and the adjacent block includes: obtaining two-dimensional transform coefficients for the adjacent block; and determining the one-dimensional transform coefficients for the adjacent block based on the block boundary and the two-dimensional transform coefficients for the adjacent block, wherein determining the one-dimensional transform coefficients for the adjacent block includes: in response to the determination that the block boundary corresponds with the left edge of the current block, for a current row from the two-dimensional transform coefficients for the adjacent block determining a sum of two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the adjacent block as a right one-dimensional transform coefficient for a corresponding row from the right one-dimensional transform coefficients for the adjacent block using alternating sign summation; in response to the determination that the block boundary corresponds with the right edge of the current block, for the current row from the two-dimensional transform coefficients for the adjacent block determining the sum of the two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the adjacent block as a left one-dimensional transform coefficient for a corresponding row from the left one-dimensional transform coefficients for the adjacent block; in response to the determination that the block boundary corresponds with the top edge of the current block, for a current column from the two-dimensional transform coefficients for the adjacent block determining a sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the adjacent block as a bottom one-dimensional transform coefficient for a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block using alternating sign summation; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, for the current column from the two-dimensional transform coefficients for the adjacent block determining the sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the adjacent block as a top one-dimensional transform coefficient for a corresponding column from the top one-dimensional transform coefficients for the adjacent block. 5. The method of claim 4, wherein determining the intermediate two-dimensional transform coefficients for the current block includes: for a current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block, the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block spatially corresponding to the current row from the two-dimensional transform coefficients for the current block and a current column from the two-dimensional transform coefficients for the current block: in response to the determination that the block boundary corresponds with the left edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by a fraction of a difference between a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the current block and a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the adj acent block; in response to the determination that the block boundary corresponds with the right edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the current block and a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the adjacent block using alternating sign multiplication; in response to the determination that the block boundary corresponds with the top edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the current block and a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the current block and a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the adjacent block using alternating sign multiplication. 6. The method of claim 4, wherein generating reconstructed block data for the current block includes generating partially reconstructed block data for the adjacent block by: determining intermediate two-dimensional transform coefficients for the adjacent block based on the two-dimensional transform coefficients for the adjacent block and the difference between the one-dimensional transform coefficients for the current block and the one-dimensional transform coefficients for the adjacent block. 7. The method of claim 6, wherein determining the intermediate two-dimensional transform coefficients for the adjacent block includes: for a current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block, the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block spatially corresponding to the current row from the two-dimensional transform coefficients for the adjacent block and a current column from the two-dimensional transform coefficients for the adjacent block: in response to the determination that the block boundary corresponds with the left edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the adjacent block and a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the current block using alternating sign multiplication; in response to the determination that the block boundary corresponds with the right edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the adjacent block and a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the current block; in response to the determination that the block boundary corresponds with the top edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block and a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the current block using alternating sign multiplication; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the adjacent block and a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the current block. 8. The method of claim 6, wherein generating the partially reconstructed block data for the adjacent block includes: generating partially reconstructed two-dimensional transform coefficients for the adjacent block based on the intermediate two-dimensional transform coefficients for the adjacent block and corresponding quantization thresholds; and including the partially reconstructed two-dimensional transform coefficients for the adjacent block in the partially reconstructed block data for the adjacent block. 9. The method of claim 2, wherein transform coefficient continuity smoothing based on the two-dimensional transform coefficients for the current block from the encoded bitstream includes: generating partially reconstructed two-dimensional transform coefficients for the current block based on the intermediate two-dimensional transform coefficients for the current block and corresponding quantization thresholds; and including the partially reconstructed two-dimensional transform coefficients in the reconstructed block data for the current block. 10. A decoder comprising: a non-transitory computer-readable memory including instructions for generating a reconstructed frame by decoding an encoded bitstream; and a processor, operatively coupled to the non-transitory computer-readable memory, for receiving the instructions from the non-transitory computer-readable memory and executing the instructions to: obtain encoded block data from the encoded bitstream, the encoded block data corresponding to a current block from the reconstructed frame; generate reconstructed block data for the current block based on the encoded block data using transform coefficient continuity smoothing, wherein transform coefficient continuity smoothing includes: for a block boundary of the current block: in response to a determination that adjacent block data corresponding to an adjacent block spatially adjacent to the current block along the block boundary is available, performing transform coefficient continuity smoothing based on the current block, the adjacent block, and the block boundary; and include the reconstructed block data in the reconstructed frame; and output the reconstructed frame. 11. The decoder of claim 10, wherein the processor is configured to: obtain the encoded block data from the encoded bitstream by obtaining two-dimensional transform coefficients for the current block from the encoded bitstream; and perform transform coefficient continuity smoothing based on the current block and the adjacent block by: determining one-dimensional transform coefficients for the current block based on the block boundary and the two-dimensional transform coefficients for the current block; and determining intermediate two-dimensional transform coefficients for the current block based on the two-dimensional transform coefficients for the current block and a difference between the one-dimensional transform coefficients for the current block and one-dimensional transform coefficients for the adjacent block. 12. The decoder of claim 11, wherein the processor is configured to determine the one-dimensional transform coefficients for the current block by: in response to a determination that the block boundary corresponds with a left edge of the current block, for a current row from the two-dimensional transform coefficients for the current block determining a sum of two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the current block as a left one-dimensional transform coefficient for a corresponding row from the left one-dimensional transform coefficients for the current block; in response to a determination that the block boundary corresponds with a right edge of the current block, for the current row from the two-dimensional transform coefficients for the current block determining the sum of the two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the current block as a right one-dimensional transform coefficient for a corresponding row from the right one-dimensional transform coefficients for the current block using alternating sign summation; in response to a determination that the block boundary corresponds with a top edge of the current block, for a current column from the two-dimensional transform coefficients for the current block determining a sum of two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the current block as a top one-dimensional transform coefficient for a corresponding column from the top one-dimensional transform coefficients for the current block; and in response to a determination that the block boundary corresponds with a bottom edge of the current block, for the current column from the two-dimensional transform coefficients for the current block determining the sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the current block as a bottom one-dimensional transform coefficient for a corresponding column from the bottom one-dimensional transform coefficients for the current block using alternating sign summation. 13. The decoder of claim 12, wherein the processor is configured to perform transform coefficient continuity smoothing based on the current block and the adjacent block by: obtaining two-dimensional transform coefficients for the adjacent block; and determining the one-dimensional transform coefficients for the adjacent block based on the block boundary and the two-dimensional transform coefficients for the adjacent block, wherein determining the one-dimensional transform coefficients for the adjacent block includes: in response to the determination that the block boundary corresponds with the left edge of the current block, for a current row from the two-dimensional transform coefficients for the adjacent block determining a sum of two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the adjacent block as a right one-dimensional transform coefficient for a corresponding row from the right one-dimensional transform coefficients for the adjacent block using alternating sign summation; in response to the determination that the block boundary corresponds with the right edge of the current block, for the current row from the two-dimensional transform coefficients for the adjacent block determining the sum of the two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the adjacent block as a left one-dimensional transform coefficient for a corresponding row from the left one-dimensional transform coefficients for the adjacent block; in response to the determination that the block boundary corresponds with the top edge of the current block, for a current column from the two-dimensional transform coefficients for the adjacent block determining a sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the adjacent block as a bottom one-dimensional transform coefficient for a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block using alternating sign summation; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, for the current column from the two-dimensional transform coefficients for the adjacent block determining the sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the adjacent block as a top one-dimensional transform coefficient for a corresponding column from the top one-dimensional transform coefficients for the adjacent block. 14. The decoder of claim 13, wherein the processor is configured to determine the intermediate two-dimensional transform coefficients for the current block by: for a current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block, the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block spatially corresponding to the current row from the two-dimensional transform coefficients for the current block and a current column from the two-dimensional transform coefficients for the current block: in response to the determination that the block boundary corresponds with the left edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by a fraction of a difference between a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the current block and a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the adj acent block; in response to the determination that the block boundary corresponds with the right edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the current block and a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the adjacent block using alternating sign multiplication; in response to the determination that the block boundary corresponds with the top edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the current block and a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the current block and a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the adjacent block using alternating sign multiplication. 15. The decoder of claim 13, wherein the processor is configured to generate reconstructed block data for the current block includes generating partially reconstructed block data for the adjacent block by: determining intermediate two-dimensional transform coefficients for the adjacent block based on the two-dimensional transform coefficients for the adjacent block and the difference between the one-dimensional transform coefficients for the current block and the one-dimensional transform coefficients for the adjacent block. 16. The decoder of claim 15, wherein the processor is configured to determine the intermediate two-dimensional transform coefficients for the adjacent block by: for a current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block, the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block spatially corresponding to the current row from the two-dimensional transform coefficients for the adjacent block and a current column from the two-dimensional transform coefficients for the adjacent block: in response to the determination that the block boundary corresponds with the left edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the adjacent block and a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the current block using alternating sign multiplication; in response to the determination that the block boundary corresponds with the right edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the adjacent block and a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the current block; in response to the determination that the block boundary corresponds with the top edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block and a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the current block using alternating sign multiplication; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the adjacent block and a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the current block. 17. The decoder of claim 15, wherein the processor is configured to generate the partially reconstructed block data for the adjacent block by: generating partially reconstructed two-dimensional transform coefficients for the adjacent block based on the intermediate two-dimensional transform coefficients for the adjacent block and corresponding quantization thresholds; and including the partially reconstructed two-dimensional transform coefficients for the adjacent block in the partially reconstructed block data for the adjacent block. 18. The decoder of claim 11, wherein the processor is configured to perform transform coefficient continuity smoothing based on the two-dimensional transform coefficients for the current block from the encoded bitstream by: generating partially reconstructed two-dimensional transform coefficients for the current block based on the intermediate two-dimensional transform coefficients for the current block and corresponding quantization thresholds; and including the partially reconstructed two-dimensional transform coefficients in the reconstructed block data for the current block. 19. A method comprising: generating, by a processor executing instructions stored on a non-transitory computer-readable medium, a reconstructed frame by decoding an encoded bitstream, wherein decoding includes: obtaining encoded block data from the encoded bitstream, the encoded block data corresponding to a current block from the reconstructed frame and including two-dimensional transform coefficients for the current block; generating reconstructed block data for the current block based on the encoded block data using transform coefficient continuity smoothing, wherein transform coefficient continuity smoothing includes: for a block boundary of the current block: in response to a determination that adjacent block data corresponding to an adjacent block spatially adjacent to the current block along the block boundary is available, performing transform coefficient continuity smoothing based on the current block, the adjacent block, and the block boundary, wherein performing transform coefficient continuity smoothing based on the current block and the adjacent block includes:  determining one-dimensional transform coefficients for the current block based on the block boundary and the two-dimensional transform coefficients for the current block; and  determining intermediate two-dimensional transform coefficients for the current block based on the two-dimensional transform coefficients for the current block and a difference between the one-dimensional transform coefficients for the current block and one-dimensional transform coefficients for the adjacent block; and including the reconstructed block data in the reconstructed frame; and outputting the reconstructed frame. 20. The method of claim 19, wherein transform coefficient continuity smoothing based on the two-dimensional transform coefficients for the current block from the encoded bitstream includes: generating partially reconstructed two-dimensional transform coefficients for the current block based on the intermediate two-dimensional transform coefficients for the current block and corresponding quantization thresholds; and including the partially reconstructed two-dimensional transform coefficients in the reconstructed block data for the current block.
Video decoding may include transform coefficient continuity smoothing, which may include coefficient continuity smoothing, defined correlation coefficient smoothing, pixel range projection, and luminance correlated chrominance resampling. Coefficient continuity smoothing may include obtaining encoded block data from the encoded bitstream, the encoded block data corresponding to a current block from the reconstructed frame, and generating reconstructed block data for the current block based on the encoded block data using transform coefficient continuity smoothing. Transform coefficient continuity smoothing may include, for a block boundary of the current block, in response to a determination that adjacent block data corresponding to an adjacent block spatially adjacent to the current block along the block boundary is available, performing transform coefficient continuity smoothing based on the current block, the adjacent block, and the block boundary, and including the reconstructed block data in the reconstructed frame, and outputting the reconstructed frame.1. A method comprising: generating, by a processor executing instructions stored on a non-transitory computer-readable medium, a reconstructed frame by decoding an encoded bitstream, wherein decoding includes: obtaining encoded block data from the encoded bitstream, the encoded block data corresponding to a current block from the reconstructed frame; generating reconstructed block data for the current block based on the encoded block data using transform coefficient continuity smoothing, wherein transform coefficient continuity smoothing includes: for a block boundary of the current block: in response to a determination that adjacent block data corresponding to an adjacent block spatially adjacent to the current block along the block boundary is available, performing transform coefficient continuity smoothing based on the current block, the adjacent block, and the block boundary; and including the reconstructed block data in the reconstructed frame; and outputting the reconstructed frame. 2. The method of claim 1, wherein: obtaining the encoded block data from the encoded bitstream includes obtaining two-dimensional transform coefficients for the current block from the encoded bitstream; and performing transform coefficient continuity smoothing based on the current block and the adjacent block includes: determining one-dimensional transform coefficients for the current block based on the block boundary and the two-dimensional transform coefficients for the current block; and determining intermediate two-dimensional transform coefficients for the current block based on the two-dimensional transform coefficients for the current block and a difference between the one-dimensional transform coefficients for the current block and one-dimensional transform coefficients for the adjacent block. 3. The method of claim 2, wherein determining the one-dimensional transform coefficients for the current block includes: in response to a determination that the block boundary corresponds with a left edge of the current block, for a current row from the two-dimensional transform coefficients for the current block determining a sum of two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the current block as a left one-dimensional transform coefficient for a corresponding row from the left one-dimensional transform coefficients for the current block; in response to a determination that the block boundary corresponds with a right edge of the current block, for the current row from the two-dimensional transform coefficients for the current block determining the sum of the two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the current block as a right one-dimensional transform coefficient for a corresponding row from the right one-dimensional transform coefficients for the current block using alternating sign summation; in response to a determination that the block boundary corresponds with a top edge of the current block, for a current column from the two-dimensional transform coefficients for the current block determining a sum of two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the current block as a top one-dimensional transform coefficient for a corresponding column from the top one-dimensional transform coefficients for the current block; and in response to a determination that the block boundary corresponds with a bottom edge of the current block, for the current column from the two-dimensional transform coefficients for the current block determining the sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the current block as a bottom one-dimensional transform coefficient for a corresponding column from the bottom one-dimensional transform coefficients for the current block using alternating sign summation. 4. The method of claim 3, wherein performing transform coefficient continuity smoothing based on the current block and the adjacent block includes: obtaining two-dimensional transform coefficients for the adjacent block; and determining the one-dimensional transform coefficients for the adjacent block based on the block boundary and the two-dimensional transform coefficients for the adjacent block, wherein determining the one-dimensional transform coefficients for the adjacent block includes: in response to the determination that the block boundary corresponds with the left edge of the current block, for a current row from the two-dimensional transform coefficients for the adjacent block determining a sum of two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the adjacent block as a right one-dimensional transform coefficient for a corresponding row from the right one-dimensional transform coefficients for the adjacent block using alternating sign summation; in response to the determination that the block boundary corresponds with the right edge of the current block, for the current row from the two-dimensional transform coefficients for the adjacent block determining the sum of the two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the adjacent block as a left one-dimensional transform coefficient for a corresponding row from the left one-dimensional transform coefficients for the adjacent block; in response to the determination that the block boundary corresponds with the top edge of the current block, for a current column from the two-dimensional transform coefficients for the adjacent block determining a sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the adjacent block as a bottom one-dimensional transform coefficient for a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block using alternating sign summation; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, for the current column from the two-dimensional transform coefficients for the adjacent block determining the sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the adjacent block as a top one-dimensional transform coefficient for a corresponding column from the top one-dimensional transform coefficients for the adjacent block. 5. The method of claim 4, wherein determining the intermediate two-dimensional transform coefficients for the current block includes: for a current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block, the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block spatially corresponding to the current row from the two-dimensional transform coefficients for the current block and a current column from the two-dimensional transform coefficients for the current block: in response to the determination that the block boundary corresponds with the left edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by a fraction of a difference between a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the current block and a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the adj acent block; in response to the determination that the block boundary corresponds with the right edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the current block and a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the adjacent block using alternating sign multiplication; in response to the determination that the block boundary corresponds with the top edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the current block and a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the current block and a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the adjacent block using alternating sign multiplication. 6. The method of claim 4, wherein generating reconstructed block data for the current block includes generating partially reconstructed block data for the adjacent block by: determining intermediate two-dimensional transform coefficients for the adjacent block based on the two-dimensional transform coefficients for the adjacent block and the difference between the one-dimensional transform coefficients for the current block and the one-dimensional transform coefficients for the adjacent block. 7. The method of claim 6, wherein determining the intermediate two-dimensional transform coefficients for the adjacent block includes: for a current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block, the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block spatially corresponding to the current row from the two-dimensional transform coefficients for the adjacent block and a current column from the two-dimensional transform coefficients for the adjacent block: in response to the determination that the block boundary corresponds with the left edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the adjacent block and a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the current block using alternating sign multiplication; in response to the determination that the block boundary corresponds with the right edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the adjacent block and a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the current block; in response to the determination that the block boundary corresponds with the top edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block and a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the current block using alternating sign multiplication; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the adjacent block and a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the current block. 8. The method of claim 6, wherein generating the partially reconstructed block data for the adjacent block includes: generating partially reconstructed two-dimensional transform coefficients for the adjacent block based on the intermediate two-dimensional transform coefficients for the adjacent block and corresponding quantization thresholds; and including the partially reconstructed two-dimensional transform coefficients for the adjacent block in the partially reconstructed block data for the adjacent block. 9. The method of claim 2, wherein transform coefficient continuity smoothing based on the two-dimensional transform coefficients for the current block from the encoded bitstream includes: generating partially reconstructed two-dimensional transform coefficients for the current block based on the intermediate two-dimensional transform coefficients for the current block and corresponding quantization thresholds; and including the partially reconstructed two-dimensional transform coefficients in the reconstructed block data for the current block. 10. A decoder comprising: a non-transitory computer-readable memory including instructions for generating a reconstructed frame by decoding an encoded bitstream; and a processor, operatively coupled to the non-transitory computer-readable memory, for receiving the instructions from the non-transitory computer-readable memory and executing the instructions to: obtain encoded block data from the encoded bitstream, the encoded block data corresponding to a current block from the reconstructed frame; generate reconstructed block data for the current block based on the encoded block data using transform coefficient continuity smoothing, wherein transform coefficient continuity smoothing includes: for a block boundary of the current block: in response to a determination that adjacent block data corresponding to an adjacent block spatially adjacent to the current block along the block boundary is available, performing transform coefficient continuity smoothing based on the current block, the adjacent block, and the block boundary; and include the reconstructed block data in the reconstructed frame; and output the reconstructed frame. 11. The decoder of claim 10, wherein the processor is configured to: obtain the encoded block data from the encoded bitstream by obtaining two-dimensional transform coefficients for the current block from the encoded bitstream; and perform transform coefficient continuity smoothing based on the current block and the adjacent block by: determining one-dimensional transform coefficients for the current block based on the block boundary and the two-dimensional transform coefficients for the current block; and determining intermediate two-dimensional transform coefficients for the current block based on the two-dimensional transform coefficients for the current block and a difference between the one-dimensional transform coefficients for the current block and one-dimensional transform coefficients for the adjacent block. 12. The decoder of claim 11, wherein the processor is configured to determine the one-dimensional transform coefficients for the current block by: in response to a determination that the block boundary corresponds with a left edge of the current block, for a current row from the two-dimensional transform coefficients for the current block determining a sum of two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the current block as a left one-dimensional transform coefficient for a corresponding row from the left one-dimensional transform coefficients for the current block; in response to a determination that the block boundary corresponds with a right edge of the current block, for the current row from the two-dimensional transform coefficients for the current block determining the sum of the two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the current block as a right one-dimensional transform coefficient for a corresponding row from the right one-dimensional transform coefficients for the current block using alternating sign summation; in response to a determination that the block boundary corresponds with a top edge of the current block, for a current column from the two-dimensional transform coefficients for the current block determining a sum of two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the current block as a top one-dimensional transform coefficient for a corresponding column from the top one-dimensional transform coefficients for the current block; and in response to a determination that the block boundary corresponds with a bottom edge of the current block, for the current column from the two-dimensional transform coefficients for the current block determining the sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the current block as a bottom one-dimensional transform coefficient for a corresponding column from the bottom one-dimensional transform coefficients for the current block using alternating sign summation. 13. The decoder of claim 12, wherein the processor is configured to perform transform coefficient continuity smoothing based on the current block and the adjacent block by: obtaining two-dimensional transform coefficients for the adjacent block; and determining the one-dimensional transform coefficients for the adjacent block based on the block boundary and the two-dimensional transform coefficients for the adjacent block, wherein determining the one-dimensional transform coefficients for the adjacent block includes: in response to the determination that the block boundary corresponds with the left edge of the current block, for a current row from the two-dimensional transform coefficients for the adjacent block determining a sum of two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the adjacent block as a right one-dimensional transform coefficient for a corresponding row from the right one-dimensional transform coefficients for the adjacent block using alternating sign summation; in response to the determination that the block boundary corresponds with the right edge of the current block, for the current row from the two-dimensional transform coefficients for the adjacent block determining the sum of the two-dimensional transform coefficients from the current row from the two-dimensional transform coefficients for the adjacent block as a left one-dimensional transform coefficient for a corresponding row from the left one-dimensional transform coefficients for the adjacent block; in response to the determination that the block boundary corresponds with the top edge of the current block, for a current column from the two-dimensional transform coefficients for the adjacent block determining a sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the adjacent block as a bottom one-dimensional transform coefficient for a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block using alternating sign summation; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, for the current column from the two-dimensional transform coefficients for the adjacent block determining the sum of the two-dimensional transform coefficients from the current column from the two-dimensional transform coefficients for the adjacent block as a top one-dimensional transform coefficient for a corresponding column from the top one-dimensional transform coefficients for the adjacent block. 14. The decoder of claim 13, wherein the processor is configured to determine the intermediate two-dimensional transform coefficients for the current block by: for a current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block, the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block spatially corresponding to the current row from the two-dimensional transform coefficients for the current block and a current column from the two-dimensional transform coefficients for the current block: in response to the determination that the block boundary corresponds with the left edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by a fraction of a difference between a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the current block and a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the adj acent block; in response to the determination that the block boundary corresponds with the right edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the current block and a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the adjacent block using alternating sign multiplication; in response to the determination that the block boundary corresponds with the top edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the current block and a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the current block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the current block by the fraction of a difference between a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the current block and a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the adjacent block using alternating sign multiplication. 15. The decoder of claim 13, wherein the processor is configured to generate reconstructed block data for the current block includes generating partially reconstructed block data for the adjacent block by: determining intermediate two-dimensional transform coefficients for the adjacent block based on the two-dimensional transform coefficients for the adjacent block and the difference between the one-dimensional transform coefficients for the current block and the one-dimensional transform coefficients for the adjacent block. 16. The decoder of claim 15, wherein the processor is configured to determine the intermediate two-dimensional transform coefficients for the adjacent block by: for a current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block, the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block spatially corresponding to the current row from the two-dimensional transform coefficients for the adjacent block and a current column from the two-dimensional transform coefficients for the adjacent block: in response to the determination that the block boundary corresponds with the left edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the adjacent block and a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the current block using alternating sign multiplication; in response to the determination that the block boundary corresponds with the right edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a left one-dimensional transform coefficient from a corresponding row from the left one-dimensional transform coefficients for the adjacent block and a right one-dimensional transform coefficient from a corresponding row from the right one-dimensional transform coefficients for the current block; in response to the determination that the block boundary corresponds with the top edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying a corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the adjacent block and a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the current block using alternating sign multiplication; and in response to the determination that the block boundary corresponds with the bottom edge of the current block, determining the current intermediate two-dimensional transform coefficient from the intermediate two-dimensional transform coefficients for the adjacent block by multiplying the corresponding two-dimensional transform coefficient from the two-dimensional transform coefficients for the adjacent block by the fraction of a difference between a top one-dimensional transform coefficient from a corresponding column from the top one-dimensional transform coefficients for the adjacent block and a bottom one-dimensional transform coefficient from a corresponding column from the bottom one-dimensional transform coefficients for the current block. 17. The decoder of claim 15, wherein the processor is configured to generate the partially reconstructed block data for the adjacent block by: generating partially reconstructed two-dimensional transform coefficients for the adjacent block based on the intermediate two-dimensional transform coefficients for the adjacent block and corresponding quantization thresholds; and including the partially reconstructed two-dimensional transform coefficients for the adjacent block in the partially reconstructed block data for the adjacent block. 18. The decoder of claim 11, wherein the processor is configured to perform transform coefficient continuity smoothing based on the two-dimensional transform coefficients for the current block from the encoded bitstream by: generating partially reconstructed two-dimensional transform coefficients for the current block based on the intermediate two-dimensional transform coefficients for the current block and corresponding quantization thresholds; and including the partially reconstructed two-dimensional transform coefficients in the reconstructed block data for the current block. 19. A method comprising: generating, by a processor executing instructions stored on a non-transitory computer-readable medium, a reconstructed frame by decoding an encoded bitstream, wherein decoding includes: obtaining encoded block data from the encoded bitstream, the encoded block data corresponding to a current block from the reconstructed frame and including two-dimensional transform coefficients for the current block; generating reconstructed block data for the current block based on the encoded block data using transform coefficient continuity smoothing, wherein transform coefficient continuity smoothing includes: for a block boundary of the current block: in response to a determination that adjacent block data corresponding to an adjacent block spatially adjacent to the current block along the block boundary is available, performing transform coefficient continuity smoothing based on the current block, the adjacent block, and the block boundary, wherein performing transform coefficient continuity smoothing based on the current block and the adjacent block includes:  determining one-dimensional transform coefficients for the current block based on the block boundary and the two-dimensional transform coefficients for the current block; and  determining intermediate two-dimensional transform coefficients for the current block based on the two-dimensional transform coefficients for the current block and a difference between the one-dimensional transform coefficients for the current block and one-dimensional transform coefficients for the adjacent block; and including the reconstructed block data in the reconstructed frame; and outputting the reconstructed frame. 20. The method of claim 19, wherein transform coefficient continuity smoothing based on the two-dimensional transform coefficients for the current block from the encoded bitstream includes: generating partially reconstructed two-dimensional transform coefficients for the current block based on the intermediate two-dimensional transform coefficients for the current block and corresponding quantization thresholds; and including the partially reconstructed two-dimensional transform coefficients in the reconstructed block data for the current block.
2,400
9,056
9,056
15,761,835
2,496
A user equipment ( 18 ) is configured to receive an extensible authentication protocol, EAP, request ( 28 ) from a session management function, SMF, ( 14 ) that serves as an EAP authenticator for secondary authentication of the user equipment ( 18 ). The secondary authentication is authentication of the user equipment ( 18 ) in addition to primary authentication of the user equipment ( 18 ). The user equipment ( 18 ) is also configured to, responsive to the EAP request ( 28 ), transmit an EAP response ( 30 ) to the SMF ( 14 ).
1-38. (canceled) 39. A method for secondary authentication of a user equipment, wherein the method comprises: receiving, by the user equipment, an extensible authentication protocol, EAP, request from a session management function, SMF, that serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment; and responsive to the EAP request, transmitting an EAP response from the user equipment to the SMF. 40. The method of claim 39, wherein the SMF is configured to forward the EAP request and the EAP response between the user equipment and an EAP server that executes an EAP authentication method for the EAP authenticator. 41. The method of claim 40, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 42. The method of claim 40, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 43. The method of claim 39, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 44. The method of claim 39, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication. 45. A method for secondary authentication of a user equipment, wherein the method comprises: transmitting an extensible authentication protocol, EAP, request from a session management function, SMF, to a user equipment, wherein the SMF serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment; and responsive to the EAP request, receiving at the SMF an EAP response from the user equipment. 46. The method of claim 45, wherein the SMF is configured to forward the EAP request and the EAP response between the user equipment and an EAP server that executes an EAP authentication method for the EAP authenticator. 47. The method of claim 46, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 48. The method of claim 46, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 49. The method of claim 45, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 50. The method of claim 45, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication. 51. A method for secondary authentication of a user equipment, wherein the method comprises: transmitting an extensible authentication protocol, EAP, request from an EAP server to the user equipment via a session management function, SMF, wherein the SMF serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment and wherein the EAP server is configured to execute an EAP authentication method for the EAP authenticator; and responsive to the EAP request, receiving at the EAP server via the SMF an EAP response from the user equipment. 52. The method of claim 51, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 53. The method of claim 51, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 54. The method of claim 51, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 55. The method of claim 51, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication. 56. A user equipment comprising: processing circuitry and memory, the memory containing instructions executable by the processing circuitry whereby the user equipment is configured to: receive an extensible authentication protocol, EAP, request from a session management function (SMF) that serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment; and responsive to the EAP request, transmit an EAP response from the user equipment to the SMF. 57. The user equipment of claim 56, wherein the SMF is configured to forward the EAP request and the EAP response between the user equipment and an EAP server that executes an EAP authentication method for the EAP authenticator. 58. The user equipment of claim 19, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 59. The user equipment of claim 19, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 60. The user equipment of claim 56, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 61. The user equipment of claim 56, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication. 62. Network equipment configured for providing a session management function, SMF, wherein the control plane equipment comprises processing circuitry and memory, the memory containing instructions executable by the processing circuitry whereby the SMF is configured to: transmit an extensible authentication protocol, EAP, request from the SMF to a user equipment, wherein the SMF serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment; and responsive to the EAP request, receiving at the SMF an EAP response from the user equipment. 63. The network equipment of claim 62, wherein the SMF is configured to forward the EAP request and the EAP response between the user equipment and an EAP server that executes an EAP authentication method for the EAP authenticator. 64. The network equipment of claim 63, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is configured for use in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 65. The network equipment of claim 63, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 66. The network equipment of claim 62, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 67. The network equipment of claim 62, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication. 68. An extensible authentication protocol, EAP, server comprising: processing circuitry and memory, the memory containing instructions executable by the processing circuitry whereby the EAP server is configured to: transmit an EAP request from the EAP server to a user equipment via a session management function, SMF, that serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment and wherein the EAP server is configured to execute an EAP authentication method for the EAP authenticator; and responsive to the EAP request, receive at the EAP server via the SMF an EAP response from the user equipment. 69. The EAP server of claim 68, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is configured for use in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 70. The EAP server of claim 68, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 71. The EAP server of claim 68, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 72. The EAP server of claim 68, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication.
A user equipment ( 18 ) is configured to receive an extensible authentication protocol, EAP, request ( 28 ) from a session management function, SMF, ( 14 ) that serves as an EAP authenticator for secondary authentication of the user equipment ( 18 ). The secondary authentication is authentication of the user equipment ( 18 ) in addition to primary authentication of the user equipment ( 18 ). The user equipment ( 18 ) is also configured to, responsive to the EAP request ( 28 ), transmit an EAP response ( 30 ) to the SMF ( 14 ).1-38. (canceled) 39. A method for secondary authentication of a user equipment, wherein the method comprises: receiving, by the user equipment, an extensible authentication protocol, EAP, request from a session management function, SMF, that serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment; and responsive to the EAP request, transmitting an EAP response from the user equipment to the SMF. 40. The method of claim 39, wherein the SMF is configured to forward the EAP request and the EAP response between the user equipment and an EAP server that executes an EAP authentication method for the EAP authenticator. 41. The method of claim 40, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 42. The method of claim 40, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 43. The method of claim 39, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 44. The method of claim 39, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication. 45. A method for secondary authentication of a user equipment, wherein the method comprises: transmitting an extensible authentication protocol, EAP, request from a session management function, SMF, to a user equipment, wherein the SMF serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment; and responsive to the EAP request, receiving at the SMF an EAP response from the user equipment. 46. The method of claim 45, wherein the SMF is configured to forward the EAP request and the EAP response between the user equipment and an EAP server that executes an EAP authentication method for the EAP authenticator. 47. The method of claim 46, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 48. The method of claim 46, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 49. The method of claim 45, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 50. The method of claim 45, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication. 51. A method for secondary authentication of a user equipment, wherein the method comprises: transmitting an extensible authentication protocol, EAP, request from an EAP server to the user equipment via a session management function, SMF, wherein the SMF serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment and wherein the EAP server is configured to execute an EAP authentication method for the EAP authenticator; and responsive to the EAP request, receiving at the EAP server via the SMF an EAP response from the user equipment. 52. The method of claim 51, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 53. The method of claim 51, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 54. The method of claim 51, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 55. The method of claim 51, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication. 56. A user equipment comprising: processing circuitry and memory, the memory containing instructions executable by the processing circuitry whereby the user equipment is configured to: receive an extensible authentication protocol, EAP, request from a session management function (SMF) that serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment; and responsive to the EAP request, transmit an EAP response from the user equipment to the SMF. 57. The user equipment of claim 56, wherein the SMF is configured to forward the EAP request and the EAP response between the user equipment and an EAP server that executes an EAP authentication method for the EAP authenticator. 58. The user equipment of claim 19, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 59. The user equipment of claim 19, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 60. The user equipment of claim 56, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 61. The user equipment of claim 56, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication. 62. Network equipment configured for providing a session management function, SMF, wherein the control plane equipment comprises processing circuitry and memory, the memory containing instructions executable by the processing circuitry whereby the SMF is configured to: transmit an extensible authentication protocol, EAP, request from the SMF to a user equipment, wherein the SMF serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment; and responsive to the EAP request, receiving at the SMF an EAP response from the user equipment. 63. The network equipment of claim 62, wherein the SMF is configured to forward the EAP request and the EAP response between the user equipment and an EAP server that executes an EAP authentication method for the EAP authenticator. 64. The network equipment of claim 63, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is configured for use in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 65. The network equipment of claim 63, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 66. The network equipment of claim 62, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 67. The network equipment of claim 62, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication. 68. An extensible authentication protocol, EAP, server comprising: processing circuitry and memory, the memory containing instructions executable by the processing circuitry whereby the EAP server is configured to: transmit an EAP request from the EAP server to a user equipment via a session management function, SMF, that serves as an EAP authenticator for secondary authentication of the user equipment, wherein the secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment and wherein the EAP server is configured to execute an EAP authentication method for the EAP authenticator; and responsive to the EAP request, receive at the EAP server via the SMF an EAP response from the user equipment. 69. The EAP server of claim 68, wherein the user equipment and the SMF are configured for use in a wireless communication network, wherein the EAP server is configured for use in a data network with which the user equipment requests a user plane session, wherein the secondary authentication of the user equipment is authentication of the user equipment to establish the user plane session, wherein the secondary authentication is delegated by the wireless communication network to the data network. 70. The EAP server of claim 68, wherein the EAP request and the EAP response are transmitted between the SMF and the EAP server via a user plane function selected by the SMF. 71. The EAP server of claim 68, wherein the EAP request and the EAP response are encapsulated within respective non-access stratum (NAS) protocol messages between the SMF and the UE. 72. The EAP server of claim 68, wherein a session establishment request transmitted from the user equipment triggers the secondary authentication of the user equipment, wherein the session establishment request includes a secondary identity of the user equipment used for the secondary authentication, and wherein a session establishment response transmitted to the user equipment includes either an EAP success message indicating success of the secondary authentication or an EAP failure message indicating failure of the secondary authentication.
2,400
9,057
9,057
13,718,930
2,448
Systems, methods, and devices for transmitting a media stream are described herein. In some aspects, a device includes a state manager configured to generate state information for a portion of the media stream for a client requesting the media stream. The device further includes a transmitter configured to transmit information identifying the media stream to the client, the information identifying the media stream including the generated state information. The device also includes a receiver configured to receive the state information from the client. The device includes a content generator configured to generate an output media stream based at least in part on the received state information.
1. A device for transmitting a media stream, the device comprising: a state manager configured to generate state information for a portion of the media stream for a client requesting the media stream; a transmitter configured to transmit information identifying the media stream to the client, the information identifying the media stream including the generated state information; a receiver configured to receive the state information from the client; and a content generator configured to generate an output media stream based at least in part on the received state information. 2. The device of claim 1, wherein the state information indicates one or more of media streamed to the client, media to be streamed to the client, demographic information for a user of the client, technical capabilities of the client, or authorization for the client. 3. The device of claim 1, wherein transmitting the information identifying the portion of the media stream comprises transmitting a dynamic adaptive streaming over HTTP media presentation description file. 4. The device of claim 1, wherein the state manager is configured to generate state information based on one or more of the portion of the media stream and the client requesting the media stream. 5. The device of claim 1, wherein generating state information includes generating at least one of a pseudo-random value and a unique pseudo-random value. 6. The device of claim 1, further comprising a memory, wherein the state manager is configured to store at least a portion of the state information in the memory. 7. The device of claim 1, wherein generating output media stream comprises: obtaining the identified portion of the media stream; identifying at least one additional content element based at least in part on the received state information; identifying an insertion point of the identified portion; and generating the output media stream including the identified additional content at the identified insertion point of the obtained portion. 8. The device of claim 7, wherein the additional content element includes an advertisement. 9. The device of claim 1, wherein transmitting the state information comprises including the state information in a query string for the portion of the media stream. 10. The device of claim 1, wherein the transmitter is further configured to transmit the generated output media stream to the client. 11. The device of claim 1, wherein the information identifying the media stream includes an identifier for the portion of the media stream, wherein the receiver is further configured to receive the identifier, and wherein the content generator is further configured to generate the output media stream based on the identifier. 12. A method for transmitting a media stream, the method comprising: generating state information for a portion of the media stream for a client requesting the media stream; transmitting information identifying the media stream to the client, the information identifying the media stream including the generated state information; receiving the state information from the client; and generating an output media stream based at least in part on the received state information and the received information identifying the portion of the media stream. 13. The method of claim 12, wherein the state information indicates one or more of media streamed to the client, media to be streamed to the client, demographic information for a user of the client, technical capabilities of the client, or authorization for the client. 14. The method of claim 12, wherein transmitting the information identifying the portion of the media stream comprises transmitting a dynamic adaptive streaming over HTTP media presentation description file. 15. The method of claim 12, wherein generating state information is based on one or more of the portion of the media stream and the client requesting the media stream. 16. The method of claim 12, wherein generating state information includes generating at least one of a pseudo-random value and a unique pseudo-random value. 17. The method of claim 12, further comprising storing at least a portion of the state information. 18. The method of claim 12, wherein generating output media stream comprises: obtaining the identified portion of the media stream; identifying at least one additional content element based at least in part on the received state information; identifying an insertion point of the identified portion; and generating the output media stream including the identified additional content at the identified insertion point of the obtained portion. 19. The method of claim 18, wherein the additional content element includes an advertisement. 20. The method of claim 12, wherein transmitting the state information comprises including the state information in a query string for the portion of the media stream. 21. The method of claim 12, further comprising transmitting the generated output media stream to the client. 22. The method of claim 12, wherein the information identifying the media stream includes an identifier for the portion of the media stream, wherein the method further comprises receiving the identifier, and wherein generating the output media stream is further based on the received information identifying the portion of the media stream. 23. A device for transmitting a media stream, the device comprising: a processor, the processor configured to: generate state information for a portion of the media stream for a client requesting the media stream; transmit information identifying the media stream to the client, the information identifying the media stream including the generated state information; receive the state information from the client; and generate an output media stream based at least in part on the received state information. 24. A device for transmitting a media stream, the device comprising: means for generating state information for a portion of the media stream for a client requesting the media stream; means for transmitting information identifying the media stream to the client, the information identifying the media stream including the generated state information; means for receiving the state information from the client; and means for generating an output media stream based at least in part on the received state information. 25. A computer-readable storage medium comprising instructions executable by a processor of an apparatus, the instructions causing the apparatus to: generate state information for a portion of a media stream for a client requesting the media stream; transmit information identifying the media stream to the client, the information identifying the media stream including the generated state information; receive the state information from the client; and generate an output media stream based at least in part on the received state information.
Systems, methods, and devices for transmitting a media stream are described herein. In some aspects, a device includes a state manager configured to generate state information for a portion of the media stream for a client requesting the media stream. The device further includes a transmitter configured to transmit information identifying the media stream to the client, the information identifying the media stream including the generated state information. The device also includes a receiver configured to receive the state information from the client. The device includes a content generator configured to generate an output media stream based at least in part on the received state information.1. A device for transmitting a media stream, the device comprising: a state manager configured to generate state information for a portion of the media stream for a client requesting the media stream; a transmitter configured to transmit information identifying the media stream to the client, the information identifying the media stream including the generated state information; a receiver configured to receive the state information from the client; and a content generator configured to generate an output media stream based at least in part on the received state information. 2. The device of claim 1, wherein the state information indicates one or more of media streamed to the client, media to be streamed to the client, demographic information for a user of the client, technical capabilities of the client, or authorization for the client. 3. The device of claim 1, wherein transmitting the information identifying the portion of the media stream comprises transmitting a dynamic adaptive streaming over HTTP media presentation description file. 4. The device of claim 1, wherein the state manager is configured to generate state information based on one or more of the portion of the media stream and the client requesting the media stream. 5. The device of claim 1, wherein generating state information includes generating at least one of a pseudo-random value and a unique pseudo-random value. 6. The device of claim 1, further comprising a memory, wherein the state manager is configured to store at least a portion of the state information in the memory. 7. The device of claim 1, wherein generating output media stream comprises: obtaining the identified portion of the media stream; identifying at least one additional content element based at least in part on the received state information; identifying an insertion point of the identified portion; and generating the output media stream including the identified additional content at the identified insertion point of the obtained portion. 8. The device of claim 7, wherein the additional content element includes an advertisement. 9. The device of claim 1, wherein transmitting the state information comprises including the state information in a query string for the portion of the media stream. 10. The device of claim 1, wherein the transmitter is further configured to transmit the generated output media stream to the client. 11. The device of claim 1, wherein the information identifying the media stream includes an identifier for the portion of the media stream, wherein the receiver is further configured to receive the identifier, and wherein the content generator is further configured to generate the output media stream based on the identifier. 12. A method for transmitting a media stream, the method comprising: generating state information for a portion of the media stream for a client requesting the media stream; transmitting information identifying the media stream to the client, the information identifying the media stream including the generated state information; receiving the state information from the client; and generating an output media stream based at least in part on the received state information and the received information identifying the portion of the media stream. 13. The method of claim 12, wherein the state information indicates one or more of media streamed to the client, media to be streamed to the client, demographic information for a user of the client, technical capabilities of the client, or authorization for the client. 14. The method of claim 12, wherein transmitting the information identifying the portion of the media stream comprises transmitting a dynamic adaptive streaming over HTTP media presentation description file. 15. The method of claim 12, wherein generating state information is based on one or more of the portion of the media stream and the client requesting the media stream. 16. The method of claim 12, wherein generating state information includes generating at least one of a pseudo-random value and a unique pseudo-random value. 17. The method of claim 12, further comprising storing at least a portion of the state information. 18. The method of claim 12, wherein generating output media stream comprises: obtaining the identified portion of the media stream; identifying at least one additional content element based at least in part on the received state information; identifying an insertion point of the identified portion; and generating the output media stream including the identified additional content at the identified insertion point of the obtained portion. 19. The method of claim 18, wherein the additional content element includes an advertisement. 20. The method of claim 12, wherein transmitting the state information comprises including the state information in a query string for the portion of the media stream. 21. The method of claim 12, further comprising transmitting the generated output media stream to the client. 22. The method of claim 12, wherein the information identifying the media stream includes an identifier for the portion of the media stream, wherein the method further comprises receiving the identifier, and wherein generating the output media stream is further based on the received information identifying the portion of the media stream. 23. A device for transmitting a media stream, the device comprising: a processor, the processor configured to: generate state information for a portion of the media stream for a client requesting the media stream; transmit information identifying the media stream to the client, the information identifying the media stream including the generated state information; receive the state information from the client; and generate an output media stream based at least in part on the received state information. 24. A device for transmitting a media stream, the device comprising: means for generating state information for a portion of the media stream for a client requesting the media stream; means for transmitting information identifying the media stream to the client, the information identifying the media stream including the generated state information; means for receiving the state information from the client; and means for generating an output media stream based at least in part on the received state information. 25. A computer-readable storage medium comprising instructions executable by a processor of an apparatus, the instructions causing the apparatus to: generate state information for a portion of a media stream for a client requesting the media stream; transmit information identifying the media stream to the client, the information identifying the media stream including the generated state information; receive the state information from the client; and generate an output media stream based at least in part on the received state information.
2,400
9,058
9,058
16,120,394
2,439
A method of selectively allocating a plurality of deployment units among a plurality of clouds. The method can include identifying a first context of a first deployment unit of a workload and identifying a second context of a second deployment unit of the workload. Based on the first context, a first of the plurality of clouds that satisfies at least one requirement indicated by the first context can be identified and the first deployment unit can be automatically allocated to the first cloud. Based on the second context, a second of the plurality of clouds that satisfies at least one requirement indicated by the second context can be identified, wherein the first cloud does not satisfy the requirement indicated by the second context, and the second deployment unit can be automatically allocated to the second cloud.
1-25. (canceled) 26. A computer-implemented method of selectively allocating a plurality of deployment units among a plurality of clouds, comprising: identifying a first context indicating a first functional requirement or non-functional requirement of a first deployment unit within a workload; identifying a second context indicating a second functional requirement or non-functional requirement of a second deployment unit within the workload; identifying, based upon the first context, a first cloud of the plurality of clouds that satisfies the first functional requirement or non-functional requirement; automatically allocating the first deployment unit to the first cloud; identifying, based upon the second context, a second cloud of the plurality of clouds that satisfies the second functional requirement or non-functional requirement; automatically allocating the second deployment unit to the second cloud, wherein the first cloud does not satisfy the second functional requirement or non-functional requirement. 27. The method of claim 26, wherein a deployment plan that identifies to which of the first and second clouds the first and second deployment units are allocated is automatically created based upon the first and second contexts. 28. The method of claim 27, wherein the automatically allocating the first deployment unit to the first cloud is based upon the deployment plan; and the automatically allocating the second deployment unit to the second cloud comprises is based upon the deployment plan. 29. The method of claim 26, wherein: the identifying the first context includes identifying metadata associated with the first deployment unit that indicates a first functional requirement of the first deployment unit; and the identifying the second context includes identifying metadata associated with the second deployment unit that indicates a second functional requirement of the second deployment unit. 30. The method of claim 29, wherein the first and second functional requirements are each performance requirements. 31. The method of claim 26, wherein: identifying the first context includes identifying metadata associated with the first deployment unit that indicates a first non-functional requirement of the first deployment unit; and identifying the second context includes identifying metadata associated with the second deployment unit that indicates a second non-functional requirement of the second deployment unit. 32. The method of claim 31, wherein the first and second non-functional requirement are each security requirements. 33. The method of claim 26, wherein a determination is made whether the first cloud continues to satisfy the first functional requirement after the first and second deployment units have been respectively allocated to the first and second clouds; upon the first cloud not satisfying the first functional requirement, another cloud that satisfies the first functional requirement is identified; and the first deployment unit is automatically allocated to the another cloud. 34. A computer hardware system, comprising: a hardware processor configured to initiate the following executable operations: identifying a first context indicating a first functional requirement or non-functional requirement of a first deployment unit within a workload; identifying a second context indicating a second functional requirement or non-functional requirement of a second deployment unit within the workload; identifying, based upon the first context, a first cloud of the plurality of clouds that satisfies the first functional requirement or non-functional requirement; automatically allocating the first deployment unit to the first cloud; identifying, based upon the second context, a second cloud of the plurality of clouds that satisfies the second functional requirement or non-functional requirement; automatically allocating the second deployment unit to the second cloud, wherein the first cloud does not satisfy the second functional requirement or non-functional requirement. 35. The system of claim 34, wherein a deployment plan that identifies to which of the first and second clouds the first and second deployment units are allocated is automatically created based upon the first and second contexts. 36. The system of claim 35, wherein the automatically allocating the first deployment unit to the first cloud is based upon the deployment plan; and the automatically allocating the second deployment unit to the second cloud comprises is based upon the deployment plan. 37. The system of claim 34, wherein: the identifying the first context includes identifying metadata associated with the first deployment unit that indicates a first functional requirement of the first deployment unit; and the identifying the second context includes identifying metadata associated with the second deployment unit that indicates a second functional requirement of the second deployment unit. 38. The system of claim 37, wherein the first and second functional requirements are each performance requirements. 39. The system of claim 34, wherein: identifying the first context includes identifying metadata associated with the first deployment unit that indicates a first non-functional requirement of the first deployment unit; and identifying the second context includes identifying metadata associated with the second deployment unit that indicates a second non-functional requirement of the second deployment unit. 40. The system of claim 39, wherein the first and second non-functional requirement are each security requirements. 41. The system of claim 34, wherein a determination is made whether the first cloud continues to satisfy the first functional requirement after the first and second deployment units have been respectively allocated to the first and second clouds; upon the first cloud not satisfying the first functional requirement, another cloud that satisfies the first functional requirement is identified; and the first deployment unit is automatically allocated to the another cloud. 42. A computer program product, comprising: a hardware storage device having program code stored therein, the program code, which when executed by a computer hardware system, causes the computer hardware system to perform: identifying a first context indicating a first functional requirement or non-functional requirement of a first deployment unit within a workload; identifying a second context indicating a second functional requirement or non-functional requirement of a second deployment unit within the workload; identifying, based upon the first context, a first cloud of the plurality of clouds that satisfies the first functional requirement or non-functional requirement; automatically allocating the first deployment unit to the first cloud; identifying, based upon the second context, a second cloud of the plurality of clouds that satisfies the second functional requirement or non-functional requirement; automatically allocating the second deployment unit to the second cloud, wherein the first cloud does not satisfy the second functional requirement or non-functional requirement. 43. The computer program product of claim 42, wherein a deployment plan that identifies to which of the first and second clouds the first and second deployment units are allocated is automatically created based upon the first and second contexts. 44. The computer program product of claim 43, wherein the automatically allocating the first deployment unit to the first cloud is based upon the deployment plan; and the automatically allocating the second deployment unit to the second cloud comprises is based upon the deployment plan. 45. The computer program product of claim 42, wherein a determination is made whether the first cloud continues to satisfy the first functional requirement after the first and second deployment units have been respectively allocated to the first and second clouds; upon the first cloud not satisfying the first functional requirement, another cloud that satisfies the first functional requirement is identified; and the first deployment unit is automatically allocated to the another cloud.
A method of selectively allocating a plurality of deployment units among a plurality of clouds. The method can include identifying a first context of a first deployment unit of a workload and identifying a second context of a second deployment unit of the workload. Based on the first context, a first of the plurality of clouds that satisfies at least one requirement indicated by the first context can be identified and the first deployment unit can be automatically allocated to the first cloud. Based on the second context, a second of the plurality of clouds that satisfies at least one requirement indicated by the second context can be identified, wherein the first cloud does not satisfy the requirement indicated by the second context, and the second deployment unit can be automatically allocated to the second cloud.1-25. (canceled) 26. A computer-implemented method of selectively allocating a plurality of deployment units among a plurality of clouds, comprising: identifying a first context indicating a first functional requirement or non-functional requirement of a first deployment unit within a workload; identifying a second context indicating a second functional requirement or non-functional requirement of a second deployment unit within the workload; identifying, based upon the first context, a first cloud of the plurality of clouds that satisfies the first functional requirement or non-functional requirement; automatically allocating the first deployment unit to the first cloud; identifying, based upon the second context, a second cloud of the plurality of clouds that satisfies the second functional requirement or non-functional requirement; automatically allocating the second deployment unit to the second cloud, wherein the first cloud does not satisfy the second functional requirement or non-functional requirement. 27. The method of claim 26, wherein a deployment plan that identifies to which of the first and second clouds the first and second deployment units are allocated is automatically created based upon the first and second contexts. 28. The method of claim 27, wherein the automatically allocating the first deployment unit to the first cloud is based upon the deployment plan; and the automatically allocating the second deployment unit to the second cloud comprises is based upon the deployment plan. 29. The method of claim 26, wherein: the identifying the first context includes identifying metadata associated with the first deployment unit that indicates a first functional requirement of the first deployment unit; and the identifying the second context includes identifying metadata associated with the second deployment unit that indicates a second functional requirement of the second deployment unit. 30. The method of claim 29, wherein the first and second functional requirements are each performance requirements. 31. The method of claim 26, wherein: identifying the first context includes identifying metadata associated with the first deployment unit that indicates a first non-functional requirement of the first deployment unit; and identifying the second context includes identifying metadata associated with the second deployment unit that indicates a second non-functional requirement of the second deployment unit. 32. The method of claim 31, wherein the first and second non-functional requirement are each security requirements. 33. The method of claim 26, wherein a determination is made whether the first cloud continues to satisfy the first functional requirement after the first and second deployment units have been respectively allocated to the first and second clouds; upon the first cloud not satisfying the first functional requirement, another cloud that satisfies the first functional requirement is identified; and the first deployment unit is automatically allocated to the another cloud. 34. A computer hardware system, comprising: a hardware processor configured to initiate the following executable operations: identifying a first context indicating a first functional requirement or non-functional requirement of a first deployment unit within a workload; identifying a second context indicating a second functional requirement or non-functional requirement of a second deployment unit within the workload; identifying, based upon the first context, a first cloud of the plurality of clouds that satisfies the first functional requirement or non-functional requirement; automatically allocating the first deployment unit to the first cloud; identifying, based upon the second context, a second cloud of the plurality of clouds that satisfies the second functional requirement or non-functional requirement; automatically allocating the second deployment unit to the second cloud, wherein the first cloud does not satisfy the second functional requirement or non-functional requirement. 35. The system of claim 34, wherein a deployment plan that identifies to which of the first and second clouds the first and second deployment units are allocated is automatically created based upon the first and second contexts. 36. The system of claim 35, wherein the automatically allocating the first deployment unit to the first cloud is based upon the deployment plan; and the automatically allocating the second deployment unit to the second cloud comprises is based upon the deployment plan. 37. The system of claim 34, wherein: the identifying the first context includes identifying metadata associated with the first deployment unit that indicates a first functional requirement of the first deployment unit; and the identifying the second context includes identifying metadata associated with the second deployment unit that indicates a second functional requirement of the second deployment unit. 38. The system of claim 37, wherein the first and second functional requirements are each performance requirements. 39. The system of claim 34, wherein: identifying the first context includes identifying metadata associated with the first deployment unit that indicates a first non-functional requirement of the first deployment unit; and identifying the second context includes identifying metadata associated with the second deployment unit that indicates a second non-functional requirement of the second deployment unit. 40. The system of claim 39, wherein the first and second non-functional requirement are each security requirements. 41. The system of claim 34, wherein a determination is made whether the first cloud continues to satisfy the first functional requirement after the first and second deployment units have been respectively allocated to the first and second clouds; upon the first cloud not satisfying the first functional requirement, another cloud that satisfies the first functional requirement is identified; and the first deployment unit is automatically allocated to the another cloud. 42. A computer program product, comprising: a hardware storage device having program code stored therein, the program code, which when executed by a computer hardware system, causes the computer hardware system to perform: identifying a first context indicating a first functional requirement or non-functional requirement of a first deployment unit within a workload; identifying a second context indicating a second functional requirement or non-functional requirement of a second deployment unit within the workload; identifying, based upon the first context, a first cloud of the plurality of clouds that satisfies the first functional requirement or non-functional requirement; automatically allocating the first deployment unit to the first cloud; identifying, based upon the second context, a second cloud of the plurality of clouds that satisfies the second functional requirement or non-functional requirement; automatically allocating the second deployment unit to the second cloud, wherein the first cloud does not satisfy the second functional requirement or non-functional requirement. 43. The computer program product of claim 42, wherein a deployment plan that identifies to which of the first and second clouds the first and second deployment units are allocated is automatically created based upon the first and second contexts. 44. The computer program product of claim 43, wherein the automatically allocating the first deployment unit to the first cloud is based upon the deployment plan; and the automatically allocating the second deployment unit to the second cloud comprises is based upon the deployment plan. 45. The computer program product of claim 42, wherein a determination is made whether the first cloud continues to satisfy the first functional requirement after the first and second deployment units have been respectively allocated to the first and second clouds; upon the first cloud not satisfying the first functional requirement, another cloud that satisfies the first functional requirement is identified; and the first deployment unit is automatically allocated to the another cloud.
2,400
9,059
9,059
14,802,508
2,416
Energy consumption of cellular interfaces on multihomed mobile devices, such as smartphones, tablets and laptops can be improved by adjusting the inactivity timer of the cellular interface of the mobile devices based on the on/off status of non-cellular interface(s) on the mobile devices. Possible near-future data packets can be transmitted or received on the non-cellular interfaces that co-exist on the mobile devices and thus the inactivity timer of the cellular interface may be dynamically and more efficiently adjusted, based on the on/off status of non-cellular interface(s). If the non-cellular interface is available on the mobile device, then the inactivity timer can be set to be shorter than if only the cellular interface is available.
1. A method comprising: setting an inactivity timer for a mobile device having a cellular radio interface and a non-cellular radio interface based on a status of the non-cellular radio interface in the mobile device. 2. The method as recited in claim 1, further comprising: a base station setting the inactivity timer to a first value responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned off; and the base station setting the inactivity timer to a second value, smaller than the first value, responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned on. 3. The method as recited in claim 2, further comprising adjusting the inactivity timer responsive to a change in the status of non-cellular radio interface. 4. The method as recited in claim 3, further comprising the base station receiving the change in the status of the non cellular radio interface during a connected state. 5. The method as recited in claim 3, further comprising adjusting the inactivity timer to the first value from the second value if the change in the status of the non-cellular radio interface indicates the non-cellular radio interface has been turned off and setting the inactivity timer to the second value responsive to the change in the status of the non-cellular radio interface indicating the non-cellular radio interface has been turned on. 6. The method as recited in claim 3, further comprising: receiving the change of the status in the non-cellular radio interface from a multi-path Transmission Control Protocol (MPTCP) server. 7. The method as recited in claim 3, further comprising: receiving the change of the status in the non-cellular radio interface from an authentication, authorization, and accounting server. 8. The method as recited in claim 3, further comprising: filtering reporting of the change of the status in the non-cellular radio interface responsive to a moving speed of the mobile device. 9. The method as recited in claim 3, further comprising: filtering reporting of the change of the status in the non-cellular radio interface responsive to a threshold number of changes in the status in the non-cellular radio interface. 10. The method as recited in claim 1, further comprising the base station communicating to the mobile device to enter a lower power state responsive to an end of a time period indicated by the inactivity timer. 11. The method as recited in claim 1, further comprising the base station receiving the status of the non-cellular radio interface during an RRC connection setup. 12. The method as recited in claim 1, further comprising the mobile device monitoring changes in the status of the non cellular radio interface during a connected state and reporting changes in the status of the non-cellular radio interface to the base station. 13. An apparatus comprising: an inactivity timer for a mobile device; and control logic responsive to a status of a non-cellular radio interface in a mobile device having a cellular radio interface and the non-cellular radio interface, to set the inactivity timer for the mobile device to a first value responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned off and to set the inactivity timer to a second value, smaller than the first value responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned on. 14. The apparatus as recited in claim 13, wherein the apparatus receives an indication of a change in the status of non-cellular radio interface and the control logic is responsive to the change to adjust the inactivity timer to the first value from the second value if the change in the status of the non-cellular radio interface indicates the non-cellular radio interface has been turned off and setting the inactivity timer to the second value responsive to the change in the status of the non-cellular radio interface indicating the non-cellular radio interface has been turned on. 15. The apparatus as recited in claim 13, wherein the apparatus is configured to communicate to the mobile device to enter a lower power state at an end of a timer interval specified by the inactivity timer. 16. The apparatus as recited in claim 13, wherein the base station receives the status of the non-cellular radio interface during an RRC connection setup. 17. A system comprising: a base station including, an inactivity timer for a mobile device; and control logic responsive to a status of a non-cellular radio interface in the mobile device having a cellular radio interface and the non-cellular radio interface, to set the inactivity timer to a first value responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned off and to set the inactivity timer to a second value, smaller than the first value, responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned on; and wherein the control logic is responsive to a change in status of the non-cellular radio interface indicating the non-cellular radio interface has been turned off to set the inactivity timer to the first value from the second value and the control logic is responsive if the change in the status of the non-cellular radio interface indicating the non-cellular radio interface has been turned on to set the inactivity timer to the second value. 18. The system as recited in claim 17, further comprising: a multi-path Transmission Control Protocol (MPTCP) server communicatively coupled to the base station to send the change of the status in the non-cellular radio interface. 19. The system as recited in claim 17, further comprising: an authentication, authorization, and accounting server communicatively coupled to the base station to send the change of the status in the non-cellular radio interface. 20. The system as recited in claim 17, further comprising: the mobile device configured to send status updates to the base station in response to a change in the status of the non-cellular radio interface.
Energy consumption of cellular interfaces on multihomed mobile devices, such as smartphones, tablets and laptops can be improved by adjusting the inactivity timer of the cellular interface of the mobile devices based on the on/off status of non-cellular interface(s) on the mobile devices. Possible near-future data packets can be transmitted or received on the non-cellular interfaces that co-exist on the mobile devices and thus the inactivity timer of the cellular interface may be dynamically and more efficiently adjusted, based on the on/off status of non-cellular interface(s). If the non-cellular interface is available on the mobile device, then the inactivity timer can be set to be shorter than if only the cellular interface is available.1. A method comprising: setting an inactivity timer for a mobile device having a cellular radio interface and a non-cellular radio interface based on a status of the non-cellular radio interface in the mobile device. 2. The method as recited in claim 1, further comprising: a base station setting the inactivity timer to a first value responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned off; and the base station setting the inactivity timer to a second value, smaller than the first value, responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned on. 3. The method as recited in claim 2, further comprising adjusting the inactivity timer responsive to a change in the status of non-cellular radio interface. 4. The method as recited in claim 3, further comprising the base station receiving the change in the status of the non cellular radio interface during a connected state. 5. The method as recited in claim 3, further comprising adjusting the inactivity timer to the first value from the second value if the change in the status of the non-cellular radio interface indicates the non-cellular radio interface has been turned off and setting the inactivity timer to the second value responsive to the change in the status of the non-cellular radio interface indicating the non-cellular radio interface has been turned on. 6. The method as recited in claim 3, further comprising: receiving the change of the status in the non-cellular radio interface from a multi-path Transmission Control Protocol (MPTCP) server. 7. The method as recited in claim 3, further comprising: receiving the change of the status in the non-cellular radio interface from an authentication, authorization, and accounting server. 8. The method as recited in claim 3, further comprising: filtering reporting of the change of the status in the non-cellular radio interface responsive to a moving speed of the mobile device. 9. The method as recited in claim 3, further comprising: filtering reporting of the change of the status in the non-cellular radio interface responsive to a threshold number of changes in the status in the non-cellular radio interface. 10. The method as recited in claim 1, further comprising the base station communicating to the mobile device to enter a lower power state responsive to an end of a time period indicated by the inactivity timer. 11. The method as recited in claim 1, further comprising the base station receiving the status of the non-cellular radio interface during an RRC connection setup. 12. The method as recited in claim 1, further comprising the mobile device monitoring changes in the status of the non cellular radio interface during a connected state and reporting changes in the status of the non-cellular radio interface to the base station. 13. An apparatus comprising: an inactivity timer for a mobile device; and control logic responsive to a status of a non-cellular radio interface in a mobile device having a cellular radio interface and the non-cellular radio interface, to set the inactivity timer for the mobile device to a first value responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned off and to set the inactivity timer to a second value, smaller than the first value responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned on. 14. The apparatus as recited in claim 13, wherein the apparatus receives an indication of a change in the status of non-cellular radio interface and the control logic is responsive to the change to adjust the inactivity timer to the first value from the second value if the change in the status of the non-cellular radio interface indicates the non-cellular radio interface has been turned off and setting the inactivity timer to the second value responsive to the change in the status of the non-cellular radio interface indicating the non-cellular radio interface has been turned on. 15. The apparatus as recited in claim 13, wherein the apparatus is configured to communicate to the mobile device to enter a lower power state at an end of a timer interval specified by the inactivity timer. 16. The apparatus as recited in claim 13, wherein the base station receives the status of the non-cellular radio interface during an RRC connection setup. 17. A system comprising: a base station including, an inactivity timer for a mobile device; and control logic responsive to a status of a non-cellular radio interface in the mobile device having a cellular radio interface and the non-cellular radio interface, to set the inactivity timer to a first value responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned off and to set the inactivity timer to a second value, smaller than the first value, responsive to the status of the non-cellular radio interface indicating the non-cellular radio interface is turned on; and wherein the control logic is responsive to a change in status of the non-cellular radio interface indicating the non-cellular radio interface has been turned off to set the inactivity timer to the first value from the second value and the control logic is responsive if the change in the status of the non-cellular radio interface indicating the non-cellular radio interface has been turned on to set the inactivity timer to the second value. 18. The system as recited in claim 17, further comprising: a multi-path Transmission Control Protocol (MPTCP) server communicatively coupled to the base station to send the change of the status in the non-cellular radio interface. 19. The system as recited in claim 17, further comprising: an authentication, authorization, and accounting server communicatively coupled to the base station to send the change of the status in the non-cellular radio interface. 20. The system as recited in claim 17, further comprising: the mobile device configured to send status updates to the base station in response to a change in the status of the non-cellular radio interface.
2,400
9,060
9,060
12,353,188
2,465
Methods and apparatus for controlling transmission of a base station, such as a Femto cell, based on the determined quality of a backhaul connection to a network are disclosed. In particular, a quality of a backhaul connection of a base station to a node in a communication network is determined. Based on this quality determination, transmission from the base station is either limited or stopped when the determined quality fails to meet a predefined condition. The degradation in quality of the backhaul connection, for example, affects the ability of the base station to offer sufficient service to access terminals. By limiting or stopping wireless transmission of the base station when the backhaul quality is degraded, access terminals either currently accessing the base station or attempting to connect to the base station can then more efficaciously hand off to another base station or access point.
1. A method for controlling transmission of a base station in a communication network, the method comprising: determining a quality of a backhaul connection between the base station and at least one node within the communication network; and preventing transmission of at least one wireless signal from the base station when the determined quality fails to meet a predefined condition. 2. The method as defined in claim 1, wherein the predefined condition includes at least one of packet connectivity of the backhaul connection to the at least one node within the communication network, packet throughput of the backhaul connection between the base station and the at least one node is above a predetermined throughput threshold, packet latency between the base station and the at least one node over the backhaul connection is below a predetermined latency threshold, and a level of backhaul jitter is below ajitter threshold. 3. The method as defined in claim 1, wherein determining the quality of the backhaul connection includes at least one of: determining a packet connectivity state of the backhaul connection between the base station and the at least one node, determining the packet throughput of the backhaul connection, determining packet latency of the backhaul, and determining a level of backhaul jitter. 4. The method as defined in claim 1, wherein the determination of the quality of the backhaul connection is initiated by at least one of the base station and the at least one node. 5. The method as defined in claim 1, wherein the at least one node of the communication network comprises at least one of a Femto Gateway, a Pico Gateway, an Access Gateway, a mobility manager, and an AAA server. 6. The method as defined in claim 1, wherein the determination of the quality of the backhaul connection is performed periodically. 7. The method as defined in claim 1, wherein the determination of quality of the backhaul connection is performed whenever a wireless communication device requests access to the base station. 8. The method as defined in claim 1, wherein the determination of the quality of the backhaul connection is performed upon power up of the base station. 9. The method as defined in claim 1, wherein the base station comprises an end user device configured to communicate with a wireless communication device using a cellular technology. 10. The method as defined in claim 9, wherein the base station is one of a Femto cell and a Pico cell. 11. The method as defined in claim 1, further comprising: preventing transmission of all wireless signals from the base station when the determined quality fails to meet the predefined condition. 12. An apparatus for controlling transmission of a base station, the apparatus comprising: a memory storing instructions executable by a processor; and at least one processor configured to execute the instructions stored in the memory to: determine a quality of a backhaul connection between the base station and at least one node within the communication network; and prevent transmission of at least one wireless signal from the base station when the determined quality fails to meet a predefined condition. 13. The apparatus as defined in claim 12, wherein the predefined condition includes at least one of packet connectivity of the backhaul connection to the at least one node within the communication network, packet throughput of the backhaul connection between the base station and the at least one node is above a predetermined throughput threshold, packet latency between the base station and the at least one node over the backhaul connection is below a predetermined latency threshold, and a level of backhaul jitter is below ajitter threshold. 14. The apparatus as defined in claim 12, wherein the at least one processor is configured to determine the quality of the backhaul connection through at least one of: determining a packet connectivity state of the backhaul connection between the base station and the at least one node, determining the packet throughput of the backhaul connection, determining packet latency of the backhaul, and determining a level of backhaul jitter. 15. The apparatus as defined in claim 12, wherein the determination of the quality of the backhaul connection is initiated by one of the at least one processor in the base station and the at least one node. 16. The apparatus as defined in claim 12, wherein the at least one node of the communication network comprises at least one of a Femto Gateway, a Pico Gateway, an Access Gateway, a mobility manager, and an AAA server. 17. The apparatus as defined in claim 12, wherein the at least one processor is configured to determine of the quality of the backhaul connection periodically. 18. The apparatus as defined in claim 12, wherein at least one processor is configured to determinate the quality of the backhaul connection whenever a wireless communication device requests access to the base station. 19. The apparatus as defined in claim 12, wherein the at least one processor is configured to determine of the quality of the backhaul connection upon power up of the base station. 20. The apparatus as defined in claim 12, wherein the base station comprises an end user device configured to communicate with a communication device using a cellular technology. 21. The apparatus as defined in claim 20, wherein the base station is one of a Femto cell and a Pico cell. 22. The apparatus as defined in claim 12, wherein the at least one processor is further configured to prevent transmission of all wireless signals from the base station when the determined quality fails to meet the predefined condition. 23. An apparatus for use in a communication system comprising: means for determining a quality of a backhaul connection between the base station and at least one node within the communication network; and means for preventing transmission of at least one wireless signal from the base station when the determined quality fails to meet a predefined condition. 24. The apparatus as defined in claim 23, wherein the predefined condition includes at least one of packet connectivity of the backhaul connection to the at least one node within the communication network, packet throughput of the backhaul connection between the base station and the at least one node is above a predetermined throughput threshold, packet latency between the base station and the at least one node over the backhaul connection is below a predetermined latency threshold, and a level of backhaul jitter is below ajitter threshold. 25. The apparatus as defined in claim 23, wherein the means for determining the quality of the backhaul connection is configured to at least one of: determine a packet connectivity state of the backhaul connection between the base station and the at least one node; determine the packet throughput of the backhaul connection; determine packet latency of the backhaul; and determine a level of backhaul jitter. 26. The apparatus as defined in claim 23, wherein the determination of the quality of the backhaul connection is initiated by one of the base station and the at least one node. 27. The apparatus as defined in claim 23, wherein the at least one node of the communication network comprises at least one of a Femto Gateway, a Pico Gateway, an Access Gateway, a mobility manager, and an AAA server. 28. The apparatus as defined in claim 23, wherein the determination of the quality of the backhaul connection is performed periodically. 29. The apparatus as defined in claim 23, wherein the determination of quality of the backhaul connection is performed whenever a wireless communication device requests access to the base station. 30. The apparatus as defined in claim 23, wherein the determination of the quality of the backhaul connection is performed upon power up of the base station. 31. The apparatus as defined in claim 23, wherein the base station comprises an end user device configured to communicate with a wireless communication device using a cellular technology. 32. The apparatus as defined in claim 31, wherein the base station is one of a Femto cell and a Pico cell. 33. The apparatus as defined in claim 23, wherein the means for preventing transmission of at least one signal from the base station in configured to prevent transmission of all wireless signals from the base station when the determined quality fails to meet the predefined condition. 34. A computer program product for use in a base station for controlling transmissions of the base station, the computer program product comprising: a computer-readable medium comprising: code for causing a computer to determine a quality of a backhaul connection between the base station and at least one node within the communication network; and code for causing a computer to prevent transmission of at least one wireless signal from the base station when the determined quality fails to meet a predefined condition. 35. The computer program product as defined in claim 34, wherein the predefined condition includes at least one of packet connectivity of the backhaul connection to the at least one node within the communication network, packet throughput of the backhaul connection between the base station and the at least one node is above a predetermined throughput threshold, packet latency between the base station and the at least one node over the backhaul connection is below a predetermined latency threshold, and a level of backhaul jitter is below ajitter threshold. 36. The computer program product as defined in claim 34, wherein the code for causing a computer to determine the quality of the backhaul connection includes code for causing a computer to at least one of: determine a packet connectivity state of the backhaul connection between the base station and the at least one node, determine the packet throughput of the backhaul connection, determine packet latency of the backhaul, and determine a level of backhaul jitter. 37. The computer program product as defined in claim 34, wherein the determination of the quality of the backhaul connection is initiated in one of the base station and the at least one node. 38. The computer program product as defined in claim 38, wherein the at least one node of the communication network comprises at least one of a Femto Gateway, a Pico Gateway, an Access Gateway, a mobility manager, and an AAA server. 39. The computer program product as defined in claim 34, wherein the determination of the quality of the backhaul connection is performed periodically. 40. The computer program product as defined in claim 34, wherein the determination of quality of the backhaul connection is performed whenever a wireless communication device requests access to the base station. 41. The computer program product as defined in claim 34, wherein the determination of the quality of the backhaul connection is performed upon power up of the base station. 42. The computer program product as defined in claim 34, wherein the base station comprises an end user device configured to communicate with a wireless communication device using a cellular technology. 43. The computer program product as defined in claim 42, wherein the base station is one of a Femto cell and a Pico cell. 44. The computer program product as defined in claim 34, the computer-readable medium further comprising: code for causing a computer to prevent transmission of all wireless signals from the base station when the determined quality fails to meet the predefined condition.
Methods and apparatus for controlling transmission of a base station, such as a Femto cell, based on the determined quality of a backhaul connection to a network are disclosed. In particular, a quality of a backhaul connection of a base station to a node in a communication network is determined. Based on this quality determination, transmission from the base station is either limited or stopped when the determined quality fails to meet a predefined condition. The degradation in quality of the backhaul connection, for example, affects the ability of the base station to offer sufficient service to access terminals. By limiting or stopping wireless transmission of the base station when the backhaul quality is degraded, access terminals either currently accessing the base station or attempting to connect to the base station can then more efficaciously hand off to another base station or access point.1. A method for controlling transmission of a base station in a communication network, the method comprising: determining a quality of a backhaul connection between the base station and at least one node within the communication network; and preventing transmission of at least one wireless signal from the base station when the determined quality fails to meet a predefined condition. 2. The method as defined in claim 1, wherein the predefined condition includes at least one of packet connectivity of the backhaul connection to the at least one node within the communication network, packet throughput of the backhaul connection between the base station and the at least one node is above a predetermined throughput threshold, packet latency between the base station and the at least one node over the backhaul connection is below a predetermined latency threshold, and a level of backhaul jitter is below ajitter threshold. 3. The method as defined in claim 1, wherein determining the quality of the backhaul connection includes at least one of: determining a packet connectivity state of the backhaul connection between the base station and the at least one node, determining the packet throughput of the backhaul connection, determining packet latency of the backhaul, and determining a level of backhaul jitter. 4. The method as defined in claim 1, wherein the determination of the quality of the backhaul connection is initiated by at least one of the base station and the at least one node. 5. The method as defined in claim 1, wherein the at least one node of the communication network comprises at least one of a Femto Gateway, a Pico Gateway, an Access Gateway, a mobility manager, and an AAA server. 6. The method as defined in claim 1, wherein the determination of the quality of the backhaul connection is performed periodically. 7. The method as defined in claim 1, wherein the determination of quality of the backhaul connection is performed whenever a wireless communication device requests access to the base station. 8. The method as defined in claim 1, wherein the determination of the quality of the backhaul connection is performed upon power up of the base station. 9. The method as defined in claim 1, wherein the base station comprises an end user device configured to communicate with a wireless communication device using a cellular technology. 10. The method as defined in claim 9, wherein the base station is one of a Femto cell and a Pico cell. 11. The method as defined in claim 1, further comprising: preventing transmission of all wireless signals from the base station when the determined quality fails to meet the predefined condition. 12. An apparatus for controlling transmission of a base station, the apparatus comprising: a memory storing instructions executable by a processor; and at least one processor configured to execute the instructions stored in the memory to: determine a quality of a backhaul connection between the base station and at least one node within the communication network; and prevent transmission of at least one wireless signal from the base station when the determined quality fails to meet a predefined condition. 13. The apparatus as defined in claim 12, wherein the predefined condition includes at least one of packet connectivity of the backhaul connection to the at least one node within the communication network, packet throughput of the backhaul connection between the base station and the at least one node is above a predetermined throughput threshold, packet latency between the base station and the at least one node over the backhaul connection is below a predetermined latency threshold, and a level of backhaul jitter is below ajitter threshold. 14. The apparatus as defined in claim 12, wherein the at least one processor is configured to determine the quality of the backhaul connection through at least one of: determining a packet connectivity state of the backhaul connection between the base station and the at least one node, determining the packet throughput of the backhaul connection, determining packet latency of the backhaul, and determining a level of backhaul jitter. 15. The apparatus as defined in claim 12, wherein the determination of the quality of the backhaul connection is initiated by one of the at least one processor in the base station and the at least one node. 16. The apparatus as defined in claim 12, wherein the at least one node of the communication network comprises at least one of a Femto Gateway, a Pico Gateway, an Access Gateway, a mobility manager, and an AAA server. 17. The apparatus as defined in claim 12, wherein the at least one processor is configured to determine of the quality of the backhaul connection periodically. 18. The apparatus as defined in claim 12, wherein at least one processor is configured to determinate the quality of the backhaul connection whenever a wireless communication device requests access to the base station. 19. The apparatus as defined in claim 12, wherein the at least one processor is configured to determine of the quality of the backhaul connection upon power up of the base station. 20. The apparatus as defined in claim 12, wherein the base station comprises an end user device configured to communicate with a communication device using a cellular technology. 21. The apparatus as defined in claim 20, wherein the base station is one of a Femto cell and a Pico cell. 22. The apparatus as defined in claim 12, wherein the at least one processor is further configured to prevent transmission of all wireless signals from the base station when the determined quality fails to meet the predefined condition. 23. An apparatus for use in a communication system comprising: means for determining a quality of a backhaul connection between the base station and at least one node within the communication network; and means for preventing transmission of at least one wireless signal from the base station when the determined quality fails to meet a predefined condition. 24. The apparatus as defined in claim 23, wherein the predefined condition includes at least one of packet connectivity of the backhaul connection to the at least one node within the communication network, packet throughput of the backhaul connection between the base station and the at least one node is above a predetermined throughput threshold, packet latency between the base station and the at least one node over the backhaul connection is below a predetermined latency threshold, and a level of backhaul jitter is below ajitter threshold. 25. The apparatus as defined in claim 23, wherein the means for determining the quality of the backhaul connection is configured to at least one of: determine a packet connectivity state of the backhaul connection between the base station and the at least one node; determine the packet throughput of the backhaul connection; determine packet latency of the backhaul; and determine a level of backhaul jitter. 26. The apparatus as defined in claim 23, wherein the determination of the quality of the backhaul connection is initiated by one of the base station and the at least one node. 27. The apparatus as defined in claim 23, wherein the at least one node of the communication network comprises at least one of a Femto Gateway, a Pico Gateway, an Access Gateway, a mobility manager, and an AAA server. 28. The apparatus as defined in claim 23, wherein the determination of the quality of the backhaul connection is performed periodically. 29. The apparatus as defined in claim 23, wherein the determination of quality of the backhaul connection is performed whenever a wireless communication device requests access to the base station. 30. The apparatus as defined in claim 23, wherein the determination of the quality of the backhaul connection is performed upon power up of the base station. 31. The apparatus as defined in claim 23, wherein the base station comprises an end user device configured to communicate with a wireless communication device using a cellular technology. 32. The apparatus as defined in claim 31, wherein the base station is one of a Femto cell and a Pico cell. 33. The apparatus as defined in claim 23, wherein the means for preventing transmission of at least one signal from the base station in configured to prevent transmission of all wireless signals from the base station when the determined quality fails to meet the predefined condition. 34. A computer program product for use in a base station for controlling transmissions of the base station, the computer program product comprising: a computer-readable medium comprising: code for causing a computer to determine a quality of a backhaul connection between the base station and at least one node within the communication network; and code for causing a computer to prevent transmission of at least one wireless signal from the base station when the determined quality fails to meet a predefined condition. 35. The computer program product as defined in claim 34, wherein the predefined condition includes at least one of packet connectivity of the backhaul connection to the at least one node within the communication network, packet throughput of the backhaul connection between the base station and the at least one node is above a predetermined throughput threshold, packet latency between the base station and the at least one node over the backhaul connection is below a predetermined latency threshold, and a level of backhaul jitter is below ajitter threshold. 36. The computer program product as defined in claim 34, wherein the code for causing a computer to determine the quality of the backhaul connection includes code for causing a computer to at least one of: determine a packet connectivity state of the backhaul connection between the base station and the at least one node, determine the packet throughput of the backhaul connection, determine packet latency of the backhaul, and determine a level of backhaul jitter. 37. The computer program product as defined in claim 34, wherein the determination of the quality of the backhaul connection is initiated in one of the base station and the at least one node. 38. The computer program product as defined in claim 38, wherein the at least one node of the communication network comprises at least one of a Femto Gateway, a Pico Gateway, an Access Gateway, a mobility manager, and an AAA server. 39. The computer program product as defined in claim 34, wherein the determination of the quality of the backhaul connection is performed periodically. 40. The computer program product as defined in claim 34, wherein the determination of quality of the backhaul connection is performed whenever a wireless communication device requests access to the base station. 41. The computer program product as defined in claim 34, wherein the determination of the quality of the backhaul connection is performed upon power up of the base station. 42. The computer program product as defined in claim 34, wherein the base station comprises an end user device configured to communicate with a wireless communication device using a cellular technology. 43. The computer program product as defined in claim 42, wherein the base station is one of a Femto cell and a Pico cell. 44. The computer program product as defined in claim 34, the computer-readable medium further comprising: code for causing a computer to prevent transmission of all wireless signals from the base station when the determined quality fails to meet the predefined condition.
2,400
9,061
9,061
16,049,739
2,416
A communication device stores a master rate table, which comprises a plurality of rows that correspond to i) respective data rates, and ii) respective sets of communication parameter values corresponding to the respective sets of data rates. Each set of communication parameter values includes i) a default value of a parameter, and iii) one or more alternative values of the parameter. When the communication device determines that a new transmission rate should be used, and when a current set of communication parameter values corresponds to a row in the master rate table and includes the default value, the communication device selects a trial set of communication parameter values corresponding to the row of the master rate table, and including one of the alternative values. The communication device measures an error rate measure corresponding to use of the trial set of communication parameter values.
1. A method, comprising: storing, in a memory device of a first communication device, a master rate table, wherein the master rate table comprises a plurality of rows that correspond to i) respective data rates, and ii) respective sets of communication parameter values corresponding to the respective sets of data rates, each set of communication parameter values includes i) a respective plurality of first values corresponding to a plurality of first parameters, ii) respective one or more default second values corresponding to one or more second parameters, and iii) respective one or more alternative second values corresponding to the one or more second parameters; determining, at the first communication device, a first error rate measure corresponding to transmission of one or more first data units by the first communication device to a second communication device according to a first set of communication parameter values, wherein the first set of communication parameter values correspond to i) a first row of the master rate table, and ii) a first transmission data rate; when the first communication device determines that a new transmission rate should be used, selecting, at the first communication device, new communication parameter values using the master rate table, including: when the first set of communication parameter values includes the respective one or more default second values corresponding to the first row of the master rate table, determining, at the first communication device, a first trial set of communication parameter values as i) the respective plurality of first values corresponding to the first row of the master rate table, and ii) at least one of the respective one or more alternative second values corresponding to the one or more second parameters that correspond to the first row of the master rate table, determining, at the first communication device, a second error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the first trial set of communication parameter values, and selecting, at the first communication device, the new communication parameter values based on the second error rate measure. 2. The method of claim 1, wherein selecting the new communication parameter values further comprises: when the first communication device determines that the new transmission rate should be used, and when the first set of communication parameter values includes the respective one or more second default values corresponding to the first row of the master rate table: determining, at the first communication device, a second trial set of communication parameter values as i) the respective plurality of first values corresponding to a second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table, wherein the second row of the master rate table corresponds to a second transmission data rate that is different than the first transmission data rate, determining, at the first communication device, a third error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the second trial set of communication parameter values, and selecting, at the first communication device, the new communication parameter values further based on the third error rate measure. 3. The method of claim 1, wherein selecting the new communication parameter values further comprises: when the first communication device determines that the new transmission rate should be used, and when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters: determining, at the first communication device, a second trial set of communication parameter values as i) the respective plurality of first values corresponding to a second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table, wherein the second row of the master rate table corresponds to a second transmission data rate that is different than the first transmission data rate, determining, at the first communication device, a third error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the second trial set of communication parameter values, and selecting, at the first communication device, the new communication parameter values based on the third error rate measure. 4. The method of claim 3, wherein selecting the new communication parameter values further comprises: when the first communication device determines that the new transmission rate should be used, and when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters: determining, at the first communication device, whether the second transmission data rate is greater than a current transmission data rate; wherein: determining the second trial set of communication parameter values as i) the respective plurality of first values corresponding to the second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table is performed when the first communication device determines that the second transmission data rate that is greater than the current transmission data rate, determining the third error rate measure is performed when the first communication device determines that the second transmission data rate that is greater than the current transmission data rate, and selecting the new communication parameter values based on the third error rate measure is performed when the first communication device determines that the second transmission data rate that is greater than the current transmission data rate. 5. The method of claim 4, wherein selecting the new communication parameter values further comprises: when the first communication device determines that the new transmission rate should be used, when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters, and when the first communication device determines that the second transmission data rate is not greater than the current transmission data rate: determining, at the first communication device, a third trial set of communication parameter values as i) the respective plurality of first values corresponding to the second row of the master rate table, and ii) at least one of the respective one or more alternative second values corresponding to i) the one or more second parameters, and ii) the second row of the master rate table, determining, at the first communication device, a fourth error rate measure corresponding to transmission of one or more fourth data units by the first communication device to the second communication device according to the third trial set of communication parameter values, and selecting, at the first communication device, the new communication parameter values based on the fourth error rate measure. 6. An apparatus, comprising: a network interface device associated with a first communication device, the network interface device comprising: one or more integrated circuit (IC) devices, and a memory device implemented on the one or more IC devices; wherein the one or more IC devices are configured to: store, in the memory device, a master rate table, wherein the master rate table comprises a plurality of rows that correspond to i) respective data rates, and ii) respective sets of communication parameter values corresponding to the respective sets of data rates, and each set of communication parameter values includes i) a respective plurality of first values corresponding to a plurality of first parameters, ii) respective one or more default second values corresponding to one or more second parameters, and iii) respective one or more alternative second values corresponding to the one or more second parameters; wherein the one or more IC devices are further configured to: determine a first error rate measure corresponding to transmission of one or more first physical layer (PHY) data units to a second communication device according to a first set of communication parameter values, wherein the first set of communication parameter values correspond to i) a first row of the master rate table, and ii) a first transmission data rate, when the network interface device determines that a new transmission rate should be used, select new communication parameter values using the master rate table, including: when the first set of communication parameter values includes the respective one or more default second values corresponding to the first row of the master rate table, determining a first trial set of communication parameter values as i) the respective plurality of first values corresponding to the first row of the master rate table, and ii) at least one of the respective one or more alternative second values corresponding to the one or more second parameters that correspond to the first row of the master rate table, determining a second error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the first trial set of communication parameter values, and selecting the new communication parameter values based on the second error rate measure. 7. The apparatus of claim 6, wherein the one or more IC devices are further configured to: when the network interface device determines that the new transmission rate should be used, and when the first set of communication parameter values includes the respective one or more second default values corresponding to the first row of the master rate table: determine a second trial set of communication parameter values as i) the respective plurality of first values corresponding to a second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table, wherein the second row of the master rate table corresponds to a second transmission data rate that is different than the first transmission data rate, determine a third error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the second trial set of communication parameter values, and select the new communication parameter values further based on the third error rate measure. 8. The apparatus of claim 6, wherein the one or more IC devices are further configured to: when the network interface device determines that the new transmission rate should be used, and when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters: determine a second trial set of communication parameter values as i) the respective plurality of first values corresponding to a second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table, wherein the second row of the master rate table corresponds to a second transmission data rate that is different than the first transmission data rate, determine a third error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the second trial set of communication parameter values, and select the new communication parameter values based on the third error rate measure. 9. The apparatus of claim 8, wherein the one or more IC devices are further configured to: when the network interface device determines that the new transmission rate should be used, and when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters: determine whether the second transmission data rate is greater than a current transmission data rate; wherein: determining the second trial set of communication parameter values as i) the respective plurality of first values corresponding to the second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table is performed when the network interface device determines that the second transmission data rate that is greater than the current transmission data rate, determining the third error rate measure is performed when the network interface device determines that the second transmission data rate that is greater than the current transmission data rate, and selecting the new communication parameter values based on the third error rate measure is performed when the network interface device determines that the second transmission data rate that is greater than the current transmission data rate. 10. The apparatus of claim 9, wherein the one or more IC devices are further configured to: when the network interface device determines that the new transmission rate should be used, when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters, and when the network interface device determines that the second transmission data rate is not greater than the current transmission data rate: determine a third trial set of communication parameter values as i) the respective plurality of first values corresponding to the second row of the master rate table, and ii) at least one of the respective one or more alternative second values corresponding to i) the one or more second parameters, and ii) the second row of the master rate table, determine a fourth error rate measure corresponding to transmission of one or more fourth data units by the first communication device to the second communication device according to the third trial set of communication parameter values, and select the new communication parameter values based on the fourth error rate measure. 11. A method, comprising: generating, at a communication device, one or more first physical layer (PHY) data units using a first set of communication parameter values, wherein the first set of communication parameter values corresponds to a first data rate; transmitting, by the communication device, the one or more first PHY data units; determining, at the first communication device, that a new data rate is to be used based on error rate information corresponding to the transmission of the one or more first PHY data units; in response to determining that the new data rate is to be used: determining, at the communication device, a plurality of trial sets of communication parameters corresponding to respective second data rates, generating, at the communication device, respective sets of one or more second PHY data units using the plurality of trial sets of communication parameter values, transmitting, by the communication device, the respective sets of one or more second PHY data units during a first contiguous time period for evaluating the plurality of trial sets of communication parameter values, and selecting, at the communication device, a new set of communication parameter values based on error rate information corresponding to the transmission of the respective sets of one or more second PHY data units during the first contiguous time period; wherein the method further comprises transmitting, by the communication device, one or more third PHY data units using the new set of communication parameter values during a second contiguous time period after the first contiguous time period. 12. The method of claim 11, wherein: the respective sets of one or more second PHY data units includes i) a first set of one or more second PHY data units generated using a first trial set of communication parameter values among the plurality of trial sets of communication parameters, and ii) a second set of one or more second PHY data units generated using a second trial set of communication parameter values among the plurality of trial sets of communication parameters; transmitting the respective sets of one or more second PHY data units during the first contiguous time period comprises: transmitting, by the communication device, the first set of one or more second PHY data units during a first contiguous time subperiod, and transmitting, by the communication device, the second set of one or more second PHY data units during a second contiguous time subperiod. 13. The method of claim 12, further comprising: generating, at the communication device, one or more fourth PHY data units using the first set of communication parameter values; and transmitting, by the communication device, the one or more fourth PHY data units during a third contiguous time subperiod between the first contiguous time subperiod and the second contiguous time subperiod. 14. The method of claim 11, further comprising: using, by the communication device, the new set of communication parameter values for PHY data units at least for a minimum time duration. 15. The method of claim 11, wherein selecting the new set of communication parameter values comprises: selecting the first set of communication parameter values as the new set of communication parameter values in response to determining that none of the plurality of trial sets of communication parameter values provides an acceptable error rate. 16. An apparatus, comprising: a network interface device including one or more integrated circuit (IC) devices, wherein the one or more IC devices are configured to: generate one or more first physical layer (PHY) data units using a first set of communication parameter values, wherein the first set of communication parameter values corresponds to a first data rate, transmit the one or more first PHY data units, determine that a new data rate is to be used based on error rate information corresponding to the transmission of the one or more first PHY data units, and in response to determining that the new data rate is to be used: determine a plurality of trial sets of communication parameters corresponding to respective second data rates, generate respective sets of one or more second PHY data units using the plurality of trial sets of communication parameter values, transmit the respective sets of one or more second PHY data units during a first contiguous time period for evaluating the plurality of trial sets of communication parameter values, and select a new set of communication parameter values based on error rate information corresponding to the transmission of the respective sets of one or more second PHY data units during the first contiguous time period, and wherein the one or more IC devices are configured to: transmit one or more third PHY data units using the new set of communication parameter values during a second contiguous time period after the first contiguous time period. 17. The apparatus of claim 16, wherein: the respective sets of one or more second PHY data units includes i) a first set of one or more second PHY data units generated using a first trial set of communication parameter values among the plurality of trial sets of communication parameters, and ii) a second set of one or more second PHY data units generated using a second trial set of communication parameter values among the plurality of trial sets of communication parameters; wherein the one or more IC devices are configured to: transmit the first set of one or more second PHY data units during a first contiguous time subperiod within the first contiguous time period, and transmit the second set of one or more second PHY data units during a second contiguous time subperiod within the first contiguous time period. 18. The apparatus of claim 17, wherein the one or more IC devices are configured to: generate one or more fourth PHY data units using the first set of communication parameter values; and transmit the one or more fourth PHY data units during a third contiguous time subperiod between the first contiguous time subperiod and the second contiguous time subperiod. 19. The apparatus of claim 16, wherein the one or more IC devices are configured to: use the new set of communication parameter values for PHY data units transmitted during the second contiguous time period at least for a minimum time duration. 20. The apparatus of claim 16, wherein the one or more IC devices are configured to: select the first set of communication parameter values as the new set of communication parameter values in response to determining that none of the plurality of trial sets of communication parameter values provides an acceptable error rate.
A communication device stores a master rate table, which comprises a plurality of rows that correspond to i) respective data rates, and ii) respective sets of communication parameter values corresponding to the respective sets of data rates. Each set of communication parameter values includes i) a default value of a parameter, and iii) one or more alternative values of the parameter. When the communication device determines that a new transmission rate should be used, and when a current set of communication parameter values corresponds to a row in the master rate table and includes the default value, the communication device selects a trial set of communication parameter values corresponding to the row of the master rate table, and including one of the alternative values. The communication device measures an error rate measure corresponding to use of the trial set of communication parameter values.1. A method, comprising: storing, in a memory device of a first communication device, a master rate table, wherein the master rate table comprises a plurality of rows that correspond to i) respective data rates, and ii) respective sets of communication parameter values corresponding to the respective sets of data rates, each set of communication parameter values includes i) a respective plurality of first values corresponding to a plurality of first parameters, ii) respective one or more default second values corresponding to one or more second parameters, and iii) respective one or more alternative second values corresponding to the one or more second parameters; determining, at the first communication device, a first error rate measure corresponding to transmission of one or more first data units by the first communication device to a second communication device according to a first set of communication parameter values, wherein the first set of communication parameter values correspond to i) a first row of the master rate table, and ii) a first transmission data rate; when the first communication device determines that a new transmission rate should be used, selecting, at the first communication device, new communication parameter values using the master rate table, including: when the first set of communication parameter values includes the respective one or more default second values corresponding to the first row of the master rate table, determining, at the first communication device, a first trial set of communication parameter values as i) the respective plurality of first values corresponding to the first row of the master rate table, and ii) at least one of the respective one or more alternative second values corresponding to the one or more second parameters that correspond to the first row of the master rate table, determining, at the first communication device, a second error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the first trial set of communication parameter values, and selecting, at the first communication device, the new communication parameter values based on the second error rate measure. 2. The method of claim 1, wherein selecting the new communication parameter values further comprises: when the first communication device determines that the new transmission rate should be used, and when the first set of communication parameter values includes the respective one or more second default values corresponding to the first row of the master rate table: determining, at the first communication device, a second trial set of communication parameter values as i) the respective plurality of first values corresponding to a second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table, wherein the second row of the master rate table corresponds to a second transmission data rate that is different than the first transmission data rate, determining, at the first communication device, a third error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the second trial set of communication parameter values, and selecting, at the first communication device, the new communication parameter values further based on the third error rate measure. 3. The method of claim 1, wherein selecting the new communication parameter values further comprises: when the first communication device determines that the new transmission rate should be used, and when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters: determining, at the first communication device, a second trial set of communication parameter values as i) the respective plurality of first values corresponding to a second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table, wherein the second row of the master rate table corresponds to a second transmission data rate that is different than the first transmission data rate, determining, at the first communication device, a third error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the second trial set of communication parameter values, and selecting, at the first communication device, the new communication parameter values based on the third error rate measure. 4. The method of claim 3, wherein selecting the new communication parameter values further comprises: when the first communication device determines that the new transmission rate should be used, and when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters: determining, at the first communication device, whether the second transmission data rate is greater than a current transmission data rate; wherein: determining the second trial set of communication parameter values as i) the respective plurality of first values corresponding to the second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table is performed when the first communication device determines that the second transmission data rate that is greater than the current transmission data rate, determining the third error rate measure is performed when the first communication device determines that the second transmission data rate that is greater than the current transmission data rate, and selecting the new communication parameter values based on the third error rate measure is performed when the first communication device determines that the second transmission data rate that is greater than the current transmission data rate. 5. The method of claim 4, wherein selecting the new communication parameter values further comprises: when the first communication device determines that the new transmission rate should be used, when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters, and when the first communication device determines that the second transmission data rate is not greater than the current transmission data rate: determining, at the first communication device, a third trial set of communication parameter values as i) the respective plurality of first values corresponding to the second row of the master rate table, and ii) at least one of the respective one or more alternative second values corresponding to i) the one or more second parameters, and ii) the second row of the master rate table, determining, at the first communication device, a fourth error rate measure corresponding to transmission of one or more fourth data units by the first communication device to the second communication device according to the third trial set of communication parameter values, and selecting, at the first communication device, the new communication parameter values based on the fourth error rate measure. 6. An apparatus, comprising: a network interface device associated with a first communication device, the network interface device comprising: one or more integrated circuit (IC) devices, and a memory device implemented on the one or more IC devices; wherein the one or more IC devices are configured to: store, in the memory device, a master rate table, wherein the master rate table comprises a plurality of rows that correspond to i) respective data rates, and ii) respective sets of communication parameter values corresponding to the respective sets of data rates, and each set of communication parameter values includes i) a respective plurality of first values corresponding to a plurality of first parameters, ii) respective one or more default second values corresponding to one or more second parameters, and iii) respective one or more alternative second values corresponding to the one or more second parameters; wherein the one or more IC devices are further configured to: determine a first error rate measure corresponding to transmission of one or more first physical layer (PHY) data units to a second communication device according to a first set of communication parameter values, wherein the first set of communication parameter values correspond to i) a first row of the master rate table, and ii) a first transmission data rate, when the network interface device determines that a new transmission rate should be used, select new communication parameter values using the master rate table, including: when the first set of communication parameter values includes the respective one or more default second values corresponding to the first row of the master rate table, determining a first trial set of communication parameter values as i) the respective plurality of first values corresponding to the first row of the master rate table, and ii) at least one of the respective one or more alternative second values corresponding to the one or more second parameters that correspond to the first row of the master rate table, determining a second error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the first trial set of communication parameter values, and selecting the new communication parameter values based on the second error rate measure. 7. The apparatus of claim 6, wherein the one or more IC devices are further configured to: when the network interface device determines that the new transmission rate should be used, and when the first set of communication parameter values includes the respective one or more second default values corresponding to the first row of the master rate table: determine a second trial set of communication parameter values as i) the respective plurality of first values corresponding to a second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table, wherein the second row of the master rate table corresponds to a second transmission data rate that is different than the first transmission data rate, determine a third error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the second trial set of communication parameter values, and select the new communication parameter values further based on the third error rate measure. 8. The apparatus of claim 6, wherein the one or more IC devices are further configured to: when the network interface device determines that the new transmission rate should be used, and when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters: determine a second trial set of communication parameter values as i) the respective plurality of first values corresponding to a second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table, wherein the second row of the master rate table corresponds to a second transmission data rate that is different than the first transmission data rate, determine a third error rate measure corresponding to transmission of one or more second data units by the first communication device to the second communication device according to the second trial set of communication parameter values, and select the new communication parameter values based on the third error rate measure. 9. The apparatus of claim 8, wherein the one or more IC devices are further configured to: when the network interface device determines that the new transmission rate should be used, and when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters: determine whether the second transmission data rate is greater than a current transmission data rate; wherein: determining the second trial set of communication parameter values as i) the respective plurality of first values corresponding to the second row of the master rate table, and ii) the respective one or more default second values corresponding to the second row of the master rate table is performed when the network interface device determines that the second transmission data rate that is greater than the current transmission data rate, determining the third error rate measure is performed when the network interface device determines that the second transmission data rate that is greater than the current transmission data rate, and selecting the new communication parameter values based on the third error rate measure is performed when the network interface device determines that the second transmission data rate that is greater than the current transmission data rate. 10. The apparatus of claim 9, wherein the one or more IC devices are further configured to: when the network interface device determines that the new transmission rate should be used, when the first set of communication parameter values includes one of the respective one or more alternative second values corresponding to the one or more second parameters, and when the network interface device determines that the second transmission data rate is not greater than the current transmission data rate: determine a third trial set of communication parameter values as i) the respective plurality of first values corresponding to the second row of the master rate table, and ii) at least one of the respective one or more alternative second values corresponding to i) the one or more second parameters, and ii) the second row of the master rate table, determine a fourth error rate measure corresponding to transmission of one or more fourth data units by the first communication device to the second communication device according to the third trial set of communication parameter values, and select the new communication parameter values based on the fourth error rate measure. 11. A method, comprising: generating, at a communication device, one or more first physical layer (PHY) data units using a first set of communication parameter values, wherein the first set of communication parameter values corresponds to a first data rate; transmitting, by the communication device, the one or more first PHY data units; determining, at the first communication device, that a new data rate is to be used based on error rate information corresponding to the transmission of the one or more first PHY data units; in response to determining that the new data rate is to be used: determining, at the communication device, a plurality of trial sets of communication parameters corresponding to respective second data rates, generating, at the communication device, respective sets of one or more second PHY data units using the plurality of trial sets of communication parameter values, transmitting, by the communication device, the respective sets of one or more second PHY data units during a first contiguous time period for evaluating the plurality of trial sets of communication parameter values, and selecting, at the communication device, a new set of communication parameter values based on error rate information corresponding to the transmission of the respective sets of one or more second PHY data units during the first contiguous time period; wherein the method further comprises transmitting, by the communication device, one or more third PHY data units using the new set of communication parameter values during a second contiguous time period after the first contiguous time period. 12. The method of claim 11, wherein: the respective sets of one or more second PHY data units includes i) a first set of one or more second PHY data units generated using a first trial set of communication parameter values among the plurality of trial sets of communication parameters, and ii) a second set of one or more second PHY data units generated using a second trial set of communication parameter values among the plurality of trial sets of communication parameters; transmitting the respective sets of one or more second PHY data units during the first contiguous time period comprises: transmitting, by the communication device, the first set of one or more second PHY data units during a first contiguous time subperiod, and transmitting, by the communication device, the second set of one or more second PHY data units during a second contiguous time subperiod. 13. The method of claim 12, further comprising: generating, at the communication device, one or more fourth PHY data units using the first set of communication parameter values; and transmitting, by the communication device, the one or more fourth PHY data units during a third contiguous time subperiod between the first contiguous time subperiod and the second contiguous time subperiod. 14. The method of claim 11, further comprising: using, by the communication device, the new set of communication parameter values for PHY data units at least for a minimum time duration. 15. The method of claim 11, wherein selecting the new set of communication parameter values comprises: selecting the first set of communication parameter values as the new set of communication parameter values in response to determining that none of the plurality of trial sets of communication parameter values provides an acceptable error rate. 16. An apparatus, comprising: a network interface device including one or more integrated circuit (IC) devices, wherein the one or more IC devices are configured to: generate one or more first physical layer (PHY) data units using a first set of communication parameter values, wherein the first set of communication parameter values corresponds to a first data rate, transmit the one or more first PHY data units, determine that a new data rate is to be used based on error rate information corresponding to the transmission of the one or more first PHY data units, and in response to determining that the new data rate is to be used: determine a plurality of trial sets of communication parameters corresponding to respective second data rates, generate respective sets of one or more second PHY data units using the plurality of trial sets of communication parameter values, transmit the respective sets of one or more second PHY data units during a first contiguous time period for evaluating the plurality of trial sets of communication parameter values, and select a new set of communication parameter values based on error rate information corresponding to the transmission of the respective sets of one or more second PHY data units during the first contiguous time period, and wherein the one or more IC devices are configured to: transmit one or more third PHY data units using the new set of communication parameter values during a second contiguous time period after the first contiguous time period. 17. The apparatus of claim 16, wherein: the respective sets of one or more second PHY data units includes i) a first set of one or more second PHY data units generated using a first trial set of communication parameter values among the plurality of trial sets of communication parameters, and ii) a second set of one or more second PHY data units generated using a second trial set of communication parameter values among the plurality of trial sets of communication parameters; wherein the one or more IC devices are configured to: transmit the first set of one or more second PHY data units during a first contiguous time subperiod within the first contiguous time period, and transmit the second set of one or more second PHY data units during a second contiguous time subperiod within the first contiguous time period. 18. The apparatus of claim 17, wherein the one or more IC devices are configured to: generate one or more fourth PHY data units using the first set of communication parameter values; and transmit the one or more fourth PHY data units during a third contiguous time subperiod between the first contiguous time subperiod and the second contiguous time subperiod. 19. The apparatus of claim 16, wherein the one or more IC devices are configured to: use the new set of communication parameter values for PHY data units transmitted during the second contiguous time period at least for a minimum time duration. 20. The apparatus of claim 16, wherein the one or more IC devices are configured to: select the first set of communication parameter values as the new set of communication parameter values in response to determining that none of the plurality of trial sets of communication parameter values provides an acceptable error rate.
2,400
9,062
9,062
15,535,452
2,412
Systems and methods of handing over a wireless device 300 are provided. In one exemplary embodiment, a method performed by a source base station 100 of handing over a wireless device 300 from the source base station 100 to a target base station 200 may include determining that a wireless device 300 is to be handed over from the source base station 100 to the target base station 200. Further, the method may include sending, to the target base station 200, a current mapping between one or more flow identifiers and a first set of data radio bearers used for communication between the wireless device 300 and the source base station 100.
1-36. (canceled) 37. A method performed by a source base station of handing over a wireless device from the source base station to a target base station, said method comprising: determining that a wireless device is to be handed over from the source base station to the target base station; and sending, to the target base station, a current mapping between one or more flow identifiers and a first set of data radio bearers used for communication between the wireless device and the source base station. 38. The method of claim 37, further comprising: receiving the current mapping from a network node or from a wireless device. 39. The method of claim 37, wherein said sending the current mapping is prior to or contemporaneous with or after the wireless device being handed over to the target base station. 40. The method of claim 37, wherein the one or more flow identifiers are associated with respective packet flows originating or terminating at the wireless device. 41. The method of claim 37, further comprising: receiving, from the target base station, an indication of a new mapping between the one or more flow identifiers and a second set of data radio bearers used for communication between the wireless device and the target base station; and sending, to the wireless device, the indication. 42. The method of claim 37, further comprising: receiving, from the wireless device, an indication of a new mapping between the one or more flow identifiers and a second set of data radio bearers used for communication between the wireless device and the target base station; and sending, to the target base station, the indication. 43. The method of claim 42, wherein said sending the new mapping is prior to or contemporaneous with or after the wireless device is handed over to the target base station. 44. A source base station for handing over a wireless device to a target base station, the source base station comprising: a processor and a memory, said memory containing instructions executable by said processor, whereby said source base station is operative to: determine that the wireless device is to be handed over from the source base station to the target base station; and sending, to the target base station, a current mapping between one or more flow identifiers and a first set of data radio bearers used for communication between the wireless device and the source base station. 45. A method performed by a wireless device of handing over the wireless device from a source base station to a target base station, said method comprising: determining that the wireless device is to be handed over from the source base station to the target base station; and sending, to the target base station, a current mapping between one or more flow identifiers and a first set of data radio bearers used for communication between the wireless device and the source base station. 46. The method of claim 45, wherein said sending the current mapping is via the source base station. 47. The method of claim 45, further comprising: obtaining a new mapping between the one or more flow identifiers and a second set of data radio bearers used for communication between the wireless device and the target base station. 48. The method of claim 47, wherein said obtaining includes: receiving, from the target base station, an indication of the new mapping. 49. The method of claim 48, wherein said receiving is via the source base station. 50. The method of claim 48, further comprising: sending, to the target base station, an indication that acknowledges receiving the new mapping. 51. The method of claim 50, wherein said sending the acknowledgement indication is via the source base station. 52. The method of claim 47, wherein the new mapping is the same as the current mapping or the new mapping removes or adds a data radio bearer from/to the first set to obtain the second set. 53. The method of claim 45, further comprising: after the wireless device has been handed over to the target base station: receiving, from the target base station, one or more flow identifiers associated with one or more downlink packet flows on a new data radio bearer used for communication between the wireless device and the target base station; mapping the one or more flow identifiers to the one or more uplink packet flows; and transmitting, to the target base station, the one or more uplink packet flows on the new data radio bearer. 54. The method of claim 45, further comprising: after the wireless device has been handed over to the target base station, mapping the one or more flow identifiers to a default data radio bearer used for communication between the wireless device and the target base station. 55. The method of claim 45, further comprising: after a failed hand over to the target base station, mapping the one or more flow identifiers to the first set based on the current mapping. 56. The method of claim 45, wherein the one or more flow identifiers is associated with respective packet flows originating or terminating at the wireless device. 57. A wireless device that is capable of being handed over from a source base station to a target base station, said wireless device comprising: a processor and a memory, said memory containing instructions executable by said processor, whereby said wireless device is operative to: determine that the wireless device is to be handed over from the source base station to the target base station; and send, to the target base station, a current mapping between one or more flow identifiers associated with respective packet flows originating or terminating at the wireless device and a first set of data radio bearers used for communication between the wireless device and the source base station. 58. A method performed by the target base station of handing over a wireless device from a source base station to the target base station, said method comprising: obtaining a current mapping between one or more flow identifiers and a first set of data radio bearers used for communication between the wireless device and the source base station; determining a new mapping between the one or more flow identifiers and a second set of data radio bearers used for communication between the wireless device and the target base station; and signaling the new mapping to the wireless device. 59. The method of claim 58, wherein said obtaining includes: receiving, from the source base station or from the wireless device, the current mapping. 60. The method of claim 59, wherein said receiving is via the source base station. 61. The method of claim 59, wherein said receiving is prior to or contemporaneous with or after the wireless device being handed over to the source base station. 62. The method of claim 58, wherein said determining includes: determining that the new mapping is the same as the current mapping or determining that the new mapping removes or adds a data radio bearer from/to the first set to obtain the second set. 63. The method of claim 58, wherein said determining includes: after the wireless device has been handed over to the target base station, determining a new mapping between the one or more flow identifiers and a new data radio bearer of the second set. 64. The method of claim 58, wherein said determining includes: after the wireless device has been handed over to the target base station, determining a new mapping between the one or more flow identifiers associated with one or more downlink packet flows on a new data radio bearer used for communication between the wireless device and the target base station. 65. The method of claim 64, further comprising: transmitting, to the wireless device, the one or more downlink packet flows on the new data radio bearer based on the new mapping; and in response to said transmitting, receiving, from the wireless device, one or more uplink packet flows on the new data radio bearer that are mapped to the one or more flow identifiers. 66. The method of claim 58, wherein said signaling includes: sending, to the wireless device, an indication of the new mapping. 67. The method of claim 66, wherein said sending the new mapping indication is via the source base station. 68. The method of claim 58, wherein the one or more flow identifiers are associated with respective packet flows originating or terminating at the wireless device. 69. A target base station for handing over a wireless device from a source base station to the target base station, said target base station comprising a processor and a memory, said memory containing instructions executable by said processor, whereby said target base station is operative to: obtain a current mapping between one or more flow identifiers associated with respective packet flows originating or terminating at the wireless device and a first set of data radio bearers used for communication between the wireless device and the source base station; determine a new mapping between the one or more flow identifiers and a second set of data radio bearers used for communication between the wireless device and the target base station; and signal, to the wireless device, the new mapping.
Systems and methods of handing over a wireless device 300 are provided. In one exemplary embodiment, a method performed by a source base station 100 of handing over a wireless device 300 from the source base station 100 to a target base station 200 may include determining that a wireless device 300 is to be handed over from the source base station 100 to the target base station 200. Further, the method may include sending, to the target base station 200, a current mapping between one or more flow identifiers and a first set of data radio bearers used for communication between the wireless device 300 and the source base station 100.1-36. (canceled) 37. A method performed by a source base station of handing over a wireless device from the source base station to a target base station, said method comprising: determining that a wireless device is to be handed over from the source base station to the target base station; and sending, to the target base station, a current mapping between one or more flow identifiers and a first set of data radio bearers used for communication between the wireless device and the source base station. 38. The method of claim 37, further comprising: receiving the current mapping from a network node or from a wireless device. 39. The method of claim 37, wherein said sending the current mapping is prior to or contemporaneous with or after the wireless device being handed over to the target base station. 40. The method of claim 37, wherein the one or more flow identifiers are associated with respective packet flows originating or terminating at the wireless device. 41. The method of claim 37, further comprising: receiving, from the target base station, an indication of a new mapping between the one or more flow identifiers and a second set of data radio bearers used for communication between the wireless device and the target base station; and sending, to the wireless device, the indication. 42. The method of claim 37, further comprising: receiving, from the wireless device, an indication of a new mapping between the one or more flow identifiers and a second set of data radio bearers used for communication between the wireless device and the target base station; and sending, to the target base station, the indication. 43. The method of claim 42, wherein said sending the new mapping is prior to or contemporaneous with or after the wireless device is handed over to the target base station. 44. A source base station for handing over a wireless device to a target base station, the source base station comprising: a processor and a memory, said memory containing instructions executable by said processor, whereby said source base station is operative to: determine that the wireless device is to be handed over from the source base station to the target base station; and sending, to the target base station, a current mapping between one or more flow identifiers and a first set of data radio bearers used for communication between the wireless device and the source base station. 45. A method performed by a wireless device of handing over the wireless device from a source base station to a target base station, said method comprising: determining that the wireless device is to be handed over from the source base station to the target base station; and sending, to the target base station, a current mapping between one or more flow identifiers and a first set of data radio bearers used for communication between the wireless device and the source base station. 46. The method of claim 45, wherein said sending the current mapping is via the source base station. 47. The method of claim 45, further comprising: obtaining a new mapping between the one or more flow identifiers and a second set of data radio bearers used for communication between the wireless device and the target base station. 48. The method of claim 47, wherein said obtaining includes: receiving, from the target base station, an indication of the new mapping. 49. The method of claim 48, wherein said receiving is via the source base station. 50. The method of claim 48, further comprising: sending, to the target base station, an indication that acknowledges receiving the new mapping. 51. The method of claim 50, wherein said sending the acknowledgement indication is via the source base station. 52. The method of claim 47, wherein the new mapping is the same as the current mapping or the new mapping removes or adds a data radio bearer from/to the first set to obtain the second set. 53. The method of claim 45, further comprising: after the wireless device has been handed over to the target base station: receiving, from the target base station, one or more flow identifiers associated with one or more downlink packet flows on a new data radio bearer used for communication between the wireless device and the target base station; mapping the one or more flow identifiers to the one or more uplink packet flows; and transmitting, to the target base station, the one or more uplink packet flows on the new data radio bearer. 54. The method of claim 45, further comprising: after the wireless device has been handed over to the target base station, mapping the one or more flow identifiers to a default data radio bearer used for communication between the wireless device and the target base station. 55. The method of claim 45, further comprising: after a failed hand over to the target base station, mapping the one or more flow identifiers to the first set based on the current mapping. 56. The method of claim 45, wherein the one or more flow identifiers is associated with respective packet flows originating or terminating at the wireless device. 57. A wireless device that is capable of being handed over from a source base station to a target base station, said wireless device comprising: a processor and a memory, said memory containing instructions executable by said processor, whereby said wireless device is operative to: determine that the wireless device is to be handed over from the source base station to the target base station; and send, to the target base station, a current mapping between one or more flow identifiers associated with respective packet flows originating or terminating at the wireless device and a first set of data radio bearers used for communication between the wireless device and the source base station. 58. A method performed by the target base station of handing over a wireless device from a source base station to the target base station, said method comprising: obtaining a current mapping between one or more flow identifiers and a first set of data radio bearers used for communication between the wireless device and the source base station; determining a new mapping between the one or more flow identifiers and a second set of data radio bearers used for communication between the wireless device and the target base station; and signaling the new mapping to the wireless device. 59. The method of claim 58, wherein said obtaining includes: receiving, from the source base station or from the wireless device, the current mapping. 60. The method of claim 59, wherein said receiving is via the source base station. 61. The method of claim 59, wherein said receiving is prior to or contemporaneous with or after the wireless device being handed over to the source base station. 62. The method of claim 58, wherein said determining includes: determining that the new mapping is the same as the current mapping or determining that the new mapping removes or adds a data radio bearer from/to the first set to obtain the second set. 63. The method of claim 58, wherein said determining includes: after the wireless device has been handed over to the target base station, determining a new mapping between the one or more flow identifiers and a new data radio bearer of the second set. 64. The method of claim 58, wherein said determining includes: after the wireless device has been handed over to the target base station, determining a new mapping between the one or more flow identifiers associated with one or more downlink packet flows on a new data radio bearer used for communication between the wireless device and the target base station. 65. The method of claim 64, further comprising: transmitting, to the wireless device, the one or more downlink packet flows on the new data radio bearer based on the new mapping; and in response to said transmitting, receiving, from the wireless device, one or more uplink packet flows on the new data radio bearer that are mapped to the one or more flow identifiers. 66. The method of claim 58, wherein said signaling includes: sending, to the wireless device, an indication of the new mapping. 67. The method of claim 66, wherein said sending the new mapping indication is via the source base station. 68. The method of claim 58, wherein the one or more flow identifiers are associated with respective packet flows originating or terminating at the wireless device. 69. A target base station for handing over a wireless device from a source base station to the target base station, said target base station comprising a processor and a memory, said memory containing instructions executable by said processor, whereby said target base station is operative to: obtain a current mapping between one or more flow identifiers associated with respective packet flows originating or terminating at the wireless device and a first set of data radio bearers used for communication between the wireless device and the source base station; determine a new mapping between the one or more flow identifiers and a second set of data radio bearers used for communication between the wireless device and the target base station; and signal, to the wireless device, the new mapping.
2,400
9,063
9,063
15,318,977
2,451
A client-server system includes a server, at least one of a first client and a second client, and server-side computer resources which are attributed to the at least one of a first client and a second client so as to implement a server-side multitasking. The at least one of a first client and a second client distribute the server-side computer resources input-dependently so as to implement a client-side and input-dependent multitasking.
1-11. (canceled) 12. A client-server system comprising: a server; at least one of a first client and a second client; and server-side computer resources which are attributed to the at least one of a first client and a second client so as to implement a server-side multitasking, wherein, the at least one of a first client and a second client distribute the server-side computer resources input-dependently so as to implement a client-side and input-dependent multitasking. 13. The client-server system as recited in claim 12, wherein the client-side and input-dependent multitasking is a pre-emptive multitasking. 14. The client-server system as recited in claim 12, further comprising: other clients, wherein, the other clients also have attributed server-side computer resources attributed thereto, and the other clients input-dependently distribute the server-side computer resources. 15. The client-server system as recited in claim 14, wherein, the server comprises at least one server service, and at least one of the first client, the second client, and the other clients is configured to directly or to indirectly call up the at least one server service. 16. The client-server system as recited in claim 15, wherein the server further comprises at least one database and/or at least one database system. 17. The client-server system as recited in claim 16, further comprising: at least one of a load dispatcher and a database meta-description appliance which are configured to allows a unitary access to the at least one database and/or to the at least one database system. 18. The client-server system as recited in claim 17, wherein the at least one of a load dispatcher and a database meta-description appliance is further configured to distribute the server-side computer resources to the first client, to the second client, and to the other clients. 19. The client-server system as recited in claims 14, wherein, a dependency of, a called-up service, or a result or results of at least one called-up service, or results of several called-up services, from, another service, or another result of a service, is taken into account for the input-dependent distribution. 20. The client-server system as recited in claim 19, wherein at least one of the first client, the second client, and the other clients comprises a display device. 21. The client-server system as recited in claim 20, wherein at least one of the first client, the second client, and the other clients is configured so that, the called-up service, or the result or results of the at least one called-up service, or the results of the several called-up services, is represented via a tab structure in the display device. 22. The client-server system as recited in claim 21, wherein at least one of the first client, the second client, and the other clients is configured so that requested interdependent services are displayed in a related manner via the display device so as to provide a context-based representation. 23. The client-server system as recited in claim 22, wherein the displaying in a related manner is provided by a tab family structure, 24. A terminal which is configured to implement the client-server system as recited in claim 12. 25. The terminal as recited in claim 24, wherein the terminal is a laptop, a tablet, a cell phone, a smart watch, or a desktop computer.
A client-server system includes a server, at least one of a first client and a second client, and server-side computer resources which are attributed to the at least one of a first client and a second client so as to implement a server-side multitasking. The at least one of a first client and a second client distribute the server-side computer resources input-dependently so as to implement a client-side and input-dependent multitasking.1-11. (canceled) 12. A client-server system comprising: a server; at least one of a first client and a second client; and server-side computer resources which are attributed to the at least one of a first client and a second client so as to implement a server-side multitasking, wherein, the at least one of a first client and a second client distribute the server-side computer resources input-dependently so as to implement a client-side and input-dependent multitasking. 13. The client-server system as recited in claim 12, wherein the client-side and input-dependent multitasking is a pre-emptive multitasking. 14. The client-server system as recited in claim 12, further comprising: other clients, wherein, the other clients also have attributed server-side computer resources attributed thereto, and the other clients input-dependently distribute the server-side computer resources. 15. The client-server system as recited in claim 14, wherein, the server comprises at least one server service, and at least one of the first client, the second client, and the other clients is configured to directly or to indirectly call up the at least one server service. 16. The client-server system as recited in claim 15, wherein the server further comprises at least one database and/or at least one database system. 17. The client-server system as recited in claim 16, further comprising: at least one of a load dispatcher and a database meta-description appliance which are configured to allows a unitary access to the at least one database and/or to the at least one database system. 18. The client-server system as recited in claim 17, wherein the at least one of a load dispatcher and a database meta-description appliance is further configured to distribute the server-side computer resources to the first client, to the second client, and to the other clients. 19. The client-server system as recited in claims 14, wherein, a dependency of, a called-up service, or a result or results of at least one called-up service, or results of several called-up services, from, another service, or another result of a service, is taken into account for the input-dependent distribution. 20. The client-server system as recited in claim 19, wherein at least one of the first client, the second client, and the other clients comprises a display device. 21. The client-server system as recited in claim 20, wherein at least one of the first client, the second client, and the other clients is configured so that, the called-up service, or the result or results of the at least one called-up service, or the results of the several called-up services, is represented via a tab structure in the display device. 22. The client-server system as recited in claim 21, wherein at least one of the first client, the second client, and the other clients is configured so that requested interdependent services are displayed in a related manner via the display device so as to provide a context-based representation. 23. The client-server system as recited in claim 22, wherein the displaying in a related manner is provided by a tab family structure, 24. A terminal which is configured to implement the client-server system as recited in claim 12. 25. The terminal as recited in claim 24, wherein the terminal is a laptop, a tablet, a cell phone, a smart watch, or a desktop computer.
2,400
9,064
9,064
16,115,198
2,421
A method of filtering images of live stream content may include defining a prohibited frame content template; analyzing live stream content at a frame level to determine content within each frame of the live stream content; and comparing a frame of the live stream content against the prohibited frame content template to detect prohibited content in the frame that matches prohibited frame content as defined by the prohibited frame content template.
1. A method of filtering images of live stream content, comprising: defining a prohibited frame content template; analyzing live stream content at a frame level to determine content within each a of the live stream content; comparing a frame of the live stream content against the prohibited frame content template to detect prohibited content in the frame that matches prohibited frame content as defined by the prohibited frame content template; and identifying, within the frame, an outline of the prohibited frame content and blurring a portion of the frame within the outline, wherein the outline encompasses the prohibited frame content. 2. (canceled) 3. The method of claim 1, wherein analyzing the live stream content comprises using a computer vision process to identify prohibited content as defined by the prohibited frame content template. 4. The method of claim 1, comprising storing the prohibited frame content template in a database. 5. (canceled) 6. The method of claim 1, wherein comparing the frame of the live stream content against the prohibited frame content template comprises comparing an I-frame of the live stream content, the I-frame content comprising frame content for a plurality of subsequent frames in the live stream content. 7. The method of claim 6, wherein the subsequent frames comprise P-frames, B-frames, or combinations thereof. 8. The method of claim 3, wherein the computer vision process comprises using machine learning processes. 9. A computer program product for filtering images of live stream content, the computer program product comprising: a computer readable storage medium comprising computer usable program code embodied therewith, the computer usable program code to, when executed by a processor: define a prohibited frame content template; analyze live stream content at a frame level to determine content within each frame of the live stream content; compare a frame of the live stream content against the prohibited frame content template to detect prohibited content in the frame that matches prohibited frame content as defined by the prohibited frame content template; simultaneously compare a second frame of the live stream content against the prohibited frame template to detect prohibited content in the second frame that matches prohibited frame content as defined by the prohibited frame content template; and in response to the detection of prohibited frame content, take remedial action to filter the prohibited frame content in both the frame and the second frame. 10. The computer program product of claim 9, wherein analyzing the live stream content comprises using a computer vision process to identify prohibited content as defined by the prohibited frame content template. 11. The computer program product of claim 9, comprising computer usable program code to, when executed by the processor, store the prohibited frame content template in a database. 12. The computer program product of claim 9, wherein the remedial action comprises alerting a user to the existence of prohibited frame content within the live stream content, obfuscating a portion of a frame containing the prohibited frame content, automatically performing take down process where at least a portion of the live stream content is removed from live streaming, blocking users from accessing the live stream content, or combinations thereof. 13. The computer program product of claim 9, wherein comparing the frame of the live stream content against the prohibited frame content template comprises comparing an I-frame of the live stream content, the I-frame content comprising frame content for a plurality of subsequent frames in the live stream content. 14. The computer program product of claim 13, wherein the subsequent frames comprise P-frames, B-frames, or combinations thereof. 15. The computer program product of claim 10, wherein the computer vision process comprises using machine learning processes. 16. A system for filtering images of live stream content, comprising: a computing device, comprising: a processor; a data storage device communicatively coupled to the processor, the data storage device comprising: a template definition module to, when executed by the processor, define a prohibited frame content template; an analysis module to, when executed by the processor, analyze live stream content at a frame level to determine content within each frame of the live stream content; and a comparison module to, when executed by the processor, compare a frame of the live stream content against the prohibited frame content template to detect prohibited content in the frame that matches prohibited frame content as defined by the prohibited frame content template, and propagate detection of prohibited frame content detected in an I-frame into a subsequent P-frame or B-frame. 17. The system of claim 16, comprising a remediation module to, when executed by the processor, take remedial action to filter the prohibited frame content in response to the detection of prohibited frame content. 18. The system of claim 17, wherein the remedial action comprises alerting a user to the existence of prohibited frame content within the live stream content, obfuscating a portion of a frame containing the prohibited frame content, automatically performing take down process where at least a portion of the live stream content is removed from live streaming, blocking users from accessing the live stream content, or combinations thereof. 19. The system of claim 16, wherein: analyzing the live stream content comprises using a computer vision process to identify prohibited content as defined by the prohibited frame content template; wherein the computer vision process comprises using machine learning processes. 20. The system of claim 16, comprising a database coupled to the computing device to store the prohibited frame content template. 21. The method of claim 1 wherein the prohibited content comprises confidential information. 22. The method of claim 1 wherein the prohibited content comprises: sexually explicit images, weapon images, images of people using profanity, and images of confidential information.
A method of filtering images of live stream content may include defining a prohibited frame content template; analyzing live stream content at a frame level to determine content within each frame of the live stream content; and comparing a frame of the live stream content against the prohibited frame content template to detect prohibited content in the frame that matches prohibited frame content as defined by the prohibited frame content template.1. A method of filtering images of live stream content, comprising: defining a prohibited frame content template; analyzing live stream content at a frame level to determine content within each a of the live stream content; comparing a frame of the live stream content against the prohibited frame content template to detect prohibited content in the frame that matches prohibited frame content as defined by the prohibited frame content template; and identifying, within the frame, an outline of the prohibited frame content and blurring a portion of the frame within the outline, wherein the outline encompasses the prohibited frame content. 2. (canceled) 3. The method of claim 1, wherein analyzing the live stream content comprises using a computer vision process to identify prohibited content as defined by the prohibited frame content template. 4. The method of claim 1, comprising storing the prohibited frame content template in a database. 5. (canceled) 6. The method of claim 1, wherein comparing the frame of the live stream content against the prohibited frame content template comprises comparing an I-frame of the live stream content, the I-frame content comprising frame content for a plurality of subsequent frames in the live stream content. 7. The method of claim 6, wherein the subsequent frames comprise P-frames, B-frames, or combinations thereof. 8. The method of claim 3, wherein the computer vision process comprises using machine learning processes. 9. A computer program product for filtering images of live stream content, the computer program product comprising: a computer readable storage medium comprising computer usable program code embodied therewith, the computer usable program code to, when executed by a processor: define a prohibited frame content template; analyze live stream content at a frame level to determine content within each frame of the live stream content; compare a frame of the live stream content against the prohibited frame content template to detect prohibited content in the frame that matches prohibited frame content as defined by the prohibited frame content template; simultaneously compare a second frame of the live stream content against the prohibited frame template to detect prohibited content in the second frame that matches prohibited frame content as defined by the prohibited frame content template; and in response to the detection of prohibited frame content, take remedial action to filter the prohibited frame content in both the frame and the second frame. 10. The computer program product of claim 9, wherein analyzing the live stream content comprises using a computer vision process to identify prohibited content as defined by the prohibited frame content template. 11. The computer program product of claim 9, comprising computer usable program code to, when executed by the processor, store the prohibited frame content template in a database. 12. The computer program product of claim 9, wherein the remedial action comprises alerting a user to the existence of prohibited frame content within the live stream content, obfuscating a portion of a frame containing the prohibited frame content, automatically performing take down process where at least a portion of the live stream content is removed from live streaming, blocking users from accessing the live stream content, or combinations thereof. 13. The computer program product of claim 9, wherein comparing the frame of the live stream content against the prohibited frame content template comprises comparing an I-frame of the live stream content, the I-frame content comprising frame content for a plurality of subsequent frames in the live stream content. 14. The computer program product of claim 13, wherein the subsequent frames comprise P-frames, B-frames, or combinations thereof. 15. The computer program product of claim 10, wherein the computer vision process comprises using machine learning processes. 16. A system for filtering images of live stream content, comprising: a computing device, comprising: a processor; a data storage device communicatively coupled to the processor, the data storage device comprising: a template definition module to, when executed by the processor, define a prohibited frame content template; an analysis module to, when executed by the processor, analyze live stream content at a frame level to determine content within each frame of the live stream content; and a comparison module to, when executed by the processor, compare a frame of the live stream content against the prohibited frame content template to detect prohibited content in the frame that matches prohibited frame content as defined by the prohibited frame content template, and propagate detection of prohibited frame content detected in an I-frame into a subsequent P-frame or B-frame. 17. The system of claim 16, comprising a remediation module to, when executed by the processor, take remedial action to filter the prohibited frame content in response to the detection of prohibited frame content. 18. The system of claim 17, wherein the remedial action comprises alerting a user to the existence of prohibited frame content within the live stream content, obfuscating a portion of a frame containing the prohibited frame content, automatically performing take down process where at least a portion of the live stream content is removed from live streaming, blocking users from accessing the live stream content, or combinations thereof. 19. The system of claim 16, wherein: analyzing the live stream content comprises using a computer vision process to identify prohibited content as defined by the prohibited frame content template; wherein the computer vision process comprises using machine learning processes. 20. The system of claim 16, comprising a database coupled to the computing device to store the prohibited frame content template. 21. The method of claim 1 wherein the prohibited content comprises confidential information. 22. The method of claim 1 wherein the prohibited content comprises: sexually explicit images, weapon images, images of people using profanity, and images of confidential information.
2,400
9,065
9,065
15,321,840
2,484
The present invention provides a method for remotely controlling an image processing device, using a mobile terminal. The method comprises the steps of: searching for and pairing with an adjacent mobile terminal by an image processing device; receiving screen state information of the image processing device by the paired mobile terminal; generating a menu screen on the basis of the received screen state information by the paired mobile terminal; and receiving an input from a user through the menu screen and controlling a display of the image processing device according to a function of the menu screen selected by the user, by the paired mobile terminal.
1. A remote control system comprising: an at least one source terminal capturing a monitoring image of a particular area; an image processing device assigning a channel number for identifying the monitoring image to each of at least one monitoring image transmitted by the at least one source terminal, and receiving at least one of the at least one monitoring image and displaying a received image on a display; and a mobile terminal receiving screen state information transmitted by the image processing device and generating a menu screen, and receiving an input from a user through the menu screen and controlling the display of the image processing device according to a function of the menu screen received through the menu screen and selected by the user, wherein the menu screen of the mobile terminal is generated based on screen state information including at least one of a screen state of the image processing device, content information output to the display of the image processing device, real-time output state information of a content output to the display of the image processing device, screen split mode information of the image processing device, pan-tilt-zoom (PTZ) support information of the source terminal, audio output state information of the image processing device, time information, and recording state information. 2. The remote control system of claim 1, wherein the menu screen of the mobile terminal is generated on the display of the mobile terminal in a form of an on-screen display (OSD) or a graphic user interface (GUI). 3. The remote control system of claim 1, wherein the image processing device and the mobile terminal are paired with each other by a Wi-Fi direct communication or a Bluetooth communication. 4. The remote control system of claim 1, wherein, when there is a split screen asking an input of a password among split screens of the image processing device, the password is input through the mobile terminal. 5. A method of remotely controlling an image processing device, the method comprising: searching for and pairing with an adjacent mobile terminal, which is performed by an image processing device; receiving screen state information of the image processing device, which is performed by the paired mobile terminal; generating a menu screen on the basis of the received screen state information, which is performed by the paired mobile terminal; and receiving an input from a user through the menu screen and controlling a display of the image processing device according to a function of the menu screen selected by the user, which is performed by the paired mobile terminal. 6. The method of claim 5, wherein the image processing device receives an input of a content from at least one of source terminals and displays the content on a display supported by the image processing device or a display communicated with the image processing device by wires or wirelessly, and when the content is plural, at least one of the contents is selected and displayed on the display. 7. The method of claim 6, wherein the screen state information comprises at least one of content information output to the display, real-time output state information of a content output to the display, screen split mode information, pan-tilt-zoom (PTZ) support information of the source terminal, and audio output state information of the image processing device. 8. The method of claim 6, wherein the screen state information comprises at least one of replay image information output to the display, real-time output state information of a content output to the display, information about a channel of the source terminal transmitted an image output on the display, screen split mode information, and pan-tilt-zoom (PTZ) support information of the source terminal. 9. The method of claim 6, wherein the menu screen is generated in a form of an on-screen display (OSD) or a graphic user interface (GUI) on the display of the paired mobile terminal. 10. The method of claim 5, wherein the paired mobile terminal receives an input from a user through the menu screen and controls the display of the image processing device according to a function of the menu screen selected by the user, and the menu screen supports at least one of a pan-tilt-zoom (PTZ) control mode, a screen split mode, an audio output mode, a content output position change mode, and a user input mode. 11. The method of claim 10, wherein, when the user selects the user input mode through the menu screen, an input that is input through the paired mobile terminal is input to the image processing device and the input includes at least one of text, voice, and an image. 12. The method of claim 10, wherein, when the user selects the PTZ control mode through the menu screen, the paired mobile terminal perform a PTZ control on part of or whole of a screen of the image processing device display. 13. The method of claim 5, wherein the image processing device performs searching for and paring with an adjacent mobile terminal on the mobile terminal by using a Wi-Fi communication or Bluetooth communication. 14. A mobile terminal comprising: a receiver receiving screen state information transmitted by an image processing device; a menu screen generator generating a menu screen based on the screen state information; an input portion receiving an input from a user through the menu screen; and a remote controller controlling a display of the image processing device according to a function of the menu screen received through the menu screen and selected by a user, wherein the menu screen generator generates the menu screen based on the screen state information including at least one of screen state information of the image processing device, content information output to the display of the image processing device, real-time output state information of a content output to the display of the image processing device, screen split mode information of the image processing device, pan-tilt-zoom (PTZ) support information of a source terminal, audio output state information of the image processing device, time information, and recording state information. 15. The mobile terminal of claim 14, wherein the mobile terminal is paired with the image processing device by a Wi-Fi direct communication or a Bluetooth communication. 16. The mobile terminal of claim 14, wherein the image processing device receives at least one content from at least one source terminal capturing a monitoring image of a particular area, assigns a channel number for identifying the monitoring image to each of at least one monitoring image transmitted by the at least one source terminal, and receives at least one of the at least one monitoring image and displaying a received image on a display of the image processing device.
The present invention provides a method for remotely controlling an image processing device, using a mobile terminal. The method comprises the steps of: searching for and pairing with an adjacent mobile terminal by an image processing device; receiving screen state information of the image processing device by the paired mobile terminal; generating a menu screen on the basis of the received screen state information by the paired mobile terminal; and receiving an input from a user through the menu screen and controlling a display of the image processing device according to a function of the menu screen selected by the user, by the paired mobile terminal.1. A remote control system comprising: an at least one source terminal capturing a monitoring image of a particular area; an image processing device assigning a channel number for identifying the monitoring image to each of at least one monitoring image transmitted by the at least one source terminal, and receiving at least one of the at least one monitoring image and displaying a received image on a display; and a mobile terminal receiving screen state information transmitted by the image processing device and generating a menu screen, and receiving an input from a user through the menu screen and controlling the display of the image processing device according to a function of the menu screen received through the menu screen and selected by the user, wherein the menu screen of the mobile terminal is generated based on screen state information including at least one of a screen state of the image processing device, content information output to the display of the image processing device, real-time output state information of a content output to the display of the image processing device, screen split mode information of the image processing device, pan-tilt-zoom (PTZ) support information of the source terminal, audio output state information of the image processing device, time information, and recording state information. 2. The remote control system of claim 1, wherein the menu screen of the mobile terminal is generated on the display of the mobile terminal in a form of an on-screen display (OSD) or a graphic user interface (GUI). 3. The remote control system of claim 1, wherein the image processing device and the mobile terminal are paired with each other by a Wi-Fi direct communication or a Bluetooth communication. 4. The remote control system of claim 1, wherein, when there is a split screen asking an input of a password among split screens of the image processing device, the password is input through the mobile terminal. 5. A method of remotely controlling an image processing device, the method comprising: searching for and pairing with an adjacent mobile terminal, which is performed by an image processing device; receiving screen state information of the image processing device, which is performed by the paired mobile terminal; generating a menu screen on the basis of the received screen state information, which is performed by the paired mobile terminal; and receiving an input from a user through the menu screen and controlling a display of the image processing device according to a function of the menu screen selected by the user, which is performed by the paired mobile terminal. 6. The method of claim 5, wherein the image processing device receives an input of a content from at least one of source terminals and displays the content on a display supported by the image processing device or a display communicated with the image processing device by wires or wirelessly, and when the content is plural, at least one of the contents is selected and displayed on the display. 7. The method of claim 6, wherein the screen state information comprises at least one of content information output to the display, real-time output state information of a content output to the display, screen split mode information, pan-tilt-zoom (PTZ) support information of the source terminal, and audio output state information of the image processing device. 8. The method of claim 6, wherein the screen state information comprises at least one of replay image information output to the display, real-time output state information of a content output to the display, information about a channel of the source terminal transmitted an image output on the display, screen split mode information, and pan-tilt-zoom (PTZ) support information of the source terminal. 9. The method of claim 6, wherein the menu screen is generated in a form of an on-screen display (OSD) or a graphic user interface (GUI) on the display of the paired mobile terminal. 10. The method of claim 5, wherein the paired mobile terminal receives an input from a user through the menu screen and controls the display of the image processing device according to a function of the menu screen selected by the user, and the menu screen supports at least one of a pan-tilt-zoom (PTZ) control mode, a screen split mode, an audio output mode, a content output position change mode, and a user input mode. 11. The method of claim 10, wherein, when the user selects the user input mode through the menu screen, an input that is input through the paired mobile terminal is input to the image processing device and the input includes at least one of text, voice, and an image. 12. The method of claim 10, wherein, when the user selects the PTZ control mode through the menu screen, the paired mobile terminal perform a PTZ control on part of or whole of a screen of the image processing device display. 13. The method of claim 5, wherein the image processing device performs searching for and paring with an adjacent mobile terminal on the mobile terminal by using a Wi-Fi communication or Bluetooth communication. 14. A mobile terminal comprising: a receiver receiving screen state information transmitted by an image processing device; a menu screen generator generating a menu screen based on the screen state information; an input portion receiving an input from a user through the menu screen; and a remote controller controlling a display of the image processing device according to a function of the menu screen received through the menu screen and selected by a user, wherein the menu screen generator generates the menu screen based on the screen state information including at least one of screen state information of the image processing device, content information output to the display of the image processing device, real-time output state information of a content output to the display of the image processing device, screen split mode information of the image processing device, pan-tilt-zoom (PTZ) support information of a source terminal, audio output state information of the image processing device, time information, and recording state information. 15. The mobile terminal of claim 14, wherein the mobile terminal is paired with the image processing device by a Wi-Fi direct communication or a Bluetooth communication. 16. The mobile terminal of claim 14, wherein the image processing device receives at least one content from at least one source terminal capturing a monitoring image of a particular area, assigns a channel number for identifying the monitoring image to each of at least one monitoring image transmitted by the at least one source terminal, and receives at least one of the at least one monitoring image and displaying a received image on a display of the image processing device.
2,400
9,066
9,066
15,671,502
2,486
A borescope for use within an unlit, closed conduit can include an elongated probe, an artificial light source illuminating the conduit, and a microlens array mounted to the probe. An imaging device can be in data communication with the microlens array.
1. A borescope for producing a composite image within an unlit, closed conduit, the borescope comprising: an elongated probe having a microlens array located at a first end of the probe used within the closed conduit; an artificial light source illuminating a space proximate the microlens array within the closed conduit; an imaging device in data communication with the microlens array converting light from the lens array into the composite image; and a memory storing the composite image. 2. The borescope of claim 1 further comprising a display in data communication with the microlens array or the imaging device to display the composite image. 3. The borescope of claim 2 wherein the display is mounted to the probe and provides real-time viewing of the composite image. 4. The borescope of claim 3 further comprising a fiber optic cable providing data communication between the imaging device, the display, the memory, or the microlens array. 5. The borescope of claim 1 wherein the imaging device is in data communication with a computer system processing the composite image. 6. The borescope of claim 5 wherein the composite image can be used to construct a three-dimensional model. 7. The borescope of claim 6 wherein the three-dimensional model can be used to additive manufacture a turbine engine component. 8. The borescope of claim 1 wherein the closed conduit is a turbine engine air flow conduit. 9. The borescope of claim 8 wherein the turbine engine air flow conduit provides access to the combustion chamber, HP, turbine, LP turbine or blade elements for inspection. 10. The borescope of claim 1 wherein the probe is flexible. 11. The borescope of claim 1 further comprising a plurality of lenses of equal optical properties. 12. The borescope of claim 1 further comprising a plurality of lenses wherein at least two of the plurality of lenses have different focal lengths. 13. A method for inspecting a turbine engine, the method comprising: inserting a probe carrying a microlens array carrying at least one lens into an air flow conduit of the turbine engine; moving the probe through the conduit; collecting at least one image from the at least one lens; producing at least one composite image from the at least one collected image; and storing the at least one composite image in a imaging device in data communication with the microlens array. 14. The method of inspecting the turbine engine of claim 13 further comprising viewing the composite image through a display in real time. 15. The method of inspecting the turbine engine of claim 14 further comprising processing the composite image to create a three-dimensional model. 16. The method of inspecting the turbine engine of claim 15 further comprising transmitting the at least one composite image via a fiber optic cable to the display and the imaging device. 17. A borescope for inspecting a turbine engine having a core, the borescope comprising: an elongated probe having a microlens array on a first end for inspecting the core of the turbine engine having a compressor, combustor, and turbine in axial flow arrangement; a light source illuminating a portion of the core proximate the microlens array; an imaging device in data communication with the microlens array converting light from the lens array into a composite image; and a memory storing the composite image. 18. The borescope of claim 17 further comprising a display in data communication with the microlens array or the imaging device to display the composite image. 19. The borescope of claim 18 wherein the display provides real-time viewing of the composite image. 20. The borescope of claim 18 further comprising a fiber optic cable providing data communication between the imaging device, the display, the memory, or the microlens array.
A borescope for use within an unlit, closed conduit can include an elongated probe, an artificial light source illuminating the conduit, and a microlens array mounted to the probe. An imaging device can be in data communication with the microlens array.1. A borescope for producing a composite image within an unlit, closed conduit, the borescope comprising: an elongated probe having a microlens array located at a first end of the probe used within the closed conduit; an artificial light source illuminating a space proximate the microlens array within the closed conduit; an imaging device in data communication with the microlens array converting light from the lens array into the composite image; and a memory storing the composite image. 2. The borescope of claim 1 further comprising a display in data communication with the microlens array or the imaging device to display the composite image. 3. The borescope of claim 2 wherein the display is mounted to the probe and provides real-time viewing of the composite image. 4. The borescope of claim 3 further comprising a fiber optic cable providing data communication between the imaging device, the display, the memory, or the microlens array. 5. The borescope of claim 1 wherein the imaging device is in data communication with a computer system processing the composite image. 6. The borescope of claim 5 wherein the composite image can be used to construct a three-dimensional model. 7. The borescope of claim 6 wherein the three-dimensional model can be used to additive manufacture a turbine engine component. 8. The borescope of claim 1 wherein the closed conduit is a turbine engine air flow conduit. 9. The borescope of claim 8 wherein the turbine engine air flow conduit provides access to the combustion chamber, HP, turbine, LP turbine or blade elements for inspection. 10. The borescope of claim 1 wherein the probe is flexible. 11. The borescope of claim 1 further comprising a plurality of lenses of equal optical properties. 12. The borescope of claim 1 further comprising a plurality of lenses wherein at least two of the plurality of lenses have different focal lengths. 13. A method for inspecting a turbine engine, the method comprising: inserting a probe carrying a microlens array carrying at least one lens into an air flow conduit of the turbine engine; moving the probe through the conduit; collecting at least one image from the at least one lens; producing at least one composite image from the at least one collected image; and storing the at least one composite image in a imaging device in data communication with the microlens array. 14. The method of inspecting the turbine engine of claim 13 further comprising viewing the composite image through a display in real time. 15. The method of inspecting the turbine engine of claim 14 further comprising processing the composite image to create a three-dimensional model. 16. The method of inspecting the turbine engine of claim 15 further comprising transmitting the at least one composite image via a fiber optic cable to the display and the imaging device. 17. A borescope for inspecting a turbine engine having a core, the borescope comprising: an elongated probe having a microlens array on a first end for inspecting the core of the turbine engine having a compressor, combustor, and turbine in axial flow arrangement; a light source illuminating a portion of the core proximate the microlens array; an imaging device in data communication with the microlens array converting light from the lens array into a composite image; and a memory storing the composite image. 18. The borescope of claim 17 further comprising a display in data communication with the microlens array or the imaging device to display the composite image. 19. The borescope of claim 18 wherein the display provides real-time viewing of the composite image. 20. The borescope of claim 18 further comprising a fiber optic cable providing data communication between the imaging device, the display, the memory, or the microlens array.
2,400
9,067
9,067
15,061,129
2,482
A system (e.g., an off-board camera system) includes a camera and a communication device. The camera is configured to be disposed on an off-board device remotely located from a non-aerial vehicle as the non-aerial vehicle moves along a route. The camera is configured to generate image data representative of an upcoming segment of the route relative to a direction of travel of the non-aerial vehicle. The communication device is configured to be disposed on the off-board device and to wirelessly communicate the image data to the non-aerial vehicle during movement of the non-aerial vehicle along the route.
1. A system comprising: a camera configured to be disposed on an off-board device remotely located from a non-aerial vehicle as the non-aerial vehicle moves along a route, the camera configured to generate image data representative of an upcoming segment of the route relative to a direction of travel of the non-aerial vehicle; and a communication device configured to be disposed on the off-board device and to wirelessly communicate the image data to the non-aerial vehicle during movement of the non-aerial vehicle along the route. 2. The system of claim 1, wherein the off-board device is a stationary wayside device along the route and the communication device is configured to wirelessly communicate the image data to the non-aerial vehicle responsive to the non-aerial vehicle entering a communication range of the communication device. 3. The system of claim 1, wherein the off-board device is a stationary wayside device along the route and the communication device is configured to wirelessly communicate the image data to the non-aerial vehicle responsive to receiving a data transmission request from the non-aerial vehicle. 4. The system of claim 1, further comprising one or more processors on the off-board device configured to examine the upcoming segment of the route based on the image data to identify a hazard disposed in the upcoming segment of the route. 5. The system of claim 4, wherein the communication device is configured to communicate, responsive to the hazard being identified by the one or more processors, at least one of a warning signal or a control signal to the non-aerial vehicle, the warning signal notifying an operator of the non-aerial vehicle of the hazard, the control signal causing the non-aerial vehicle to automatically slow the movement of the non-aerial vehicle. 6. The system of claim 1, wherein the off-board device is an aerial device configured to fly above the route during movement of the non-aerial vehicle along the route, and the system further comprises a control unit configured to be disposed on the non-aerial vehicle that is configured to control the flight of the aerial device. 7. The system of claim 6, wherein the control unit is configured to autonomously control the aerial device to fly to a designated location along the route ahead of the non-aerial vehicle in the direction of travel of the non-aerial vehicle, the control unit further configured to control the aerial device to remain stationary in air at the designated location for a period of time as the non-aerial vehicle approaches the designated location. 8. The system of claim 6, wherein the non-aerial vehicle has a length dimension extending along multiple rail vehicle units configured to travel together along the route, the control unit configured to autonomously control the aerial device to fly along the length of the non-aerial vehicle, the camera being configured to generate image data representative of at least one of tractive or braking components of the rail vehicle units, the aerial device further including one or more processors configured to analyze the image data to inspect the at least one of tractive or braking components. 9. The system of claim 6, wherein the control unit is configured to autonomously control the aerial device to fly along a path of the route in the direction of travel of the non-aerial vehicle a designated distance from the non-aerial vehicle as the non-aerial vehicle moves along the route such that the aerial device maintains the designated distance from the non-aerial vehicle. 10. The system of claim 9, wherein the designated distance is a trailing distance behind a rear end of the non-aerial vehicle, the image data generated by the camera of the aerial device being representative of the upcoming segment of the route behind the non-aerial vehicle. 11. The system of claim 9, wherein the designated distance is a leading distance ahead of a front end of the non-aerial vehicle, the leading distance being greater than a sum of a safe breaking distance of the non-aerial vehicle and a response time distance, the image data generated by the camera of the aerial device being representative of the upcoming segment of the route that is ahead of the aerial device in the direction of travel. 12. The system of claim 11, wherein the aerial device includes one or more processors configured to analyze the image data to determine that the aerial device flying the leading distance ahead of the non-aerial vehicle is at least one of within a threshold proximity of another vehicle on the route or is ahead of a rear end of the other vehicle on the route, and, in response thereto, the one or more processors being configured to cause the non-aerial vehicle to slow the movement of the non-aerial vehicle. 13. The system of claim 1, wherein the off-board device includes an audio speaker configured to provide an audible alert that the non-aerial vehicle is approaching the upcoming segment of the route. 14. A method comprising: generating image data from a camera disposed on an off-board device remotely located from a non-aerial vehicle as the non-aerial vehicle moves along a route, the image data being representative of an upcoming segment of the route relative to a direction of travel of the non-aerial vehicle; communicating the image data from the off-board device to the non-aerial vehicle; and examining, using one or more processors, the image data to identify a hazard disposed on the upcoming segment of the route. 15. The method of claim 14, wherein the off-board device is a stationary wayside device along the route and the image data is communicated from the off-board device to the non-aerial vehicle responsive to at least one of the non-aerial vehicle entering a communication range of the wayside device or receiving a data transmission request from the non-aerial vehicle. 16. The method of claim 14, wherein the one or more processors are disposed on the off-board device, the method further including, responsive to identifying the hazard in the upcoming segment of the route, communicating at least one of a warning signal or a control signal to the non-aerial vehicle, the warning signal notifying an operator of the non-aerial vehicle of the hazard, the control signal causing the non-aerial vehicle to automatically slow the movement of the non-aerial vehicle. 17. The method of claim 14, wherein the off-board device is an aerial device configured to fly above the route during movement of the non-aerial vehicle along the route, the method further including controlling the aerial device to fly along a path of the route in the direction of travel of the non-aerial vehicle a designated distance from the non-aerial vehicle such that the aerial device maintains the designated distance from the non-aerial vehicle. 18. The method of claim 14, wherein the off-board device is an aerial device configured to fly above the route during movement of the non-aerial vehicle along the route, the method further including controlling the aerial device to fly to a designated location along the route ahead of the non-aerial vehicle in the direction of travel of the non-aerial vehicle and controlling the aerial device to remain stationary in air at the designated location for a period of time as the non-aerial vehicle approaches the designated location. 19. A system comprising: a camera configured to be disposed on an aerial device configured to fly above a route remote from a non-aerial vehicle as the non-aerial vehicle moves along the route, the aerial device controlled to fly along a path of the route, the camera configured to generate image data representative of an upcoming segment of the route relative to a direction of travel of the non-aerial vehicle; a communication device on the off-board device configured to wirelessly communicate the image data to the non-aerial vehicle; and one or more processors disposed on the off-board device that are configured to examine the segment of the route based on the image data to identify a hazard disposed in the segment of the route. 20. The system of claim 19, wherein the aerial device is controlled to fly a leading distance ahead of the non-aerial vehicle in the direction of travel of the non-aerial vehicle, and wherein, responsive to the one or more processors identifying, based on the image data, that the aerial device is at least one of within a threshold proximity of another vehicle on the route or is ahead of a rear end of the other vehicle on the route, the communication device is configured to send a slow message to the non-aerial vehicle commanding the non-aerial vehicle to slow the movement of the non-aerial vehicle along the route.
A system (e.g., an off-board camera system) includes a camera and a communication device. The camera is configured to be disposed on an off-board device remotely located from a non-aerial vehicle as the non-aerial vehicle moves along a route. The camera is configured to generate image data representative of an upcoming segment of the route relative to a direction of travel of the non-aerial vehicle. The communication device is configured to be disposed on the off-board device and to wirelessly communicate the image data to the non-aerial vehicle during movement of the non-aerial vehicle along the route.1. A system comprising: a camera configured to be disposed on an off-board device remotely located from a non-aerial vehicle as the non-aerial vehicle moves along a route, the camera configured to generate image data representative of an upcoming segment of the route relative to a direction of travel of the non-aerial vehicle; and a communication device configured to be disposed on the off-board device and to wirelessly communicate the image data to the non-aerial vehicle during movement of the non-aerial vehicle along the route. 2. The system of claim 1, wherein the off-board device is a stationary wayside device along the route and the communication device is configured to wirelessly communicate the image data to the non-aerial vehicle responsive to the non-aerial vehicle entering a communication range of the communication device. 3. The system of claim 1, wherein the off-board device is a stationary wayside device along the route and the communication device is configured to wirelessly communicate the image data to the non-aerial vehicle responsive to receiving a data transmission request from the non-aerial vehicle. 4. The system of claim 1, further comprising one or more processors on the off-board device configured to examine the upcoming segment of the route based on the image data to identify a hazard disposed in the upcoming segment of the route. 5. The system of claim 4, wherein the communication device is configured to communicate, responsive to the hazard being identified by the one or more processors, at least one of a warning signal or a control signal to the non-aerial vehicle, the warning signal notifying an operator of the non-aerial vehicle of the hazard, the control signal causing the non-aerial vehicle to automatically slow the movement of the non-aerial vehicle. 6. The system of claim 1, wherein the off-board device is an aerial device configured to fly above the route during movement of the non-aerial vehicle along the route, and the system further comprises a control unit configured to be disposed on the non-aerial vehicle that is configured to control the flight of the aerial device. 7. The system of claim 6, wherein the control unit is configured to autonomously control the aerial device to fly to a designated location along the route ahead of the non-aerial vehicle in the direction of travel of the non-aerial vehicle, the control unit further configured to control the aerial device to remain stationary in air at the designated location for a period of time as the non-aerial vehicle approaches the designated location. 8. The system of claim 6, wherein the non-aerial vehicle has a length dimension extending along multiple rail vehicle units configured to travel together along the route, the control unit configured to autonomously control the aerial device to fly along the length of the non-aerial vehicle, the camera being configured to generate image data representative of at least one of tractive or braking components of the rail vehicle units, the aerial device further including one or more processors configured to analyze the image data to inspect the at least one of tractive or braking components. 9. The system of claim 6, wherein the control unit is configured to autonomously control the aerial device to fly along a path of the route in the direction of travel of the non-aerial vehicle a designated distance from the non-aerial vehicle as the non-aerial vehicle moves along the route such that the aerial device maintains the designated distance from the non-aerial vehicle. 10. The system of claim 9, wherein the designated distance is a trailing distance behind a rear end of the non-aerial vehicle, the image data generated by the camera of the aerial device being representative of the upcoming segment of the route behind the non-aerial vehicle. 11. The system of claim 9, wherein the designated distance is a leading distance ahead of a front end of the non-aerial vehicle, the leading distance being greater than a sum of a safe breaking distance of the non-aerial vehicle and a response time distance, the image data generated by the camera of the aerial device being representative of the upcoming segment of the route that is ahead of the aerial device in the direction of travel. 12. The system of claim 11, wherein the aerial device includes one or more processors configured to analyze the image data to determine that the aerial device flying the leading distance ahead of the non-aerial vehicle is at least one of within a threshold proximity of another vehicle on the route or is ahead of a rear end of the other vehicle on the route, and, in response thereto, the one or more processors being configured to cause the non-aerial vehicle to slow the movement of the non-aerial vehicle. 13. The system of claim 1, wherein the off-board device includes an audio speaker configured to provide an audible alert that the non-aerial vehicle is approaching the upcoming segment of the route. 14. A method comprising: generating image data from a camera disposed on an off-board device remotely located from a non-aerial vehicle as the non-aerial vehicle moves along a route, the image data being representative of an upcoming segment of the route relative to a direction of travel of the non-aerial vehicle; communicating the image data from the off-board device to the non-aerial vehicle; and examining, using one or more processors, the image data to identify a hazard disposed on the upcoming segment of the route. 15. The method of claim 14, wherein the off-board device is a stationary wayside device along the route and the image data is communicated from the off-board device to the non-aerial vehicle responsive to at least one of the non-aerial vehicle entering a communication range of the wayside device or receiving a data transmission request from the non-aerial vehicle. 16. The method of claim 14, wherein the one or more processors are disposed on the off-board device, the method further including, responsive to identifying the hazard in the upcoming segment of the route, communicating at least one of a warning signal or a control signal to the non-aerial vehicle, the warning signal notifying an operator of the non-aerial vehicle of the hazard, the control signal causing the non-aerial vehicle to automatically slow the movement of the non-aerial vehicle. 17. The method of claim 14, wherein the off-board device is an aerial device configured to fly above the route during movement of the non-aerial vehicle along the route, the method further including controlling the aerial device to fly along a path of the route in the direction of travel of the non-aerial vehicle a designated distance from the non-aerial vehicle such that the aerial device maintains the designated distance from the non-aerial vehicle. 18. The method of claim 14, wherein the off-board device is an aerial device configured to fly above the route during movement of the non-aerial vehicle along the route, the method further including controlling the aerial device to fly to a designated location along the route ahead of the non-aerial vehicle in the direction of travel of the non-aerial vehicle and controlling the aerial device to remain stationary in air at the designated location for a period of time as the non-aerial vehicle approaches the designated location. 19. A system comprising: a camera configured to be disposed on an aerial device configured to fly above a route remote from a non-aerial vehicle as the non-aerial vehicle moves along the route, the aerial device controlled to fly along a path of the route, the camera configured to generate image data representative of an upcoming segment of the route relative to a direction of travel of the non-aerial vehicle; a communication device on the off-board device configured to wirelessly communicate the image data to the non-aerial vehicle; and one or more processors disposed on the off-board device that are configured to examine the segment of the route based on the image data to identify a hazard disposed in the segment of the route. 20. The system of claim 19, wherein the aerial device is controlled to fly a leading distance ahead of the non-aerial vehicle in the direction of travel of the non-aerial vehicle, and wherein, responsive to the one or more processors identifying, based on the image data, that the aerial device is at least one of within a threshold proximity of another vehicle on the route or is ahead of a rear end of the other vehicle on the route, the communication device is configured to send a slow message to the non-aerial vehicle commanding the non-aerial vehicle to slow the movement of the non-aerial vehicle along the route.
2,400
9,068
9,068
16,352,916
2,482
A system of transferring of three dimensional (3D) image data is described. A 3D source device ( 10 ) provides 3D display signal ( 56 ) for a display ( 13 ) via a high speed digital interface like HDMI. The 3D display signal has frames constituting the 3D image data according to a 3D video transfer format, in which format the frames comprise at least two different frame types. Each frame has a data structure for representing a sequence of digital image pixel data, and represents a partial 3D data structure. The 3D source device includes frame type synchronization indicators in the 3D display signal. The display detects the frame type synchronization indicators and frame types, and generates the display control signals based on synchronizing the partial 3D data structures in dependence of the frame type synchronization indicators.
1. A three dimensional (3D) source device for transferring of 3D image data to a 3D display device, the 3D source device comprising: a processor circuit that: creates source image data so as to generate a 3D display signal, the 3D display signal comprising a plurality of frames constituting the 3D image data according to a 3D video transfer format, wherein the 3d video transfer format comprises at least two different frame types, an output interface, wherein the output interface outputs the 3D display signal, wherein each frame has a data structure for representing a sequence of digital image pixel data, wherein each frame type represents a partial 3D data structure, a transmit synchronization circuit, the transmit synchronization circuit comprising at least one frame type synchronization indicator in the 3D display signal, wherein the display control signals is based on synchronizing the partial 3D data structures in dependence of the frame type synchronization indicator at the 3D display device, wherein the frame type synchronization indicator comprises a frame type indicator corresponding to the frame type for synchronizing in time each of the partial 3D data structures from the respective frame types in the 3D video transfer format, wherein the frame type synchronization indicator comprises a 3D video format indicator indicative of the 3D video transfer format in a subsequent section of the 3D display signal. 2. The three dimensional (3D) source device as claimed in claim 1, wherein the different frame type in the 3D video transfer format is one of a left frame type, a right frame type, a two dimensional (2D) frame type, a depth frame type, a transparency frame type, a shielded frame type, a combinatorial frame type indicative of a combination of sub-frames of type 3. The three dimensional (3D) source device as claimed in claim 1, wherein the frame type synchronization indicator comprising a frame type indicator corresponding to the frame type for time synchronizing each of the piecewise 3D data structures from each frame type. 4. The three dimensional (3D) source device as claimed in claim 1, wherein the 3D video transfer format comprises a main video and at least one auxiliary video layer transferred via respective frame types, wherein the frame type synchronization indicator comprises a main frame type indicator and an auxiliary Layer frame type indicator, wherein the layer frame type indicator comprises at least one of a layer frame type indicator. 5. The three dimensional (3D) source device as claimed in claim 1, wherein the auxiliary video layer comprises graphical information or subtitles. 6. The three dimensional (3D) source device as claimed in claim 4, wherein the frame type synchronization indicator for the auxiliary video layer comprises the type and format of the auxiliary layer, the position of the display of the auxiliary layer with respect to the display of the main video, the size of the display of the auxiliary layer, 7. The three dimensional (3D) source device as claimed in claim 4, wherein the frame type synchronization indicator for the auxiliary video layer comprises the type or format of the auxiliary layer, the position of the display of the auxiliary layer with respect to the display of the main video, the size of the display of the auxiliary layer, 8. The three dimensional (3D) source device as claimed in claim 4, comprising layer signaling parameters indicative of at least one of appearance of the layer's display, time and duration of disappearance of the layers display, 3D display settings or 3D display parameters. 9. The three dimensional (3D) source device as claimed in claim 4, comprising layer signaling parameters indicative of at least one of appearance of the layer's display, time or duration of disappearance. 10. The three dimensional (3D) source device as claimed in claim 1, wherein the frame type synchronization indicator comprises a frame sequence indicator indicating frequency of the frame type. 11. The three dimensional (3D) source device as claimed in claim 1, wherein the frame type synchronization indicator comprises a frame sequence indicator indicating frequency of an order of the different frame types. 12. The three dimensional (3D) source device as claimed in claim 1, wherein the frame type synchronization indicator has a frame sequence number. 13. The three dimensional (3D) source device as claimed in claim 1, wherein the 3D video transfer format comprises a main video and at least one auxiliary video layer transferred via respective frame types, wherein the frame type synchronization indicator comprises a main frame type indicator and an auxiliary Layer frame type indicator, wherein the processing means combines the different layers represented by the partial partial 3D data structure according to the frame type synchronization indicator.
A system of transferring of three dimensional (3D) image data is described. A 3D source device ( 10 ) provides 3D display signal ( 56 ) for a display ( 13 ) via a high speed digital interface like HDMI. The 3D display signal has frames constituting the 3D image data according to a 3D video transfer format, in which format the frames comprise at least two different frame types. Each frame has a data structure for representing a sequence of digital image pixel data, and represents a partial 3D data structure. The 3D source device includes frame type synchronization indicators in the 3D display signal. The display detects the frame type synchronization indicators and frame types, and generates the display control signals based on synchronizing the partial 3D data structures in dependence of the frame type synchronization indicators.1. A three dimensional (3D) source device for transferring of 3D image data to a 3D display device, the 3D source device comprising: a processor circuit that: creates source image data so as to generate a 3D display signal, the 3D display signal comprising a plurality of frames constituting the 3D image data according to a 3D video transfer format, wherein the 3d video transfer format comprises at least two different frame types, an output interface, wherein the output interface outputs the 3D display signal, wherein each frame has a data structure for representing a sequence of digital image pixel data, wherein each frame type represents a partial 3D data structure, a transmit synchronization circuit, the transmit synchronization circuit comprising at least one frame type synchronization indicator in the 3D display signal, wherein the display control signals is based on synchronizing the partial 3D data structures in dependence of the frame type synchronization indicator at the 3D display device, wherein the frame type synchronization indicator comprises a frame type indicator corresponding to the frame type for synchronizing in time each of the partial 3D data structures from the respective frame types in the 3D video transfer format, wherein the frame type synchronization indicator comprises a 3D video format indicator indicative of the 3D video transfer format in a subsequent section of the 3D display signal. 2. The three dimensional (3D) source device as claimed in claim 1, wherein the different frame type in the 3D video transfer format is one of a left frame type, a right frame type, a two dimensional (2D) frame type, a depth frame type, a transparency frame type, a shielded frame type, a combinatorial frame type indicative of a combination of sub-frames of type 3. The three dimensional (3D) source device as claimed in claim 1, wherein the frame type synchronization indicator comprising a frame type indicator corresponding to the frame type for time synchronizing each of the piecewise 3D data structures from each frame type. 4. The three dimensional (3D) source device as claimed in claim 1, wherein the 3D video transfer format comprises a main video and at least one auxiliary video layer transferred via respective frame types, wherein the frame type synchronization indicator comprises a main frame type indicator and an auxiliary Layer frame type indicator, wherein the layer frame type indicator comprises at least one of a layer frame type indicator. 5. The three dimensional (3D) source device as claimed in claim 1, wherein the auxiliary video layer comprises graphical information or subtitles. 6. The three dimensional (3D) source device as claimed in claim 4, wherein the frame type synchronization indicator for the auxiliary video layer comprises the type and format of the auxiliary layer, the position of the display of the auxiliary layer with respect to the display of the main video, the size of the display of the auxiliary layer, 7. The three dimensional (3D) source device as claimed in claim 4, wherein the frame type synchronization indicator for the auxiliary video layer comprises the type or format of the auxiliary layer, the position of the display of the auxiliary layer with respect to the display of the main video, the size of the display of the auxiliary layer, 8. The three dimensional (3D) source device as claimed in claim 4, comprising layer signaling parameters indicative of at least one of appearance of the layer's display, time and duration of disappearance of the layers display, 3D display settings or 3D display parameters. 9. The three dimensional (3D) source device as claimed in claim 4, comprising layer signaling parameters indicative of at least one of appearance of the layer's display, time or duration of disappearance. 10. The three dimensional (3D) source device as claimed in claim 1, wherein the frame type synchronization indicator comprises a frame sequence indicator indicating frequency of the frame type. 11. The three dimensional (3D) source device as claimed in claim 1, wherein the frame type synchronization indicator comprises a frame sequence indicator indicating frequency of an order of the different frame types. 12. The three dimensional (3D) source device as claimed in claim 1, wherein the frame type synchronization indicator has a frame sequence number. 13. The three dimensional (3D) source device as claimed in claim 1, wherein the 3D video transfer format comprises a main video and at least one auxiliary video layer transferred via respective frame types, wherein the frame type synchronization indicator comprises a main frame type indicator and an auxiliary Layer frame type indicator, wherein the processing means combines the different layers represented by the partial partial 3D data structure according to the frame type synchronization indicator.
2,400
9,069
9,069
12,963,007
2,483
This invention provides a system and method for training and performing runtime 3D pose determination of an object using a plurality of camera assemblies in a 3D vision system. The cameras are arranged at different orientations with respect to a scene, so as to acquire contemporaneous images of an object, both at training and runtime. Each of the camera assemblies includes a non-perspective lens that acquires a respective non-perspective image for use in the process. The searched object features in one of the acquired non-perspective image can be used to define the expected location of object features in the second (or subsequent) non-perspective images based upon an affine transform, which is computed based upon at least a subset of the intrinsics and extrinsics of each camera. The locations of features in the second, and subsequent, non-perspective images can be refined by searching within the expected location of those images. This approach can be used in training, to generate the training model, and in runtime operating on acquired images of runtime objects. The non-perspective cameras can employ telecentric lenses.
1. A method for determining a 3D pose of an object during runtime operation of a 3D vision system comprising the steps of: orienting at least a first non-perspective camera assembly and a second non-perspective camera assembly with respect to the object so that a first non-perspective image is acquired by the first non-perspective camera assembly and a second non-perspective image is contemporaneously acquired by the second non-perspective camera; searching for 2D model features in the first non-perspective image based upon a first model; searching for 2D model features in the second non-perspective image based upon a second model in which the second model is a trained descendant of the first model; and determining 3D pose of the object based upon locations of the 2D model features in the first non-perspective image and the second non-perspective image. 2. The method as set forth in claim 1 further comprising training the second model at training time based upon an affine transform applied to the first model. 3. The method as set forth in claim 2 further comprising distorting at least one of the first non-perspective image and the second non-perspective image, according to a predetermined relationship, and removing lens distortion from at least one of the first non-perspective image and the second non-perspective image in order to perform the searching step respectively therein. 4. The method as set forth in claim 2 further comprising computing the affine transform based upon at least a subset of intrinsics and extrinsics of the first non-perspective camera assembly and intrinsics and extrinsics of the second camera non-perspective camera assembly. 5. The method as set forth in claim 1 further comprising performing an operation on the object based upon the 3D pose. 6. The method as set forth in claim 5 wherein the operation includes manipulating a robot with respect to the object. 7. A 3D vision system for determining a 3D pose of an object during runtime operation comprising: a first non-perspective camera assembly and a second non-perspective camera assembly that respectively acquire a first non-perspective image and a second non-perspective image of the object contemporaneously; and a searching tool that searches for 2D model features in the first non-perspective image based upon a first model and that searches for 2D model features in the second non-perspective image based upon a second model in which the second model is a trained descendant of the first model, the 3D pose being based upon locations of the searched 2D model features in each of the first non-perspective image and the second-non-perspective image. 8. The 3D vision system as set forth in claim 7 the second model is trained at training time based upon an affine transform applied to the first model. 9. The 3D vision system as set forth in claim 8 wherein at least one of the first non-perspective image and the second non-perspective image is distorted according to a predetermined relationship upon acquisition, and further comprising an undistorting process that undistorts the at least one of the first non-perspective image and the second non-perspective image for searching by the searching tool. 10. The system as set forth in claim 8 wherein the affine transform is based upon at least a subset of intrinsics and extrinsics of the first non-perspective camera assembly and intrinsics and extrinsics of the second camera non-perspective camera assembly. 12. The system as set forth in claim 7 wherein the first non-perspective camera assembly includes a non-perspective lens and the second non-perspective camera assembly includes a non-perspective lens. 13. The system as set forth in claim 12 wherein at least one non-perspective lens comprises a telecentric lens. 14. The system as set forth in claim 7 further comprising a device that moves with respect to the object based upon the pose data. 15. The system as set forth in claim 14 wherein the device comprises a robot. 16. A method for training a model of an object for use during runtime operation of a 3D vision system comprising the steps of: orienting at least a first non-perspective camera assembly and a second non-perspective camera assembly with respect to the object so that a first non-perspective image is acquired by the first non-perspective camera assembly and a second non-perspective image is contemporaneously acquired by the second non-perspective camera; providing an affine transform between the first non-perspective camera assembly and the second non-perspective camera assembly based on at least a subset of intriniscs and extrinsics of the first non-perspective camera assembly and intrinsics and extrinsics of the second non-perspective camera assembly; defining a first model with a reference point in the first non-perspective image; and generating a second model with the reference point based upon the affine transform. 17. The method as set forth in claim 16 further comprising refining the second model based upon a search for the reference point in the second non-perspective image within a search range limited based upon the second model generated by the affine transform. 18. The method as set forth in claim 17 further comprising, during runtime, determining a 3D pose of the object based upon at least the first model and the second model. 19. The method as set forth in claim 18 further comprising, based upon the 3D pose, performing an operation upon the object. 20. The method as set forth in claim 17 wherein the step of performing includes directing movement of a robot with respect to the object. 21. A 3D vision system comprising: a first non-perspective camera assembly and a second non-perspective camera assembly that respectively acquire a first non-perspective image and a second non-perspective image of the object contemporaneously; and a training process that includes, (a) a search process that locates a first model pattern in the first non perspective image, (b) an affine transform process that generates an affine-transformed pattern from the first pattern based upon at least a subset of intrinsics and extrinsics of each of the first non-perspective camera assembly and the second non-perspective camera assembly, and (c) a registration process that registers the affine-transformed pattern with respect to the second non-perspective image, determines a locale in the second non-perspective image of a pattern associated with the affine-transformed pattern, and defines a second model pattern from the associated pattern. 22. The 3D vision system as set forth in claim 21 wherein, during runtime, the first non-perspective camera assembly and the second non-perspective camera assembly are constructed and arranged to respectively acquire a first non-perspective runtime image and a second non-perspective runtime image of a runtime object, contemporaneously, the runtime object having features similar to the object, and further comprising a runtime process that includes a registration process that registers the first model pattern with respect to the first runtime non-perspective image and the second model pattern with respect to the second runtime non-perspective image so as to determine a 3D pose of the object. 23. The method as set forth in claim 22 further comprising a device that, based upon the 3D pose, performs an operation upon the object. 24. The method as set forth in claim 23 wherein the device comprises a robot that moves with respect to the object.
This invention provides a system and method for training and performing runtime 3D pose determination of an object using a plurality of camera assemblies in a 3D vision system. The cameras are arranged at different orientations with respect to a scene, so as to acquire contemporaneous images of an object, both at training and runtime. Each of the camera assemblies includes a non-perspective lens that acquires a respective non-perspective image for use in the process. The searched object features in one of the acquired non-perspective image can be used to define the expected location of object features in the second (or subsequent) non-perspective images based upon an affine transform, which is computed based upon at least a subset of the intrinsics and extrinsics of each camera. The locations of features in the second, and subsequent, non-perspective images can be refined by searching within the expected location of those images. This approach can be used in training, to generate the training model, and in runtime operating on acquired images of runtime objects. The non-perspective cameras can employ telecentric lenses.1. A method for determining a 3D pose of an object during runtime operation of a 3D vision system comprising the steps of: orienting at least a first non-perspective camera assembly and a second non-perspective camera assembly with respect to the object so that a first non-perspective image is acquired by the first non-perspective camera assembly and a second non-perspective image is contemporaneously acquired by the second non-perspective camera; searching for 2D model features in the first non-perspective image based upon a first model; searching for 2D model features in the second non-perspective image based upon a second model in which the second model is a trained descendant of the first model; and determining 3D pose of the object based upon locations of the 2D model features in the first non-perspective image and the second non-perspective image. 2. The method as set forth in claim 1 further comprising training the second model at training time based upon an affine transform applied to the first model. 3. The method as set forth in claim 2 further comprising distorting at least one of the first non-perspective image and the second non-perspective image, according to a predetermined relationship, and removing lens distortion from at least one of the first non-perspective image and the second non-perspective image in order to perform the searching step respectively therein. 4. The method as set forth in claim 2 further comprising computing the affine transform based upon at least a subset of intrinsics and extrinsics of the first non-perspective camera assembly and intrinsics and extrinsics of the second camera non-perspective camera assembly. 5. The method as set forth in claim 1 further comprising performing an operation on the object based upon the 3D pose. 6. The method as set forth in claim 5 wherein the operation includes manipulating a robot with respect to the object. 7. A 3D vision system for determining a 3D pose of an object during runtime operation comprising: a first non-perspective camera assembly and a second non-perspective camera assembly that respectively acquire a first non-perspective image and a second non-perspective image of the object contemporaneously; and a searching tool that searches for 2D model features in the first non-perspective image based upon a first model and that searches for 2D model features in the second non-perspective image based upon a second model in which the second model is a trained descendant of the first model, the 3D pose being based upon locations of the searched 2D model features in each of the first non-perspective image and the second-non-perspective image. 8. The 3D vision system as set forth in claim 7 the second model is trained at training time based upon an affine transform applied to the first model. 9. The 3D vision system as set forth in claim 8 wherein at least one of the first non-perspective image and the second non-perspective image is distorted according to a predetermined relationship upon acquisition, and further comprising an undistorting process that undistorts the at least one of the first non-perspective image and the second non-perspective image for searching by the searching tool. 10. The system as set forth in claim 8 wherein the affine transform is based upon at least a subset of intrinsics and extrinsics of the first non-perspective camera assembly and intrinsics and extrinsics of the second camera non-perspective camera assembly. 12. The system as set forth in claim 7 wherein the first non-perspective camera assembly includes a non-perspective lens and the second non-perspective camera assembly includes a non-perspective lens. 13. The system as set forth in claim 12 wherein at least one non-perspective lens comprises a telecentric lens. 14. The system as set forth in claim 7 further comprising a device that moves with respect to the object based upon the pose data. 15. The system as set forth in claim 14 wherein the device comprises a robot. 16. A method for training a model of an object for use during runtime operation of a 3D vision system comprising the steps of: orienting at least a first non-perspective camera assembly and a second non-perspective camera assembly with respect to the object so that a first non-perspective image is acquired by the first non-perspective camera assembly and a second non-perspective image is contemporaneously acquired by the second non-perspective camera; providing an affine transform between the first non-perspective camera assembly and the second non-perspective camera assembly based on at least a subset of intriniscs and extrinsics of the first non-perspective camera assembly and intrinsics and extrinsics of the second non-perspective camera assembly; defining a first model with a reference point in the first non-perspective image; and generating a second model with the reference point based upon the affine transform. 17. The method as set forth in claim 16 further comprising refining the second model based upon a search for the reference point in the second non-perspective image within a search range limited based upon the second model generated by the affine transform. 18. The method as set forth in claim 17 further comprising, during runtime, determining a 3D pose of the object based upon at least the first model and the second model. 19. The method as set forth in claim 18 further comprising, based upon the 3D pose, performing an operation upon the object. 20. The method as set forth in claim 17 wherein the step of performing includes directing movement of a robot with respect to the object. 21. A 3D vision system comprising: a first non-perspective camera assembly and a second non-perspective camera assembly that respectively acquire a first non-perspective image and a second non-perspective image of the object contemporaneously; and a training process that includes, (a) a search process that locates a first model pattern in the first non perspective image, (b) an affine transform process that generates an affine-transformed pattern from the first pattern based upon at least a subset of intrinsics and extrinsics of each of the first non-perspective camera assembly and the second non-perspective camera assembly, and (c) a registration process that registers the affine-transformed pattern with respect to the second non-perspective image, determines a locale in the second non-perspective image of a pattern associated with the affine-transformed pattern, and defines a second model pattern from the associated pattern. 22. The 3D vision system as set forth in claim 21 wherein, during runtime, the first non-perspective camera assembly and the second non-perspective camera assembly are constructed and arranged to respectively acquire a first non-perspective runtime image and a second non-perspective runtime image of a runtime object, contemporaneously, the runtime object having features similar to the object, and further comprising a runtime process that includes a registration process that registers the first model pattern with respect to the first runtime non-perspective image and the second model pattern with respect to the second runtime non-perspective image so as to determine a 3D pose of the object. 23. The method as set forth in claim 22 further comprising a device that, based upon the 3D pose, performs an operation upon the object. 24. The method as set forth in claim 23 wherein the device comprises a robot that moves with respect to the object.
2,400
9,070
9,070
16,000,635
2,488
Enclosures for deep ocean or other high exterior pressure environment including a dome window with an angular measurement of between 164 and 178 degrees, a structure housing, a dome support ring, and a compliance material positioned between the dome support ring and housing are disclosed.
1. A submersible optical enclosure for use in high pressure environments, comprising: a housing having a hollow interior sized to accommodate an electronic device comprising one or more of an electronic light and an imaging device; a transparent pressure bearing substantially dome shaped window mechanically coupled to the housing, having an angular measurement of between approximately 164 degrees and 178 degrees and sized correspondingly to the electronic device to allow light in to or out of the housing interior for lighting or imaging; a dome support ring positioned between the housing and window having opposite annular faces that are substantially planar and parallel; a compliance material layer positioned between the annular dome support ring and the transparent pressure bearing window; a coupling element that secures the housing, dome support ring, and port window together; and one or more water-tight seals to block water entry into the housing interior. 2. The enclosure of claim 1, wherein the electronic device is a still camera or video camera. 3. The enclosure of claim 1, wherein the electronic device is an LED light. 4. The enclosure of claim 3, wherein the electronic device further includes a still camera or a video camera. 5. The enclosure of claim 1, wherein the housing comprises titanium, the window comprises glass, and the dome support ring comprises stainless steel. 6. The enclosure of claim 1, wherein the window comprises glass and the angular measurement is between 172 and 176 degrees. 7. The enclosure of claim 1, wherein the window includes one or more chamfered edges adjacent to a seating surface. 8. The enclosure of claim 1, wherein the dome support ring is an annular ring having textured locking features on a first of the two faces, wherein the first face is positioned adjacent to the compliance material. 9. The enclosure of claim 8, wherein the textured features are etched or machined on the one face. 10. The enclosure of claim 1, wherein the compliance material comprises a polymer material. 11. The enclosure of claim 1, wherein the dome support ring is stepped. 12. The enclosure of claim 1, wherein the dome support ring comprises a ceramic material. 13. The enclosure of claim 1, wherein the dome support ring comprises stainless steel. 14. The enclosure of claim 1, wherein the dome support ring includes two or more sections, wherein a first section has a radial thickness selected to match the radial stiffness of the dome window, and a second section has a different radial thickness. 15. The enclosure of claim 1, wherein the housing includes an inward sloped section to accommodate displacement of the dome and/or support ring under hydrostatic load. 16. The enclosure of claim 1, wherein the dome window and dome support ring are shaped to provide substantial uniformity of pressure at the mating seat of the dome window and the dome support ring. 17. The enclosure of claim 1, wherein the dome support ring has a larger inner diameter in a forward section near the dome shaped window and a smaller inside diameter in a rear section against the housing. 18. The enclosure of claim 1, wherein the dome support ring comprises a material having a higher Young's modulus than the window. 19. The enclosure of claim 1, wherein the window is mechanically polished for strengthening. 20. The enclosure of claim 1, wherein the window is acid etched for strengthening. 21. The enclosure of claim 19, wherein the acid etching is hydrofluoric acid etching. 22. The enclosure of claim 1, wherein the window is flame polished for strengthening. 23. The enclosure of claim 1, wherein the window is chemically strengthened. 24. The enclosure of claim 22, wherein the chemical strengthening is ion exchange strengthening. 25. The enclosure of claim 1, wherein the housing is shaped to withstand an external pressure of at least 1000 PSI. 26. The enclosure of claim 1, wherein the coefficient of thermal expansion of the window and the support ring material are matched within 6 percent or less. 27. A submersible optical enclosure for use in high pressure environments, comprising: a housing comprising a titanium material, the housing having a hollow interior sized to accommodate an electronic device comprising one or more of an electronic light and an imaging device; a transparent pressure bearing substantially dome shaped glass window mechanically coupled to the housing and having an angular measurement of between 170 degrees and 176 degrees and sized correspondingly to the electronic device to allow light in to or out of the housing interior for lighting or imaging; a stainless steel stepped dome support ring positioned between the housing and window having opposite annular faces that are substantially planar and parallel; a compliance material layer of a polymer material positioned between the annular dome support ring and the transparent pressure bearing window; a coupling element that secures the housing, dome support ring, and port window together; and one or more water-tight seals to block water entry into the housing interior; wherein a first of the opposite angular faces of the dome support ring that is positioned adjacent to the compliance material layer includes textured features to lock the compliance material to the dome support ring under load.
Enclosures for deep ocean or other high exterior pressure environment including a dome window with an angular measurement of between 164 and 178 degrees, a structure housing, a dome support ring, and a compliance material positioned between the dome support ring and housing are disclosed.1. A submersible optical enclosure for use in high pressure environments, comprising: a housing having a hollow interior sized to accommodate an electronic device comprising one or more of an electronic light and an imaging device; a transparent pressure bearing substantially dome shaped window mechanically coupled to the housing, having an angular measurement of between approximately 164 degrees and 178 degrees and sized correspondingly to the electronic device to allow light in to or out of the housing interior for lighting or imaging; a dome support ring positioned between the housing and window having opposite annular faces that are substantially planar and parallel; a compliance material layer positioned between the annular dome support ring and the transparent pressure bearing window; a coupling element that secures the housing, dome support ring, and port window together; and one or more water-tight seals to block water entry into the housing interior. 2. The enclosure of claim 1, wherein the electronic device is a still camera or video camera. 3. The enclosure of claim 1, wherein the electronic device is an LED light. 4. The enclosure of claim 3, wherein the electronic device further includes a still camera or a video camera. 5. The enclosure of claim 1, wherein the housing comprises titanium, the window comprises glass, and the dome support ring comprises stainless steel. 6. The enclosure of claim 1, wherein the window comprises glass and the angular measurement is between 172 and 176 degrees. 7. The enclosure of claim 1, wherein the window includes one or more chamfered edges adjacent to a seating surface. 8. The enclosure of claim 1, wherein the dome support ring is an annular ring having textured locking features on a first of the two faces, wherein the first face is positioned adjacent to the compliance material. 9. The enclosure of claim 8, wherein the textured features are etched or machined on the one face. 10. The enclosure of claim 1, wherein the compliance material comprises a polymer material. 11. The enclosure of claim 1, wherein the dome support ring is stepped. 12. The enclosure of claim 1, wherein the dome support ring comprises a ceramic material. 13. The enclosure of claim 1, wherein the dome support ring comprises stainless steel. 14. The enclosure of claim 1, wherein the dome support ring includes two or more sections, wherein a first section has a radial thickness selected to match the radial stiffness of the dome window, and a second section has a different radial thickness. 15. The enclosure of claim 1, wherein the housing includes an inward sloped section to accommodate displacement of the dome and/or support ring under hydrostatic load. 16. The enclosure of claim 1, wherein the dome window and dome support ring are shaped to provide substantial uniformity of pressure at the mating seat of the dome window and the dome support ring. 17. The enclosure of claim 1, wherein the dome support ring has a larger inner diameter in a forward section near the dome shaped window and a smaller inside diameter in a rear section against the housing. 18. The enclosure of claim 1, wherein the dome support ring comprises a material having a higher Young's modulus than the window. 19. The enclosure of claim 1, wherein the window is mechanically polished for strengthening. 20. The enclosure of claim 1, wherein the window is acid etched for strengthening. 21. The enclosure of claim 19, wherein the acid etching is hydrofluoric acid etching. 22. The enclosure of claim 1, wherein the window is flame polished for strengthening. 23. The enclosure of claim 1, wherein the window is chemically strengthened. 24. The enclosure of claim 22, wherein the chemical strengthening is ion exchange strengthening. 25. The enclosure of claim 1, wherein the housing is shaped to withstand an external pressure of at least 1000 PSI. 26. The enclosure of claim 1, wherein the coefficient of thermal expansion of the window and the support ring material are matched within 6 percent or less. 27. A submersible optical enclosure for use in high pressure environments, comprising: a housing comprising a titanium material, the housing having a hollow interior sized to accommodate an electronic device comprising one or more of an electronic light and an imaging device; a transparent pressure bearing substantially dome shaped glass window mechanically coupled to the housing and having an angular measurement of between 170 degrees and 176 degrees and sized correspondingly to the electronic device to allow light in to or out of the housing interior for lighting or imaging; a stainless steel stepped dome support ring positioned between the housing and window having opposite annular faces that are substantially planar and parallel; a compliance material layer of a polymer material positioned between the annular dome support ring and the transparent pressure bearing window; a coupling element that secures the housing, dome support ring, and port window together; and one or more water-tight seals to block water entry into the housing interior; wherein a first of the opposite angular faces of the dome support ring that is positioned adjacent to the compliance material layer includes textured features to lock the compliance material to the dome support ring under load.
2,400
9,071
9,071
16,152,723
2,488
A multi-copter on which a camera with a distance to a focal plane where the camera is in focus fixed at d is mounted detects a position of an inspection overhead line when moving to an image capture start point above the inspection overhead line, and moves to a shooting end point immediately above the inspection overhead line while capturing images of the inspection overhead line at the lower side using the camera while keeping an altitude difference d with the inspection overhead line.
1. An overhead line image capturing system that captures images of an overhead line, the overhead line image capturing system comprising: an unmanned aerial vehicle; a camera mounted on the unmanned aerial vehicle; an overhead line detection unit configured to detect an overhead line; and a control unit that is mounted on the unmanned aerial vehicle and that is configured to automatically navigate the unmanned aerial vehicle, wherein a distance to a focal plane where the camera is in focus is fixable, and wherein the control unit is configured to automatically navigate the unmanned aerial vehicle so as to move along the overhead line while keeping a distance with respect to the overhead line detected by the overhead line detection unit to be constant at a predetermined distance when capturing images of the overhead line with the camera. 2. The overhead line image capturing system according to claim 1, wherein: the control unit is configured to automatically navigate the unmanned aerial vehicle so as to move along the overhead line immediately above the overhead line while keeping a distance with respect to the overhead line whose position has been detected by the overhead line detection unit to be constant at the predetermined distance when capturing images of the overhead line. 3. The overhead line image capturing system according to claim 1, wherein: the unmanned aerial vehicle includes a gimbal capable of changing an orientation of the camera, and the control unit is configured to cause the gimbal to change the orientation of the camera so that the overhead line whose position has been detected by the overhead line detection unit is included in an image capturing range of the camera when capturing images of the overhead line. 4. The overhead line image capturing system according to claim 1, wherein the unmanned aerial vehicle is a multi-copter. 5. The overhead line image capturing system according to claim 2, wherein the distance to the focal plane where the camera is in focus is set to a distance equal to the predetermined distance when capturing images of the overhead line. 6. The overhead line image capturing system according to claim 2, wherein: the unmanned aerial vehicle includes a gimbal capable of changing an orientation of the camera, and the control unit is configurd to cause the gimbal to change the orientation of the camera so that the overhead line whose position has been detected by the overhead line detection unit is included in an image capturing range of the camera when capturing images of the overhead line. 7. The overhead line image capturing system according to claim 2, wherein the unmanned aerial vehicle is a multi-copter. 8. The overhead line image capturing system according to claim 5, wherein: the unmanned aerial vehicle includes a gimbal capable of changing an orientation of the camera, and the control unit is configured to cause the gimbal to change the orientation of the camera so that the overhead line whose position has been detected by the overhead line detection unit is included in an image capturing range of the camera when capturing images of the overhead line. 9. The overhead line image capturing system according to claim 5, wherein the unmanned aerial vehicle is a multi-copter. 10. The overhead line image capturing system according to claim 8, wherein the unmanned aerial vehicle is a multi-copter. 11. An overhead line image capturing method for capturing images of an overhead line using an unmanned aerial vehicle, the unmanned aerial vehicle having a camera, an overhead line detection unit configured to detect an overhead line, and a control unit configured to automatically navigate the unmanned aerial vehicle mounted thereon, the overhead line shooting method comprising: a first step of fixing a distance to a focal plane where the camera is in focus; and a second step of causing the control unit to automatically navigate the unmanned aerial vehicle so as to move along the overhead line while keeping a distance with respect to the overhead line detected by the overhead line detection unit to be constant at a predetermined distance, and capturing images of the overhead line using the camera whose distance to the focal plane is fixed. 12. The overhead line shooting method according to claim 11, wherein: the distance to the focal plane where the camera is in focus is set to the same distance as the predetermined distance in the first step, and the control unit is configured to automatically navigate the unmanned aerial vehicle to move along the overhead line immediately above the overhead line while keeping a distance with respect to the overhead line whose position has been detected by the overhead line detection unit to be constant at the predetermined distance in the second step.
A multi-copter on which a camera with a distance to a focal plane where the camera is in focus fixed at d is mounted detects a position of an inspection overhead line when moving to an image capture start point above the inspection overhead line, and moves to a shooting end point immediately above the inspection overhead line while capturing images of the inspection overhead line at the lower side using the camera while keeping an altitude difference d with the inspection overhead line.1. An overhead line image capturing system that captures images of an overhead line, the overhead line image capturing system comprising: an unmanned aerial vehicle; a camera mounted on the unmanned aerial vehicle; an overhead line detection unit configured to detect an overhead line; and a control unit that is mounted on the unmanned aerial vehicle and that is configured to automatically navigate the unmanned aerial vehicle, wherein a distance to a focal plane where the camera is in focus is fixable, and wherein the control unit is configured to automatically navigate the unmanned aerial vehicle so as to move along the overhead line while keeping a distance with respect to the overhead line detected by the overhead line detection unit to be constant at a predetermined distance when capturing images of the overhead line with the camera. 2. The overhead line image capturing system according to claim 1, wherein: the control unit is configured to automatically navigate the unmanned aerial vehicle so as to move along the overhead line immediately above the overhead line while keeping a distance with respect to the overhead line whose position has been detected by the overhead line detection unit to be constant at the predetermined distance when capturing images of the overhead line. 3. The overhead line image capturing system according to claim 1, wherein: the unmanned aerial vehicle includes a gimbal capable of changing an orientation of the camera, and the control unit is configured to cause the gimbal to change the orientation of the camera so that the overhead line whose position has been detected by the overhead line detection unit is included in an image capturing range of the camera when capturing images of the overhead line. 4. The overhead line image capturing system according to claim 1, wherein the unmanned aerial vehicle is a multi-copter. 5. The overhead line image capturing system according to claim 2, wherein the distance to the focal plane where the camera is in focus is set to a distance equal to the predetermined distance when capturing images of the overhead line. 6. The overhead line image capturing system according to claim 2, wherein: the unmanned aerial vehicle includes a gimbal capable of changing an orientation of the camera, and the control unit is configurd to cause the gimbal to change the orientation of the camera so that the overhead line whose position has been detected by the overhead line detection unit is included in an image capturing range of the camera when capturing images of the overhead line. 7. The overhead line image capturing system according to claim 2, wherein the unmanned aerial vehicle is a multi-copter. 8. The overhead line image capturing system according to claim 5, wherein: the unmanned aerial vehicle includes a gimbal capable of changing an orientation of the camera, and the control unit is configured to cause the gimbal to change the orientation of the camera so that the overhead line whose position has been detected by the overhead line detection unit is included in an image capturing range of the camera when capturing images of the overhead line. 9. The overhead line image capturing system according to claim 5, wherein the unmanned aerial vehicle is a multi-copter. 10. The overhead line image capturing system according to claim 8, wherein the unmanned aerial vehicle is a multi-copter. 11. An overhead line image capturing method for capturing images of an overhead line using an unmanned aerial vehicle, the unmanned aerial vehicle having a camera, an overhead line detection unit configured to detect an overhead line, and a control unit configured to automatically navigate the unmanned aerial vehicle mounted thereon, the overhead line shooting method comprising: a first step of fixing a distance to a focal plane where the camera is in focus; and a second step of causing the control unit to automatically navigate the unmanned aerial vehicle so as to move along the overhead line while keeping a distance with respect to the overhead line detected by the overhead line detection unit to be constant at a predetermined distance, and capturing images of the overhead line using the camera whose distance to the focal plane is fixed. 12. The overhead line shooting method according to claim 11, wherein: the distance to the focal plane where the camera is in focus is set to the same distance as the predetermined distance in the first step, and the control unit is configured to automatically navigate the unmanned aerial vehicle to move along the overhead line immediately above the overhead line while keeping a distance with respect to the overhead line whose position has been detected by the overhead line detection unit to be constant at the predetermined distance in the second step.
2,400
9,072
9,072
14,964,181
2,453
One embodiment provides a method including: streaming a wireless content stream utilizing a cache of a first cache size; identifying, using a processor, an impending data availability context associated with an interruption in the wireless content stream; and adjusting, based on the identifying, the cache of the wireless content stream to a second cache size. Other aspects are described and claimed.
1. A method, comprising: streaming a wireless content stream utilizing a cache of a first cache size; identifying, using a processor, an impending data availability context associated with an interruption in the wireless content stream; and adjusting, based on the identifying, the cache of the wireless content stream to a second cache size. 2. The method of claim 1, wherein the impending data availability context is identified using data selected from the group consisting of: data indicating a coverage gap, data indicating a physical obstacle, historical data, and data indicating a congested network. 3. The method of claim 2, wherein the data indicating a coverage gap comprises data from a carrier coverage map. 4. The method of claim 1, further comprising predicting, using a processor, how long the interruption will last. 5. The method of claim 4, wherein the predicting is based on at least one routing factor selected from the group consisting of: a size of the coverage gap, a current travel speed, an estimated future travel speed, an estimated route of travel, a time needed for data re-negotiation, and a content bit rate. 6. The method of claim 1, wherein the adjusting comprises increasing the cache of the wireless content stream. 7. The method of claim 1, further comprising predicting, using a processor, how long the interruption will last; and determining, based on the predicting, an amount to increase the cache of the wireless content stream to prevent interruption. 8. The method of claim 1, wherein the adjusting comprises increasing the cache size at a predetermined parameter from the impending data availability context associated with an interruption in the wireless content stream; and wherein the parameter is one or more of time and distance. 9. The method of claim 1, wherein the identifying comprises comparing wireless data transmission to a predetermined threshold. 10. The method of claim 9, wherein: the predetermined threshold is a data transmission rate; and the adjusting comprises increasing the cache size based on the data transmission rate. 11. The method of claim 9, wherein: the predetermined threshold is a data consumption rate; and the adjusting comprises increasing the cache size based on the data consumption rate. 12. An electronic device, comprising: a processor; a memory device that stores instructions executable by the processor to: stream a wireless content stream utilizing a cache of a first cache size; identify an impending data availability context associated with an interruption in the wireless content stream; and adjust, based on the identifying, the cache of the wireless content stream to a second cache size. 13. The electronic device of claim 12, wherein the impending data availability context is identified using data selected from the group consisting of: data indicating a coverage gap, data indicating a physical obstacle, historical data, and data indicating a congested network. 14. The electronic device of claim 12, wherein the instructions are further executable by the processor to predict how long the interruption last. 15. The electronic device of claim 14, wherein to predict is based on at least one routing factor selected from the group consisting of: a size of the coverage gap, a current travel speed, an estimated future travel speed, an estimated route of travel, a time needed for data re-negotiation, and a content bit rate. 16. The electronic device of claim 12, wherein to adjust comprises increasing the cache of the wireless content stream. 17. The electronic device of claim 12, wherein the instructions are further executable by the processor to predict how long the interruption will last; and to determine an amount to increase the cache of the wireless content stream to prevent interruption. 18. The electronic device of claim 12, wherein to adjust comprises increasing the cache size at a predetermined parameter from the impending data availability context associated with an interruption in the wireless content stream. 19. The electronic device of claim 12, wherein to identify comprises comparing wireless data transmission to a predetermined threshold. 20. A product, comprising: a storage device that stores code executable by a processor, the code comprising: code that streams a wireless content stream utilizing a cache of a first cache size; code that identifies an impending data availability context associated with an interruption in the wireless content stream; and code that adjusts the cache of the wireless content stream to a second cache size.
One embodiment provides a method including: streaming a wireless content stream utilizing a cache of a first cache size; identifying, using a processor, an impending data availability context associated with an interruption in the wireless content stream; and adjusting, based on the identifying, the cache of the wireless content stream to a second cache size. Other aspects are described and claimed.1. A method, comprising: streaming a wireless content stream utilizing a cache of a first cache size; identifying, using a processor, an impending data availability context associated with an interruption in the wireless content stream; and adjusting, based on the identifying, the cache of the wireless content stream to a second cache size. 2. The method of claim 1, wherein the impending data availability context is identified using data selected from the group consisting of: data indicating a coverage gap, data indicating a physical obstacle, historical data, and data indicating a congested network. 3. The method of claim 2, wherein the data indicating a coverage gap comprises data from a carrier coverage map. 4. The method of claim 1, further comprising predicting, using a processor, how long the interruption will last. 5. The method of claim 4, wherein the predicting is based on at least one routing factor selected from the group consisting of: a size of the coverage gap, a current travel speed, an estimated future travel speed, an estimated route of travel, a time needed for data re-negotiation, and a content bit rate. 6. The method of claim 1, wherein the adjusting comprises increasing the cache of the wireless content stream. 7. The method of claim 1, further comprising predicting, using a processor, how long the interruption will last; and determining, based on the predicting, an amount to increase the cache of the wireless content stream to prevent interruption. 8. The method of claim 1, wherein the adjusting comprises increasing the cache size at a predetermined parameter from the impending data availability context associated with an interruption in the wireless content stream; and wherein the parameter is one or more of time and distance. 9. The method of claim 1, wherein the identifying comprises comparing wireless data transmission to a predetermined threshold. 10. The method of claim 9, wherein: the predetermined threshold is a data transmission rate; and the adjusting comprises increasing the cache size based on the data transmission rate. 11. The method of claim 9, wherein: the predetermined threshold is a data consumption rate; and the adjusting comprises increasing the cache size based on the data consumption rate. 12. An electronic device, comprising: a processor; a memory device that stores instructions executable by the processor to: stream a wireless content stream utilizing a cache of a first cache size; identify an impending data availability context associated with an interruption in the wireless content stream; and adjust, based on the identifying, the cache of the wireless content stream to a second cache size. 13. The electronic device of claim 12, wherein the impending data availability context is identified using data selected from the group consisting of: data indicating a coverage gap, data indicating a physical obstacle, historical data, and data indicating a congested network. 14. The electronic device of claim 12, wherein the instructions are further executable by the processor to predict how long the interruption last. 15. The electronic device of claim 14, wherein to predict is based on at least one routing factor selected from the group consisting of: a size of the coverage gap, a current travel speed, an estimated future travel speed, an estimated route of travel, a time needed for data re-negotiation, and a content bit rate. 16. The electronic device of claim 12, wherein to adjust comprises increasing the cache of the wireless content stream. 17. The electronic device of claim 12, wherein the instructions are further executable by the processor to predict how long the interruption will last; and to determine an amount to increase the cache of the wireless content stream to prevent interruption. 18. The electronic device of claim 12, wherein to adjust comprises increasing the cache size at a predetermined parameter from the impending data availability context associated with an interruption in the wireless content stream. 19. The electronic device of claim 12, wherein to identify comprises comparing wireless data transmission to a predetermined threshold. 20. A product, comprising: a storage device that stores code executable by a processor, the code comprising: code that streams a wireless content stream utilizing a cache of a first cache size; code that identifies an impending data availability context associated with an interruption in the wireless content stream; and code that adjusts the cache of the wireless content stream to a second cache size.
2,400
9,073
9,073
15,717,921
2,468
An indication can be received at a device from a network. The indication can request the device to feedback channel state information corresponding to a first transmit time interval length operation and/or a second transmit time interval length operation. When the indication requests channel state information feedback for the first transmit time interval length operation: a first reference transmit time interval of a first transmit time interval length can be determined based on the transmit time interval in which the indication is received; and a channel measurement to compute the channel state information can be derived using reference signals associated with the first reference transmit time interval, and/or an interference measurement to compute the channel state information can be derived using measurements made on resource elements associated with the first reference transmit time interval. When the indication requests channel state information feedback for the second transmit time interval length operation: a second reference transmit time interval of a second transmit time interval length can be determined based on the transmit time interval in which the indication is received; and a channel measurement to compute the channel state information can be derived using reference signals associated with the second reference transmit time interval, and/or an interference measurement to compute the channel state information can be derived using measurements made on resource elements associated with the second reference transmit time interval.
1. A method performed by a device, the method comprising: receiving an indication from a network, the indication requesting the device to feedback channel state information corresponding to at least one selected from a first transmit time interval length operation and a second transmit time interval length operation; when the indication requests channel state information feedback for the first transmit time interval length operation: determining a first reference transmit time interval of a first transmit time interval length based on the transmit time interval in which the indication is received; and deriving at least one selected from a channel measurement to compute the channel state information using reference signals associated with the first reference transmit time interval, and an interference measurement to compute the channel state information using measurements made on resource elements associated with the first reference transmit time interval; and when the indication requests channel state information feedback for the second transmit time interval length operation: determining a second reference transmit time interval of a second transmit time interval length based on the transmit time interval in which the indication is received; and deriving at least one selected from a channel measurement to compute the channel state information using reference signals associated with the second reference transmit time interval, and an interference measurement to compute the channel state information using measurements made on resource elements associated with the second reference transmit time interval, wherein the first transmit time interval length operation has one selected from a shorter time duration than the second transmit time interval length operation, or a same time duration as the second transmit time interval length operation but is associated with a shorter communication processing time than a communication processing time associated with the second transmit time interval operation. 2. The method according to claim 1, wherein the first reference transmit time interval comprises a first set of frequency resources, wherein the second reference transmit time interval comprises a second set of frequency resources, and wherein the first set of frequency resources and the second set of frequency resources are different. 3. The method according to claim 2, wherein at least one selected from the first set of frequency resources and the second set of frequency resources is determined at least based on system bandwidth split between the first transmit time interval length operation and the second transmit time interval length operation. 4. The method according to claim 2, further comprising deriving and reporting at least one selected from a first channel quality indicator index based on the first reference transmit time interval, and a second channel quality indicator index based on the second reference transmit time interval. 5. The method according to claim 4, wherein the first channel quality indicator index is reported as an offset to the most recently reported second channel quality indicator index. 6. The method according to claim 4, wherein deriving and reporting comprises deriving and reporting at least one selected from the first channel quality indicator index based on the first reference transmit time interval, the second channel quality indicator index based on the second reference transmit time interval, and a third channel quality indicator index along with the first channel quality indicator index, and wherein the first channel quality indicator index is derived based on a first overhead assumption associated with the first transmit time interval reference, and wherein the third channel quality indicator index is derived based on a second overhead assumption associated with the first transmit time interval reference. 7. The method according to claim 6, wherein an overhead assumption includes at least one selected from a number of physical downlink control channel symbols, and a number of cell specific reference signal resource elements. 8. The method according to claim 1, wherein the indication requests the device to feedback channel state information corresponding to at least one selected from a first transmit time interval length operation in a control channel associated with the first transmit time interval length operation, and a second transmit time interval length operation in a control channel associated with the second transmit time interval length operation. 9. The method according to claim 1, further comprising determining whether the channel state information feedback indication is for the first transmit time interval length operation or the second transmit time interval length operation based on a control field corresponding to the indication, where the control field is received in control signaling from a network. 10. The method according to claim 9, wherein the channel state information feedback indication is for the second transmit time interval length operation and is received in a transmit time interval within a subframe, and the transmit time interval within the subframe is of the first transmit time interval length, and wherein the reference signals associated with the second reference transmit time interval include reference signals transmitted until the end of the second reference transmit time interval, and wherein a first orthogonal frequency division multiplexing symbol of the second transmit time interval does not coincide with a first orthogonal frequency division multiplexing symbol of the subframe. 11. The method according to claim 1, further comprising: determining the channel state information feedback indication is for the first transmit time interval length operation based on a first radio network temporary identifier; and determining the channel state information feedback indication is for the second transmit time interval length operation based on a second radio network temporary identifier. 12. The method according to claim 1, wherein the indication is provided by a layer higher than physical layer signaling, and wherein the indication requests channel state information feedback to be reported in a plurality of time instances. 13. The method according to claim 12, wherein the time instances in the plurality of time instances are equidistant in time. 14. An apparatus comprising: a controller that controls operations of the apparatus; and a transceiver that receives an indication from a network, the indication requesting the apparatus to feedback channel state information corresponding to at least one selected from a first transmit time interval length operation and a second transmit time interval length operation, wherein when the indication requests channel state information feedback for the first transmit time interval length operation, the controller determines a first reference transmit time interval of a first transmit time interval length based on the transmit time interval in which the indication is received, and derives at least one selected from a channel measurement to compute the channel state information using reference signals associated with the first reference transmit time interval, and an interference measurement to compute the channel state information using measurements made on resource elements associated with the first reference transmit time interval, wherein when the indication requests channel state information feedback for the second transmit time interval length operation, the controller determines a second reference transmit time interval of a second transmit time interval length based on the transmit time interval in which the indication is received, and derives at least one selected from a channel measurement to compute the channel state information using reference signals associated with the second reference transmit time interval, and an interference measurement to compute the channel state information using measurements made on resource elements associated with the second reference transmit time interval, and wherein the first transmit time interval length operation has one selected from a shorter time duration than the second transmit time interval length operation, or a same time duration as the second transmit time interval length operation but is associated with a shorter communication processing time than a communication processing time associated with the second transmit time interval operation. 15. The apparatus according to claim 14, wherein the first reference transmit time interval comprises a first set of frequency resources, wherein the second reference transmit time interval comprises a second set of frequency resources, and wherein the first set and the second set are different. 16. The apparatus according to claim 15, wherein at least one selected from the first set of frequency resources and the second set of frequency resources is determined at least based on system bandwidth split between the first transmit time interval length operation and the second transmit time interval length operation. 17. The apparatus according to claim 15, the controller can derive and report at least one selected from a first channel quality indicator index based on the first reference transmit time interval, and a second channel quality indicator index based on the second reference transmit time interval. 18. The apparatus according to claim 17, wherein the first channel quality indicator index is reported as an offset to the most recently reported second channel quality indicator index. 19. The apparatus according to claim 17, wherein deriving and reporting comprises deriving and reporting at least one selected from the first channel quality indicator index based on the first reference transmit time interval, the second channel quality indicator index based on the second reference transmit time interval, and a third channel quality indicator index along with the first channel quality indicator index, and wherein the first channel quality indicator index is derived based on a first overhead assumption associated with the first transmit time interval reference, and wherein the third channel quality indicator index is derived based on a second overhead assumption associated with the first transmit time interval reference. 20. The apparatus according to claim 19, wherein an overhead assumption includes at least one selected from a number of physical downlink control channel symbols, and a number of cell specific reference signal resource elements.
An indication can be received at a device from a network. The indication can request the device to feedback channel state information corresponding to a first transmit time interval length operation and/or a second transmit time interval length operation. When the indication requests channel state information feedback for the first transmit time interval length operation: a first reference transmit time interval of a first transmit time interval length can be determined based on the transmit time interval in which the indication is received; and a channel measurement to compute the channel state information can be derived using reference signals associated with the first reference transmit time interval, and/or an interference measurement to compute the channel state information can be derived using measurements made on resource elements associated with the first reference transmit time interval. When the indication requests channel state information feedback for the second transmit time interval length operation: a second reference transmit time interval of a second transmit time interval length can be determined based on the transmit time interval in which the indication is received; and a channel measurement to compute the channel state information can be derived using reference signals associated with the second reference transmit time interval, and/or an interference measurement to compute the channel state information can be derived using measurements made on resource elements associated with the second reference transmit time interval.1. A method performed by a device, the method comprising: receiving an indication from a network, the indication requesting the device to feedback channel state information corresponding to at least one selected from a first transmit time interval length operation and a second transmit time interval length operation; when the indication requests channel state information feedback for the first transmit time interval length operation: determining a first reference transmit time interval of a first transmit time interval length based on the transmit time interval in which the indication is received; and deriving at least one selected from a channel measurement to compute the channel state information using reference signals associated with the first reference transmit time interval, and an interference measurement to compute the channel state information using measurements made on resource elements associated with the first reference transmit time interval; and when the indication requests channel state information feedback for the second transmit time interval length operation: determining a second reference transmit time interval of a second transmit time interval length based on the transmit time interval in which the indication is received; and deriving at least one selected from a channel measurement to compute the channel state information using reference signals associated with the second reference transmit time interval, and an interference measurement to compute the channel state information using measurements made on resource elements associated with the second reference transmit time interval, wherein the first transmit time interval length operation has one selected from a shorter time duration than the second transmit time interval length operation, or a same time duration as the second transmit time interval length operation but is associated with a shorter communication processing time than a communication processing time associated with the second transmit time interval operation. 2. The method according to claim 1, wherein the first reference transmit time interval comprises a first set of frequency resources, wherein the second reference transmit time interval comprises a second set of frequency resources, and wherein the first set of frequency resources and the second set of frequency resources are different. 3. The method according to claim 2, wherein at least one selected from the first set of frequency resources and the second set of frequency resources is determined at least based on system bandwidth split between the first transmit time interval length operation and the second transmit time interval length operation. 4. The method according to claim 2, further comprising deriving and reporting at least one selected from a first channel quality indicator index based on the first reference transmit time interval, and a second channel quality indicator index based on the second reference transmit time interval. 5. The method according to claim 4, wherein the first channel quality indicator index is reported as an offset to the most recently reported second channel quality indicator index. 6. The method according to claim 4, wherein deriving and reporting comprises deriving and reporting at least one selected from the first channel quality indicator index based on the first reference transmit time interval, the second channel quality indicator index based on the second reference transmit time interval, and a third channel quality indicator index along with the first channel quality indicator index, and wherein the first channel quality indicator index is derived based on a first overhead assumption associated with the first transmit time interval reference, and wherein the third channel quality indicator index is derived based on a second overhead assumption associated with the first transmit time interval reference. 7. The method according to claim 6, wherein an overhead assumption includes at least one selected from a number of physical downlink control channel symbols, and a number of cell specific reference signal resource elements. 8. The method according to claim 1, wherein the indication requests the device to feedback channel state information corresponding to at least one selected from a first transmit time interval length operation in a control channel associated with the first transmit time interval length operation, and a second transmit time interval length operation in a control channel associated with the second transmit time interval length operation. 9. The method according to claim 1, further comprising determining whether the channel state information feedback indication is for the first transmit time interval length operation or the second transmit time interval length operation based on a control field corresponding to the indication, where the control field is received in control signaling from a network. 10. The method according to claim 9, wherein the channel state information feedback indication is for the second transmit time interval length operation and is received in a transmit time interval within a subframe, and the transmit time interval within the subframe is of the first transmit time interval length, and wherein the reference signals associated with the second reference transmit time interval include reference signals transmitted until the end of the second reference transmit time interval, and wherein a first orthogonal frequency division multiplexing symbol of the second transmit time interval does not coincide with a first orthogonal frequency division multiplexing symbol of the subframe. 11. The method according to claim 1, further comprising: determining the channel state information feedback indication is for the first transmit time interval length operation based on a first radio network temporary identifier; and determining the channel state information feedback indication is for the second transmit time interval length operation based on a second radio network temporary identifier. 12. The method according to claim 1, wherein the indication is provided by a layer higher than physical layer signaling, and wherein the indication requests channel state information feedback to be reported in a plurality of time instances. 13. The method according to claim 12, wherein the time instances in the plurality of time instances are equidistant in time. 14. An apparatus comprising: a controller that controls operations of the apparatus; and a transceiver that receives an indication from a network, the indication requesting the apparatus to feedback channel state information corresponding to at least one selected from a first transmit time interval length operation and a second transmit time interval length operation, wherein when the indication requests channel state information feedback for the first transmit time interval length operation, the controller determines a first reference transmit time interval of a first transmit time interval length based on the transmit time interval in which the indication is received, and derives at least one selected from a channel measurement to compute the channel state information using reference signals associated with the first reference transmit time interval, and an interference measurement to compute the channel state information using measurements made on resource elements associated with the first reference transmit time interval, wherein when the indication requests channel state information feedback for the second transmit time interval length operation, the controller determines a second reference transmit time interval of a second transmit time interval length based on the transmit time interval in which the indication is received, and derives at least one selected from a channel measurement to compute the channel state information using reference signals associated with the second reference transmit time interval, and an interference measurement to compute the channel state information using measurements made on resource elements associated with the second reference transmit time interval, and wherein the first transmit time interval length operation has one selected from a shorter time duration than the second transmit time interval length operation, or a same time duration as the second transmit time interval length operation but is associated with a shorter communication processing time than a communication processing time associated with the second transmit time interval operation. 15. The apparatus according to claim 14, wherein the first reference transmit time interval comprises a first set of frequency resources, wherein the second reference transmit time interval comprises a second set of frequency resources, and wherein the first set and the second set are different. 16. The apparatus according to claim 15, wherein at least one selected from the first set of frequency resources and the second set of frequency resources is determined at least based on system bandwidth split between the first transmit time interval length operation and the second transmit time interval length operation. 17. The apparatus according to claim 15, the controller can derive and report at least one selected from a first channel quality indicator index based on the first reference transmit time interval, and a second channel quality indicator index based on the second reference transmit time interval. 18. The apparatus according to claim 17, wherein the first channel quality indicator index is reported as an offset to the most recently reported second channel quality indicator index. 19. The apparatus according to claim 17, wherein deriving and reporting comprises deriving and reporting at least one selected from the first channel quality indicator index based on the first reference transmit time interval, the second channel quality indicator index based on the second reference transmit time interval, and a third channel quality indicator index along with the first channel quality indicator index, and wherein the first channel quality indicator index is derived based on a first overhead assumption associated with the first transmit time interval reference, and wherein the third channel quality indicator index is derived based on a second overhead assumption associated with the first transmit time interval reference. 20. The apparatus according to claim 19, wherein an overhead assumption includes at least one selected from a number of physical downlink control channel symbols, and a number of cell specific reference signal resource elements.
2,400
9,074
9,074
16,371,539
2,483
Systems and methods are disclosed for operation of image capture devices. For example, systems may include an image sensor configured to capture images; a mechanical stabilization system, including gimbals and motors, that is integrated with the image sensor and configured to control an orientation of the image sensor; and a processing apparatus configured to: detect an occurrence of a triggering event; and, responsive to the occurrence of the triggering event, send commands to motor controllers of the mechanical stabilization system to electronically control the gimbals and motors to assume a fold-flat position, maintain the fold-flat position for a time period, and, after the time period expires, power off the gimbals and motors.
1. A system comprising: an image sensor configured to capture images; a mechanical stabilization system, including gimbals and motors, that is integrated with the image sensor and configured to control an orientation of the image sensor; and a processing apparatus configured to: detect an occurrence of a triggering event; and responsive to the occurrence of the triggering event, send commands to motor controllers of the mechanical stabilization system to electronically control the gimbals and motors to assume a fold-flat position, maintain the fold-flat position for a time period, and, after the time period expires, power off the gimbals and motors. 2. The system of claim 1, in which the triggering event is a command to power off a device including the image sensor, the mechanical stabilization system, and the processing apparatus. 3. The system of claim 1, comprising: a handheld module attached to the image sensor via the mechanical stabilization system, in which the handheld module includes a display configured to display images received from the image sensor. 4. The system of claim 3, in which a gimbal of the mechanical stabilization system is substantially flush with a surface of the handheld module. 5. The system of claim 1, in which the triggering event is a command to power off the mechanical stabilization system. 6. The system of claim 1, comprising: a container configured to receive and to enclose a device including the image sensor, the mechanical stabilization system, and the processing apparatus when the gimbals and motors are maintaining the fold-flat position. 7. The system of claim 6, in which the container is a carrying case. 8. The system of claim 6, in which the container includes a physical lock. 9. The system of claim 1, in which the time period is a fixed time period. 10. The system of claim 1, in which the mechanical stabilization system includes an outer axis that is attached to the image sensor, a motion sensor, and a microphone; and the processing apparatus is configured to receive data from the motion sensor and data from the microphone via conductors routed through the mechanical stabilization system. 11. The system of claim 1, in which the processing apparatus is configured to: track a user based on position data from a beacon module and based on computer vision tracking of the user in images from the image sensor. 12. A method comprising: detecting an occurrence of a triggering event indicating an electronically actuated transport mode for a device including an image sensor and a mechanical stabilization system that is integrated with the image sensor and configured to control an orientation of the image sensor; and responsive to the occurrence of the triggering event, sending commands to motor controllers of the mechanical stabilization system to electronically control the mechanical stabilization system to assume a fold-flat position, maintain the fold-flat position for a time period, and, after the time period expires, power off the mechanical stabilization system. 13. The method of claim 12, in which the triggering event includes a command to power off the device. 14. The method of claim 12, in which the time period is a fixed time period. 15. The method of claim 12, comprising: inserting the device in a container configured to receive and enclose the device when the gimbals and motors are maintaining the fold-flat position. 16. The method of claim 15, in which the container is a carrying case. 17. The method of claim 15, comprising: engaging a physical lock of the container to secure the device after it has been inserted in the container. 18. A non-transitory computer readable memory including executable instructions and data that can be executed by one or more processors to perform operations comprising: detecting an occurrence of a triggering event indicating an electronically actuated transport mode for a device including an image sensor and a mechanical stabilization system, including gimbals and motors, that is integrated with the image sensor and configured to control an orientation of the image sensor; and responsive to the occurrence of the triggering event, send commands to motor controllers of the mechanical stabilization system to electronically control the gimbals and motors to assume a fold-flat position, maintain the fold-flat position for a time period, and, after the time period expires, power off the gimbals and motors. 19. The non-transitory computer readable memory of claim 18, in which the triggering event is a command to power off the device. 20. The non-transitory computer readable memory of claim 18, in which the time period is a fixed time period.
Systems and methods are disclosed for operation of image capture devices. For example, systems may include an image sensor configured to capture images; a mechanical stabilization system, including gimbals and motors, that is integrated with the image sensor and configured to control an orientation of the image sensor; and a processing apparatus configured to: detect an occurrence of a triggering event; and, responsive to the occurrence of the triggering event, send commands to motor controllers of the mechanical stabilization system to electronically control the gimbals and motors to assume a fold-flat position, maintain the fold-flat position for a time period, and, after the time period expires, power off the gimbals and motors.1. A system comprising: an image sensor configured to capture images; a mechanical stabilization system, including gimbals and motors, that is integrated with the image sensor and configured to control an orientation of the image sensor; and a processing apparatus configured to: detect an occurrence of a triggering event; and responsive to the occurrence of the triggering event, send commands to motor controllers of the mechanical stabilization system to electronically control the gimbals and motors to assume a fold-flat position, maintain the fold-flat position for a time period, and, after the time period expires, power off the gimbals and motors. 2. The system of claim 1, in which the triggering event is a command to power off a device including the image sensor, the mechanical stabilization system, and the processing apparatus. 3. The system of claim 1, comprising: a handheld module attached to the image sensor via the mechanical stabilization system, in which the handheld module includes a display configured to display images received from the image sensor. 4. The system of claim 3, in which a gimbal of the mechanical stabilization system is substantially flush with a surface of the handheld module. 5. The system of claim 1, in which the triggering event is a command to power off the mechanical stabilization system. 6. The system of claim 1, comprising: a container configured to receive and to enclose a device including the image sensor, the mechanical stabilization system, and the processing apparatus when the gimbals and motors are maintaining the fold-flat position. 7. The system of claim 6, in which the container is a carrying case. 8. The system of claim 6, in which the container includes a physical lock. 9. The system of claim 1, in which the time period is a fixed time period. 10. The system of claim 1, in which the mechanical stabilization system includes an outer axis that is attached to the image sensor, a motion sensor, and a microphone; and the processing apparatus is configured to receive data from the motion sensor and data from the microphone via conductors routed through the mechanical stabilization system. 11. The system of claim 1, in which the processing apparatus is configured to: track a user based on position data from a beacon module and based on computer vision tracking of the user in images from the image sensor. 12. A method comprising: detecting an occurrence of a triggering event indicating an electronically actuated transport mode for a device including an image sensor and a mechanical stabilization system that is integrated with the image sensor and configured to control an orientation of the image sensor; and responsive to the occurrence of the triggering event, sending commands to motor controllers of the mechanical stabilization system to electronically control the mechanical stabilization system to assume a fold-flat position, maintain the fold-flat position for a time period, and, after the time period expires, power off the mechanical stabilization system. 13. The method of claim 12, in which the triggering event includes a command to power off the device. 14. The method of claim 12, in which the time period is a fixed time period. 15. The method of claim 12, comprising: inserting the device in a container configured to receive and enclose the device when the gimbals and motors are maintaining the fold-flat position. 16. The method of claim 15, in which the container is a carrying case. 17. The method of claim 15, comprising: engaging a physical lock of the container to secure the device after it has been inserted in the container. 18. A non-transitory computer readable memory including executable instructions and data that can be executed by one or more processors to perform operations comprising: detecting an occurrence of a triggering event indicating an electronically actuated transport mode for a device including an image sensor and a mechanical stabilization system, including gimbals and motors, that is integrated with the image sensor and configured to control an orientation of the image sensor; and responsive to the occurrence of the triggering event, send commands to motor controllers of the mechanical stabilization system to electronically control the gimbals and motors to assume a fold-flat position, maintain the fold-flat position for a time period, and, after the time period expires, power off the gimbals and motors. 19. The non-transitory computer readable memory of claim 18, in which the triggering event is a command to power off the device. 20. The non-transitory computer readable memory of claim 18, in which the time period is a fixed time period.
2,400
9,075
9,075
16,387,176
2,424
Novel tools and techniques are provided for implementing over the top service implementation coupled with over the air tuning. In various embodiments, an integrated media presentation device might receive one or more over the top (“OTT”) service signals, information associated with each OTT media content received in the one or more OTT service signals, one or more over the air (“OTA”) service signals, location information associated with location of the integrated media presentation device, and information associated with each OTA media content received in the one or more OTA service signals. The integrated media presentation device might compile the received information associated with each OTT media content and the received information associated with each OTA media content, might generate an integrated electronic program guide (“EPG”) that integrates the compiled information; and might display, on a display device, the generated integrated EPG.
1. A method, comprising: receiving, with an integrated media presentation device, one or more over the top (“OTT”) service signals; receiving, with the integrated media presentation device, information associated with each OTT media content received in the one or more OTT service signals; receiving, with the integrated media presentation device, one or more over the air (“OTA”) service signals; receiving, with the integrated media presentation device, location information associated with location of the integrated media presentation device; receiving, with the integrated media presentation device, information associated with each OTA media content received in the one or more OTA service signals, wherein the information associated with each OTA media content received in the one or more OTA service signals is based on the received location information; compiling, with the integrated media presentation device, the received information associated with each OTT media content received in the one or more OTT service signals and the received information associated with each OTA media content received in the one or more OTA service signals; generating, with the integrated media presentation device, an integrated electronic program guide (“EPG”) that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals; and displaying, with the integrated media presentation device and on a display device, the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals. 2. The method of claim 1, wherein the integrated media presentation device comprises at least one of a set-top box (“STB”), a digital video recording and playback device (“DVR”), a universal serial bus (“USB”)-based streaming device, a cable television tuner, an OTT tuner, or an OTA tuner. 3. The method of claim 1, wherein the integrated media presentation device comprises a master device and one or more slave devices that service two or more display devices in a customer premises associated with a user. 4. The method of claim 3, wherein the master device comprises an OTA tuner, while the one or more slave devices do not comprise any OTA tuners. 5. The method of claim 1, wherein the location information associated with the location of the integrated media presentation device comprises at least one of local area code, local zip code, billing address of a user associated with the integrated media presentation device, service address of the user associated with the integrated media presentation device, or location data obtained for identifying location of the integrated media presentation device. 6. The method of claim 1, further comprising: in response to one or more first user commands received from a user indicating to record at least one first OTA media content among the received OTA media content received in the one or more OTA service signals, storing, with the integrated media presentation device and on a local datastore, the at least one first OTA media content, wherein storing the at least one first OTA media content on the local datastore is performed in a similar manner as storing of OTT media content on the local datastore. 7. The method of claim 6, further comprising: in response to one or more second user commands received from the user indicating to stream at least one second OTA media content among the at least one first OTA media content, sending, with the integrated media presentation device and to a mobile user device associated with the user, the at least one second OTA media content for streaming of the at least one second OTA media content on the mobile user device. 8. The method of claim 1, further comprising: in response to one or more third user commands received from a user indicating to stream at least one third OTA media content among the received OTA media content received in the one or more OTA service signals, sending, with the integrated media presentation device and to a mobile user device associated with the user, the at least one third OTA media content for streaming of the at least one third OTA media content on the mobile user device. 9. The method of claim 1, further comprising: receiving, with the integrated media presentation device, one or more television cable service signals; and receiving, with the integrated media presentation device, information associated with each television cable media content received in the one or more television cable service signals; wherein compiling the received information associated with each OTT media content received in the one or more OTT service signals and the received information associated with each OTA media content received in the one or more OTA service signals comprises compiling, with the integrated media presentation device, the received information associated with each OTT media content received in the one or more OTT service signals, the received information associated with each OTA media content received in the one or more OTA service signals, and the received information associated with each television cable media content received in the one or more television cable service signals; wherein generating the integrated EPG that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals comprises generating, with the integrated media presentation device, an integrated EPG that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals, information associated with each OTA media content received in the one or more OTA service signals, and information associated with each television cable media content received in the one or more television cable service signals; and wherein displaying the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals comprises displaying, with the integrated media presentation device and on the display device, the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals, information associated with each OTA media content received in the one or more OTA service signals, and information associated with each television cable media content received in the one or more television cable service signals. 10. The method of claim 1, further comprising: receiving, with the integrated media presentation device, one or more fourth user commands from a user indicating to customize at least one of display format of the integrated EPG, channels of media content to display in the integrated EPG, or types of media content to display in the integrated EPG; wherein generating the integrated EPG comprises generating, with the integrated media presentation device, an integrated EPG, based on the received one or more fourth user commands, wherein the display format comprises at least one of format, orientation, or order of one or more categories, wherein the one or more categories comprises at least one of channel numbers, channel designations, or broadcast times. 11. An apparatus, comprising: at least one processor; and a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to: receive one or more over the top (“OTT”) service signals; receive information associated with each OTT media content received in the one or more OTT service signals; receive one or more over the air (“OTA”) service signals; receive location information associated with location of the integrated media presentation device; receive information associated with each OTA media content received in the one or more OTA service signals, wherein the information associated with each OTA media content received in the one or more OTA service signals is based on the received location information; compile the received information associated with each OTT media content received in the one or more OTT service signals and the received information associated with each OTA media content received in the one or more OTA service signals; generate an integrated electronic program guide (“EPG”) that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals; and display, on a display device, the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals. 12. The apparatus of claim 11, wherein the apparatus comprises at least one of a set-top box (“STB”), a digital video recording and playback device (“DVR”), a universal serial bus (“USB”)-based streaming device, a cable television tuner, an OTT tuner, or an OTA tuner. 13. The apparatus of claim 11, wherein the apparatus comprises a master device and one or more slave devices that service two or more display devices in a customer premises associated with a user. 14. The apparatus of claim 13, wherein the master device comprises an OTA tuner, while the one or more slave devices do not comprise any OTA tuners. 15. The apparatus of claim 11, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to: in response to one or more first user commands received from a user indicating to record at least one first OTA media content among the received OTA media content received in the one or more OTA service signals, storing, with the apparatus and on a local datastore, the at least one first OTA media content, wherein storing the at least one first OTA media content on the local datastore is performed in a similar manner as storing of OTT media content on the local datastore. 16. The apparatus of claim 15, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to: in response to one or more second user commands received from the user indicating to stream at least one second OTA media content among the at least one first OTA media content, sending, with the apparatus and to a mobile user device associated with the user, the at least one second OTA media content for streaming of the at least one second OTA media content on the mobile user device. 17. The apparatus of claim 11, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to: in response to one or more third user commands received from a user indicating to stream at least one third OTA media content among the received OTA media content received in the one or more OTA service signals, sending, with the apparatus and to a mobile user device associated with the user, the at least one third OTA media content for streaming of the at least one third OTA media content on the mobile user device. 18. The apparatus of claim 11, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to: receive one or more television cable service signals; and receive information associated with each television cable media content received in the one or more television cable service signals; wherein compiling the received information associated with each OTT media content received in the one or more OTT service signals and the received information associated with each OTA media content received in the one or more OTA service signals comprises compiling the received information associated with each OTT media content received in the one or more OTT service signals, the received information associated with each OTA media content received in the one or more OTA service signals, and the received information associated with each television cable media content received in the one or more television cable service signals; wherein generating the integrated EPG that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals comprises generating an integrated EPG that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals, information associated with each OTA media content received in the one or more OTA service signals, and information associated with each television cable media content received in the one or more television cable service signals; and wherein displaying the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals comprises displaying, on the display device, the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals, information associated with each OTA media content received in the one or more OTA service signals, and information associated with each television cable media content received in the one or more television cable service signals. 19. The apparatus of claim 11, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to: receive one or more fourth user commands from a user indicating to customize at least one of display format of the integrated EPG, channels of media content to display in the integrated EPG, or types of media content to display in the integrated EPG; wherein generating the integrated EPG comprises generating an integrated EPG, based on the received one or more fourth user commands, wherein the display format comprises at least one of format, orientation, or order of one or more categories, wherein the one or more categories comprises at least one of channel numbers, channel designations, or broadcast times. 20. A system, comprising: an integrated media presentation device, comprising: at least one first processor; and a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the integrated media presentation device to: receive one or more over the top (“OTT”) service signals; receive information associated with each OTT media content received in the one or more OTT service signals; receive one or more over the air (“OTA”) service signals; receive location information associated with location of the integrated media presentation device; receive information associated with each OTA media content received in the one or more OTA service signals, wherein the information associated with each OTA media content received in the one or more OTA service signals is based on the received location information; compile the received information associated with each OTT media content received in the one or more OTT service signals and the received information associated with each OTA media content received in the one or more OTA service signals; generate an integrated electronic program guide (“EPG”) that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals; and display, on a display device, the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals.
Novel tools and techniques are provided for implementing over the top service implementation coupled with over the air tuning. In various embodiments, an integrated media presentation device might receive one or more over the top (“OTT”) service signals, information associated with each OTT media content received in the one or more OTT service signals, one or more over the air (“OTA”) service signals, location information associated with location of the integrated media presentation device, and information associated with each OTA media content received in the one or more OTA service signals. The integrated media presentation device might compile the received information associated with each OTT media content and the received information associated with each OTA media content, might generate an integrated electronic program guide (“EPG”) that integrates the compiled information; and might display, on a display device, the generated integrated EPG.1. A method, comprising: receiving, with an integrated media presentation device, one or more over the top (“OTT”) service signals; receiving, with the integrated media presentation device, information associated with each OTT media content received in the one or more OTT service signals; receiving, with the integrated media presentation device, one or more over the air (“OTA”) service signals; receiving, with the integrated media presentation device, location information associated with location of the integrated media presentation device; receiving, with the integrated media presentation device, information associated with each OTA media content received in the one or more OTA service signals, wherein the information associated with each OTA media content received in the one or more OTA service signals is based on the received location information; compiling, with the integrated media presentation device, the received information associated with each OTT media content received in the one or more OTT service signals and the received information associated with each OTA media content received in the one or more OTA service signals; generating, with the integrated media presentation device, an integrated electronic program guide (“EPG”) that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals; and displaying, with the integrated media presentation device and on a display device, the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals. 2. The method of claim 1, wherein the integrated media presentation device comprises at least one of a set-top box (“STB”), a digital video recording and playback device (“DVR”), a universal serial bus (“USB”)-based streaming device, a cable television tuner, an OTT tuner, or an OTA tuner. 3. The method of claim 1, wherein the integrated media presentation device comprises a master device and one or more slave devices that service two or more display devices in a customer premises associated with a user. 4. The method of claim 3, wherein the master device comprises an OTA tuner, while the one or more slave devices do not comprise any OTA tuners. 5. The method of claim 1, wherein the location information associated with the location of the integrated media presentation device comprises at least one of local area code, local zip code, billing address of a user associated with the integrated media presentation device, service address of the user associated with the integrated media presentation device, or location data obtained for identifying location of the integrated media presentation device. 6. The method of claim 1, further comprising: in response to one or more first user commands received from a user indicating to record at least one first OTA media content among the received OTA media content received in the one or more OTA service signals, storing, with the integrated media presentation device and on a local datastore, the at least one first OTA media content, wherein storing the at least one first OTA media content on the local datastore is performed in a similar manner as storing of OTT media content on the local datastore. 7. The method of claim 6, further comprising: in response to one or more second user commands received from the user indicating to stream at least one second OTA media content among the at least one first OTA media content, sending, with the integrated media presentation device and to a mobile user device associated with the user, the at least one second OTA media content for streaming of the at least one second OTA media content on the mobile user device. 8. The method of claim 1, further comprising: in response to one or more third user commands received from a user indicating to stream at least one third OTA media content among the received OTA media content received in the one or more OTA service signals, sending, with the integrated media presentation device and to a mobile user device associated with the user, the at least one third OTA media content for streaming of the at least one third OTA media content on the mobile user device. 9. The method of claim 1, further comprising: receiving, with the integrated media presentation device, one or more television cable service signals; and receiving, with the integrated media presentation device, information associated with each television cable media content received in the one or more television cable service signals; wherein compiling the received information associated with each OTT media content received in the one or more OTT service signals and the received information associated with each OTA media content received in the one or more OTA service signals comprises compiling, with the integrated media presentation device, the received information associated with each OTT media content received in the one or more OTT service signals, the received information associated with each OTA media content received in the one or more OTA service signals, and the received information associated with each television cable media content received in the one or more television cable service signals; wherein generating the integrated EPG that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals comprises generating, with the integrated media presentation device, an integrated EPG that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals, information associated with each OTA media content received in the one or more OTA service signals, and information associated with each television cable media content received in the one or more television cable service signals; and wherein displaying the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals comprises displaying, with the integrated media presentation device and on the display device, the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals, information associated with each OTA media content received in the one or more OTA service signals, and information associated with each television cable media content received in the one or more television cable service signals. 10. The method of claim 1, further comprising: receiving, with the integrated media presentation device, one or more fourth user commands from a user indicating to customize at least one of display format of the integrated EPG, channels of media content to display in the integrated EPG, or types of media content to display in the integrated EPG; wherein generating the integrated EPG comprises generating, with the integrated media presentation device, an integrated EPG, based on the received one or more fourth user commands, wherein the display format comprises at least one of format, orientation, or order of one or more categories, wherein the one or more categories comprises at least one of channel numbers, channel designations, or broadcast times. 11. An apparatus, comprising: at least one processor; and a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to: receive one or more over the top (“OTT”) service signals; receive information associated with each OTT media content received in the one or more OTT service signals; receive one or more over the air (“OTA”) service signals; receive location information associated with location of the integrated media presentation device; receive information associated with each OTA media content received in the one or more OTA service signals, wherein the information associated with each OTA media content received in the one or more OTA service signals is based on the received location information; compile the received information associated with each OTT media content received in the one or more OTT service signals and the received information associated with each OTA media content received in the one or more OTA service signals; generate an integrated electronic program guide (“EPG”) that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals; and display, on a display device, the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals. 12. The apparatus of claim 11, wherein the apparatus comprises at least one of a set-top box (“STB”), a digital video recording and playback device (“DVR”), a universal serial bus (“USB”)-based streaming device, a cable television tuner, an OTT tuner, or an OTA tuner. 13. The apparatus of claim 11, wherein the apparatus comprises a master device and one or more slave devices that service two or more display devices in a customer premises associated with a user. 14. The apparatus of claim 13, wherein the master device comprises an OTA tuner, while the one or more slave devices do not comprise any OTA tuners. 15. The apparatus of claim 11, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to: in response to one or more first user commands received from a user indicating to record at least one first OTA media content among the received OTA media content received in the one or more OTA service signals, storing, with the apparatus and on a local datastore, the at least one first OTA media content, wherein storing the at least one first OTA media content on the local datastore is performed in a similar manner as storing of OTT media content on the local datastore. 16. The apparatus of claim 15, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to: in response to one or more second user commands received from the user indicating to stream at least one second OTA media content among the at least one first OTA media content, sending, with the apparatus and to a mobile user device associated with the user, the at least one second OTA media content for streaming of the at least one second OTA media content on the mobile user device. 17. The apparatus of claim 11, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to: in response to one or more third user commands received from a user indicating to stream at least one third OTA media content among the received OTA media content received in the one or more OTA service signals, sending, with the apparatus and to a mobile user device associated with the user, the at least one third OTA media content for streaming of the at least one third OTA media content on the mobile user device. 18. The apparatus of claim 11, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to: receive one or more television cable service signals; and receive information associated with each television cable media content received in the one or more television cable service signals; wherein compiling the received information associated with each OTT media content received in the one or more OTT service signals and the received information associated with each OTA media content received in the one or more OTA service signals comprises compiling the received information associated with each OTT media content received in the one or more OTT service signals, the received information associated with each OTA media content received in the one or more OTA service signals, and the received information associated with each television cable media content received in the one or more television cable service signals; wherein generating the integrated EPG that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals comprises generating an integrated EPG that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals, information associated with each OTA media content received in the one or more OTA service signals, and information associated with each television cable media content received in the one or more television cable service signals; and wherein displaying the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals comprises displaying, on the display device, the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals, information associated with each OTA media content received in the one or more OTA service signals, and information associated with each television cable media content received in the one or more television cable service signals. 19. The apparatus of claim 11, wherein the set of instructions, when executed by the at least one processor, further causes the apparatus to: receive one or more fourth user commands from a user indicating to customize at least one of display format of the integrated EPG, channels of media content to display in the integrated EPG, or types of media content to display in the integrated EPG; wherein generating the integrated EPG comprises generating an integrated EPG, based on the received one or more fourth user commands, wherein the display format comprises at least one of format, orientation, or order of one or more categories, wherein the one or more categories comprises at least one of channel numbers, channel designations, or broadcast times. 20. A system, comprising: an integrated media presentation device, comprising: at least one first processor; and a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the integrated media presentation device to: receive one or more over the top (“OTT”) service signals; receive information associated with each OTT media content received in the one or more OTT service signals; receive one or more over the air (“OTA”) service signals; receive location information associated with location of the integrated media presentation device; receive information associated with each OTA media content received in the one or more OTA service signals, wherein the information associated with each OTA media content received in the one or more OTA service signals is based on the received location information; compile the received information associated with each OTT media content received in the one or more OTT service signals and the received information associated with each OTA media content received in the one or more OTA service signals; generate an integrated electronic program guide (“EPG”) that integrates the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals; and display, on a display device, the generated integrated EPG that presents the compiled information associated with each OTT media content received in the one or more OTT service signals and information associated with each OTA media content received in the one or more OTA service signals.
2,400
9,076
9,076
15,823,145
2,486
An app and associated toy are disclosed that allow a smartphone user to play remotely with a pet by controlling the movement of a remote spot of light. A remote camera allows the user to see and record video of the pet playing. The light spot is controlled by moving a cursor, or by directly moving the light spot on a touch video screen. The viewer also has the option to have the spot follow a predetermined path. By starting the play at the same time as presenting a noise designed to attract a pet, the pet is conditioned to associate that noise with playing. This allows the pet to be summoned to the game. In a more advanced version, the app also controls a treat dispenser for rewarding the pet for playing. An RFID tag on the pet allows the light source to be shone near to the pet.
1. An animal monitoring and treat dispensing apparatus comprising: a housing with a portion of the housing configured to allow transmission of light therethrough; an optical device and a light source positioned in a proximity the portion of the housing configured to allow the transmission of the light, wherein the light source is configured to move along at least one of an x-axis or a y-axis, and wherein the light source is oriented such that a lens of the optical device is oriented in a direction of the light emitted from the light source; a dispensing mechanism coupled to the housing, the dispensing mechanism comprising a movable tray having a plurality of receptacles, wherein the dispensing mechanism is actuated by a wireless signal, and wherein the dispensing mechanism is disposed below the optical device and the light source; and a dispensing outlet coupled to the dispensing mechanism, the dispensing outlet providing a channel for transport of an item from the dispensing mechanism to the dispensing outlet. 2. The apparatus of claim 1 wherein the light source is a laser and the optical device is a camera. 3. The apparatus of claim 1 wherein a bottom of the housing comprises a non-slip surface. 4. The apparatus of claim 3 further comprising a flip down member coupled to the bottom of the housing, the flip down member being configured to secure a position of the apparatus. 5. The apparatus of claim 1 wherein the optical device is configured to record video and capture sound. 6. An animal monitoring and treat dispensing apparatus comprising: a housing with a portion of the housing configured to allow transmission of light therethrough; an optical device and a light source positioned within the housing to allow the transmission of the light from the housing, wherein a beam of the light source is configured to move along at least one of an x-axis or a y-axis, and wherein the light source is oriented such that a lens of the optical device is oriented in a direction of the light emitted from the light source; a dispensing mechanism coupled to the housing, wherein the dispensing mechanism is actuated by a wireless signal. 7. The apparatus of claim 6 wherein the dispensing mechanism includes a plurality of receptacles. 8. The apparatus of claim 6 wherein light source of configured to move along each of the x-axis and the y-axis. 9. The apparatus of claim 7 wherein the dispensing mechanism is actuated by the wireless signal to select one of said receptacles from which to dispense an item, and to cause said dispensing of said item from said selected receptacle. 10. The apparatus of claim 6 wherein movement of the light source is actuated by at least one motor. 11. The apparatus of claim 6 wherein the dispensing mechanism is disposed below the optical device and the light source. 12. An animal monitoring and treat dispensing apparatus comprising: a housing, the housing having a window configured to allow transmission of light therethrough; an optical device positioned behind the window, a light source for emitting a light beam, the light source or the light beam being configured to move along at least an x-axis and a y-axis, and wherein the light source is oriented such that a lens of the optical device is oriented in a direction of the light emitted from the light source; a dispensing mechanism coupled to the housing, the dispensing mechanism being actuable from a wireless signal sent to the monitoring and dispensing apparatus; and a dispensing outlet coupled to the dispensing mechanism, the dispensing outlet being configurable to transport an item from at least one of the plurality of receptacles of the dispensing mechanism to the dispensing outlet. 13. An animal monitoring and treat dispensing apparatus comprising: a housing, the housing having a light source connected to the housing for emitting a beam of light, said light source being configured to move said beam of light along at least one of an x-axis or a y-axis, and a dispensing mechanism actuable from a wireless signal, and configured to move a dispensing mechanism to cause dispensing of an item. 14. The apparatus of claim 13 wherein the light source is configured to be manually controlled. 15. The apparatus of claim 13 wherein the light source is configured to follow a pre-programmed movement pattern. 16. An animal monitoring and treat dispensing apparatus comprising: a housing, the housing having an integrated window configured to allow transmission of light therethrough; a camera positioned in a proximity to the integrated window, a laser source positioned behind the integrated window, wherein the laser source is configured to move along at least an x-axis and a y-axis, and wherein the laser source is oriented such that a lens of the camera is always oriented in a direction of light emitted from the laser source; a rotatable dispensing mechanism coupled to the housing, the dispensing mechanism comprising a rotatable tray having a plurality of receptacles, wherein the rotatable dispensing mechanism is actuated by a wireless signal sent to the apparatus, and wherein the rotatable dispensing mechanism is disposed below the camera and the laser source; and a dispensing outlet coupled to the rotatable dispensing mechanism, the dispensing outlet configured to transport at least one item from at least one of the plurality of receptacles of the rotatable dispensing mechanism to the dispensing outlet. 17. The apparatus of claim 16 wherein actuation of the rotatable dispensing mechanism causes a second of the plurality of receptacles to be aligned with the dispensing outlet. 18. The apparatus of claim 16 wherein the camera is positioned behind the integrated window. 19. The apparatus of claim 16 wherein only one of the plurality of receptacles is capable of being aligned with the dispensing outlet at a time. 20. The apparatus of claim 16 further comprising at least one motor configured to modify the orientation of the laser source.
An app and associated toy are disclosed that allow a smartphone user to play remotely with a pet by controlling the movement of a remote spot of light. A remote camera allows the user to see and record video of the pet playing. The light spot is controlled by moving a cursor, or by directly moving the light spot on a touch video screen. The viewer also has the option to have the spot follow a predetermined path. By starting the play at the same time as presenting a noise designed to attract a pet, the pet is conditioned to associate that noise with playing. This allows the pet to be summoned to the game. In a more advanced version, the app also controls a treat dispenser for rewarding the pet for playing. An RFID tag on the pet allows the light source to be shone near to the pet.1. An animal monitoring and treat dispensing apparatus comprising: a housing with a portion of the housing configured to allow transmission of light therethrough; an optical device and a light source positioned in a proximity the portion of the housing configured to allow the transmission of the light, wherein the light source is configured to move along at least one of an x-axis or a y-axis, and wherein the light source is oriented such that a lens of the optical device is oriented in a direction of the light emitted from the light source; a dispensing mechanism coupled to the housing, the dispensing mechanism comprising a movable tray having a plurality of receptacles, wherein the dispensing mechanism is actuated by a wireless signal, and wherein the dispensing mechanism is disposed below the optical device and the light source; and a dispensing outlet coupled to the dispensing mechanism, the dispensing outlet providing a channel for transport of an item from the dispensing mechanism to the dispensing outlet. 2. The apparatus of claim 1 wherein the light source is a laser and the optical device is a camera. 3. The apparatus of claim 1 wherein a bottom of the housing comprises a non-slip surface. 4. The apparatus of claim 3 further comprising a flip down member coupled to the bottom of the housing, the flip down member being configured to secure a position of the apparatus. 5. The apparatus of claim 1 wherein the optical device is configured to record video and capture sound. 6. An animal monitoring and treat dispensing apparatus comprising: a housing with a portion of the housing configured to allow transmission of light therethrough; an optical device and a light source positioned within the housing to allow the transmission of the light from the housing, wherein a beam of the light source is configured to move along at least one of an x-axis or a y-axis, and wherein the light source is oriented such that a lens of the optical device is oriented in a direction of the light emitted from the light source; a dispensing mechanism coupled to the housing, wherein the dispensing mechanism is actuated by a wireless signal. 7. The apparatus of claim 6 wherein the dispensing mechanism includes a plurality of receptacles. 8. The apparatus of claim 6 wherein light source of configured to move along each of the x-axis and the y-axis. 9. The apparatus of claim 7 wherein the dispensing mechanism is actuated by the wireless signal to select one of said receptacles from which to dispense an item, and to cause said dispensing of said item from said selected receptacle. 10. The apparatus of claim 6 wherein movement of the light source is actuated by at least one motor. 11. The apparatus of claim 6 wherein the dispensing mechanism is disposed below the optical device and the light source. 12. An animal monitoring and treat dispensing apparatus comprising: a housing, the housing having a window configured to allow transmission of light therethrough; an optical device positioned behind the window, a light source for emitting a light beam, the light source or the light beam being configured to move along at least an x-axis and a y-axis, and wherein the light source is oriented such that a lens of the optical device is oriented in a direction of the light emitted from the light source; a dispensing mechanism coupled to the housing, the dispensing mechanism being actuable from a wireless signal sent to the monitoring and dispensing apparatus; and a dispensing outlet coupled to the dispensing mechanism, the dispensing outlet being configurable to transport an item from at least one of the plurality of receptacles of the dispensing mechanism to the dispensing outlet. 13. An animal monitoring and treat dispensing apparatus comprising: a housing, the housing having a light source connected to the housing for emitting a beam of light, said light source being configured to move said beam of light along at least one of an x-axis or a y-axis, and a dispensing mechanism actuable from a wireless signal, and configured to move a dispensing mechanism to cause dispensing of an item. 14. The apparatus of claim 13 wherein the light source is configured to be manually controlled. 15. The apparatus of claim 13 wherein the light source is configured to follow a pre-programmed movement pattern. 16. An animal monitoring and treat dispensing apparatus comprising: a housing, the housing having an integrated window configured to allow transmission of light therethrough; a camera positioned in a proximity to the integrated window, a laser source positioned behind the integrated window, wherein the laser source is configured to move along at least an x-axis and a y-axis, and wherein the laser source is oriented such that a lens of the camera is always oriented in a direction of light emitted from the laser source; a rotatable dispensing mechanism coupled to the housing, the dispensing mechanism comprising a rotatable tray having a plurality of receptacles, wherein the rotatable dispensing mechanism is actuated by a wireless signal sent to the apparatus, and wherein the rotatable dispensing mechanism is disposed below the camera and the laser source; and a dispensing outlet coupled to the rotatable dispensing mechanism, the dispensing outlet configured to transport at least one item from at least one of the plurality of receptacles of the rotatable dispensing mechanism to the dispensing outlet. 17. The apparatus of claim 16 wherein actuation of the rotatable dispensing mechanism causes a second of the plurality of receptacles to be aligned with the dispensing outlet. 18. The apparatus of claim 16 wherein the camera is positioned behind the integrated window. 19. The apparatus of claim 16 wherein only one of the plurality of receptacles is capable of being aligned with the dispensing outlet at a time. 20. The apparatus of claim 16 further comprising at least one motor configured to modify the orientation of the laser source.
2,400
9,077
9,077
15,160,628
2,447
There is provided a method comprising: transmitting, by a user terminal, to a state server a request for state change information of a service provided by the user terminal; receiving, by the user terminal, an indication of said state change information from the state server; and using, by the user terminal, said received indication to determine whether or not to suppress a polling relating to said service of a master server.
1. A method comprising: transmitting, by a user terminal, to a state server a request for state change information of a service provided by the user terminal; receiving, by the user terminal, an indication of said state change information from the state server; and using, by the user terminal, said received indication to determine whether or not to suppress a polling relating to said service of a master server. 2. A method as claimed in claim 1, wherein the indication is an entity tag. 3. A method as claimed in claim 1, wherein said using comprises: comparing the received indication to a locally stored value indicative of the state of the service; and determining to suppress said polling to the master server if there is a correspondence between the received indication and the stored value. 4. A method as claimed in claim 3, wherein said using further comprises determining to poll said master server if there is no correspondence between the received indication and the stored value. 5. A method as claimed in claim 1, further comprising: receiving details regarding said state information with said indication; and determining to suppress said polling to the master server in dependence on the received details. 6. A method as claimed in claim 1, further comprising: transmitting said request for state change information only when no notifications regarding a change in state in the service have been received from a push server within a predetermined preceding time period. 7. A method as claimed in claim 1, wherein the service comprises a plurality of microservices and said indication comprises separate current state indications for each of said plurality of microservices. 8. A method as claimed in claim 7, wherein said polling to the master server is suppressed for only those microservices for which the received indication indicates that the state of that microservice has not changed. 9. A method as claimed in claim 1, wherein the service comprises a plurality of microservices and said indication comprises a single current state indication for said service. 10. A method as claimed in claim 9, wherein said single current state indication is an aggregation of state information for each of the plurality of the microservices. 11. A method as claimed in claim 1, wherein the service is a non-real-time service. 12. A method as claimed in claim 1, further comprising receiving a notification regarding a change in state of the service from a push notification server. 13. An apparatus comprising: at least one processor; and at least one memory comprising computer code that, when executed by the at least one processor, causes the apparatus to: transmit to a state server a request for state change information of a service provided by the user terminal; receive an indication of said state change information from the state server; and use said received indication to determine whether or not to suppress a polling relating to said service of a master server. 14. An apparatus as claimed in claim 13, wherein the indication is an entity tag. 15. An apparatus as claimed in claim 13, wherein said use comprises: comparing the received indication to a locally stored value indicative of the state of the service; and determining to suppress said polling to the master server if there is a correspondence between the received indication and the stored value. 16. An apparatus as claimed in claim 15, wherein said use further comprises determining to poll said master server if there is no correspondence between the received indication and the stored value. 17. An apparatus as claimed in claim 13, wherein said apparatus is further caused to: receiving details regarding said state information with said indication; and determining to suppress said polling to the master server in dependence on the received details. 18. An apparatus as claimed in claim 13, wherein said apparatus is further caused to: transmit said request for state change information only when no notifications regarding a change in state in the service have been received from a push server within a predetermined preceding time period. 19. An apparatus as claimed in claim 13, wherein the service comprises a plurality of microservices and said indication comprises a single current state indication for said service. 20. A computer program comprising code means adapted to cause performing of the steps of claim 1 when the program is run on data processing apparatus.
There is provided a method comprising: transmitting, by a user terminal, to a state server a request for state change information of a service provided by the user terminal; receiving, by the user terminal, an indication of said state change information from the state server; and using, by the user terminal, said received indication to determine whether or not to suppress a polling relating to said service of a master server.1. A method comprising: transmitting, by a user terminal, to a state server a request for state change information of a service provided by the user terminal; receiving, by the user terminal, an indication of said state change information from the state server; and using, by the user terminal, said received indication to determine whether or not to suppress a polling relating to said service of a master server. 2. A method as claimed in claim 1, wherein the indication is an entity tag. 3. A method as claimed in claim 1, wherein said using comprises: comparing the received indication to a locally stored value indicative of the state of the service; and determining to suppress said polling to the master server if there is a correspondence between the received indication and the stored value. 4. A method as claimed in claim 3, wherein said using further comprises determining to poll said master server if there is no correspondence between the received indication and the stored value. 5. A method as claimed in claim 1, further comprising: receiving details regarding said state information with said indication; and determining to suppress said polling to the master server in dependence on the received details. 6. A method as claimed in claim 1, further comprising: transmitting said request for state change information only when no notifications regarding a change in state in the service have been received from a push server within a predetermined preceding time period. 7. A method as claimed in claim 1, wherein the service comprises a plurality of microservices and said indication comprises separate current state indications for each of said plurality of microservices. 8. A method as claimed in claim 7, wherein said polling to the master server is suppressed for only those microservices for which the received indication indicates that the state of that microservice has not changed. 9. A method as claimed in claim 1, wherein the service comprises a plurality of microservices and said indication comprises a single current state indication for said service. 10. A method as claimed in claim 9, wherein said single current state indication is an aggregation of state information for each of the plurality of the microservices. 11. A method as claimed in claim 1, wherein the service is a non-real-time service. 12. A method as claimed in claim 1, further comprising receiving a notification regarding a change in state of the service from a push notification server. 13. An apparatus comprising: at least one processor; and at least one memory comprising computer code that, when executed by the at least one processor, causes the apparatus to: transmit to a state server a request for state change information of a service provided by the user terminal; receive an indication of said state change information from the state server; and use said received indication to determine whether or not to suppress a polling relating to said service of a master server. 14. An apparatus as claimed in claim 13, wherein the indication is an entity tag. 15. An apparatus as claimed in claim 13, wherein said use comprises: comparing the received indication to a locally stored value indicative of the state of the service; and determining to suppress said polling to the master server if there is a correspondence between the received indication and the stored value. 16. An apparatus as claimed in claim 15, wherein said use further comprises determining to poll said master server if there is no correspondence between the received indication and the stored value. 17. An apparatus as claimed in claim 13, wherein said apparatus is further caused to: receiving details regarding said state information with said indication; and determining to suppress said polling to the master server in dependence on the received details. 18. An apparatus as claimed in claim 13, wherein said apparatus is further caused to: transmit said request for state change information only when no notifications regarding a change in state in the service have been received from a push server within a predetermined preceding time period. 19. An apparatus as claimed in claim 13, wherein the service comprises a plurality of microservices and said indication comprises a single current state indication for said service. 20. A computer program comprising code means adapted to cause performing of the steps of claim 1 when the program is run on data processing apparatus.
2,400
9,078
9,078
15,888,696
2,452
A method is disclosed for operating a motor vehicle having a computing device providing computing power, a communication device for communicating with a vehicle-external cloud provided with a server device, and a control device, wherein the control device performs an availability check indicating the existence of free computing power available from the motor vehicle for executing a computing task provided by a currently-reachable cloud as determined by the motor vehicle's communication device. From within a list of currently-reachable clouds, a target cloud to which the motor vehicle's computing power must be provided is selected either manually by user input or at least partially automatically based on availability parameters. Once a target cloud is selected, a communication link with the target cloud is established and the motor vehicle is logged into the target cloud as a provider of computing power. A motor vehicle for performing the method is also disclosed.
1-15. (canceled) 16. A method for operating a motor vehicle having at least one computing device providing computing power, a communication device for communicating with at least one vehicle-external cloud each provided with at least one server device, and a control device, wherein the method comprises: performing an availability check to determine the availability of free computing power of the motor vehicle; indicating, for the availability check returning a positive result, the existence of the free computing power for executing a computing task provided by the at least one vehicle-external cloud; determining, by the communication device, at least one currently-reachable vehicle-external cloud; selecting, among the at least one currently reachable vehicle-external cloud, a target cloud in need of the computing power; establishing a communication link with the target cloud; and logging the motor vehicle into the target cloud as a provider of the computing power. 17. The method of claim 16, further comprising: determining, by the availability check, at least one availability parameter describing a quantity of free computing power, a predicted time period for the free computing power, or an amount of available energy for computing. 18. The method of claim 17, further comprising: selecting, depending on the at least one availability parameter, one of a plurality of operating modes of the motor vehicle, wherein the plurality of operating modes comprise: an exclusion operating mode, without the provision of computing power to a cloud; a cloud operating mode, with provision of a maximum computing power to the target cloud, when the motor vehicle is not operational; and a hybrid operating mode, with provision of partial computing power to the target cloud, wherein at least a portion of the entire free computing power is used for driving operation of the motor vehicle. 19. The method of claim 17, wherein the at least one availability parameter is a charging status of a battery of the motor vehicle or the presence of a power connection with a vehicle-external energy source for charging the battery. 20. The method of claim 17, wherein the determining of the predicted time period includes using a trained usage model of the motor vehicle or by applying known past usage data to a planned future use of the motor vehicle. 21. The method of claim 16, wherein the selecting of the target cloud from among the at least one currently reachable vehicle-external cloud includes performing the selecting manually, depending on at least one user input, or includes performing the selecting at least partially automatically. 22. The method of claim 21, further comprising: displaying the at least one currently reachable vehicle-external cloud to the driver. 23. The method of claim 21, wherein the manual selecting of the target cloud includes using the at least one user input that describes the at least one currently reachable vehicle-external cloud preferred by the user, or includes using the at least one user input that provides one selection criterion. 24. The method of claim 21, wherein the at least partially automatically selecting of the target cloud includes evaluating the at least one availability parameter. 25. The method of claim 16, further comprising: providing for other traffic participants that form a selected target cloud to request at least one computing task to be taken over by the motor vehicle. 26. The method of claim 25, further comprising: receiving at least one computing task from a vehicle-external control device of the target cloud, wherein the target cloud is a fog, and wherein the at least one computing task originates from a requesting device positioned at a distance from the motor vehicle; and establishing a direct communication connection between the motor vehicle and the requesting device through the fog. 27. The method of claim 26, wherein the direct communication connection is a wireless connection over which the at least one computing task or task data required for executing the at least one computing task is directly transmitted from the requesting device to the motor vehicle. 28. A motor vehicle having at least one computing device providing computing power, a communication device for communicating with at least one vehicle-external cloud each provided with at least one server device, and a control device configured to: perform an availability check to determine the availability of free computing power of the motor vehicle; indicate, for the availability check returning a positive result, the existence of the free computing power for executing a computing task provided by the at least one vehicle-external cloud; determine, by the communication device, at least one currently-reachable vehicle-external cloud; select, among the at least one currently reachable vehicle-external cloud, a target cloud in need of the computing power; establish a communication link with the target cloud; and log the motor vehicle into the target cloud as a provider of the computing power. 29. The motor vehicle of claim 28, wherein the control device is further configured to: determine, by the availability check, at least one availability parameter describing a quantity of free computing power, a predicted time period for the free computing power, or an amount of available energy for computing. 30. The motor vehicle of claim 29, wherein the control device is further configured to: select, depending on the at least one availability parameter, one of a plurality of operating modes of the motor vehicle, wherein the plurality of operating modes comprise: an exclusion operating mode, without the provision of computing power to a cloud; a cloud operating mode, with provision of a maximum computing power to the target cloud, when the motor vehicle is not operational; and a hybrid operating mode, with provision of partial computing power to the target cloud, wherein at least a portion of the entire free computing power is used for driving operation of the motor vehicle. 31. The motor vehicle of claim 29, wherein, according to the configuration of the control device, the at least one availability parameter is a charging status of a battery of the motor vehicle or the presence of a power connection with a vehicle-external energy source for charging the battery. 32. The motor vehicle of claim 29, wherein the control device is further configured to: determine the predicted time period from a trained usage model of the motor vehicle or by applying known past usage data to a planned future use of the motor vehicle. 33. The motor vehicle of claim 28, wherein the control device is further configured such that the selecting of the target cloud from among the at least one currently reachable vehicle-external cloud is performed manually, depending on at least one user input, or is performed at least partially automatically. 34. The motor vehicle of claim 33, wherein the control device is further configured to allow the at least one currently reachable vehicle-external cloud to be displayed to the driver. 35. The motor vehicle of claim 33, wherein the control device is further configured to manually select the target cloud using the at least one user input that describes the at least one currently reachable vehicle-external cloud preferred by the user, or that provides one selection criterion.
A method is disclosed for operating a motor vehicle having a computing device providing computing power, a communication device for communicating with a vehicle-external cloud provided with a server device, and a control device, wherein the control device performs an availability check indicating the existence of free computing power available from the motor vehicle for executing a computing task provided by a currently-reachable cloud as determined by the motor vehicle's communication device. From within a list of currently-reachable clouds, a target cloud to which the motor vehicle's computing power must be provided is selected either manually by user input or at least partially automatically based on availability parameters. Once a target cloud is selected, a communication link with the target cloud is established and the motor vehicle is logged into the target cloud as a provider of computing power. A motor vehicle for performing the method is also disclosed.1-15. (canceled) 16. A method for operating a motor vehicle having at least one computing device providing computing power, a communication device for communicating with at least one vehicle-external cloud each provided with at least one server device, and a control device, wherein the method comprises: performing an availability check to determine the availability of free computing power of the motor vehicle; indicating, for the availability check returning a positive result, the existence of the free computing power for executing a computing task provided by the at least one vehicle-external cloud; determining, by the communication device, at least one currently-reachable vehicle-external cloud; selecting, among the at least one currently reachable vehicle-external cloud, a target cloud in need of the computing power; establishing a communication link with the target cloud; and logging the motor vehicle into the target cloud as a provider of the computing power. 17. The method of claim 16, further comprising: determining, by the availability check, at least one availability parameter describing a quantity of free computing power, a predicted time period for the free computing power, or an amount of available energy for computing. 18. The method of claim 17, further comprising: selecting, depending on the at least one availability parameter, one of a plurality of operating modes of the motor vehicle, wherein the plurality of operating modes comprise: an exclusion operating mode, without the provision of computing power to a cloud; a cloud operating mode, with provision of a maximum computing power to the target cloud, when the motor vehicle is not operational; and a hybrid operating mode, with provision of partial computing power to the target cloud, wherein at least a portion of the entire free computing power is used for driving operation of the motor vehicle. 19. The method of claim 17, wherein the at least one availability parameter is a charging status of a battery of the motor vehicle or the presence of a power connection with a vehicle-external energy source for charging the battery. 20. The method of claim 17, wherein the determining of the predicted time period includes using a trained usage model of the motor vehicle or by applying known past usage data to a planned future use of the motor vehicle. 21. The method of claim 16, wherein the selecting of the target cloud from among the at least one currently reachable vehicle-external cloud includes performing the selecting manually, depending on at least one user input, or includes performing the selecting at least partially automatically. 22. The method of claim 21, further comprising: displaying the at least one currently reachable vehicle-external cloud to the driver. 23. The method of claim 21, wherein the manual selecting of the target cloud includes using the at least one user input that describes the at least one currently reachable vehicle-external cloud preferred by the user, or includes using the at least one user input that provides one selection criterion. 24. The method of claim 21, wherein the at least partially automatically selecting of the target cloud includes evaluating the at least one availability parameter. 25. The method of claim 16, further comprising: providing for other traffic participants that form a selected target cloud to request at least one computing task to be taken over by the motor vehicle. 26. The method of claim 25, further comprising: receiving at least one computing task from a vehicle-external control device of the target cloud, wherein the target cloud is a fog, and wherein the at least one computing task originates from a requesting device positioned at a distance from the motor vehicle; and establishing a direct communication connection between the motor vehicle and the requesting device through the fog. 27. The method of claim 26, wherein the direct communication connection is a wireless connection over which the at least one computing task or task data required for executing the at least one computing task is directly transmitted from the requesting device to the motor vehicle. 28. A motor vehicle having at least one computing device providing computing power, a communication device for communicating with at least one vehicle-external cloud each provided with at least one server device, and a control device configured to: perform an availability check to determine the availability of free computing power of the motor vehicle; indicate, for the availability check returning a positive result, the existence of the free computing power for executing a computing task provided by the at least one vehicle-external cloud; determine, by the communication device, at least one currently-reachable vehicle-external cloud; select, among the at least one currently reachable vehicle-external cloud, a target cloud in need of the computing power; establish a communication link with the target cloud; and log the motor vehicle into the target cloud as a provider of the computing power. 29. The motor vehicle of claim 28, wherein the control device is further configured to: determine, by the availability check, at least one availability parameter describing a quantity of free computing power, a predicted time period for the free computing power, or an amount of available energy for computing. 30. The motor vehicle of claim 29, wherein the control device is further configured to: select, depending on the at least one availability parameter, one of a plurality of operating modes of the motor vehicle, wherein the plurality of operating modes comprise: an exclusion operating mode, without the provision of computing power to a cloud; a cloud operating mode, with provision of a maximum computing power to the target cloud, when the motor vehicle is not operational; and a hybrid operating mode, with provision of partial computing power to the target cloud, wherein at least a portion of the entire free computing power is used for driving operation of the motor vehicle. 31. The motor vehicle of claim 29, wherein, according to the configuration of the control device, the at least one availability parameter is a charging status of a battery of the motor vehicle or the presence of a power connection with a vehicle-external energy source for charging the battery. 32. The motor vehicle of claim 29, wherein the control device is further configured to: determine the predicted time period from a trained usage model of the motor vehicle or by applying known past usage data to a planned future use of the motor vehicle. 33. The motor vehicle of claim 28, wherein the control device is further configured such that the selecting of the target cloud from among the at least one currently reachable vehicle-external cloud is performed manually, depending on at least one user input, or is performed at least partially automatically. 34. The motor vehicle of claim 33, wherein the control device is further configured to allow the at least one currently reachable vehicle-external cloud to be displayed to the driver. 35. The motor vehicle of claim 33, wherein the control device is further configured to manually select the target cloud using the at least one user input that describes the at least one currently reachable vehicle-external cloud preferred by the user, or that provides one selection criterion.
2,400
9,079
9,079
16,130,238
2,487
A method of encoding image data, including: frequency-transforming input image data to generate an array of frequency-transformed input image coefficients by a matrix-multiplication process, according to a maximum dynamic range of the transformed data and using transform matrices having a data precision; and selecting the maximum dynamic range and/or the data precision of the transform matrices according to the bit depth of the input image data.
1. A method of encoding image data, comprising: frequency-transforming input image data to generate an array of frequency-transformed input image coefficients by a matrix-multiplication process, according to a maximum dynamic range of the transformed data and using transform matrices having a data precision; and selecting the maximum dynamic range and/or the data precision of the transform matrices according to the bit depth of the input image data, wherein the selecting includes: setting the data precision of the transform matrices to a first offset number of bits less than the bit depth of the input image data; and setting the maximum dynamic range of the transformed data to a second offset number of bits greater than the bit depth of the input image data.
A method of encoding image data, including: frequency-transforming input image data to generate an array of frequency-transformed input image coefficients by a matrix-multiplication process, according to a maximum dynamic range of the transformed data and using transform matrices having a data precision; and selecting the maximum dynamic range and/or the data precision of the transform matrices according to the bit depth of the input image data.1. A method of encoding image data, comprising: frequency-transforming input image data to generate an array of frequency-transformed input image coefficients by a matrix-multiplication process, according to a maximum dynamic range of the transformed data and using transform matrices having a data precision; and selecting the maximum dynamic range and/or the data precision of the transform matrices according to the bit depth of the input image data, wherein the selecting includes: setting the data precision of the transform matrices to a first offset number of bits less than the bit depth of the input image data; and setting the maximum dynamic range of the transformed data to a second offset number of bits greater than the bit depth of the input image data.
2,400
9,080
9,080
15,381,567
2,432
A content replication connector receives control data associated with replication of content data from a source system. Based on the control data, the content replication connector fetches the content data from the source system, converts the content data from a first data format to a second data format, and sends the content data to a content replication server. The content replication server replicates the content data, and a target system fetches the content data from the content replication server.
1. A computer-implemented method, comprising: receiving, at a content replication connector and from a source system, control data associated with replication of content data; and based on the control data: fetching the content data from the source system; converting the content data from a first data format to a second data format; and sending the content data to a content replication server, wherein the content replication server replicates the content data, and a target system fetches the content data from the content replication server. 2. The computer-implemented method of claim 1, wherein the source system is a productive enterprise thread detection system, the target system is a development and test enterprise thread detection system, and the content data is context data of the productive enterprise thread detection system. 3. The computer-implemented method of claim 1, wherein the source system is a development and test enterprise thread detection system, the target system is a productive enterprise thread detection system, and the content data is development object. 4. The computer-implemented method of claim 1, wherein the data format is JAVASCRIPT Object Notation (JSON). 5. The computer-implemented method of claim 1, wherein the content replication connector is in a workspace on a smart database streaming server connected to the source system, the workspace having a name including a system identifier of the source system. 6. The computer-implemented method of claim 1, wherein the content replication server is in a workspace on a smart database streaming server connected to the source system or the target system. 7. The computer-implemented method of claim 1, wherein receiving the control data from the source system includes polling the source system. 8. The computer-implemented method of claim 1, wherein the target system is connected to a second content replication connector, wherein the second content replication connector receives the control data from the target system, and based on the control data the second content replication connector fetches the content data from the content replication server. 9. The computer-implemented method of claim 8, wherein the second content replication connector further converts the content data from the second data format to the first data format, and sends the content data to the target system. 10. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising: receiving, at a content replication connector and from a source system, control data associated with replication of content data; and based on the control data: fetching the content data from the source system; converting the content data from a first data format to a second data format; and sending the content data to a content replication server, wherein the content replication server replicates the content data, and a target system fetches the content data from the content replication server. 11. The non-transitory, computer-readable medium of claim 10, wherein the source system is a productive enterprise thread detection system, the target system is a development and test enterprise thread detection system, and the content data is context data of the productive enterprise thread detection system. 12. The non-transitory, computer-readable medium of claim 10, wherein the source system is a development and test enterprise thread detection system, the target system is a productive enterprise thread detection system, and the content data is development object. 13. The non-transitory, computer-readable medium of claim 10, wherein the data format is JAVASCRIPT Object Notation (JSON). 14. The non-transitory, computer-readable medium of claim 10, wherein the content replication connector is in a workspace on a smart database streaming server connected to the source system, the workspace having a name including a system identifier of the source system. 15. The non-transitory, computer-readable medium of claim 10, wherein the content replication server is in a workspace on a smart database streaming server connected to the source system or the target system. 16. The non-transitory, computer-readable medium of claim 10, wherein the target system is connected to a second content replication connector, wherein the second content replication connector receives the control data from the target system, and based on the control data the second content replication connector fetches the content data from the content replication server. 17. The non-transitory, computer-readable medium of claim 16, wherein the second content replication connector further converts the content data from the second data format to the first data format, and sends the content data to the target system. 18. A computer-implemented system, comprising: a computer memory; and a hardware processor interoperably coupled with the computer memory and configured to perform operations comprising: receiving, at a content replication connector and from a source system, control data associated with replication of content data; and based on the control data: fetching the content data from the source system; converting the content data from a first data format to a second data format; and sending the content data to a content replication server, wherein the content replication server replicates the content data, and a target system fetches the content data from the content replication server. 19. The computer-implemented system of claim 18, wherein the target system is connected to a second content replication connector, wherein the second content replication connector receives the control data from the target system, and based on the control data the second content replication connector fetches the content data from the content replication server. 20. The computer-implemented system of claim 19, wherein the second content replication connector further converts the content data from the second data format to the first data format, and sends the content data to the target system.
A content replication connector receives control data associated with replication of content data from a source system. Based on the control data, the content replication connector fetches the content data from the source system, converts the content data from a first data format to a second data format, and sends the content data to a content replication server. The content replication server replicates the content data, and a target system fetches the content data from the content replication server.1. A computer-implemented method, comprising: receiving, at a content replication connector and from a source system, control data associated with replication of content data; and based on the control data: fetching the content data from the source system; converting the content data from a first data format to a second data format; and sending the content data to a content replication server, wherein the content replication server replicates the content data, and a target system fetches the content data from the content replication server. 2. The computer-implemented method of claim 1, wherein the source system is a productive enterprise thread detection system, the target system is a development and test enterprise thread detection system, and the content data is context data of the productive enterprise thread detection system. 3. The computer-implemented method of claim 1, wherein the source system is a development and test enterprise thread detection system, the target system is a productive enterprise thread detection system, and the content data is development object. 4. The computer-implemented method of claim 1, wherein the data format is JAVASCRIPT Object Notation (JSON). 5. The computer-implemented method of claim 1, wherein the content replication connector is in a workspace on a smart database streaming server connected to the source system, the workspace having a name including a system identifier of the source system. 6. The computer-implemented method of claim 1, wherein the content replication server is in a workspace on a smart database streaming server connected to the source system or the target system. 7. The computer-implemented method of claim 1, wherein receiving the control data from the source system includes polling the source system. 8. The computer-implemented method of claim 1, wherein the target system is connected to a second content replication connector, wherein the second content replication connector receives the control data from the target system, and based on the control data the second content replication connector fetches the content data from the content replication server. 9. The computer-implemented method of claim 8, wherein the second content replication connector further converts the content data from the second data format to the first data format, and sends the content data to the target system. 10. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising: receiving, at a content replication connector and from a source system, control data associated with replication of content data; and based on the control data: fetching the content data from the source system; converting the content data from a first data format to a second data format; and sending the content data to a content replication server, wherein the content replication server replicates the content data, and a target system fetches the content data from the content replication server. 11. The non-transitory, computer-readable medium of claim 10, wherein the source system is a productive enterprise thread detection system, the target system is a development and test enterprise thread detection system, and the content data is context data of the productive enterprise thread detection system. 12. The non-transitory, computer-readable medium of claim 10, wherein the source system is a development and test enterprise thread detection system, the target system is a productive enterprise thread detection system, and the content data is development object. 13. The non-transitory, computer-readable medium of claim 10, wherein the data format is JAVASCRIPT Object Notation (JSON). 14. The non-transitory, computer-readable medium of claim 10, wherein the content replication connector is in a workspace on a smart database streaming server connected to the source system, the workspace having a name including a system identifier of the source system. 15. The non-transitory, computer-readable medium of claim 10, wherein the content replication server is in a workspace on a smart database streaming server connected to the source system or the target system. 16. The non-transitory, computer-readable medium of claim 10, wherein the target system is connected to a second content replication connector, wherein the second content replication connector receives the control data from the target system, and based on the control data the second content replication connector fetches the content data from the content replication server. 17. The non-transitory, computer-readable medium of claim 16, wherein the second content replication connector further converts the content data from the second data format to the first data format, and sends the content data to the target system. 18. A computer-implemented system, comprising: a computer memory; and a hardware processor interoperably coupled with the computer memory and configured to perform operations comprising: receiving, at a content replication connector and from a source system, control data associated with replication of content data; and based on the control data: fetching the content data from the source system; converting the content data from a first data format to a second data format; and sending the content data to a content replication server, wherein the content replication server replicates the content data, and a target system fetches the content data from the content replication server. 19. The computer-implemented system of claim 18, wherein the target system is connected to a second content replication connector, wherein the second content replication connector receives the control data from the target system, and based on the control data the second content replication connector fetches the content data from the content replication server. 20. The computer-implemented system of claim 19, wherein the second content replication connector further converts the content data from the second data format to the first data format, and sends the content data to the target system.
2,400
9,081
9,081
15,441,908
2,454
A verified method of high-value, person-to-person communication is provided. The method comprises creating a unique dynamic messaging link recognizable to a selected intended recipient; creating a transmissible personal hypermedia message to which the link is assigned; and storing the hypermedia message on a device accessible to a network. The link comprises a recognizable proprietary domain name and a random hash code. The individual is sent a direct message and the device is monitored for transmission thereto of the link, analyzing and storing accompanying metadata. The direct message contains an invitation to click on the link over the imprimatur of a person known to the recipient. The invitation contains descriptive material relating to the hypermedia message. Upon activation of the link, without redirection, the hypermedia message is transmitted to the recipient and the sender is notified. The sender is alerted if the link has not been activated within a predetermined period.
1. A verified method of high-value, person-to-person communication, comprising the steps of: a. selecting as an intended recipient an individual with whom at least implicit permission for person-to-person communication exists; b. creating a unique dynamic messaging link recognizable to the intended recipient of said person-to-person communication comprising a recognizable proprietary domain name and a random hash code appended thereto; c. creating a transmissible personal hypermedia message and assigning said unique dynamic messaging link leading directly thereto and storing said transmissible personal hypermedia message on a device accessible to a network upon actuation of said unique dynamic messaging link without redirection; d. sending said individual a direct message containing said dynamic link over the imprimatur of a person known to said intended recipient and an invitation to click on said dynamic link, said invitation containing descriptive material relating to said transmissible personal hypermedia message; e. monitoring said device accessible to said network for transmission thereto of said dynamic link, analyzing and storing metadata accompanying transmission of said dynamic link; f. transmitting said transmissible personal hypermedia message to said recipient upon activation of said dynamic link; g. notifying the sender of said direct message of activation of said dynamic link upon receipt thereof; h. alerting the sender of said direct message if said link has not been activated within a predetermined period. 2. The method of personal communication of claim 1, wherein each said unique dynamic messaging link is provided to the intended recipient via instant messaging. 3. The method of personal communication of claim 1, wherein each said unique dynamic messaging link is provided to the intended recipient via MMS or SMS text messaging. 4. The method of personal communication of claim 1, wherein each said unique dynamic messaging link is provided to the intended recipient by social media. 5. A method of personal communication comprising the steps of: a. obtaining permission to send personal messages to a recipient from a known individual; b. composing a personal transmittable dynamic hypermedia message; assigning a unique personal dynamic messaging link leading directly thereto and storing said personal transmissible hypermedia message on a device accessible to a network upon actuation of said unique dynamic messaging link; c. sending said recipient an instant message listing said known individual as the sender, said instant message having said dynamic messaging link embedded therein, accompanied by an invitation to click on said unique dynamic messaging link, wherein said unique dynamic messaging link includes primarily a domain name known to said recipient and a unique hash code individualized for each dynamic message sent to said recipient; d. monitoring said instant messages to determine whether said unique dynamic messaging link has been actuated; and e. transmitting said dynamic message to said intended recipient in response to actuation of said unique dynamic messaging link. 6. The method of personal communication of claim 5, wherein each said unique dynamic messaging link is provided to the intended recipient via instant messaging. 7. The method of personal communication of claim 5, wherein each said unique dynamic messaging link is provided to the intended recipient via MMS or SMS text messaging. 8. The method of personal communication of claim 5, wherein each said unique dynamic messaging link is provided to the intended recipient by social media. 9. A system and method of person-to-person communication comprising the steps of: a. creating transmissible personal hypermedia message and assigning a unique dynamic messaging link leading directly thereto and storing said transmissible personal hypermedia message on a device accessible to a network upon actuation of said unique dynamic messaging link wherein said dynamic messaging link includes a proprietary domain name and a unique hash code individualized for each dynamic message sent to a recipient; b. communicating said dynamic messaging link to the intended recipient; and c. transmitting said personal hypermedia message to said recipient presently upon actuation of said unique dynamic messaging link and recording metadata attendant thereupon; and d. monitoring and recording whether said dynamic messaging link has been activated and informing the sender thereof if said link has not been activated within a predetermined period of time. 10. A method of communicating individual unique personalized messages to a plurality of recipients, comprising the steps of: a. generating a plurality of individual unique personalized messages in HTML, storing said individual unique personalized message on a device accessible to a network, assigning each of said plurality of messages a unique dynamic messaging link leading directly thereto, each said dynamic messaging link comprising a domain name known to the intended recipient thereof and a unique hash code corresponding to said individual unique personalized message; b. electronically providing the intended recipient of each said unique dynamic messaging link over an imprimatur known to its intended recipient in the form of a descriptive invitation to click upon said dynamic messaging link; and c. transmitting said individual unique personalized message upon actuation of its corresponding unique dynamic messaging link. 11. The method of claim 10, wherein the sender is notified when the dynamic message has been transmitted as well as if the message is not transmitted within a predetermined period of time after transmission of the invitation. 12. The method of claim 11, wherein metadata accompanying said dynamic link is stored and analyzed upon receipt of activation of said dynamic link. 13. The method of communicating individual unique personalized messages to a plurality of recipients of claim 10, wherein each said unique dynamic messaging link is provided to the intended recipient via electronic direct messaging, instant messaging, or social media. 14. The method of claim 13, wherein the sender is notified when the dynamic message has been transmitted as well as if the message is not transmitted within a predetermined period of time after transmission of the invitation. 15. The method of claim 14, wherein metadata accompanying said dynamic link is stored and analyzed upon receipt of activation of said dynamic link. 16. The method of communicating individual unique personalized messages to a plurality of recipients of claim 10, wherein each said unique dynamic messaging link is provided to the intended recipient via SMS. 17. The method of communicating individual unique personalized messages to a plurality of recipients of claim 10, wherein each said unique dynamic messaging link is provided to the intended recipient via social media. 18. A method of sending personalized/individualized communications to plurality of intended recipients, comprising the steps of: a. preparing a plurality of personalized/individualized hypermedia communications, at least one for each of said plurality of intended recipients; b. preparing a plurality of innocuous dynamic messaging links associated with said personalized/individualized hypermedia communications, one for each of said plurality of personalized/individualized hypermedia communications, each said innocuous dynamic messaging link comprising an innocuous proprietary domain name and a randomized hashcode, each said innocuous dynamic messaging link being unique to one of said personalized/individualized hypermedia communications; c. storing said personalized/individualized hypermedia communications on a server accessible to a network, each said personalized/individualized hypermedia communication being directly accessible on a web browser connected to said network by entering its associated innocuous dynamic messaging link; d. preparing and transmitting a series of innocuous invitation messages, one to each of said plurality of recipients, each said innocuous invitation message comprising said innocuous dynamic messaging link associated with the personalized/individualized hypermedia communication and accompanied by an invitation to click on said innocuous dynamic messaging link. 19. The method of claim 18, wherein the sender is notified when the dynamic message has been transmitted as well as if the message is not transmitted within a predetermined period of time after transmission of the invitation. 20. The method of claim 18, wherein metadata accompanying said dynamic link is stored and analyzed upon receipt of activation of said dynamic link.
A verified method of high-value, person-to-person communication is provided. The method comprises creating a unique dynamic messaging link recognizable to a selected intended recipient; creating a transmissible personal hypermedia message to which the link is assigned; and storing the hypermedia message on a device accessible to a network. The link comprises a recognizable proprietary domain name and a random hash code. The individual is sent a direct message and the device is monitored for transmission thereto of the link, analyzing and storing accompanying metadata. The direct message contains an invitation to click on the link over the imprimatur of a person known to the recipient. The invitation contains descriptive material relating to the hypermedia message. Upon activation of the link, without redirection, the hypermedia message is transmitted to the recipient and the sender is notified. The sender is alerted if the link has not been activated within a predetermined period.1. A verified method of high-value, person-to-person communication, comprising the steps of: a. selecting as an intended recipient an individual with whom at least implicit permission for person-to-person communication exists; b. creating a unique dynamic messaging link recognizable to the intended recipient of said person-to-person communication comprising a recognizable proprietary domain name and a random hash code appended thereto; c. creating a transmissible personal hypermedia message and assigning said unique dynamic messaging link leading directly thereto and storing said transmissible personal hypermedia message on a device accessible to a network upon actuation of said unique dynamic messaging link without redirection; d. sending said individual a direct message containing said dynamic link over the imprimatur of a person known to said intended recipient and an invitation to click on said dynamic link, said invitation containing descriptive material relating to said transmissible personal hypermedia message; e. monitoring said device accessible to said network for transmission thereto of said dynamic link, analyzing and storing metadata accompanying transmission of said dynamic link; f. transmitting said transmissible personal hypermedia message to said recipient upon activation of said dynamic link; g. notifying the sender of said direct message of activation of said dynamic link upon receipt thereof; h. alerting the sender of said direct message if said link has not been activated within a predetermined period. 2. The method of personal communication of claim 1, wherein each said unique dynamic messaging link is provided to the intended recipient via instant messaging. 3. The method of personal communication of claim 1, wherein each said unique dynamic messaging link is provided to the intended recipient via MMS or SMS text messaging. 4. The method of personal communication of claim 1, wherein each said unique dynamic messaging link is provided to the intended recipient by social media. 5. A method of personal communication comprising the steps of: a. obtaining permission to send personal messages to a recipient from a known individual; b. composing a personal transmittable dynamic hypermedia message; assigning a unique personal dynamic messaging link leading directly thereto and storing said personal transmissible hypermedia message on a device accessible to a network upon actuation of said unique dynamic messaging link; c. sending said recipient an instant message listing said known individual as the sender, said instant message having said dynamic messaging link embedded therein, accompanied by an invitation to click on said unique dynamic messaging link, wherein said unique dynamic messaging link includes primarily a domain name known to said recipient and a unique hash code individualized for each dynamic message sent to said recipient; d. monitoring said instant messages to determine whether said unique dynamic messaging link has been actuated; and e. transmitting said dynamic message to said intended recipient in response to actuation of said unique dynamic messaging link. 6. The method of personal communication of claim 5, wherein each said unique dynamic messaging link is provided to the intended recipient via instant messaging. 7. The method of personal communication of claim 5, wherein each said unique dynamic messaging link is provided to the intended recipient via MMS or SMS text messaging. 8. The method of personal communication of claim 5, wherein each said unique dynamic messaging link is provided to the intended recipient by social media. 9. A system and method of person-to-person communication comprising the steps of: a. creating transmissible personal hypermedia message and assigning a unique dynamic messaging link leading directly thereto and storing said transmissible personal hypermedia message on a device accessible to a network upon actuation of said unique dynamic messaging link wherein said dynamic messaging link includes a proprietary domain name and a unique hash code individualized for each dynamic message sent to a recipient; b. communicating said dynamic messaging link to the intended recipient; and c. transmitting said personal hypermedia message to said recipient presently upon actuation of said unique dynamic messaging link and recording metadata attendant thereupon; and d. monitoring and recording whether said dynamic messaging link has been activated and informing the sender thereof if said link has not been activated within a predetermined period of time. 10. A method of communicating individual unique personalized messages to a plurality of recipients, comprising the steps of: a. generating a plurality of individual unique personalized messages in HTML, storing said individual unique personalized message on a device accessible to a network, assigning each of said plurality of messages a unique dynamic messaging link leading directly thereto, each said dynamic messaging link comprising a domain name known to the intended recipient thereof and a unique hash code corresponding to said individual unique personalized message; b. electronically providing the intended recipient of each said unique dynamic messaging link over an imprimatur known to its intended recipient in the form of a descriptive invitation to click upon said dynamic messaging link; and c. transmitting said individual unique personalized message upon actuation of its corresponding unique dynamic messaging link. 11. The method of claim 10, wherein the sender is notified when the dynamic message has been transmitted as well as if the message is not transmitted within a predetermined period of time after transmission of the invitation. 12. The method of claim 11, wherein metadata accompanying said dynamic link is stored and analyzed upon receipt of activation of said dynamic link. 13. The method of communicating individual unique personalized messages to a plurality of recipients of claim 10, wherein each said unique dynamic messaging link is provided to the intended recipient via electronic direct messaging, instant messaging, or social media. 14. The method of claim 13, wherein the sender is notified when the dynamic message has been transmitted as well as if the message is not transmitted within a predetermined period of time after transmission of the invitation. 15. The method of claim 14, wherein metadata accompanying said dynamic link is stored and analyzed upon receipt of activation of said dynamic link. 16. The method of communicating individual unique personalized messages to a plurality of recipients of claim 10, wherein each said unique dynamic messaging link is provided to the intended recipient via SMS. 17. The method of communicating individual unique personalized messages to a plurality of recipients of claim 10, wherein each said unique dynamic messaging link is provided to the intended recipient via social media. 18. A method of sending personalized/individualized communications to plurality of intended recipients, comprising the steps of: a. preparing a plurality of personalized/individualized hypermedia communications, at least one for each of said plurality of intended recipients; b. preparing a plurality of innocuous dynamic messaging links associated with said personalized/individualized hypermedia communications, one for each of said plurality of personalized/individualized hypermedia communications, each said innocuous dynamic messaging link comprising an innocuous proprietary domain name and a randomized hashcode, each said innocuous dynamic messaging link being unique to one of said personalized/individualized hypermedia communications; c. storing said personalized/individualized hypermedia communications on a server accessible to a network, each said personalized/individualized hypermedia communication being directly accessible on a web browser connected to said network by entering its associated innocuous dynamic messaging link; d. preparing and transmitting a series of innocuous invitation messages, one to each of said plurality of recipients, each said innocuous invitation message comprising said innocuous dynamic messaging link associated with the personalized/individualized hypermedia communication and accompanied by an invitation to click on said innocuous dynamic messaging link. 19. The method of claim 18, wherein the sender is notified when the dynamic message has been transmitted as well as if the message is not transmitted within a predetermined period of time after transmission of the invitation. 20. The method of claim 18, wherein metadata accompanying said dynamic link is stored and analyzed upon receipt of activation of said dynamic link.
2,400
9,082
9,082
15,485,961
2,432
Embodiments disclosed herein provide systems and methods for quarantining communications at a network edge by routing traffic through a specialized network edge system. In a particular embodiment a method provides, identifying criteria indicating whether certain network traffic should be handled by the specialized network edge system. The method further provides receiving first information about first network traffic received at a first network edge system for a communication network. In response to determining, based on the first information, that the first network traffic satisfies the criteria, the method provides routing the first network traffic through the specialized network edge system.
1. A method of routing network traffic through a specialized network edge system, the method comprising: identifying criteria indicating whether certain network traffic should be handled by the specialized network edge system; receiving first information about first network traffic received at a first network edge system for a communication network; and in response to determining, based on the first information, that the first network traffic satisfies the criteria, routing the first network traffic through the specialized network edge system. 2. The method of claim 1, further comprising: receiving second information about second network traffic received at a second network edge system for the communication network; and in response to determining, based on the second information, that the second network traffic satisfies the criteria, routing the second network traffic through the specialized network edge system. 3. The method of claim 2, wherein the first and second network edge systems comprise two of a plurality of network edge systems from which information about network traffic is received. 4. The method of claim 1, wherein the criteria define network traffic characteristics indicative of malicious network traffic. 5. The method of claim 1, wherein the specialized network edge system is configured to process the first network traffic in a more resource intensive manner than that of the first network edge system 6. The method of claim 1, wherein receiving the first information comprises receiving the first information in an edge system controller from the first network edge system via a real-time application programming interface (API) of the edge system controller. 7. The method of claim 1, wherein the specialized network edge system comprises a virtualized computing element. 8. The method of claim 7, further comprising: instantiating the specialized network edge system in a quarantined software defined network. 9. The method of claim 1, wherein the first network edge system and the specialized network edge system each comprise a session border controller (SBC) for the communication network. 10. The method of claim 1, wherein the first network traffic comprises session initiation protocol (SIP) traffic. 11. A system for routing network traffic through a specialized network edge system, the system comprising: one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media that, when read and executed by the processing system, direct the processing system to: identify criteria indicating whether certain network traffic should be handled by the specialized network edge system; receive first information about first network traffic received at a first network edge system for a communication network; and in response to determining, based on the first information, that the first network traffic satisfies the criteria, route the first network traffic through the specialized network edge system. 12. The system of claim 11, wherein the program instructions further direct the processing system to: receive second information about second network traffic received at a second network edge system for the communication network; and in response to determining, based on the second information, that the second network traffic satisfies the criteria, route the second network traffic through the specialized network edge system. 13. The system of claim 12, wherein the first and second network edge systems comprise two of a plurality of network edge systems from which information about network traffic is received. 14. The system of claim 11, wherein the criteria define network traffic characteristics indicative of malicious network traffic. 15. The system of claim 11, wherein the specialized network edge system is configured to process the first network traffic in a more resource intensive manner than that of the first network edge system 16. The system of claim 11, wherein the system implements an edge system controller and wherein to receive the first information the program instructions direct the processing system to at least receive the first information from the first network edge system via a real-time application programming interface (API) of the edge system controller. 17. The system of claim 11, wherein the specialized network edge system comprises a virtualized computing element. 18. The system of claim 17, wherein the program instructions further direct the processing system to: instantiate the specialized network edge system in a quarantined software defined network. 19. The system of claim 11, wherein the first network edge system and the specialized network edge system each comprise a session border controller (SBC) for the communication network. 20. The system of claim 11, wherein the first network traffic comprises session initiation protocol (SIP) traffic.
Embodiments disclosed herein provide systems and methods for quarantining communications at a network edge by routing traffic through a specialized network edge system. In a particular embodiment a method provides, identifying criteria indicating whether certain network traffic should be handled by the specialized network edge system. The method further provides receiving first information about first network traffic received at a first network edge system for a communication network. In response to determining, based on the first information, that the first network traffic satisfies the criteria, the method provides routing the first network traffic through the specialized network edge system.1. A method of routing network traffic through a specialized network edge system, the method comprising: identifying criteria indicating whether certain network traffic should be handled by the specialized network edge system; receiving first information about first network traffic received at a first network edge system for a communication network; and in response to determining, based on the first information, that the first network traffic satisfies the criteria, routing the first network traffic through the specialized network edge system. 2. The method of claim 1, further comprising: receiving second information about second network traffic received at a second network edge system for the communication network; and in response to determining, based on the second information, that the second network traffic satisfies the criteria, routing the second network traffic through the specialized network edge system. 3. The method of claim 2, wherein the first and second network edge systems comprise two of a plurality of network edge systems from which information about network traffic is received. 4. The method of claim 1, wherein the criteria define network traffic characteristics indicative of malicious network traffic. 5. The method of claim 1, wherein the specialized network edge system is configured to process the first network traffic in a more resource intensive manner than that of the first network edge system 6. The method of claim 1, wherein receiving the first information comprises receiving the first information in an edge system controller from the first network edge system via a real-time application programming interface (API) of the edge system controller. 7. The method of claim 1, wherein the specialized network edge system comprises a virtualized computing element. 8. The method of claim 7, further comprising: instantiating the specialized network edge system in a quarantined software defined network. 9. The method of claim 1, wherein the first network edge system and the specialized network edge system each comprise a session border controller (SBC) for the communication network. 10. The method of claim 1, wherein the first network traffic comprises session initiation protocol (SIP) traffic. 11. A system for routing network traffic through a specialized network edge system, the system comprising: one or more computer readable storage media; a processing system operatively coupled with the one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media that, when read and executed by the processing system, direct the processing system to: identify criteria indicating whether certain network traffic should be handled by the specialized network edge system; receive first information about first network traffic received at a first network edge system for a communication network; and in response to determining, based on the first information, that the first network traffic satisfies the criteria, route the first network traffic through the specialized network edge system. 12. The system of claim 11, wherein the program instructions further direct the processing system to: receive second information about second network traffic received at a second network edge system for the communication network; and in response to determining, based on the second information, that the second network traffic satisfies the criteria, route the second network traffic through the specialized network edge system. 13. The system of claim 12, wherein the first and second network edge systems comprise two of a plurality of network edge systems from which information about network traffic is received. 14. The system of claim 11, wherein the criteria define network traffic characteristics indicative of malicious network traffic. 15. The system of claim 11, wherein the specialized network edge system is configured to process the first network traffic in a more resource intensive manner than that of the first network edge system 16. The system of claim 11, wherein the system implements an edge system controller and wherein to receive the first information the program instructions direct the processing system to at least receive the first information from the first network edge system via a real-time application programming interface (API) of the edge system controller. 17. The system of claim 11, wherein the specialized network edge system comprises a virtualized computing element. 18. The system of claim 17, wherein the program instructions further direct the processing system to: instantiate the specialized network edge system in a quarantined software defined network. 19. The system of claim 11, wherein the first network edge system and the specialized network edge system each comprise a session border controller (SBC) for the communication network. 20. The system of claim 11, wherein the first network traffic comprises session initiation protocol (SIP) traffic.
2,400
9,083
9,083
16,164,080
2,485
An example method is performed by a thermal imaging device. The method includes capturing a thermal image of a vehicle and displaying the thermal image within a first region of a display of the thermal imaging device. The method further includes displaying information related to servicing the vehicle within a second region of the display that is distinct from the first region. Other example methods performed by a thermal imaging device are also disclosed herein.
1. A method performed by a thermal imaging device, the method comprising: capturing a thermal image; displaying the captured thermal image within a first region of a display of the thermal imaging device, wherein the displayed thermal image conforms to a first color palette that maps temperatures to one or more of (i) a color or (ii) a brightness level; displaying one or more color palette icons within a second region of the display that is distinct from the first region, wherein the one or more color palette icons respectively represent additional color palettes that map temperatures to one or more of (i) a color or (ii) a brightness level; receiving input representing a selection of a color palette icon of the one or more color palette icons; and displaying, within the first region, a thermal image that conforms to a second color palette that corresponds to the selected color palette icon. 2. The method of claim 1, wherein receiving the input comprises receiving a touch and drag input. 3. The method of claim 2, wherein the touch and drag input begins at the selected color palette and ends within the first region of the display. 4. The method of claim 1, wherein the displayed thermal image that conforms to the second color palette is the captured thermal image that is displayed to conform to the second color palette. 5. The method of claim 1, further comprising replacing, within the display, the selected color palette icon with a color palette icon that corresponds to the first color palette. 6. The method of claim 5, wherein the selected color palette icon comprises a compressed version of the captured thermal image that conforms to the second color palette, and wherein replacing the selected color palette icon comprises displaying a compressed version of the captured thermal image that conforms to the first color palette. 7. The method of claim 1, wherein first region is larger than the second region. 8. The method of claim 1, wherein receiving the input comprises receiving the input via a touchscreen of the thermal imaging device. 9. A thermal imaging device comprising: one or more processors; a display; a thermal image sensor; and a non-transitory computer readable medium storing instructions that, when executed by the one or more processors, cause the thermal imaging device to perform functions comprising: capturing a thermal image with the thermal image sensor; displaying the captured thermal image within a first region of the display, wherein the displayed thermal image conforms to a first color palette that maps temperatures to one or more of (i) a color or (ii) a brightness level; displaying one or more color palette icons within a second region of the display that is distinct from the first region, wherein the one or more color palette icons respectively represent additional color palettes that map temperatures to one or more of (i) a color or (ii) a brightness level; receiving input representing a selection of a color palette icon of the one or more color palette icons; and displaying, within the first region, a thermal image that conforms to a second color palette that corresponds to the selected color palette icon. 10. The thermal imaging device of claim 9, wherein receiving the input comprises receiving a touch and drag input. 11. The thermal imaging device of claim 10, wherein the touch and drag input begins at the selected color palette and ends within the first region of the display. 12. The thermal imaging device of claim 9, wherein the displayed thermal image that conforms to the second color palette is the captured thermal image that is displayed to conform to the second color palette. 13. The thermal imaging device of claim 9, the functions further comprising replacing, within the display, the selected color palette icon with a color palette icon that corresponds to the first color palette. 14. The thermal imaging device of claim 13, wherein the selected color palette icon comprises a compressed version of the captured thermal image that conforms to the second color palette, and wherein replacing the selected color palette icon comprises displaying a compressed version of the captured thermal image that conforms to the first color palette. 15. The thermal imaging device of claim 9, wherein first region is larger than the second region. 16. The thermal imaging device of claim 9, wherein receiving the input comprises receiving the input via a touchscreen of the thermal imaging device. 17. A non-transitory computer readable medium storing instructions that, when executed by a thermal imaging device, cause the thermal imaging device to perform functions comprising: capturing a thermal image; displaying the captured thermal image within a first region of a display of the thermal imaging device, wherein the displayed thermal image conforms to a first color palette that maps temperatures to one or more of (i) a color or (ii) a brightness level; displaying one or more color palette icons within a second region of the display that is distinct from the first region, wherein the one or more color palette icons respectively represent additional color palettes that map temperatures to one or more of (i) a color or (ii) a brightness level; receiving input representing a selection of a color palette icon of the one or more color palette icons; and displaying, within the first region, a thermal image that conforms to a second color palette that corresponds to the selected color palette icon. 18. The non-transitory computer readable medium of claim 17, wherein receiving the input comprises receiving a touch and drag input. 19. The non-transitory computer readable medium of claim 18, wherein the touch and drag input begins at the selected color palette and ends within the first region of the display. 20. The non-transitory computer readable medium of claim 17, wherein the displayed thermal image that conforms to the second color palette is the captured thermal image that is displayed to conform to the second color palette.
An example method is performed by a thermal imaging device. The method includes capturing a thermal image of a vehicle and displaying the thermal image within a first region of a display of the thermal imaging device. The method further includes displaying information related to servicing the vehicle within a second region of the display that is distinct from the first region. Other example methods performed by a thermal imaging device are also disclosed herein.1. A method performed by a thermal imaging device, the method comprising: capturing a thermal image; displaying the captured thermal image within a first region of a display of the thermal imaging device, wherein the displayed thermal image conforms to a first color palette that maps temperatures to one or more of (i) a color or (ii) a brightness level; displaying one or more color palette icons within a second region of the display that is distinct from the first region, wherein the one or more color palette icons respectively represent additional color palettes that map temperatures to one or more of (i) a color or (ii) a brightness level; receiving input representing a selection of a color palette icon of the one or more color palette icons; and displaying, within the first region, a thermal image that conforms to a second color palette that corresponds to the selected color palette icon. 2. The method of claim 1, wherein receiving the input comprises receiving a touch and drag input. 3. The method of claim 2, wherein the touch and drag input begins at the selected color palette and ends within the first region of the display. 4. The method of claim 1, wherein the displayed thermal image that conforms to the second color palette is the captured thermal image that is displayed to conform to the second color palette. 5. The method of claim 1, further comprising replacing, within the display, the selected color palette icon with a color palette icon that corresponds to the first color palette. 6. The method of claim 5, wherein the selected color palette icon comprises a compressed version of the captured thermal image that conforms to the second color palette, and wherein replacing the selected color palette icon comprises displaying a compressed version of the captured thermal image that conforms to the first color palette. 7. The method of claim 1, wherein first region is larger than the second region. 8. The method of claim 1, wherein receiving the input comprises receiving the input via a touchscreen of the thermal imaging device. 9. A thermal imaging device comprising: one or more processors; a display; a thermal image sensor; and a non-transitory computer readable medium storing instructions that, when executed by the one or more processors, cause the thermal imaging device to perform functions comprising: capturing a thermal image with the thermal image sensor; displaying the captured thermal image within a first region of the display, wherein the displayed thermal image conforms to a first color palette that maps temperatures to one or more of (i) a color or (ii) a brightness level; displaying one or more color palette icons within a second region of the display that is distinct from the first region, wherein the one or more color palette icons respectively represent additional color palettes that map temperatures to one or more of (i) a color or (ii) a brightness level; receiving input representing a selection of a color palette icon of the one or more color palette icons; and displaying, within the first region, a thermal image that conforms to a second color palette that corresponds to the selected color palette icon. 10. The thermal imaging device of claim 9, wherein receiving the input comprises receiving a touch and drag input. 11. The thermal imaging device of claim 10, wherein the touch and drag input begins at the selected color palette and ends within the first region of the display. 12. The thermal imaging device of claim 9, wherein the displayed thermal image that conforms to the second color palette is the captured thermal image that is displayed to conform to the second color palette. 13. The thermal imaging device of claim 9, the functions further comprising replacing, within the display, the selected color palette icon with a color palette icon that corresponds to the first color palette. 14. The thermal imaging device of claim 13, wherein the selected color palette icon comprises a compressed version of the captured thermal image that conforms to the second color palette, and wherein replacing the selected color palette icon comprises displaying a compressed version of the captured thermal image that conforms to the first color palette. 15. The thermal imaging device of claim 9, wherein first region is larger than the second region. 16. The thermal imaging device of claim 9, wherein receiving the input comprises receiving the input via a touchscreen of the thermal imaging device. 17. A non-transitory computer readable medium storing instructions that, when executed by a thermal imaging device, cause the thermal imaging device to perform functions comprising: capturing a thermal image; displaying the captured thermal image within a first region of a display of the thermal imaging device, wherein the displayed thermal image conforms to a first color palette that maps temperatures to one or more of (i) a color or (ii) a brightness level; displaying one or more color palette icons within a second region of the display that is distinct from the first region, wherein the one or more color palette icons respectively represent additional color palettes that map temperatures to one or more of (i) a color or (ii) a brightness level; receiving input representing a selection of a color palette icon of the one or more color palette icons; and displaying, within the first region, a thermal image that conforms to a second color palette that corresponds to the selected color palette icon. 18. The non-transitory computer readable medium of claim 17, wherein receiving the input comprises receiving a touch and drag input. 19. The non-transitory computer readable medium of claim 18, wherein the touch and drag input begins at the selected color palette and ends within the first region of the display. 20. The non-transitory computer readable medium of claim 17, wherein the displayed thermal image that conforms to the second color palette is the captured thermal image that is displayed to conform to the second color palette.
2,400
9,084
9,084
15,173,081
2,481
A device and method for compressing image data. Image data is received comprising one or more images recorded by a camera. Attitude data is received indicating the attitude of the camera when each of the one or more images was recorded. In each of the one or more images, a region of interest is defined, the region of interest being bounded by a boundary, the boundary of the region of interest being based on the attitude data for the respective image and defining a section of the image within the region of interest and a section of the image outside the region of interest. Each of the one or more images is compressed, wherein the compression ratio applied to the section of the image outside the region of interest is higher than that applied to the section of the image within the region of interest.
1. A device for compressing image data, the device comprising a controller configured to: receive image data comprising one or more images recorded by a camera; receive attitude data indicating the attitude of the camera when each of the one or more images was recorded; in each of the one or more images, define a region of interest bounded by a boundary, the boundary of the region of interest being based on the attitude data for the respective image and defining a section of the image within the region of interest and a section of the image outside the region of interest; and compress each of the one or more images, wherein the compression ratio applied to the section of the image outside the region of interest is higher than that applied to the section of the image within the region of interest. 2. A device according to claim 1 wherein the controller is configured to compress, for each image, only the section of the image outside the region of interest. 3. A device according to claim 1 wherein defining the region of interest in each of the one or more images comprises transforming the boundary of the region of interest defined in a reference coordinate system into the boundary of the region of interest within the respective image based on the attitude data for the image. 4. A device according to claim 3 wherein the reference coordinate system is concentric with the optical centre of the camera and is fixed with respect to compass points and with respect to the local horizontal plane. 5. A device according to claim 3 wherein the boundary of the region of interest is defined in the reference coordinate system on a two dimensional manifold which is carried by the reference coordinate system. 6. A device according to claim 5 wherein, on the manifold in the reference coordinate system, the boundary of the region of interest is static. 7. A device according to claim 5 wherein: the two dimensional manifold is a sphere whose centre is located at the origin of the reference coordinate system; and in the reference coordinate system, the boundary of the region of interest is defined using a series of points located on the surface of the sphere. 8. A device according to claim 3 wherein: the controller is configured to receive a reference image, attitude data for the reference image and data indicating the boundary of a region of interest within the reference image; and the boundary of the region of interest in the reference coordinate system is defined by transforming the boundary of the region of interest in the reference image into the boundary of the region of interest in the reference coordinate system based on the attitude data for the reference image. 9. A device according to claim 3 wherein the region of interest in the reference coordinate system is defined based on a minimum and/or maximum threshold for elevation angle and/or wherein the region of interest in the reference coordinate system is defined based on a minimum and/or maximum threshold for azimuth angle. 10. A device according to claim 1 wherein: the image data comprises first and second images recorded by the camera; and the boundary of the region of interest in the second image is defined based on a transformation applied to the boundary of the region of interest in the first image, the transformation being based on the attitude data for the first and second images. 11. The device of claim 10 wherein the transformation compensates for a change in the attitude of the camera between the recording of the first image and the recording of the second image. 12. A method of compressing image data, the method comprising: receiving image data comprising one or more images recorded by a camera; receiving attitude data indicating the attitude of the camera when each of the one or more images was recorded; in each of the one or more images, defining a region of interest bounded by a boundary, the boundary of the region of interest being based on the attitude data for the respective image and defining a section of the image within the region of interest and a section of the image outside the region of interest; and compressing each of the one or more images, wherein the compression ratio applied to the section of the image outside the region of interest is higher than that applied to the section of the image within the region of interest. 13. A method according to claim 12 wherein compressing each of the one or more images comprises, for each image, compressing only the section of the image outside the region of interest. 14. A method according to claim 12 wherein defining the region of interest in each of the one or more images comprises transforming the boundary of the region of interest defined in a reference coordinate system into the boundary of the region of interest within the respective image based on the attitude data for the image. 15. A method according to claim 14 wherein the reference coordinate system is concentric with the optical centre of the camera and is fixed with respect to compass points and with respect to the local horizontal plane. 16. A method according to claim 14 wherein the boundary of the region of interest is defined in the reference coordinate system on a two dimensional manifold which is carried by the reference coordinate system. 17. A method according to claim 16 wherein, on the manifold in the reference coordinate system, the boundary of the region of interest is static. 18. A method according to claim 16 wherein: the two dimensional manifold is a sphere whose centre is located at the origin of the reference coordinate system; and in the reference coordinate system, the boundary of the region of interest is defined using a series of points located on the surface of the sphere. 19. A method according to claim 14 wherein: the method further comprises receiving a reference image, attitude data for the reference image and data indicating the boundary of a region of interest within the reference image; and the boundary of the region of interest in the reference coordinate system is defined by transforming the boundary of the region of interest in the reference image into the boundary of the region of interest in the reference coordinate system based on the attitude data for the reference image. 20. A method according to claim 14 wherein the region of interest in the reference coordinate system is defined based on a minimum and/or maximum threshold for elevation angle and/or wherein the region of interest in the reference coordinate system is defined based on a minimum and/or maximum threshold for azimuth angle.
A device and method for compressing image data. Image data is received comprising one or more images recorded by a camera. Attitude data is received indicating the attitude of the camera when each of the one or more images was recorded. In each of the one or more images, a region of interest is defined, the region of interest being bounded by a boundary, the boundary of the region of interest being based on the attitude data for the respective image and defining a section of the image within the region of interest and a section of the image outside the region of interest. Each of the one or more images is compressed, wherein the compression ratio applied to the section of the image outside the region of interest is higher than that applied to the section of the image within the region of interest.1. A device for compressing image data, the device comprising a controller configured to: receive image data comprising one or more images recorded by a camera; receive attitude data indicating the attitude of the camera when each of the one or more images was recorded; in each of the one or more images, define a region of interest bounded by a boundary, the boundary of the region of interest being based on the attitude data for the respective image and defining a section of the image within the region of interest and a section of the image outside the region of interest; and compress each of the one or more images, wherein the compression ratio applied to the section of the image outside the region of interest is higher than that applied to the section of the image within the region of interest. 2. A device according to claim 1 wherein the controller is configured to compress, for each image, only the section of the image outside the region of interest. 3. A device according to claim 1 wherein defining the region of interest in each of the one or more images comprises transforming the boundary of the region of interest defined in a reference coordinate system into the boundary of the region of interest within the respective image based on the attitude data for the image. 4. A device according to claim 3 wherein the reference coordinate system is concentric with the optical centre of the camera and is fixed with respect to compass points and with respect to the local horizontal plane. 5. A device according to claim 3 wherein the boundary of the region of interest is defined in the reference coordinate system on a two dimensional manifold which is carried by the reference coordinate system. 6. A device according to claim 5 wherein, on the manifold in the reference coordinate system, the boundary of the region of interest is static. 7. A device according to claim 5 wherein: the two dimensional manifold is a sphere whose centre is located at the origin of the reference coordinate system; and in the reference coordinate system, the boundary of the region of interest is defined using a series of points located on the surface of the sphere. 8. A device according to claim 3 wherein: the controller is configured to receive a reference image, attitude data for the reference image and data indicating the boundary of a region of interest within the reference image; and the boundary of the region of interest in the reference coordinate system is defined by transforming the boundary of the region of interest in the reference image into the boundary of the region of interest in the reference coordinate system based on the attitude data for the reference image. 9. A device according to claim 3 wherein the region of interest in the reference coordinate system is defined based on a minimum and/or maximum threshold for elevation angle and/or wherein the region of interest in the reference coordinate system is defined based on a minimum and/or maximum threshold for azimuth angle. 10. A device according to claim 1 wherein: the image data comprises first and second images recorded by the camera; and the boundary of the region of interest in the second image is defined based on a transformation applied to the boundary of the region of interest in the first image, the transformation being based on the attitude data for the first and second images. 11. The device of claim 10 wherein the transformation compensates for a change in the attitude of the camera between the recording of the first image and the recording of the second image. 12. A method of compressing image data, the method comprising: receiving image data comprising one or more images recorded by a camera; receiving attitude data indicating the attitude of the camera when each of the one or more images was recorded; in each of the one or more images, defining a region of interest bounded by a boundary, the boundary of the region of interest being based on the attitude data for the respective image and defining a section of the image within the region of interest and a section of the image outside the region of interest; and compressing each of the one or more images, wherein the compression ratio applied to the section of the image outside the region of interest is higher than that applied to the section of the image within the region of interest. 13. A method according to claim 12 wherein compressing each of the one or more images comprises, for each image, compressing only the section of the image outside the region of interest. 14. A method according to claim 12 wherein defining the region of interest in each of the one or more images comprises transforming the boundary of the region of interest defined in a reference coordinate system into the boundary of the region of interest within the respective image based on the attitude data for the image. 15. A method according to claim 14 wherein the reference coordinate system is concentric with the optical centre of the camera and is fixed with respect to compass points and with respect to the local horizontal plane. 16. A method according to claim 14 wherein the boundary of the region of interest is defined in the reference coordinate system on a two dimensional manifold which is carried by the reference coordinate system. 17. A method according to claim 16 wherein, on the manifold in the reference coordinate system, the boundary of the region of interest is static. 18. A method according to claim 16 wherein: the two dimensional manifold is a sphere whose centre is located at the origin of the reference coordinate system; and in the reference coordinate system, the boundary of the region of interest is defined using a series of points located on the surface of the sphere. 19. A method according to claim 14 wherein: the method further comprises receiving a reference image, attitude data for the reference image and data indicating the boundary of a region of interest within the reference image; and the boundary of the region of interest in the reference coordinate system is defined by transforming the boundary of the region of interest in the reference image into the boundary of the region of interest in the reference coordinate system based on the attitude data for the reference image. 20. A method according to claim 14 wherein the region of interest in the reference coordinate system is defined based on a minimum and/or maximum threshold for elevation angle and/or wherein the region of interest in the reference coordinate system is defined based on a minimum and/or maximum threshold for azimuth angle.
2,400
9,085
9,085
11,385,009
2,416
A network entity controls delivery of information to user devices over bearer paths including unicast channels and multicast channels. The network entity may interoperate in any of a number of network architectures, including 3GPP Internet Protocol Multimedia Subsystem (IMS) and 3GPP2 Multimedia Domain (MMD). The network entity may provide functionality of a modified 3GPP2 Broadcast and Multicast Service (BCMCS) controller component configured to enable BCMCS signaling protocol transactions to occur over 3GPP IMS interfaces and/or 3GPP2 MMD interfaces. A network entity configured to interoperate in a 3GPP IMS and/or 3GPP2 MMD network architecture may provide network-mobile multimedia services to user devices. Content associated with the multimedia services may be stored in storage devices in the network. A common interface through which a network operator defines service-specific parameters of a number of unicast and multicast multimedia services deployed in a distribution network may be provided.
1. A method comprising: enabling a network entity to control delivery of information to user devices over bearer paths, the bearer paths comprising unicast channels and multicast channels. 2. The method of claim 1, wherein the enabling comprises: provisioning a multimedia service so that one or more multimedia programs are available for delivery to the user devices. 3. The method of claim 2, wherein the provisioning comprises: for each of the one or more multimedia programs, receiving program-related parameters, network-related parameters, and user-related parameters from a network operator. 4. The method of claim 2, wherein the provisioning comprises: adding the one or more multimedia program to a list of multimedia programs available for delivery to the user devices. 5. The method of claim 1, wherein the enabling comprises: generating a program guide that provides a list of multimedia programs available for delivery to the user devices. 6. The method of claim 1, wherein the enabling comprises: sending to a distribution network control information for use in setting up the bearer paths with the user devices. 7. The method of claim 1, wherein the enabling comprises: sending to at least one of the user devices a program guide that provides a list of multimedia programs available for delivery. 8. The method of claim 7, wherein the program guide is sent upon registration of the at least one of the user devices with a distribution network. 9. The method of claim 7, wherein the program guide is sent in response to a program guide request by the at least one of the user devices. 10. The method of claim 7, wherein the at least one of the user devices is associated with a service profile that identifies one or more multimedia services the at least one of the user devices has access to. 11. The method of claim 1, wherein the enabling comprises: receiving a request for a program from at least one of the user devices; and identifying a transport mode associated with the requested program, the transport mode being one of unicast or multicast. 12. The method of claim 11, wherein the identified transport mode is multicast, and the enabling further comprises: determining whether the requested program is currently being delivered over a multicast channel to which the at least one of the user devices has access, and if so, sending information to the at least one of the user devices to enable the at least one of the user devices to extract the requested program from that multicast channel. 13. The method of claim 11, wherein the identified transport mode is multicast, and the enabling further comprises: determining whether the requested program is currently being delivered over a multicast channel to which the at least one of the user devices has access to, and if not, sending a notification to another network entity to start delivering the requested program over a multicast channel to which the at least one of the user devices has access. 14. The method of claim 11, wherein the enabling further comprises: retrieving a service profile associated with the at least one of the user devices; and taking an action based on the retrieved service profile. 15. The method of claim 14, wherein taking an action comprises one or more of the following: determining whether the at least one of the user devices is capable of accessing the requested program; and identifying a quality of service the at least one of the user devices is subscribed to receive. 16. The method of claim 1, wherein the enabling comprises: maintaining a count of a number of user devices to which a program is being delivered over unicast channels; and dynamically establishing a multicast channel when the count exceeds a threshold value. 17. The method of claim 16, wherein the enabling further comprises: sending a notification to another network entity to start delivering the program over the newly-established multicast channel; and sending information to the user devices to enable the user devices to extract the program from the newly-established multicast channel. 18. The method of claim 1, wherein the bearer paths are set up over a plurality of distribution networks, the distribution networks using different access technologies. 19. The method of claim 18, wherein the bearer paths comprise unicast channels and the distribution networks comprise a Global System for Mobile Communications (GSM) network, a General Packet Radio Service (GPRS) network, a Universal Mobile Telecommunications System (UMTS), an Evolution-Data Optimized (EV-DO) network, a High-Speed Downlink Packet Access network, and a High-Speed Uplink Packet Access network. 20. The method of claim 18, wherein the bearer paths comprise multicast channels and the distribution networks comprise: a cellular multicast network that comprises a Code Division Multiple Access (CDMA) network implementing a Broadcast-Multicast Service (BCMCS) service, and a Global System for Mobile Communications (GSM) network implementing a Multimedia Broadcast/Multicast Service (MBMS) service; a broadband wireless network that comprises a Worldwide Interoperability for Microwave Access (WiMAX) network, and a Wireless Broadband (WiBro) network; a wireless multicast network that comprises a MediaFLO network, a Digital Video Broadcasting—Handheld (DVB-H) network, and a Digital Multimedia Broadcasting network (DMB); and a wired network that comprises a Digital Subscriber Line (DSL) network, a Gigabit Ethernet network, a Frame Relay network, and a cable network. 21. The method of claim 1, wherein the bearer paths used to deliver a multicast service to the user devices originate at one of the user devices. 22. The method of claim 1, wherein the network entity is configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 23. The method of claim 22, wherein the enabling comprises: provisioning a multimedia service so that one or more multimedia programs are available for delivery to the user devices. 24. The method of claim 23, wherein the provisioning comprises: for each of the one or more multimedia programs, receiving program-related parameters, network-related parameters, and user-related parameters from a network operator. 25. The method of claim 23, wherein the provisioning comprises: adding the one or more multimedia program to a list of multimedia programs available for delivery to the user devices. 26. The method of claim 22, wherein the enabling comprises: generating a program guide that provides a list of multimedia programs available for delivery to the user devices. 27. The method of claim 22, wherein the enabling comprises: sending to a distribution network control information for use in setting up the bearer paths with the user devices. 28. The method of claim 22, wherein the enabling comprises: sending to at least one of the user devices a program guide that provides a list of multimedia programs available for delivery. 29. The method of claim 28, wherein the program guide is sent upon registration of the at least one of the user devices with a distribution network. 30. The method of claim 28, wherein the program guide is sent in response to a program guide request by the at least one of the user devices. 31. The method of claim 28, wherein the at least one of the user devices is associated with a service profile that identifies one or more multimedia services the at least one of the user devices has access to. 32. The method of claim 22, wherein the enabling comprises: receiving a request for a program from at least one of the user devices; and identifying a transport mode associated with the requested program, the transport mode being one of unicast or multicast. 33. The method of claim 32, wherein the identified transport mode is multicast, and the enabling further comprises: determining whether the requested program is currently being delivered over a multicast channel to which the at least one of the user devices has access, and if so, sending information to the at least one of the user devices to enable the at least one of the user devices to extract the requested program from that multicast channel. 34. The method of claim 32, wherein the identified transport mode is multicast, and the enabling further comprises: determining whether the requested program is currently being delivered over a multicast channel to which the at least one of the user devices has access to, and if not, sending a notification to another network entity to start delivering the requested program over a multicast channel to which the at least one of the user devices has access. 35. The method of claim 32, wherein the enabling further comprises: retrieving a service profile associated with the at least one of the user devices; and taking an action based on the retrieved service profile. 36. The method of claim 35, wherein taking an action comprises one or more of the following: determining whether the at least one of the user devices is capable of accessing the requested program; and identifying a quality of service the at least one of the user devices is subscribed to receive. 37. The method of claim 22, wherein the enabling comprises: maintaining a count of a number of user devices to which a program is being delivered over unicast channels; and dynamically establishing a multicast channel when the count exceeds a threshold value. 38. The method of claim 37, wherein the enabling further comprises: sending a notification to another network entity to start delivering the program over the newly-established multicast channel; and sending information to the user devices to enable the user devices to extract the program from the newly-established multicast channel. 39. The method of claim 22, wherein the bearer paths are set up over a plurality of distribution networks, the distribution networks using different access technologies. 40. The method of claim 39, wherein the bearer paths comprise unicast channels and the distribution networks comprise a Global System for Mobile Communications (GSM) network, a General Packet Radio Service (GPRS) network, a Universal Mobile Telecommunications System (UMTS), an Evolution-Data Optimized (EV-DO) network, a High-Speed Downlink Packet Access network, and a High-Speed Uplink Packet Access network. 41. The method of claim 39, wherein the bearer paths comprise multicast channels and the distribution networks comprise: a cellular multicast network that comprises a Code Division Multiple Access (CDMA) network implementing a Broadcast-Multicast Service (BCMCS) service, and a Global System for Mobile Communications (GSM) network implementing a Multimedia Broadcast/Multicast Service (MBMS) service; a broadband wireless network that comprises a Worldwide Interoperability for Microwave Access (WiMAX) network, and a Wireless Broadband (WiBro) network; a wireless multicast network that comprises a MediaFLO network, a Digital Video Broadcasting—Handheld (DVB-H) network, and a Digital Multimedia Broadcasting network (DMB); and a wired network that comprises a Digital Subscriber Line (DSL) network, a Gigabit Ethernet network, a Frame Relay network, and a cable network. 42. The method of claim 22, wherein the bearer paths used to deliver a multicast service to the user devices originate at one of the user devices. 43. The method of claim 22, wherein the network entity provides functionality of a modified 3GPP2 Broadcast and Multicast Service (BCMCS) controller component configured to enable BCMCS signaling protocol transactions to occur over interfaces of one of a 3GPP IMS network architecture and a 3GPP2 MMD network architecture. 44. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS service discovery and announcement functionality by generating a program guide and delivering the program guide to the user devices. 45. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS content subscription and information functionality by authenticating and authorizing the user devices and delivering encryption keys and control information in a way compatible to 3GPP2 BCMCS transactions performed over interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 46. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS content delivery functionality by having a MRFC functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send control information to a MRFP functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture so as to enable content to be sent content to user devices through a distribution network. 47. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS controller discovery functionality by having a S-CSCF functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send user requests to a network entity. 48. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS accounting functionality by having an HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture collect accounting records in a manner compatible with BCMCS transactions performed over the interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 49. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS subscription profile manager functionality by having a network operator configure user subscription information in a HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 50. The method of claim 43, wherein: an interface between a 3GPP2 BCMCS controller and a user device is implemented with a SIP Interface between the network entity and the user device; an interface between a 3GPP2 BCMCS controller and a broadcast serving node is implemented with a Mb Interface; an interface between a 3GPP2 BCMCS controller and a content server is implemented with a Mp Interface; an interface between a 3GPP2 BCMCS controller and an authenticate, authorize, and accounting (AAA) server is implemented with a Sh Interface; and an interface between a 3GPP2 BCMCS controller and a subscription profile manager is implemented with a Sh interface, wherein each of the SIP Interface, Mb Interface, Mp Interface, Sh Interface is an interface of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 51. A machine-readable medium including machine-executable instructions to cause the machine to: enable a network entity to control delivery of information to user devices over bearer paths, the bearer paths comprising unicast channels and multicast channels. 52. The machine-readable medium of claim 51, wherein the instructions to cause the machine to enable comprise one or more of the following: instructions to provision a multimedia service so that one or more multimedia programs are available for delivery to the user devices; instructions to generate a program guide that provides a list of multimedia programs available for delivery to the user devices; instructions to send to a distribution network control information for use in setting up the bearer paths with the user devices; and instructions to send to at least one of the user devices a program guide that provides a list of multimedia programs available for delivery. 53. The machine-readable medium of claim 51, wherein the instructions to cause the machine to enable comprise instructions to: receive a request for a program from at least one of the user devices; and identify a transport mode associated with the requested program, the transport mode being one of unicast or multicast. 54. The machine-readable medium of claim 51, wherein the instructions to cause the machine to enable comprise instructions to: maintain a count of a number of user devices to which a program is being delivered over unicast channels; and dynamically-establish a multicast channel when the count exceeds a threshold value. 55. The machine-readable medium of claim 51, wherein the bearer paths are set up over a plurality of distribution networks, the distribution networks using different access technologies. 56. The machine-readable medium of claim 51, wherein the bearer paths used to deliver a multicast service to the user devices originate at one of the user devices. 57. The machine-readable medium of claim 51, wherein the network entity is configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 58. The machine-readable medium of claim 51, wherein the network entity is configured to provide functionality of a modified 3GPP2 Broadcast and Multicast Service (BCMCS) controller component so as to enable BCMCS signaling protocol transactions to occur over interfaces of one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 59. The machine-readable medium of claim 58, wherein the instructions to cause the machine to enable comprise one of more of the following: instructions to perform 3GPP2 BCMCS service discovery and announcement functionality by generating a program guide and delivering the program guide to the user devices; instructions to perform 3GPP2 BCMCS content subscription and information functionality by authenticating and authorizing the user devices and delivering encryption keys and control information in a way compatible to 3GPP2 BCMCS transactions performed over interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture; instructions to perform 3GPP2 BCMCS content delivery functionality by having a MRFC functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send control information to a MRFP functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture so as to enable content to be sent content to user devices through a distribution network; instructions to perform 3GPP2 BCMCS controller discovery functionality by having a S-CSCF functional entity interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send user requests to a network entity; instructions to perform 3GPP2 BCMCS accounting functionality by having a HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture collect accounting records in a manner compatible with BCMCS transactions performed over the interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture; and instructions to perform 3GPP2 BCMCS subscription profile manager functionality by having a network operator configure user subscription information in a HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 60. An apparatus comprising: means for controlling delivery of information to user devices over bearer paths, the bearer paths comprising unicast channels and multicast channels. 61. The apparatus of claim 60, further comprising: means for provisioning a multimedia service so that one or more multimedia programs are available for delivery to the user devices; means for generating a program guide that provides a list of multimedia programs available for delivery to the user devices; means for sending to a distribution network control information for use in setting up the bearer paths with the user devices; and means for sending to at least one of the user devices a program guide that provides a list of multimedia programs available for delivery. 62. The apparatus of claim 60, further comprising: means for receiving a request for a program from at least one of the user devices; and means for identifying a transport mode associated with the requested program, the transport mode being one of unicast or multicast. 63. The apparatus of claim 60, further comprising: means for maintaining a count of a number of user devices to which a program is being delivered over unicast channels; and means for dynamically establishing a multicast channel when the count exceeds a threshold value. 64. The apparatus of claim 60, wherein the bearer paths are set up over a plurality of distribution networks, the distribution networks using different access technologies. 65. The apparatus of claim 60, wherein the bearer paths used to deliver a multicast service to the user devices originate at one of the user devices. 66. The apparatus of claim 60, wherein the apparatus is configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 67. The apparatus of claim 60, wherein the apparatus is configured to provide functionality of a modified Broadcast and Multicast Service (BCMCS) controller component so as to enable 3GPP2 BCMCS signaling protocol transactions to occur over interfaces of one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 68. The apparatus of claim 67, further comprising: means for performing 3GPP2 BCMCS service discovery and announcement functionality by generating a program guide and delivering the program guide to the user devices; means for performing 3GPP2 BCMCS content subscription and information functionality by authenticating and authorizing the user devices and delivering encryption keys and control information in a way compatible to BCMCS transactions performed over the IMS interfaces or the MMD interfaces; means for performing 3GPP2 BCMCS content delivery functionality by having a MRFC functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send control information to a MRFP functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture so as to enable content to be sent content to user devices through a distribution network; means for performing 3GPP2 BCMCS controller discovery functionality by having a S-CSCF functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send user requests to a network entity; means for performing 3GPP2 BCMCS accounting functionality by having a HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture collect accounting records in a manner compatible with BCMCS transactions performed over the interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture; and means for performing 3GPP2 BCMCS subscription profile manager functionality by having a network operator configure user subscription information in a HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 69. The apparatus of claim 67, further comprising: means for implementing an interface between a 3GPP2 BCMCS controller and a user device with a SIP Interface between the network entity and the user device; means for implementing an interface between a 3GPP2 BCMCS controller and a broadcast serving node with a Mb Interface; means for implementing an interface between a 3GPP2 BCMCS controller and a content server with a Mp Interface; means for implementing an interface between a 3GPP2 BCMCS controller and an authenticate, authorize, and accounting (AAA) server with a Sh Interface; and means for implementing an interface between a 3GPP2 BCMCS controller and a subscription profile manager with a Sh interface, wherein each of the SIP Interface, Mb Interface, Mp Interface, Sh Interface is an interface of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 70. A method comprising: enabling a network entity configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture to provide network-mobile multimedia services to user devices, wherein content associated with the multimedia services are stored in a plurality of storage devices in the network. 71. The method of claim 70, wherein a bearer path used to deliver a multimedia service to the user devices is established before an explicit service request is received from a user device. 72. The method of claim 70, wherein enabling comprises receiving from at least one of the user devices a request for authorization to access at least one of the multimedia services. 73. The method of claim 70 further comprising: establishing a multicast channel of a distribution network over which the content is simultaneously delivered to the user devices. 74. The method of claim 73, wherein the establishing is performed by another network entity in response to a request for the content received from at least one of the user devices. 75. A machine-readable medium including machine-executable instructions to cause the machine to: enable a network entity configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture to provide network-mobile multimedia services to user devices, wherein content associated with the multimedia services are stored in a plurality of storage devices in the network. 76. The machine-readable medium of claim 75, wherein a bearer path used to deliver a multimedia service to the user devices is established before an explicit service request is received from a user device. 77. The machine-readable medium of claim 75, wherein the instructions to cause the machine to enable comprise instructions to receive from at least one of the user devices a request for authorization to access at least one of the multimedia services. 78. An apparatus comprising: means for enabling a network entity configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture to provide network-mobile multimedia services to user devices, wherein content associated with the multimedia services are stored in a plurality of storage devices in the network 79. The apparatus of claim 78, wherein a bearer path used to deliver a multimedia service to the user devices is established before an explicit service request is received from a user device. 80. The apparatus of claim 78, wherein the means for enabling comprise means for receiving from at least one of the user devices a request for authorization to access at least one of the multimedia services. 81. A method comprising: providing a common interface through which a network operator-defines service-specific parameters of a plurality of unicast and multicast multimedia services deployed in a distribution network. 82. The method of claim 81, wherein the service-specific parameters are common to all programs associated with the multimedia service. 83. The method of claim 81, wherein the service-specific parameters comprise one or more of the following: transport mode parameters, geographical area parameters, encryption mode parameters, quality of service parameters, network configuration parameters, security and access parameters, announcement parameters, and charging model parameters. 84. The method of claim 81, wherein through the common interface, the network operator defines program-specific parameters of a program associated with the multimedia service. 85. The method of claim 84, wherein the program-specific parameters comprise one or more of the following: a program name, a program identifier, a program availability time, a program start time, a program end time, transport mode parameters, encryption mode parameters, quality of service parameters, application bit rate parameters, and user information that specifies a service profile associated with the program. 86. The method of claim 84, wherein one or more of the program-specific parameters overrides corresponding one or more of the service-specific parameters. 87. The method of claim 81, wherein through the interface, the network operator defines information to generate a program guide that provides a list of programs available for delivery to user devices in communication with the distribution network. 88. The method of claim 81, wherein through the common interface, the network operator defines rendering parameters of a program guide to be displayed on user devices in communication with the distribution network, parameters associated with program guide delivery, and parameters associated with program guide geography. 89. The method of claim 81, wherein the common interface resides on a network entity that is configured to interoperate in a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture or a 3GPP2 Multimedia Domain (MMD) network architecture. 90. A machine-readable medium including machine-executable instructions to cause the machine to: provide a common interface through which a network operator defines service-specific parameters of a plurality of unicast and multicast multimedia services deployed in a distribution network. 91. The machine-readable medium of claim 90, wherein through the common interface, the network operator defines one or more of the following: program-specific parameters of a program associated with the multimedia service; information to generate a program guide that provides a list of programs available for delivery to user devices in communication with the distribution network; and rendering parameters of a program guide to be displayed on user devices in communication with the distribution network, parameters associated with program guide delivery, and parameters associated with program guide geography. 92. The machine-readable medium of claim 90, wherein the common interface resides on a network entity that is configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 93. An apparatus comprising: means for providing a common interface through which a network operator defines service-specific parameters of a plurality of unicast and multicast multimedia services deployed in a distribution network. 94. The apparatus of claim 93, wherein through the common interface, the network operator defines one or more of the following: program-specific parameters of a program associated with the multimedia service; information to generate a program guide that provides a list of programs available for delivery to user devices in communication with the distribution network; and rendering parameters of a program guide to be displayed on user devices in communication with the distribution network, parameters associated with program guide delivery, and parameters associated with program guide geography. 95. The apparatus of claim 93, wherein the common interface resides on a network entity that is configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture.
A network entity controls delivery of information to user devices over bearer paths including unicast channels and multicast channels. The network entity may interoperate in any of a number of network architectures, including 3GPP Internet Protocol Multimedia Subsystem (IMS) and 3GPP2 Multimedia Domain (MMD). The network entity may provide functionality of a modified 3GPP2 Broadcast and Multicast Service (BCMCS) controller component configured to enable BCMCS signaling protocol transactions to occur over 3GPP IMS interfaces and/or 3GPP2 MMD interfaces. A network entity configured to interoperate in a 3GPP IMS and/or 3GPP2 MMD network architecture may provide network-mobile multimedia services to user devices. Content associated with the multimedia services may be stored in storage devices in the network. A common interface through which a network operator defines service-specific parameters of a number of unicast and multicast multimedia services deployed in a distribution network may be provided.1. A method comprising: enabling a network entity to control delivery of information to user devices over bearer paths, the bearer paths comprising unicast channels and multicast channels. 2. The method of claim 1, wherein the enabling comprises: provisioning a multimedia service so that one or more multimedia programs are available for delivery to the user devices. 3. The method of claim 2, wherein the provisioning comprises: for each of the one or more multimedia programs, receiving program-related parameters, network-related parameters, and user-related parameters from a network operator. 4. The method of claim 2, wherein the provisioning comprises: adding the one or more multimedia program to a list of multimedia programs available for delivery to the user devices. 5. The method of claim 1, wherein the enabling comprises: generating a program guide that provides a list of multimedia programs available for delivery to the user devices. 6. The method of claim 1, wherein the enabling comprises: sending to a distribution network control information for use in setting up the bearer paths with the user devices. 7. The method of claim 1, wherein the enabling comprises: sending to at least one of the user devices a program guide that provides a list of multimedia programs available for delivery. 8. The method of claim 7, wherein the program guide is sent upon registration of the at least one of the user devices with a distribution network. 9. The method of claim 7, wherein the program guide is sent in response to a program guide request by the at least one of the user devices. 10. The method of claim 7, wherein the at least one of the user devices is associated with a service profile that identifies one or more multimedia services the at least one of the user devices has access to. 11. The method of claim 1, wherein the enabling comprises: receiving a request for a program from at least one of the user devices; and identifying a transport mode associated with the requested program, the transport mode being one of unicast or multicast. 12. The method of claim 11, wherein the identified transport mode is multicast, and the enabling further comprises: determining whether the requested program is currently being delivered over a multicast channel to which the at least one of the user devices has access, and if so, sending information to the at least one of the user devices to enable the at least one of the user devices to extract the requested program from that multicast channel. 13. The method of claim 11, wherein the identified transport mode is multicast, and the enabling further comprises: determining whether the requested program is currently being delivered over a multicast channel to which the at least one of the user devices has access to, and if not, sending a notification to another network entity to start delivering the requested program over a multicast channel to which the at least one of the user devices has access. 14. The method of claim 11, wherein the enabling further comprises: retrieving a service profile associated with the at least one of the user devices; and taking an action based on the retrieved service profile. 15. The method of claim 14, wherein taking an action comprises one or more of the following: determining whether the at least one of the user devices is capable of accessing the requested program; and identifying a quality of service the at least one of the user devices is subscribed to receive. 16. The method of claim 1, wherein the enabling comprises: maintaining a count of a number of user devices to which a program is being delivered over unicast channels; and dynamically establishing a multicast channel when the count exceeds a threshold value. 17. The method of claim 16, wherein the enabling further comprises: sending a notification to another network entity to start delivering the program over the newly-established multicast channel; and sending information to the user devices to enable the user devices to extract the program from the newly-established multicast channel. 18. The method of claim 1, wherein the bearer paths are set up over a plurality of distribution networks, the distribution networks using different access technologies. 19. The method of claim 18, wherein the bearer paths comprise unicast channels and the distribution networks comprise a Global System for Mobile Communications (GSM) network, a General Packet Radio Service (GPRS) network, a Universal Mobile Telecommunications System (UMTS), an Evolution-Data Optimized (EV-DO) network, a High-Speed Downlink Packet Access network, and a High-Speed Uplink Packet Access network. 20. The method of claim 18, wherein the bearer paths comprise multicast channels and the distribution networks comprise: a cellular multicast network that comprises a Code Division Multiple Access (CDMA) network implementing a Broadcast-Multicast Service (BCMCS) service, and a Global System for Mobile Communications (GSM) network implementing a Multimedia Broadcast/Multicast Service (MBMS) service; a broadband wireless network that comprises a Worldwide Interoperability for Microwave Access (WiMAX) network, and a Wireless Broadband (WiBro) network; a wireless multicast network that comprises a MediaFLO network, a Digital Video Broadcasting—Handheld (DVB-H) network, and a Digital Multimedia Broadcasting network (DMB); and a wired network that comprises a Digital Subscriber Line (DSL) network, a Gigabit Ethernet network, a Frame Relay network, and a cable network. 21. The method of claim 1, wherein the bearer paths used to deliver a multicast service to the user devices originate at one of the user devices. 22. The method of claim 1, wherein the network entity is configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 23. The method of claim 22, wherein the enabling comprises: provisioning a multimedia service so that one or more multimedia programs are available for delivery to the user devices. 24. The method of claim 23, wherein the provisioning comprises: for each of the one or more multimedia programs, receiving program-related parameters, network-related parameters, and user-related parameters from a network operator. 25. The method of claim 23, wherein the provisioning comprises: adding the one or more multimedia program to a list of multimedia programs available for delivery to the user devices. 26. The method of claim 22, wherein the enabling comprises: generating a program guide that provides a list of multimedia programs available for delivery to the user devices. 27. The method of claim 22, wherein the enabling comprises: sending to a distribution network control information for use in setting up the bearer paths with the user devices. 28. The method of claim 22, wherein the enabling comprises: sending to at least one of the user devices a program guide that provides a list of multimedia programs available for delivery. 29. The method of claim 28, wherein the program guide is sent upon registration of the at least one of the user devices with a distribution network. 30. The method of claim 28, wherein the program guide is sent in response to a program guide request by the at least one of the user devices. 31. The method of claim 28, wherein the at least one of the user devices is associated with a service profile that identifies one or more multimedia services the at least one of the user devices has access to. 32. The method of claim 22, wherein the enabling comprises: receiving a request for a program from at least one of the user devices; and identifying a transport mode associated with the requested program, the transport mode being one of unicast or multicast. 33. The method of claim 32, wherein the identified transport mode is multicast, and the enabling further comprises: determining whether the requested program is currently being delivered over a multicast channel to which the at least one of the user devices has access, and if so, sending information to the at least one of the user devices to enable the at least one of the user devices to extract the requested program from that multicast channel. 34. The method of claim 32, wherein the identified transport mode is multicast, and the enabling further comprises: determining whether the requested program is currently being delivered over a multicast channel to which the at least one of the user devices has access to, and if not, sending a notification to another network entity to start delivering the requested program over a multicast channel to which the at least one of the user devices has access. 35. The method of claim 32, wherein the enabling further comprises: retrieving a service profile associated with the at least one of the user devices; and taking an action based on the retrieved service profile. 36. The method of claim 35, wherein taking an action comprises one or more of the following: determining whether the at least one of the user devices is capable of accessing the requested program; and identifying a quality of service the at least one of the user devices is subscribed to receive. 37. The method of claim 22, wherein the enabling comprises: maintaining a count of a number of user devices to which a program is being delivered over unicast channels; and dynamically establishing a multicast channel when the count exceeds a threshold value. 38. The method of claim 37, wherein the enabling further comprises: sending a notification to another network entity to start delivering the program over the newly-established multicast channel; and sending information to the user devices to enable the user devices to extract the program from the newly-established multicast channel. 39. The method of claim 22, wherein the bearer paths are set up over a plurality of distribution networks, the distribution networks using different access technologies. 40. The method of claim 39, wherein the bearer paths comprise unicast channels and the distribution networks comprise a Global System for Mobile Communications (GSM) network, a General Packet Radio Service (GPRS) network, a Universal Mobile Telecommunications System (UMTS), an Evolution-Data Optimized (EV-DO) network, a High-Speed Downlink Packet Access network, and a High-Speed Uplink Packet Access network. 41. The method of claim 39, wherein the bearer paths comprise multicast channels and the distribution networks comprise: a cellular multicast network that comprises a Code Division Multiple Access (CDMA) network implementing a Broadcast-Multicast Service (BCMCS) service, and a Global System for Mobile Communications (GSM) network implementing a Multimedia Broadcast/Multicast Service (MBMS) service; a broadband wireless network that comprises a Worldwide Interoperability for Microwave Access (WiMAX) network, and a Wireless Broadband (WiBro) network; a wireless multicast network that comprises a MediaFLO network, a Digital Video Broadcasting—Handheld (DVB-H) network, and a Digital Multimedia Broadcasting network (DMB); and a wired network that comprises a Digital Subscriber Line (DSL) network, a Gigabit Ethernet network, a Frame Relay network, and a cable network. 42. The method of claim 22, wherein the bearer paths used to deliver a multicast service to the user devices originate at one of the user devices. 43. The method of claim 22, wherein the network entity provides functionality of a modified 3GPP2 Broadcast and Multicast Service (BCMCS) controller component configured to enable BCMCS signaling protocol transactions to occur over interfaces of one of a 3GPP IMS network architecture and a 3GPP2 MMD network architecture. 44. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS service discovery and announcement functionality by generating a program guide and delivering the program guide to the user devices. 45. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS content subscription and information functionality by authenticating and authorizing the user devices and delivering encryption keys and control information in a way compatible to 3GPP2 BCMCS transactions performed over interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 46. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS content delivery functionality by having a MRFC functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send control information to a MRFP functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture so as to enable content to be sent content to user devices through a distribution network. 47. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS controller discovery functionality by having a S-CSCF functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send user requests to a network entity. 48. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS accounting functionality by having an HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture collect accounting records in a manner compatible with BCMCS transactions performed over the interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 49. The method of claim 43, wherein the enabling comprises performing 3GPP2 BCMCS subscription profile manager functionality by having a network operator configure user subscription information in a HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 50. The method of claim 43, wherein: an interface between a 3GPP2 BCMCS controller and a user device is implemented with a SIP Interface between the network entity and the user device; an interface between a 3GPP2 BCMCS controller and a broadcast serving node is implemented with a Mb Interface; an interface between a 3GPP2 BCMCS controller and a content server is implemented with a Mp Interface; an interface between a 3GPP2 BCMCS controller and an authenticate, authorize, and accounting (AAA) server is implemented with a Sh Interface; and an interface between a 3GPP2 BCMCS controller and a subscription profile manager is implemented with a Sh interface, wherein each of the SIP Interface, Mb Interface, Mp Interface, Sh Interface is an interface of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 51. A machine-readable medium including machine-executable instructions to cause the machine to: enable a network entity to control delivery of information to user devices over bearer paths, the bearer paths comprising unicast channels and multicast channels. 52. The machine-readable medium of claim 51, wherein the instructions to cause the machine to enable comprise one or more of the following: instructions to provision a multimedia service so that one or more multimedia programs are available for delivery to the user devices; instructions to generate a program guide that provides a list of multimedia programs available for delivery to the user devices; instructions to send to a distribution network control information for use in setting up the bearer paths with the user devices; and instructions to send to at least one of the user devices a program guide that provides a list of multimedia programs available for delivery. 53. The machine-readable medium of claim 51, wherein the instructions to cause the machine to enable comprise instructions to: receive a request for a program from at least one of the user devices; and identify a transport mode associated with the requested program, the transport mode being one of unicast or multicast. 54. The machine-readable medium of claim 51, wherein the instructions to cause the machine to enable comprise instructions to: maintain a count of a number of user devices to which a program is being delivered over unicast channels; and dynamically-establish a multicast channel when the count exceeds a threshold value. 55. The machine-readable medium of claim 51, wherein the bearer paths are set up over a plurality of distribution networks, the distribution networks using different access technologies. 56. The machine-readable medium of claim 51, wherein the bearer paths used to deliver a multicast service to the user devices originate at one of the user devices. 57. The machine-readable medium of claim 51, wherein the network entity is configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 58. The machine-readable medium of claim 51, wherein the network entity is configured to provide functionality of a modified 3GPP2 Broadcast and Multicast Service (BCMCS) controller component so as to enable BCMCS signaling protocol transactions to occur over interfaces of one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 59. The machine-readable medium of claim 58, wherein the instructions to cause the machine to enable comprise one of more of the following: instructions to perform 3GPP2 BCMCS service discovery and announcement functionality by generating a program guide and delivering the program guide to the user devices; instructions to perform 3GPP2 BCMCS content subscription and information functionality by authenticating and authorizing the user devices and delivering encryption keys and control information in a way compatible to 3GPP2 BCMCS transactions performed over interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture; instructions to perform 3GPP2 BCMCS content delivery functionality by having a MRFC functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send control information to a MRFP functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture so as to enable content to be sent content to user devices through a distribution network; instructions to perform 3GPP2 BCMCS controller discovery functionality by having a S-CSCF functional entity interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send user requests to a network entity; instructions to perform 3GPP2 BCMCS accounting functionality by having a HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture collect accounting records in a manner compatible with BCMCS transactions performed over the interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture; and instructions to perform 3GPP2 BCMCS subscription profile manager functionality by having a network operator configure user subscription information in a HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 60. An apparatus comprising: means for controlling delivery of information to user devices over bearer paths, the bearer paths comprising unicast channels and multicast channels. 61. The apparatus of claim 60, further comprising: means for provisioning a multimedia service so that one or more multimedia programs are available for delivery to the user devices; means for generating a program guide that provides a list of multimedia programs available for delivery to the user devices; means for sending to a distribution network control information for use in setting up the bearer paths with the user devices; and means for sending to at least one of the user devices a program guide that provides a list of multimedia programs available for delivery. 62. The apparatus of claim 60, further comprising: means for receiving a request for a program from at least one of the user devices; and means for identifying a transport mode associated with the requested program, the transport mode being one of unicast or multicast. 63. The apparatus of claim 60, further comprising: means for maintaining a count of a number of user devices to which a program is being delivered over unicast channels; and means for dynamically establishing a multicast channel when the count exceeds a threshold value. 64. The apparatus of claim 60, wherein the bearer paths are set up over a plurality of distribution networks, the distribution networks using different access technologies. 65. The apparatus of claim 60, wherein the bearer paths used to deliver a multicast service to the user devices originate at one of the user devices. 66. The apparatus of claim 60, wherein the apparatus is configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 67. The apparatus of claim 60, wherein the apparatus is configured to provide functionality of a modified Broadcast and Multicast Service (BCMCS) controller component so as to enable 3GPP2 BCMCS signaling protocol transactions to occur over interfaces of one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 68. The apparatus of claim 67, further comprising: means for performing 3GPP2 BCMCS service discovery and announcement functionality by generating a program guide and delivering the program guide to the user devices; means for performing 3GPP2 BCMCS content subscription and information functionality by authenticating and authorizing the user devices and delivering encryption keys and control information in a way compatible to BCMCS transactions performed over the IMS interfaces or the MMD interfaces; means for performing 3GPP2 BCMCS content delivery functionality by having a MRFC functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send control information to a MRFP functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture so as to enable content to be sent content to user devices through a distribution network; means for performing 3GPP2 BCMCS controller discovery functionality by having a S-CSCF functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture send user requests to a network entity; means for performing 3GPP2 BCMCS accounting functionality by having a HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture collect accounting records in a manner compatible with BCMCS transactions performed over the interfaces of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture; and means for performing 3GPP2 BCMCS subscription profile manager functionality by having a network operator configure user subscription information in a HSS functional entity of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 69. The apparatus of claim 67, further comprising: means for implementing an interface between a 3GPP2 BCMCS controller and a user device with a SIP Interface between the network entity and the user device; means for implementing an interface between a 3GPP2 BCMCS controller and a broadcast serving node with a Mb Interface; means for implementing an interface between a 3GPP2 BCMCS controller and a content server with a Mp Interface; means for implementing an interface between a 3GPP2 BCMCS controller and an authenticate, authorize, and accounting (AAA) server with a Sh Interface; and means for implementing an interface between a 3GPP2 BCMCS controller and a subscription profile manager with a Sh interface, wherein each of the SIP Interface, Mb Interface, Mp Interface, Sh Interface is an interface of one of the 3GPP IMS network architecture and the 3GPP2 MMD network architecture. 70. A method comprising: enabling a network entity configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture to provide network-mobile multimedia services to user devices, wherein content associated with the multimedia services are stored in a plurality of storage devices in the network. 71. The method of claim 70, wherein a bearer path used to deliver a multimedia service to the user devices is established before an explicit service request is received from a user device. 72. The method of claim 70, wherein enabling comprises receiving from at least one of the user devices a request for authorization to access at least one of the multimedia services. 73. The method of claim 70 further comprising: establishing a multicast channel of a distribution network over which the content is simultaneously delivered to the user devices. 74. The method of claim 73, wherein the establishing is performed by another network entity in response to a request for the content received from at least one of the user devices. 75. A machine-readable medium including machine-executable instructions to cause the machine to: enable a network entity configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture to provide network-mobile multimedia services to user devices, wherein content associated with the multimedia services are stored in a plurality of storage devices in the network. 76. The machine-readable medium of claim 75, wherein a bearer path used to deliver a multimedia service to the user devices is established before an explicit service request is received from a user device. 77. The machine-readable medium of claim 75, wherein the instructions to cause the machine to enable comprise instructions to receive from at least one of the user devices a request for authorization to access at least one of the multimedia services. 78. An apparatus comprising: means for enabling a network entity configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture to provide network-mobile multimedia services to user devices, wherein content associated with the multimedia services are stored in a plurality of storage devices in the network 79. The apparatus of claim 78, wherein a bearer path used to deliver a multimedia service to the user devices is established before an explicit service request is received from a user device. 80. The apparatus of claim 78, wherein the means for enabling comprise means for receiving from at least one of the user devices a request for authorization to access at least one of the multimedia services. 81. A method comprising: providing a common interface through which a network operator-defines service-specific parameters of a plurality of unicast and multicast multimedia services deployed in a distribution network. 82. The method of claim 81, wherein the service-specific parameters are common to all programs associated with the multimedia service. 83. The method of claim 81, wherein the service-specific parameters comprise one or more of the following: transport mode parameters, geographical area parameters, encryption mode parameters, quality of service parameters, network configuration parameters, security and access parameters, announcement parameters, and charging model parameters. 84. The method of claim 81, wherein through the common interface, the network operator defines program-specific parameters of a program associated with the multimedia service. 85. The method of claim 84, wherein the program-specific parameters comprise one or more of the following: a program name, a program identifier, a program availability time, a program start time, a program end time, transport mode parameters, encryption mode parameters, quality of service parameters, application bit rate parameters, and user information that specifies a service profile associated with the program. 86. The method of claim 84, wherein one or more of the program-specific parameters overrides corresponding one or more of the service-specific parameters. 87. The method of claim 81, wherein through the interface, the network operator defines information to generate a program guide that provides a list of programs available for delivery to user devices in communication with the distribution network. 88. The method of claim 81, wherein through the common interface, the network operator defines rendering parameters of a program guide to be displayed on user devices in communication with the distribution network, parameters associated with program guide delivery, and parameters associated with program guide geography. 89. The method of claim 81, wherein the common interface resides on a network entity that is configured to interoperate in a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture or a 3GPP2 Multimedia Domain (MMD) network architecture. 90. A machine-readable medium including machine-executable instructions to cause the machine to: provide a common interface through which a network operator defines service-specific parameters of a plurality of unicast and multicast multimedia services deployed in a distribution network. 91. The machine-readable medium of claim 90, wherein through the common interface, the network operator defines one or more of the following: program-specific parameters of a program associated with the multimedia service; information to generate a program guide that provides a list of programs available for delivery to user devices in communication with the distribution network; and rendering parameters of a program guide to be displayed on user devices in communication with the distribution network, parameters associated with program guide delivery, and parameters associated with program guide geography. 92. The machine-readable medium of claim 90, wherein the common interface resides on a network entity that is configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture. 93. An apparatus comprising: means for providing a common interface through which a network operator defines service-specific parameters of a plurality of unicast and multicast multimedia services deployed in a distribution network. 94. The apparatus of claim 93, wherein through the common interface, the network operator defines one or more of the following: program-specific parameters of a program associated with the multimedia service; information to generate a program guide that provides a list of programs available for delivery to user devices in communication with the distribution network; and rendering parameters of a program guide to be displayed on user devices in communication with the distribution network, parameters associated with program guide delivery, and parameters associated with program guide geography. 95. The apparatus of claim 93, wherein the common interface resides on a network entity that is configured to interoperate in one of a 3GPP Internet Protocol Multimedia Subsystem (IMS) network architecture and a 3GPP2 Multimedia Domain (MMD) network architecture.
2,400
9,086
9,086
15,784,136
2,458
A method for coordinating distributed network address translation (NAT) in a network within which several logical networks are implemented. The logical networks include several tenant logical networks and at least one service logical network that include service virtual machines (VMs) that are accessed by VMs of the tenant logical networks. The method defines a group of replacement IP address and port number pairs. Each pair is used to uniquely identify a VM across all tenant logical networks. The method sends to at least one host that is hosting a VM of a particular tenant logical network, a set of replacement IP address and port number pairs. Each replacement IP address and port number pair can be used by the host to replace a source IP address and a source port number in a packet that is destined from the particular VM to a VM of the particular service logical network.
1-20. (canceled) 21. For a multi-tenant datacenter, a method of forwarding packets from tenant machines executing on a host computer to a set of one or more service machines used by a plurality of tenants, the method comprising: at the host computer, receiving a packet sent by a first machine of a first tenant that executes on the host computer; based on a determination that the packet is addressed to the set of service machines, replacing a first network address identified as a source network address in a header of the packet with a second network address, as it is possible that the first network address is used by other tenants in the datacenter; and forwarding the packet with the second network address to the set of service machines. 22. The method of claim 21, wherein the packet is a first packet, the method further comprising: at the host computer, receiving a second packet sent by a second machine of a second tenant that executes on the host computer; based on a determination that the second packet is addressed to the set of service machines, replacing a third network address identified as a source network address in a header of the second packet with a fourth network address, as it is possible that the third network address is used by other tenants in the datacenter; and forwarding the second packet with the fourth network address to the set of service machines. 23. The method of claim 22, wherein first and second logical networks are defined for first and second different tenants and the first and third network addresses are defined in the network address space of the first and second logical networks. 24. The method of claim 21, wherein the second network address uniquely identifies the first machine for the set of service machines. 25. The method of claim 21, wherein replacing the first network address comprises selecting the first network address from a plurality of candidate replacement source network addresses provided to the host computer by a set of one or more controllers, in order to replace source network addresses of packets that machines on the host computer send to the set of service machines as it is possible for different machines of tenants to have the same network addresses and this sharing would prevent the set of service machines from differentiating the different machines of different tenants. 26. The method of claim 25 further comprising removing the second network address from the plurality of candidate replacement source network addresses as the second network address is being used to forward a packet of the first machine of the first tenant to the set of service machines. 27. The method of claim 26 further comprising: determining that a session between the first machine and a machine in the set of service machine has ended; and re-assigning the second network address to the plurality of replacement candidate network addresses. 28. The method of claim 25, wherein replacing the first network address further comprises determining that the second network address has not been used for another tenant machine in an ongoing communication session. 29. The method of claim 21 further comprising: at the host computer, receiving, from the set of service machines, a reply packet that has the second network address as a destination network address; replacing the second network address in the reply packet with the first network address; and forwarding the reply packet with the first network address to the first machine. 30. The method of claim 21, wherein the first packet further comprises a media access control (MAC) address of a network address translation (NAT) gateway associated with the host computer, the method further comprising replacing the MAC address of the gateway in the packet with a MAC address of the set of service machines to prevent the first packet from being forwarded to the NAT gateway. 31. A non-transitory machine readable medium storing a program for execution by at least one processing unit of a host computer in a multi-tenant datacenter, the program for forwarding packets from tenant machines executing on a host computer to a set of one or more service machines used by a plurality of tenants, the program comprising: receiving a packet sent by a first machine of a first tenant that executes on the host computer; based on a determination that the packet is addressed to the set of service machines, replacing a first network address identified as a source network address in a header of the packet with a second network address, as it is possible that the first network address is used by other tenants in the datacenter; and forwarding the packet with the second network address to the set of service machines. 32. The non-transitory machine readable medium of claim 31, wherein the packet is a first packet, the program further comprising sets of instructions for: receiving a second packet sent by a second machine of a second tenant that executes on the host computer; based on a determination that the second packet is addressed to the set of service machines, replacing a third network address identified as a source network address in a header of the second packet with a fourth network address, as it is possible that the third network address is used by other tenants in the datacenter; and forwarding the second packet with the fourth network address to the set of service machines. 33. The non-transitory machine readable medium of claim 32, wherein first and second logical networks are defined for first and second different tenants and the first and third network addresses are defined in the network address space of the first and second logical networks. 34. The non-transitory machine readable medium of claim 31, wherein the second network address uniquely identifies the first machine for the set of service machines. 35. The non-transitory machine readable medium of claim 31, wherein the set of instructions for replacing the first network address comprises a set of instructions for selecting the first network address from a plurality of candidate replacement source network addresses provided to the host computer by a set of one or more controllers, in order to replace source network addresses of packets that machines on the host computer send to the set of service machines as it is possible for different machines of tenants to have the same network addresses and this sharing would prevent the set of service machines from differentiating the different machines of different tenants. 36. The non-transitory machine readable medium of claim 35, wherein the program further comprises a set of instructions for removing the second network address from the plurality of candidate replacement source network addresses as the second network address is being used to forward a packet of the first machine of the first tenant to the set of service machines. 37. The non-transitory machine readable medium of claim 36, wherein the program further comprises sets of instructions: determining that a session between the first machine and a machine in the set of service machine has ended; and re-assigning the second network address to the plurality of replacement candidate network addresses. 38. The non-transitory machine readable medium of claim 35, wherein the set of instructions for replacing the first network address further comprises a set of instructions for determining that the second network address has not been used for another tenant machine in an ongoing communication session. 39. The non-transitory machine readable medium of claim, wherein the program further comprises sets of instructions: receiving, from the set of service machines, a reply packet that has the second network address as a destination network address; replacing the second network address in the reply packet with the first network address; and forwarding the reply packet with the first network address to the first machine. 40. The non-transitory machine readable medium of claim 31, wherein the first packet further comprises a media access control (MAC) address of a network address translation (NAT) gateway associated with the host computer, the program further comprises a set of instructions for replacing the MAC address of the gateway in the packet with a MAC address of the set of service machines to prevent the first packet from being forwarded to the NAT gateway.
A method for coordinating distributed network address translation (NAT) in a network within which several logical networks are implemented. The logical networks include several tenant logical networks and at least one service logical network that include service virtual machines (VMs) that are accessed by VMs of the tenant logical networks. The method defines a group of replacement IP address and port number pairs. Each pair is used to uniquely identify a VM across all tenant logical networks. The method sends to at least one host that is hosting a VM of a particular tenant logical network, a set of replacement IP address and port number pairs. Each replacement IP address and port number pair can be used by the host to replace a source IP address and a source port number in a packet that is destined from the particular VM to a VM of the particular service logical network.1-20. (canceled) 21. For a multi-tenant datacenter, a method of forwarding packets from tenant machines executing on a host computer to a set of one or more service machines used by a plurality of tenants, the method comprising: at the host computer, receiving a packet sent by a first machine of a first tenant that executes on the host computer; based on a determination that the packet is addressed to the set of service machines, replacing a first network address identified as a source network address in a header of the packet with a second network address, as it is possible that the first network address is used by other tenants in the datacenter; and forwarding the packet with the second network address to the set of service machines. 22. The method of claim 21, wherein the packet is a first packet, the method further comprising: at the host computer, receiving a second packet sent by a second machine of a second tenant that executes on the host computer; based on a determination that the second packet is addressed to the set of service machines, replacing a third network address identified as a source network address in a header of the second packet with a fourth network address, as it is possible that the third network address is used by other tenants in the datacenter; and forwarding the second packet with the fourth network address to the set of service machines. 23. The method of claim 22, wherein first and second logical networks are defined for first and second different tenants and the first and third network addresses are defined in the network address space of the first and second logical networks. 24. The method of claim 21, wherein the second network address uniquely identifies the first machine for the set of service machines. 25. The method of claim 21, wherein replacing the first network address comprises selecting the first network address from a plurality of candidate replacement source network addresses provided to the host computer by a set of one or more controllers, in order to replace source network addresses of packets that machines on the host computer send to the set of service machines as it is possible for different machines of tenants to have the same network addresses and this sharing would prevent the set of service machines from differentiating the different machines of different tenants. 26. The method of claim 25 further comprising removing the second network address from the plurality of candidate replacement source network addresses as the second network address is being used to forward a packet of the first machine of the first tenant to the set of service machines. 27. The method of claim 26 further comprising: determining that a session between the first machine and a machine in the set of service machine has ended; and re-assigning the second network address to the plurality of replacement candidate network addresses. 28. The method of claim 25, wherein replacing the first network address further comprises determining that the second network address has not been used for another tenant machine in an ongoing communication session. 29. The method of claim 21 further comprising: at the host computer, receiving, from the set of service machines, a reply packet that has the second network address as a destination network address; replacing the second network address in the reply packet with the first network address; and forwarding the reply packet with the first network address to the first machine. 30. The method of claim 21, wherein the first packet further comprises a media access control (MAC) address of a network address translation (NAT) gateway associated with the host computer, the method further comprising replacing the MAC address of the gateway in the packet with a MAC address of the set of service machines to prevent the first packet from being forwarded to the NAT gateway. 31. A non-transitory machine readable medium storing a program for execution by at least one processing unit of a host computer in a multi-tenant datacenter, the program for forwarding packets from tenant machines executing on a host computer to a set of one or more service machines used by a plurality of tenants, the program comprising: receiving a packet sent by a first machine of a first tenant that executes on the host computer; based on a determination that the packet is addressed to the set of service machines, replacing a first network address identified as a source network address in a header of the packet with a second network address, as it is possible that the first network address is used by other tenants in the datacenter; and forwarding the packet with the second network address to the set of service machines. 32. The non-transitory machine readable medium of claim 31, wherein the packet is a first packet, the program further comprising sets of instructions for: receiving a second packet sent by a second machine of a second tenant that executes on the host computer; based on a determination that the second packet is addressed to the set of service machines, replacing a third network address identified as a source network address in a header of the second packet with a fourth network address, as it is possible that the third network address is used by other tenants in the datacenter; and forwarding the second packet with the fourth network address to the set of service machines. 33. The non-transitory machine readable medium of claim 32, wherein first and second logical networks are defined for first and second different tenants and the first and third network addresses are defined in the network address space of the first and second logical networks. 34. The non-transitory machine readable medium of claim 31, wherein the second network address uniquely identifies the first machine for the set of service machines. 35. The non-transitory machine readable medium of claim 31, wherein the set of instructions for replacing the first network address comprises a set of instructions for selecting the first network address from a plurality of candidate replacement source network addresses provided to the host computer by a set of one or more controllers, in order to replace source network addresses of packets that machines on the host computer send to the set of service machines as it is possible for different machines of tenants to have the same network addresses and this sharing would prevent the set of service machines from differentiating the different machines of different tenants. 36. The non-transitory machine readable medium of claim 35, wherein the program further comprises a set of instructions for removing the second network address from the plurality of candidate replacement source network addresses as the second network address is being used to forward a packet of the first machine of the first tenant to the set of service machines. 37. The non-transitory machine readable medium of claim 36, wherein the program further comprises sets of instructions: determining that a session between the first machine and a machine in the set of service machine has ended; and re-assigning the second network address to the plurality of replacement candidate network addresses. 38. The non-transitory machine readable medium of claim 35, wherein the set of instructions for replacing the first network address further comprises a set of instructions for determining that the second network address has not been used for another tenant machine in an ongoing communication session. 39. The non-transitory machine readable medium of claim, wherein the program further comprises sets of instructions: receiving, from the set of service machines, a reply packet that has the second network address as a destination network address; replacing the second network address in the reply packet with the first network address; and forwarding the reply packet with the first network address to the first machine. 40. The non-transitory machine readable medium of claim 31, wherein the first packet further comprises a media access control (MAC) address of a network address translation (NAT) gateway associated with the host computer, the program further comprises a set of instructions for replacing the MAC address of the gateway in the packet with a MAC address of the set of service machines to prevent the first packet from being forwarded to the NAT gateway.
2,400
9,087
9,087
15,361,781
2,476
Apparatus including, and methods of operating a communications network having a common data bus communicatively coupled to control devices, non-control devices, and network appliances. The control devices control corresponding equipment components of a well construction system. One of the network appliances implements a gateway disposed between the common data bus and a corresponding control device and/or non-control device to translate communications to a common protocol for transmission on the common data bus. One of the network appliances implements a firewall disposed between the common data bus and a corresponding non-control device to permit or prohibit communications to be transmitted to the common data bus.
1. An apparatus comprising: a communications network including a common data bus communicatively coupled to a plurality of control devices, a plurality of non-control devices, and a plurality of network appliances, wherein: the control devices are configured to control corresponding ones of a plurality of equipment components of a well construction system; one or more of the network appliances are configured to implement one or more gateways; one or more of the gateways are respectively disposed between the common data bus and a corresponding one or more of the control devices and/or a corresponding one or more of the non-control devices to translate communications to a common protocol for transmission on the common data bus; one or more of the network appliances is configured to implement one or more firewalls; and one or more of the firewalls are respectively disposed between the common data bus and a corresponding one or more of the non-control devices to permit or prohibit communications to be transmitted to the common data bus. 2. The apparatus of claim 1 wherein: one or more of the network appliances are configured to implement a plurality of virtual networks within the communications network; a first virtual network of the virtual networks includes at least some of the control devices; and a second virtual network of the virtual networks includes at least some of the non-control devices and does not include the control devices. 3. The apparatus of claim 2 wherein the network appliances include switches configured to implement the plurality of virtual networks. 4. The apparatus of claim 1 wherein the network appliances are each configured to implement an access list for permitting and prohibiting communications to the common data bus. 5. The apparatus of claim 1 wherein the common data bus includes a physical connection topology among switches, and wherein the switches are at least some of the network appliances. 6. The apparatus of claim 5 wherein the physical connection topology is a ring topology among the switches. 7. The apparatus of claim 1 wherein: the control devices are configured to transmit communications according to one or more real-time communication protocols; and the non-control devices are configured to transmit communications according to one or more non-real-time communication protocols. 8. The apparatus of claim 1 wherein: the network appliances include resources dedicated for communications from the control devices that are not available for communications from the non-control devices; and the network appliances include resources available for communications from the non-control devices. 9. The apparatus of claim 8 wherein the network appliances are configured to implement a prioritization and queuing scheme for communications from the non-control devices. 10. An apparatus comprising: a plurality of equipment controllers each controlling operation of corresponding ones of a plurality of well construction equipment components; a plurality of non-control devices each not operable to control operation of well construction equipment; and a physical network including network appliances communicatively coupled to the equipment controllers and the non-control devices, wherein: the physical network includes a common data bus; one or more gateways are implemented via one or more of the network appliances and translate communications to a common protocol for transmission on the common data bus, wherein the equipment controllers and the non-control devices are each communicatively coupled with the common data bus via at least one corresponding one of the one or more gateways; and one or more firewalls are implemented via one or more of the network appliances and control which communications are transmitted to the common data bus, wherein the non-control devices are each communicatively coupled with the common data bus via at least one corresponding one of the one or more firewalls, and wherein no firewall is communicatively disposed between the common data bus and the equipment controllers. 11. The apparatus of claim 10 wherein the network appliances include switches that implement a plurality of virtual networks; 12. The apparatus of claim 10 wherein: the equipment controllers transmit communications according to one or more real-time communication protocols; and the non-control devices transmit communications according to one or more non-real-time communication protocols. 13. The apparatus of claim 10 wherein the network appliances include resources dedicated for communications from the equipment controllers that are not available for communications from the non-control devices. 14. A method comprising: operating a communications network, wherein the communications network comprises a common data bus communicatively coupled to a plurality of network appliances, a plurality of non-control devices, and a plurality of control devices configured to at least partially control corresponding ones of a plurality of components of equipment of a well construction system, and wherein operating the communications network comprises: operating one or more gateways on one or more of the network appliances, including: translating communications from the control devices and non-control devices to a common protocol; and transmitting the translated communications towards the common data bus; and operating one or more firewalls on one or more of the network appliances, including: determining whether to permit communications from the non-control devices to be transmitted to the common data bus; and transmitting the permitted communications towards the common data bus. 15. The method of claim 14 wherein operating the communications network further comprises operating one or more switches on one or more of the network appliances, wherein: operating the one or more switches includes operating a plurality of virtual networks within the communications network; a first virtual network of the virtual networks includes at least some of the control devices; and a second virtual network of the virtual networks includes at least some of the non-control devices and does not include the control devices. 16. The method of claim 14 wherein operating the communications network further comprises operating one or more switches on one or more of the network appliances, and wherein operating the one or more gateways and the one or more switches includes implementing an access list for permitting and prohibiting communications to the common data bus. 17. The method of claim 14 wherein the common data bus includes a physical connection topology among switches, and wherein the switches are at least some of the network appliances. 18. The method of claim 14 wherein: the control devices transmit communications according to one or more real-time communication protocols; and the non-control devices transmit communications according to one or more non-real-time communication protocols. 19. The method of claim 14 wherein the network appliances include resources dedicated for communications from the control devices that are not available for communications from the non-control devices. 20. The method of claim 14 wherein the network appliances implement a prioritization and queuing scheme for communications from the one or more of the non-control devices.
Apparatus including, and methods of operating a communications network having a common data bus communicatively coupled to control devices, non-control devices, and network appliances. The control devices control corresponding equipment components of a well construction system. One of the network appliances implements a gateway disposed between the common data bus and a corresponding control device and/or non-control device to translate communications to a common protocol for transmission on the common data bus. One of the network appliances implements a firewall disposed between the common data bus and a corresponding non-control device to permit or prohibit communications to be transmitted to the common data bus.1. An apparatus comprising: a communications network including a common data bus communicatively coupled to a plurality of control devices, a plurality of non-control devices, and a plurality of network appliances, wherein: the control devices are configured to control corresponding ones of a plurality of equipment components of a well construction system; one or more of the network appliances are configured to implement one or more gateways; one or more of the gateways are respectively disposed between the common data bus and a corresponding one or more of the control devices and/or a corresponding one or more of the non-control devices to translate communications to a common protocol for transmission on the common data bus; one or more of the network appliances is configured to implement one or more firewalls; and one or more of the firewalls are respectively disposed between the common data bus and a corresponding one or more of the non-control devices to permit or prohibit communications to be transmitted to the common data bus. 2. The apparatus of claim 1 wherein: one or more of the network appliances are configured to implement a plurality of virtual networks within the communications network; a first virtual network of the virtual networks includes at least some of the control devices; and a second virtual network of the virtual networks includes at least some of the non-control devices and does not include the control devices. 3. The apparatus of claim 2 wherein the network appliances include switches configured to implement the plurality of virtual networks. 4. The apparatus of claim 1 wherein the network appliances are each configured to implement an access list for permitting and prohibiting communications to the common data bus. 5. The apparatus of claim 1 wherein the common data bus includes a physical connection topology among switches, and wherein the switches are at least some of the network appliances. 6. The apparatus of claim 5 wherein the physical connection topology is a ring topology among the switches. 7. The apparatus of claim 1 wherein: the control devices are configured to transmit communications according to one or more real-time communication protocols; and the non-control devices are configured to transmit communications according to one or more non-real-time communication protocols. 8. The apparatus of claim 1 wherein: the network appliances include resources dedicated for communications from the control devices that are not available for communications from the non-control devices; and the network appliances include resources available for communications from the non-control devices. 9. The apparatus of claim 8 wherein the network appliances are configured to implement a prioritization and queuing scheme for communications from the non-control devices. 10. An apparatus comprising: a plurality of equipment controllers each controlling operation of corresponding ones of a plurality of well construction equipment components; a plurality of non-control devices each not operable to control operation of well construction equipment; and a physical network including network appliances communicatively coupled to the equipment controllers and the non-control devices, wherein: the physical network includes a common data bus; one or more gateways are implemented via one or more of the network appliances and translate communications to a common protocol for transmission on the common data bus, wherein the equipment controllers and the non-control devices are each communicatively coupled with the common data bus via at least one corresponding one of the one or more gateways; and one or more firewalls are implemented via one or more of the network appliances and control which communications are transmitted to the common data bus, wherein the non-control devices are each communicatively coupled with the common data bus via at least one corresponding one of the one or more firewalls, and wherein no firewall is communicatively disposed between the common data bus and the equipment controllers. 11. The apparatus of claim 10 wherein the network appliances include switches that implement a plurality of virtual networks; 12. The apparatus of claim 10 wherein: the equipment controllers transmit communications according to one or more real-time communication protocols; and the non-control devices transmit communications according to one or more non-real-time communication protocols. 13. The apparatus of claim 10 wherein the network appliances include resources dedicated for communications from the equipment controllers that are not available for communications from the non-control devices. 14. A method comprising: operating a communications network, wherein the communications network comprises a common data bus communicatively coupled to a plurality of network appliances, a plurality of non-control devices, and a plurality of control devices configured to at least partially control corresponding ones of a plurality of components of equipment of a well construction system, and wherein operating the communications network comprises: operating one or more gateways on one or more of the network appliances, including: translating communications from the control devices and non-control devices to a common protocol; and transmitting the translated communications towards the common data bus; and operating one or more firewalls on one or more of the network appliances, including: determining whether to permit communications from the non-control devices to be transmitted to the common data bus; and transmitting the permitted communications towards the common data bus. 15. The method of claim 14 wherein operating the communications network further comprises operating one or more switches on one or more of the network appliances, wherein: operating the one or more switches includes operating a plurality of virtual networks within the communications network; a first virtual network of the virtual networks includes at least some of the control devices; and a second virtual network of the virtual networks includes at least some of the non-control devices and does not include the control devices. 16. The method of claim 14 wherein operating the communications network further comprises operating one or more switches on one or more of the network appliances, and wherein operating the one or more gateways and the one or more switches includes implementing an access list for permitting and prohibiting communications to the common data bus. 17. The method of claim 14 wherein the common data bus includes a physical connection topology among switches, and wherein the switches are at least some of the network appliances. 18. The method of claim 14 wherein: the control devices transmit communications according to one or more real-time communication protocols; and the non-control devices transmit communications according to one or more non-real-time communication protocols. 19. The method of claim 14 wherein the network appliances include resources dedicated for communications from the control devices that are not available for communications from the non-control devices. 20. The method of claim 14 wherein the network appliances implement a prioritization and queuing scheme for communications from the one or more of the non-control devices.
2,400
9,088
9,088
15,398,057
2,447
A method for execution by a dispersed storage and task (DST) processing unit includes executing a modification of a first locally cached item. A first cache broadcast is generated for transmission via a network to a plurality of additional DST processing units in response to executing the modification. Revision data is generated by evaluating a first local revision level of a second locally cached item. An update of the second locally cached item is executed when the revision data indicates that the second locally cached item is outdated.
1. A method for execution by a dispersed storage and task (DST) processing unit that includes a processor, the method comprises: executing a modification of a first locally cached item; generating a first cache broadcast for transmission via a network to a plurality of additional DST processing units in response to executing the modification; generating revision data by evaluating a first local revision level of a second locally cached item; and executing an update of the second locally cached item when the revision data indicates that the second locally cached item is outdated. 2. The method of claim 1, wherein the first locally cached item includes at least one of: a data object, an index node of a dispersed hierarchical index, or an encoded data slice. 3. The method of claim 1, wherein the first cache broadcast includes at least one of: the first locally cached item or an item identifier corresponding to the first locally cached item. 4. The method of claim 1, wherein the first cache broadcast includes at least one of: a second local revision level corresponding to the first locally cached item or a timestamp associated with the modification. 5. The method of claim 1, wherein the revision data is generated in response to at least one of: receiving an access request or interpreting an access prediction to indicate that access is likely. 6. The method of claim 1, further comprising: receiving a second cache broadcast via the network from one of the plurality of additional DST processing units, wherein the second cache broadcast includes a non-local revision level associated with the second locally cached item; wherein generating the revision data includes comparing the first local revision level to the non-local revision level. 7. The method of claim 6, wherein the revision data indicates that the second locally cached item is outdated when the first local revision level compares unfavorably to the non-local revision level. 8. The method of claim 6, further comprising: receiving a plurality of second cache broadcasts from the plurality of additional DST processing units; wherein generating the revision data includes comparing the first local revision level to a plurality of non-local revision levels included in the received plurality of second cache broadcasts. 9. The method of claim 1, wherein executing the update includes determining a time frame to perform the update and performing the update in the determined time frame. 10. The method of claim 1, wherein executing the update includes: generating a request for a current version of the second locally cached item for transmission via the network to one of the plurality of additional DST processing units; receiving the current version of the second locally cached item from the one of the plurality of additional DST processing units via the network in response; and updating the second locally cached item based on the received current version. 11. A processing system of a dispersed storage and task (DST) processing unit comprises: at least one processor; a memory that stores operational instructions, that when executed by the at least one processor cause the processing system to: execute a modification of a first locally cached item; generate a first cache broadcast for transmission via a network to a plurality of additional DST processing units in response to executing the modification; generate revision data by evaluating a first local revision level of a second locally cached item; and execute an update of the second locally cached item when the revision data indicates that the second locally cached item is outdated. 12. The processing system of claim 11, wherein the first locally cached item includes at least one of: a data object, an index node of a dispersed hierarchical index, or an encoded data slice. 13. The processing system of claim 11, wherein the first cache broadcast includes at least one of: the first locally cached item or an item identifier corresponding to the first locally cached item. 14. The processing system of claim 11, wherein the first cache broadcast includes at least one of: a second local revision level corresponding to the first locally cached item or a timestamp associated with the modification. 15. The processing system of claim 11, wherein the revision data is generated in response to at least one of: receiving an access request or interpreting an access prediction to indicate that access is likely. 16. The processing system of claim 11, wherein the operational instruction, when executed by the at least one processor, further cause the processing system to: receive a second cache broadcast via the network from one of the plurality of additional DST processing units, wherein the second cache broadcast includes a non-local revision level associated with the second locally cached item; wherein generating the revision data includes comparing the first local revision level to the non-local revision level. 17. The processing system of claim 16, wherein the revision data indicates that the second locally cached item is outdated when the first local revision level compares unfavorably to the non-local revision level. 18. The processing system of claim 16, wherein the operational instruction, when executed by the at least one processor, further cause the processing system to: receive a plurality of second cache broadcasts from the plurality of additional DST processing units; wherein generating the revision data includes comparing the first local revision level to a plurality of non-local revision levels included in the received plurality of second cache broadcasts. 19. The processing system of claim 11, wherein the operational instruction, when executed by the at least one processor, further cause the processing system to: generate a request for a current version of the second locally cached item for transmission via the network to one of the plurality of additional DST processing units; receive the current version of the second locally cached item from the one of the plurality of additional DST processing units via the network in response; and update the second locally cached item based on the received current version. 20. A non-transitory computer readable storage medium comprises: at least one memory section that stores operational instructions that, when executed by a processing system of a dispersed storage network (DSN) that includes a processor and a memory, causes the processing system to: execute a modification of a first locally cached item; generate a first cache broadcast for transmission via a network to a plurality of additional DST processing units in response to executing the modification; generate revision data by evaluating a first local revision level of a second locally cached item; and execute an update of the second locally cached item when the revision data indicates that the second locally cached item is outdated.
A method for execution by a dispersed storage and task (DST) processing unit includes executing a modification of a first locally cached item. A first cache broadcast is generated for transmission via a network to a plurality of additional DST processing units in response to executing the modification. Revision data is generated by evaluating a first local revision level of a second locally cached item. An update of the second locally cached item is executed when the revision data indicates that the second locally cached item is outdated.1. A method for execution by a dispersed storage and task (DST) processing unit that includes a processor, the method comprises: executing a modification of a first locally cached item; generating a first cache broadcast for transmission via a network to a plurality of additional DST processing units in response to executing the modification; generating revision data by evaluating a first local revision level of a second locally cached item; and executing an update of the second locally cached item when the revision data indicates that the second locally cached item is outdated. 2. The method of claim 1, wherein the first locally cached item includes at least one of: a data object, an index node of a dispersed hierarchical index, or an encoded data slice. 3. The method of claim 1, wherein the first cache broadcast includes at least one of: the first locally cached item or an item identifier corresponding to the first locally cached item. 4. The method of claim 1, wherein the first cache broadcast includes at least one of: a second local revision level corresponding to the first locally cached item or a timestamp associated with the modification. 5. The method of claim 1, wherein the revision data is generated in response to at least one of: receiving an access request or interpreting an access prediction to indicate that access is likely. 6. The method of claim 1, further comprising: receiving a second cache broadcast via the network from one of the plurality of additional DST processing units, wherein the second cache broadcast includes a non-local revision level associated with the second locally cached item; wherein generating the revision data includes comparing the first local revision level to the non-local revision level. 7. The method of claim 6, wherein the revision data indicates that the second locally cached item is outdated when the first local revision level compares unfavorably to the non-local revision level. 8. The method of claim 6, further comprising: receiving a plurality of second cache broadcasts from the plurality of additional DST processing units; wherein generating the revision data includes comparing the first local revision level to a plurality of non-local revision levels included in the received plurality of second cache broadcasts. 9. The method of claim 1, wherein executing the update includes determining a time frame to perform the update and performing the update in the determined time frame. 10. The method of claim 1, wherein executing the update includes: generating a request for a current version of the second locally cached item for transmission via the network to one of the plurality of additional DST processing units; receiving the current version of the second locally cached item from the one of the plurality of additional DST processing units via the network in response; and updating the second locally cached item based on the received current version. 11. A processing system of a dispersed storage and task (DST) processing unit comprises: at least one processor; a memory that stores operational instructions, that when executed by the at least one processor cause the processing system to: execute a modification of a first locally cached item; generate a first cache broadcast for transmission via a network to a plurality of additional DST processing units in response to executing the modification; generate revision data by evaluating a first local revision level of a second locally cached item; and execute an update of the second locally cached item when the revision data indicates that the second locally cached item is outdated. 12. The processing system of claim 11, wherein the first locally cached item includes at least one of: a data object, an index node of a dispersed hierarchical index, or an encoded data slice. 13. The processing system of claim 11, wherein the first cache broadcast includes at least one of: the first locally cached item or an item identifier corresponding to the first locally cached item. 14. The processing system of claim 11, wherein the first cache broadcast includes at least one of: a second local revision level corresponding to the first locally cached item or a timestamp associated with the modification. 15. The processing system of claim 11, wherein the revision data is generated in response to at least one of: receiving an access request or interpreting an access prediction to indicate that access is likely. 16. The processing system of claim 11, wherein the operational instruction, when executed by the at least one processor, further cause the processing system to: receive a second cache broadcast via the network from one of the plurality of additional DST processing units, wherein the second cache broadcast includes a non-local revision level associated with the second locally cached item; wherein generating the revision data includes comparing the first local revision level to the non-local revision level. 17. The processing system of claim 16, wherein the revision data indicates that the second locally cached item is outdated when the first local revision level compares unfavorably to the non-local revision level. 18. The processing system of claim 16, wherein the operational instruction, when executed by the at least one processor, further cause the processing system to: receive a plurality of second cache broadcasts from the plurality of additional DST processing units; wherein generating the revision data includes comparing the first local revision level to a plurality of non-local revision levels included in the received plurality of second cache broadcasts. 19. The processing system of claim 11, wherein the operational instruction, when executed by the at least one processor, further cause the processing system to: generate a request for a current version of the second locally cached item for transmission via the network to one of the plurality of additional DST processing units; receive the current version of the second locally cached item from the one of the plurality of additional DST processing units via the network in response; and update the second locally cached item based on the received current version. 20. A non-transitory computer readable storage medium comprises: at least one memory section that stores operational instructions that, when executed by a processing system of a dispersed storage network (DSN) that includes a processor and a memory, causes the processing system to: execute a modification of a first locally cached item; generate a first cache broadcast for transmission via a network to a plurality of additional DST processing units in response to executing the modification; generate revision data by evaluating a first local revision level of a second locally cached item; and execute an update of the second locally cached item when the revision data indicates that the second locally cached item is outdated.
2,400
9,089
9,089
15,826,214
2,419
The disclosed embodiments include systems and methods for providing a notification upon the occurrence of a trigger event associated with playing media content over a network. An exemplary method may include transmitting access to a media content data file to a computing device associated with a content receiver, playing the data file at the computing device, and transmitting an electronic notification to another computing device when the trigger event occurs.
1. A computer-implemented method comprising: storing, on a server, a trigger event associated with a video file that is playable over a network, the trigger event occurring on the video file after video file has started playing; detecting, by the server over the network, that the video file has been played by a first computing device over the network; registering, by the server, when the trigger event occurs; and transmitting, by the server, an electronic notification over the network to a second computing device when the trigger event is registered by the server. 2. The computer-implemented method of claim 1, wherein the trigger event is playing a predetermined portion of video content in the video file. 3. The computer-implemented method of claim 1, wherein the video file includes a play time component and the trigger event is a preselected time of the play time component. 4. The computer-implemented method of claim 1, further comprising sending, by the server, an electronic message from the second computing device to the first computing device after transmitting the electronic notification. 5. The computer-implemented method of claim 1, wherein the server includes a plurality of pre-programmed electronic messages pertaining to the video file and the method further comprises receiving, by the server over the network, instructions from the second computing device to transmit at least one of the pre-programmed electronic messages to the first computing device. 6. The computer-implemented method of claim 1, wherein the video content data file is stored on a media content database in communication with a website providing access to the video file over the network. 7. A computer system comprising: non-transitory memory storing computer program instructions; at least one processor configured to execute the computer program instructions to: store, on a server, a trigger event associated with a video file that is playable over a network, the trigger event occurring on the video file after video file has started playing; detect, by the server over the network, that the video file has been played by a first computing device over the network; register, by the server, when the trigger event occurs; and transmit, by the server, an electronic notification over the network to a second computing device when the trigger event is registered by the server, the electronic notification indicating the occurrence of the trigger event. 8. The computer system of claim 7, wherein the processor is also configured to execute the computer program instructions to send, by the server, an electronic message from the second computing device to the first computing device after transmitting the electronic notification. 9. The computer system of claim 7, wherein the server includes a plurality of pre-programmed electronic messages pertaining to the video file and the processor is also configured to execute the computer program instructions to receive, by the server over the network, instructions from the second computing device to transmit at least one of the pre-programmed electronic messages to the first computing device. 10. The computer system of claim 7, wherein the video file is stored on a media content database in communication with a website providing access to the video content data file over the network. 11. The computer system of claim 7, wherein the video file includes a play time component and the trigger event is a preselected time of the play time component. 12. The computer system of claim 7, wherein the trigger event is playing a predetermined portion of video content in the video file. 13. A server comprising: non-transitory memory storing computer program instructions; at least one processor configured to execute the computer program instructions to: store, on a server, a trigger event associated with a video content data file that is playable over a network, the trigger event occurring on the video file after video file has started playing; detect, by the server over the network, that the video content data file has been played by a first computing device over the network; register, by the server, when the trigger event occurs; and transmit, by the server, an electronic notification over the network to a second computing device when the trigger event is registered by the server, the electronic notification indicating the occurrence of the trigger event. 14. The server of claim 13, wherein the processor is also configured to execute the computer program instructions to send, by the server, an electronic message from the second computing device to the first computing device after transmitting the electronic notification. 15. The server of claim 13, wherein the server includes a plurality of pre-programmed electronic messages pertaining to the video file and the processor is also configured to execute the computer program instructions to receive, by the server over the network, instructions from the second computing device to transmit at least one of the pre-programmed electronic messages to the first computing device. 16. The server of claim 13, wherein the video content data file is stored on a media content database in communication with a website providing access to the video file over the network. 17. The server of claim 13, wherein the video file includes a play time component and the trigger event is a preselected time of the play time component. 18. The server of claim 13, wherein the trigger event is playing a predetermined portion of video content in the video file.
The disclosed embodiments include systems and methods for providing a notification upon the occurrence of a trigger event associated with playing media content over a network. An exemplary method may include transmitting access to a media content data file to a computing device associated with a content receiver, playing the data file at the computing device, and transmitting an electronic notification to another computing device when the trigger event occurs.1. A computer-implemented method comprising: storing, on a server, a trigger event associated with a video file that is playable over a network, the trigger event occurring on the video file after video file has started playing; detecting, by the server over the network, that the video file has been played by a first computing device over the network; registering, by the server, when the trigger event occurs; and transmitting, by the server, an electronic notification over the network to a second computing device when the trigger event is registered by the server. 2. The computer-implemented method of claim 1, wherein the trigger event is playing a predetermined portion of video content in the video file. 3. The computer-implemented method of claim 1, wherein the video file includes a play time component and the trigger event is a preselected time of the play time component. 4. The computer-implemented method of claim 1, further comprising sending, by the server, an electronic message from the second computing device to the first computing device after transmitting the electronic notification. 5. The computer-implemented method of claim 1, wherein the server includes a plurality of pre-programmed electronic messages pertaining to the video file and the method further comprises receiving, by the server over the network, instructions from the second computing device to transmit at least one of the pre-programmed electronic messages to the first computing device. 6. The computer-implemented method of claim 1, wherein the video content data file is stored on a media content database in communication with a website providing access to the video file over the network. 7. A computer system comprising: non-transitory memory storing computer program instructions; at least one processor configured to execute the computer program instructions to: store, on a server, a trigger event associated with a video file that is playable over a network, the trigger event occurring on the video file after video file has started playing; detect, by the server over the network, that the video file has been played by a first computing device over the network; register, by the server, when the trigger event occurs; and transmit, by the server, an electronic notification over the network to a second computing device when the trigger event is registered by the server, the electronic notification indicating the occurrence of the trigger event. 8. The computer system of claim 7, wherein the processor is also configured to execute the computer program instructions to send, by the server, an electronic message from the second computing device to the first computing device after transmitting the electronic notification. 9. The computer system of claim 7, wherein the server includes a plurality of pre-programmed electronic messages pertaining to the video file and the processor is also configured to execute the computer program instructions to receive, by the server over the network, instructions from the second computing device to transmit at least one of the pre-programmed electronic messages to the first computing device. 10. The computer system of claim 7, wherein the video file is stored on a media content database in communication with a website providing access to the video content data file over the network. 11. The computer system of claim 7, wherein the video file includes a play time component and the trigger event is a preselected time of the play time component. 12. The computer system of claim 7, wherein the trigger event is playing a predetermined portion of video content in the video file. 13. A server comprising: non-transitory memory storing computer program instructions; at least one processor configured to execute the computer program instructions to: store, on a server, a trigger event associated with a video content data file that is playable over a network, the trigger event occurring on the video file after video file has started playing; detect, by the server over the network, that the video content data file has been played by a first computing device over the network; register, by the server, when the trigger event occurs; and transmit, by the server, an electronic notification over the network to a second computing device when the trigger event is registered by the server, the electronic notification indicating the occurrence of the trigger event. 14. The server of claim 13, wherein the processor is also configured to execute the computer program instructions to send, by the server, an electronic message from the second computing device to the first computing device after transmitting the electronic notification. 15. The server of claim 13, wherein the server includes a plurality of pre-programmed electronic messages pertaining to the video file and the processor is also configured to execute the computer program instructions to receive, by the server over the network, instructions from the second computing device to transmit at least one of the pre-programmed electronic messages to the first computing device. 16. The server of claim 13, wherein the video content data file is stored on a media content database in communication with a website providing access to the video file over the network. 17. The server of claim 13, wherein the video file includes a play time component and the trigger event is a preselected time of the play time component. 18. The server of claim 13, wherein the trigger event is playing a predetermined portion of video content in the video file.
2,400
9,090
9,090
15,355,371
2,441
A process of providing reminder completion assistance in a group conversation. The process comprises: analyzing the content and context of a group conversation; identifying a potential implicit action; and suggesting a reminder based on the implicit action.
1. A method, comprising: analyzing the content and context of a group conversation; identifying a potential implicit action; and suggesting a reminder based on the implicit action. 2. The method of claim 1, further comprising, after analyzing the content and content of a group conversation, identifying an explicit request. 3. The method of claim 2, further comprising, if an explicit request has been made, setting a reminder based on the explicit request. 4. The method of claim 1, further comprising, after suggesting a reminder based on the implicit action, querying a user to determine if the user accepts the suggested reminder. 5. The method of claim 4, further comprising, if the user accepts the suggested reminder, setting a reminder. 6. The method of claim 1, wherein analyzing the content and context of a group conversation comprises: processing the context of a group conversation based on one or more of the location of users in the group conversation, a location mentioned in the group conversation, a day of the group conversation, a day mentioned in the group conversation, a time of the group conversation, a time mentioned in the group conversation, and a user mentioned in the group conversation. 7. The method of claim 6, wherein identifying a potential implicit action comprises identifying an action based on the processed context of the group conversation. 8. The method of claim 6, wherein identifying a potential implicit action comprises identifying an action based on the processed context of the group conversation and a set of extracted user preferences. 9. A system comprising: at least one processor; and a memory operatively connected with the at least one processor storing computer-executable instructions that, when executed by the at least one processor, causes the at least one processor to execute a method that comprises: extracting user preferences from a set of user signals; storing the extracted user preferences; analyzing the content and context of a group conversation; identifying a potential implicit action based on the analyzed content and context and the extracted user preferences; and suggesting a reminder based on the implicit action. 10. The system of claim 9, wherein the method, executed by the at least one processor, further comprises, after analyzing the content and content of a group conversation, identifying an explicit request. 11. The system of claim 10, wherein the method, executed by the at least one processor, further comprises, if an explicit request has been made, setting a reminder based on the explicit request. 12. The system of claim 9, wherein the method, executed by the at least one processor, further comprises, after suggesting a reminder based on the implicit action, querying a user to determine if the user accepts the suggested reminder. 13. The system of claim 12, wherein the method, executed by the at least one processor, further comprises, if the user accepts the suggested reminder, setting a reminder. 14. The system of claim 9, wherein analyzing the content and context of a group conversation comprises: processing the context of a group conversation based on one or more of the location of users in the group conversation, a location mentioned in the group conversation, a day of the group conversation, a day mentioned in the group conversation, a time of the group conversation, a time mentioned in the group conversation, and a user mentioned in the group conversation. 15. The method of claim 14, wherein identifying a potential implicit action comprises identifying an action based on the processed context of the group conversation. 16. A non-transitory machine readable storage medium having stored thereon a computer program, the computer program comprising a routine of set instructions for causing the machine to perform the operations of: extracting user preferences from a set of user signals; analyzing the content and context of a group conversation; identifying a potential implicit action based on the analyzed content and context and the extracted user preferences; and suggesting a reminder based on the implicit action. 17. The non-transitory machine readable storage medium of claim 16 further comprising instructions for, after analyzing the content and content of a group conversation, identifying an explicit request. 18. The non-transitory machine readable storage medium of claim 17 further comprising instructions for, if an explicit request has been made, setting a reminder based on the explicit request. 19. The non-transitory machine readable storage medium of claim 16 further comprising instructions for, after suggesting a reminder based on the implicit action, querying a user to determine if the user accepts the suggested reminder. 20. The non-transitory machine readable storage medium of claim 19 further comprising instructions for, if the user accepts the suggested reminder, setting a reminder.
A process of providing reminder completion assistance in a group conversation. The process comprises: analyzing the content and context of a group conversation; identifying a potential implicit action; and suggesting a reminder based on the implicit action.1. A method, comprising: analyzing the content and context of a group conversation; identifying a potential implicit action; and suggesting a reminder based on the implicit action. 2. The method of claim 1, further comprising, after analyzing the content and content of a group conversation, identifying an explicit request. 3. The method of claim 2, further comprising, if an explicit request has been made, setting a reminder based on the explicit request. 4. The method of claim 1, further comprising, after suggesting a reminder based on the implicit action, querying a user to determine if the user accepts the suggested reminder. 5. The method of claim 4, further comprising, if the user accepts the suggested reminder, setting a reminder. 6. The method of claim 1, wherein analyzing the content and context of a group conversation comprises: processing the context of a group conversation based on one or more of the location of users in the group conversation, a location mentioned in the group conversation, a day of the group conversation, a day mentioned in the group conversation, a time of the group conversation, a time mentioned in the group conversation, and a user mentioned in the group conversation. 7. The method of claim 6, wherein identifying a potential implicit action comprises identifying an action based on the processed context of the group conversation. 8. The method of claim 6, wherein identifying a potential implicit action comprises identifying an action based on the processed context of the group conversation and a set of extracted user preferences. 9. A system comprising: at least one processor; and a memory operatively connected with the at least one processor storing computer-executable instructions that, when executed by the at least one processor, causes the at least one processor to execute a method that comprises: extracting user preferences from a set of user signals; storing the extracted user preferences; analyzing the content and context of a group conversation; identifying a potential implicit action based on the analyzed content and context and the extracted user preferences; and suggesting a reminder based on the implicit action. 10. The system of claim 9, wherein the method, executed by the at least one processor, further comprises, after analyzing the content and content of a group conversation, identifying an explicit request. 11. The system of claim 10, wherein the method, executed by the at least one processor, further comprises, if an explicit request has been made, setting a reminder based on the explicit request. 12. The system of claim 9, wherein the method, executed by the at least one processor, further comprises, after suggesting a reminder based on the implicit action, querying a user to determine if the user accepts the suggested reminder. 13. The system of claim 12, wherein the method, executed by the at least one processor, further comprises, if the user accepts the suggested reminder, setting a reminder. 14. The system of claim 9, wherein analyzing the content and context of a group conversation comprises: processing the context of a group conversation based on one or more of the location of users in the group conversation, a location mentioned in the group conversation, a day of the group conversation, a day mentioned in the group conversation, a time of the group conversation, a time mentioned in the group conversation, and a user mentioned in the group conversation. 15. The method of claim 14, wherein identifying a potential implicit action comprises identifying an action based on the processed context of the group conversation. 16. A non-transitory machine readable storage medium having stored thereon a computer program, the computer program comprising a routine of set instructions for causing the machine to perform the operations of: extracting user preferences from a set of user signals; analyzing the content and context of a group conversation; identifying a potential implicit action based on the analyzed content and context and the extracted user preferences; and suggesting a reminder based on the implicit action. 17. The non-transitory machine readable storage medium of claim 16 further comprising instructions for, after analyzing the content and content of a group conversation, identifying an explicit request. 18. The non-transitory machine readable storage medium of claim 17 further comprising instructions for, if an explicit request has been made, setting a reminder based on the explicit request. 19. The non-transitory machine readable storage medium of claim 16 further comprising instructions for, after suggesting a reminder based on the implicit action, querying a user to determine if the user accepts the suggested reminder. 20. The non-transitory machine readable storage medium of claim 19 further comprising instructions for, if the user accepts the suggested reminder, setting a reminder.
2,400
9,091
9,091
15,169,942
2,432
A method and system for detecting an access to a protected resource by headless browser bots are provided. The method includes receiving a request from a client machine; generating an anti-headless browser bot (AHBB) challenge, wherein the AHBB challenge comprises at least a headless browser identifying characteristic; receiving a response to the AHBB challenge; comparing the response to the AHBB challenge to at least a challenge requirement to determine any one of: a pass result, and a fail result; and upon determining a pass result, granting the client machine access to the protected resource.
1. A method for detecting an access to a protected resource by headless browser bots, comprising: receiving a request from a client machine; generating an anti-headless browser bot (AHBB) challenge, wherein the AHBB challenge includes at least one headless browser identifying characteristic; receiving a response to the AHBB challenge; comparing the received response to at least one challenge requirement to determine a pass result or a fail result; and upon determining a pass result, granting the client machine access to the protected resource. 2. The method of claim 1, further comprising: determining whether the AHBB challenge should be generated, wherein the determination is based on at least one of: at least one risk parameter, and at least one load parameter. 3. The method of claim 2, wherein each of the at least one risk parameter is any of: a list of known malicious clients, a list of trusted clients and associated internet protocol (IP) addresses, a reputation score per IP address, a reputation score per geographic region, an application layer parameter, a client unique identification (ID) token, a client affiliation, a parameter from an authentication service, a geo analysis, a type of the protected resource, and an indication of an ongoing attack. 4. The method of claim 2, wherein the at least one load parameter relates to the protected resource and includes at least one of: a current load, an availability of computing resources, and an availability of networking resources. 5. The method of claim 1, wherein the fail result is determined at least when the response is not received within a predetermined time interval. 6. The method of claim 1, further comprising: generating a new challenge based on a predefined escalation policy, when the fail result is determined. 7. The method of claim 1, wherein a web browser of the client machine is granted access to the protected resource for a predefined period of time, wherein the predefined period of time is set by an aging timer. 8. The method of claim 1, wherein generating the AHBB challenge further comprises: identifying the at least one headless browser identifying characteristic; generating a script code configured to check for the at least one headless browser identifying characteristic; and configuring the script code to return a fail result upon identification of at least one headless browser characteristic. 9. The method of claim 1, wherein the at least one headless browser characteristic includes an object for processing at least Java script code. 10. The method of claim 1, wherein generating the AHBB challenge further comprises: determining a test for detecting diversion from a normal behavior of a standard web browser; generating a script code configured to execute the test on the client machine; and configuring the script code to return the fail result upon identification of diversion from the normal behavior of a standard web browser. 11. The method of claim 1, wherein the test includes at least a zero-window size challenge. 12. The method of claim 8, wherein the script code is at least in JavaScript. 13. The method of claim 8, wherein the script code is at least one of: polymorphic, and obfuscated. 14. The method of claim 1, wherein the AHBB challenge further requires a human interaction. 15. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the computerized method according to claim 1. 16. A system for detecting an access to a protected resource by headless browser bots, comprising: a processing system; a memory connected to the processing system and configured to contain a plurality of instructions that when executed by the processing system configure the system to: receive a request from a client machine; generate an anti-headless browser bot (AHBB) challenge, wherein the AHBB challenge includes at least one headless browser identifying characteristic; receive a response to the AHBB challenge; compare the response to at least one challenge requirement to determine a pass result or a fail result; and grant the client machine access to the protected resource, upon determining a pass result. 17. The system of claim 16, wherein the system is further configured to: determine whether the AHBB challenge should be generated, wherein the determination is based on at least one of: at least one risk parameter, and at least one load parameter. 18. The system of claim 16, wherein each of the at least one risk parameter is any of: a list of known malicious clients, a list of trusted clients and associated internet protocol (IP) addresses, a reputation score per IP address, a reputation score per geographic region, an application layer parameter, a client unique identification (ID) token, a client affiliation, a parameter from an authentication service, a geo analysis, a type of the protected resource, and an indication of an ongoing attack. 19. The system of claim 16, wherein the at least one load parameter relates to the protected resource and includes any one of: a current load, an availability of computing resources, and an availability of networking resources. 20. The system of claim 16, wherein the fail result is determined at least when the response is not received in a predetermined time interval. 21. The system of claim 16, wherein the system is further configured to: generate a new challenge based on a predefined escalation policy, upon determining the fail result. 22. The system of claim 16, wherein a web browser of the client machine is granted access to the protected resource for a predefined period of time, wherein the predefined period of time is set by an aging timer. 23. The system of claim 16, wherein the system is further configured to: identify the at least one headless browser identifying characteristic; generate a script code configured to check for the at least one headless browser identifying characteristic; and configure the script code to return the fail result upon identification of at least one headless browser characteristic. 24. The system of claim 16, wherein the at least one headless browser characteristic includes an object for processing at least Java script code. 25. The system of claim 16, wherein the system is further configured to: determine a test for detecting diversion from a normal behavior of a standard web browser; and generate a script code configured to execute the test on the client machine; and configure the script code to return the fail result upon identification of the diversion from the normal behavior of a standard web browser. 26. The system of claim 25, wherein the test includes at least a zero-window size challenge. 27. The method of claim 23, wherein the script code is at least one of: polymorphic, and obfuscated.
A method and system for detecting an access to a protected resource by headless browser bots are provided. The method includes receiving a request from a client machine; generating an anti-headless browser bot (AHBB) challenge, wherein the AHBB challenge comprises at least a headless browser identifying characteristic; receiving a response to the AHBB challenge; comparing the response to the AHBB challenge to at least a challenge requirement to determine any one of: a pass result, and a fail result; and upon determining a pass result, granting the client machine access to the protected resource.1. A method for detecting an access to a protected resource by headless browser bots, comprising: receiving a request from a client machine; generating an anti-headless browser bot (AHBB) challenge, wherein the AHBB challenge includes at least one headless browser identifying characteristic; receiving a response to the AHBB challenge; comparing the received response to at least one challenge requirement to determine a pass result or a fail result; and upon determining a pass result, granting the client machine access to the protected resource. 2. The method of claim 1, further comprising: determining whether the AHBB challenge should be generated, wherein the determination is based on at least one of: at least one risk parameter, and at least one load parameter. 3. The method of claim 2, wherein each of the at least one risk parameter is any of: a list of known malicious clients, a list of trusted clients and associated internet protocol (IP) addresses, a reputation score per IP address, a reputation score per geographic region, an application layer parameter, a client unique identification (ID) token, a client affiliation, a parameter from an authentication service, a geo analysis, a type of the protected resource, and an indication of an ongoing attack. 4. The method of claim 2, wherein the at least one load parameter relates to the protected resource and includes at least one of: a current load, an availability of computing resources, and an availability of networking resources. 5. The method of claim 1, wherein the fail result is determined at least when the response is not received within a predetermined time interval. 6. The method of claim 1, further comprising: generating a new challenge based on a predefined escalation policy, when the fail result is determined. 7. The method of claim 1, wherein a web browser of the client machine is granted access to the protected resource for a predefined period of time, wherein the predefined period of time is set by an aging timer. 8. The method of claim 1, wherein generating the AHBB challenge further comprises: identifying the at least one headless browser identifying characteristic; generating a script code configured to check for the at least one headless browser identifying characteristic; and configuring the script code to return a fail result upon identification of at least one headless browser characteristic. 9. The method of claim 1, wherein the at least one headless browser characteristic includes an object for processing at least Java script code. 10. The method of claim 1, wherein generating the AHBB challenge further comprises: determining a test for detecting diversion from a normal behavior of a standard web browser; generating a script code configured to execute the test on the client machine; and configuring the script code to return the fail result upon identification of diversion from the normal behavior of a standard web browser. 11. The method of claim 1, wherein the test includes at least a zero-window size challenge. 12. The method of claim 8, wherein the script code is at least in JavaScript. 13. The method of claim 8, wherein the script code is at least one of: polymorphic, and obfuscated. 14. The method of claim 1, wherein the AHBB challenge further requires a human interaction. 15. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the computerized method according to claim 1. 16. A system for detecting an access to a protected resource by headless browser bots, comprising: a processing system; a memory connected to the processing system and configured to contain a plurality of instructions that when executed by the processing system configure the system to: receive a request from a client machine; generate an anti-headless browser bot (AHBB) challenge, wherein the AHBB challenge includes at least one headless browser identifying characteristic; receive a response to the AHBB challenge; compare the response to at least one challenge requirement to determine a pass result or a fail result; and grant the client machine access to the protected resource, upon determining a pass result. 17. The system of claim 16, wherein the system is further configured to: determine whether the AHBB challenge should be generated, wherein the determination is based on at least one of: at least one risk parameter, and at least one load parameter. 18. The system of claim 16, wherein each of the at least one risk parameter is any of: a list of known malicious clients, a list of trusted clients and associated internet protocol (IP) addresses, a reputation score per IP address, a reputation score per geographic region, an application layer parameter, a client unique identification (ID) token, a client affiliation, a parameter from an authentication service, a geo analysis, a type of the protected resource, and an indication of an ongoing attack. 19. The system of claim 16, wherein the at least one load parameter relates to the protected resource and includes any one of: a current load, an availability of computing resources, and an availability of networking resources. 20. The system of claim 16, wherein the fail result is determined at least when the response is not received in a predetermined time interval. 21. The system of claim 16, wherein the system is further configured to: generate a new challenge based on a predefined escalation policy, upon determining the fail result. 22. The system of claim 16, wherein a web browser of the client machine is granted access to the protected resource for a predefined period of time, wherein the predefined period of time is set by an aging timer. 23. The system of claim 16, wherein the system is further configured to: identify the at least one headless browser identifying characteristic; generate a script code configured to check for the at least one headless browser identifying characteristic; and configure the script code to return the fail result upon identification of at least one headless browser characteristic. 24. The system of claim 16, wherein the at least one headless browser characteristic includes an object for processing at least Java script code. 25. The system of claim 16, wherein the system is further configured to: determine a test for detecting diversion from a normal behavior of a standard web browser; and generate a script code configured to execute the test on the client machine; and configure the script code to return the fail result upon identification of the diversion from the normal behavior of a standard web browser. 26. The system of claim 25, wherein the test includes at least a zero-window size challenge. 27. The method of claim 23, wherein the script code is at least one of: polymorphic, and obfuscated.
2,400
9,092
9,092
16,222,811
2,482
For a vehicle ( 1 ) with a tractor ( 2 ) and a trailer ( 3 ), a view system has a capture unit ( 10 ) with an image sensor ( 12 ) for capturing image data of an area of view, around the vehicle, a processing unit ( 20 ) for processing the image data, and a reproduction unit ( 30 ) for reproducing at least one first image section ( 410 ) and one second image section ( 420 ) of the area of view ( 40 ) captured by the capture unit ( 10 ). The processing unit provides different resolutions of image data depending on the position of the tractor with respect to the trailer.
1. A view system for a vehicle with a tractor and a trailer, comprising: a capture unit with at least one image sensor for capturing an area of view around the vehicle in form of image data, wherein the capture unit is attachable to the tractor, at least one processing unit for processing the image data captured by the capture unit, and at least one reproduction unit for reproducing at least one first image section and one second image section of the area of view captured by the capture unit, wherein, if the tractor and the trailer are substantially aligned in the longitudinal direction of the vehicle, the processing unit takes the first image section at a first original position (A) and the second image section at a second original position (B) from the area of view of the at least one image sensor, and wherein, if the tractor and the trailer are arranged in an angle substantially unequal 0° to each other, the processing unit takes the first image section at a first modified position (A′) and/or the second image section at a second modified position from the area of view of the at least one image sensor, and wherein the resolution of the first image section at the original position (A) and at the modified position (A′) on the reproduction unit is higher than the resolution of the second image section at the original position (B) and at the modified position on the reproduction unit. 2. The view system according to claim 1, wherein the image capture unit has a single camera. 3. The view system according to claim 2, wherein the single camera has a single image sensor. 4. The view system according to claim 1, wherein the first image section comprises a main field of view and/or the second image section comprises a wide angle field of view. 5. The view system according to claim 4, wherein the main field of view comprises a first legally prescribed field of view and/or the wide angle field of view comprises a second legally prescribed field of view. 6. The view system according to claim 1, wherein the first image section is positioned and oriented on the area of view of the image sensor such that it depicts a part of the tractor at the first original position (A). 7. The view system according to claim 1, wherein the first image section at the original position (A) and the first image section at the modified position (A′) has a reference point (P) of the trailer. 8. The view system according to claim 7, wherein the reference point (P) is disposed within the first image section at the first original position (A) and at the first modified position (A′) at the same location of the first image section. 9. The view system according to claim 1, wherein the first image section and the second image section intersect each other partially on the image sensor. 10. The view system according to claim 1, wherein the reproduction unit has a defined first display portion for reproduction the first image section at the first original position (A) and a defined second display portion for reproduction of the second image section at the second original position (B). 11. The view system according to claim 10, wherein the ratio of the size of the first defined display portion to the size of the second defined display portion is unchangeable. 12. The view system according to claim 1, wherein the portion which is depicted by the first image section and/or the second image section at the modified position (A′) is arranged closer to or farther away from the tractor than the portion which is depicted by the first image section and/or the second image section at the original position (A, B). 13. The view system according to claim 11, wherein the size of the first image section and/or the size of the second image section at the modified position (A′) is equal to the size of the first image section and/or the size of the second image section at the original position (A, B). 14. The view system according to claim 12, wherein the aspect ratio of the first image section and/or the aspect ratio of the second image section at the modified position (A′) is equal to the aspect ratio of the first image section and/or the aspect ratio of the second image section at the original position (A, B). 15. The view system according to claim 10, wherein the first display portion is adapted to reproduce the first image section simultaneously at the original and the modified position, and the second display portion is adapted to reproduce the second image section. 16. The view system according to claim 15, wherein the first image section at the original position has a scaling which is changed in a direction horizontally orthogonal to the vehicle longitudinal axis in view of the first image section at the modified position. 17. The view system according to claim 1, wherein the processing unit is adapted to receive signals for describing the angle ratio between the tractor and the trailer from a signal device which is mounted on the vehicle and to take the first image section and/or the second image section based on the control signal at the modified first and/or second position or not. 18. The view system according to claim 17, wherein the signal device is adapted for generating a manual control signal. 19. The view system according to claim 17, wherein the signal device comprises a vehicle sensor which is adapted for generation of the control signal. 20. The view system according to claim 1, wherein the processing unit continuously adapts the first and second image section at the first and second modified position (A′) to the operational situation of the vehicle based on the control signal. 21. The view system according to claim 20, wherein the operational situation is cornering. 22. The view system arrangement with two view systems according to claim 1, wherein processing devices of the two view systems are adapted to exchange data. 23. A mirror replacement system for a vehicle with a view system according to claim 1. 24. A mirror replacement system for a vehicle with a view system according to claim 22.
For a vehicle ( 1 ) with a tractor ( 2 ) and a trailer ( 3 ), a view system has a capture unit ( 10 ) with an image sensor ( 12 ) for capturing image data of an area of view, around the vehicle, a processing unit ( 20 ) for processing the image data, and a reproduction unit ( 30 ) for reproducing at least one first image section ( 410 ) and one second image section ( 420 ) of the area of view ( 40 ) captured by the capture unit ( 10 ). The processing unit provides different resolutions of image data depending on the position of the tractor with respect to the trailer.1. A view system for a vehicle with a tractor and a trailer, comprising: a capture unit with at least one image sensor for capturing an area of view around the vehicle in form of image data, wherein the capture unit is attachable to the tractor, at least one processing unit for processing the image data captured by the capture unit, and at least one reproduction unit for reproducing at least one first image section and one second image section of the area of view captured by the capture unit, wherein, if the tractor and the trailer are substantially aligned in the longitudinal direction of the vehicle, the processing unit takes the first image section at a first original position (A) and the second image section at a second original position (B) from the area of view of the at least one image sensor, and wherein, if the tractor and the trailer are arranged in an angle substantially unequal 0° to each other, the processing unit takes the first image section at a first modified position (A′) and/or the second image section at a second modified position from the area of view of the at least one image sensor, and wherein the resolution of the first image section at the original position (A) and at the modified position (A′) on the reproduction unit is higher than the resolution of the second image section at the original position (B) and at the modified position on the reproduction unit. 2. The view system according to claim 1, wherein the image capture unit has a single camera. 3. The view system according to claim 2, wherein the single camera has a single image sensor. 4. The view system according to claim 1, wherein the first image section comprises a main field of view and/or the second image section comprises a wide angle field of view. 5. The view system according to claim 4, wherein the main field of view comprises a first legally prescribed field of view and/or the wide angle field of view comprises a second legally prescribed field of view. 6. The view system according to claim 1, wherein the first image section is positioned and oriented on the area of view of the image sensor such that it depicts a part of the tractor at the first original position (A). 7. The view system according to claim 1, wherein the first image section at the original position (A) and the first image section at the modified position (A′) has a reference point (P) of the trailer. 8. The view system according to claim 7, wherein the reference point (P) is disposed within the first image section at the first original position (A) and at the first modified position (A′) at the same location of the first image section. 9. The view system according to claim 1, wherein the first image section and the second image section intersect each other partially on the image sensor. 10. The view system according to claim 1, wherein the reproduction unit has a defined first display portion for reproduction the first image section at the first original position (A) and a defined second display portion for reproduction of the second image section at the second original position (B). 11. The view system according to claim 10, wherein the ratio of the size of the first defined display portion to the size of the second defined display portion is unchangeable. 12. The view system according to claim 1, wherein the portion which is depicted by the first image section and/or the second image section at the modified position (A′) is arranged closer to or farther away from the tractor than the portion which is depicted by the first image section and/or the second image section at the original position (A, B). 13. The view system according to claim 11, wherein the size of the first image section and/or the size of the second image section at the modified position (A′) is equal to the size of the first image section and/or the size of the second image section at the original position (A, B). 14. The view system according to claim 12, wherein the aspect ratio of the first image section and/or the aspect ratio of the second image section at the modified position (A′) is equal to the aspect ratio of the first image section and/or the aspect ratio of the second image section at the original position (A, B). 15. The view system according to claim 10, wherein the first display portion is adapted to reproduce the first image section simultaneously at the original and the modified position, and the second display portion is adapted to reproduce the second image section. 16. The view system according to claim 15, wherein the first image section at the original position has a scaling which is changed in a direction horizontally orthogonal to the vehicle longitudinal axis in view of the first image section at the modified position. 17. The view system according to claim 1, wherein the processing unit is adapted to receive signals for describing the angle ratio between the tractor and the trailer from a signal device which is mounted on the vehicle and to take the first image section and/or the second image section based on the control signal at the modified first and/or second position or not. 18. The view system according to claim 17, wherein the signal device is adapted for generating a manual control signal. 19. The view system according to claim 17, wherein the signal device comprises a vehicle sensor which is adapted for generation of the control signal. 20. The view system according to claim 1, wherein the processing unit continuously adapts the first and second image section at the first and second modified position (A′) to the operational situation of the vehicle based on the control signal. 21. The view system according to claim 20, wherein the operational situation is cornering. 22. The view system arrangement with two view systems according to claim 1, wherein processing devices of the two view systems are adapted to exchange data. 23. A mirror replacement system for a vehicle with a view system according to claim 1. 24. A mirror replacement system for a vehicle with a view system according to claim 22.
2,400
9,093
9,093
16,233,750
2,439
Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent electronic documents such as fraudulent webpages and electronic messages. Some embodiments use a reverse IP analysis to select a set of fraud candidates from among a set of domains hosted at the same IP address as a known fraudulent domain. The candidate set is further filtered according to domain registration data. Online content hosted at each filtered candidate domain is further analyzed to identify truly fraudulent domains. A security module may then prevent users from accessing a content of such domains.
1. A computer system comprising at least one hardware processor configured to: in response to identifying a known fraudulent Internet domain located at an Internet Protocol (IP) address, select a candidate Internet domain according to whether the candidate Internet domain is located at the IP address; in response to selecting the candidate Internet domain, determine whether the candidate Internet domain satisfies a registration condition according to domain name registration data characterizing the candidate Internet domain; in response, when the candidate Internet domain satisfies the registration condition, analyze an electronic document distributed by the candidate Internet domain to determine whether the electronic document is fraudulent; and in response to analyzing the electronic document, when the electronic document is fraudulent, determine that the candidate Internet domain is fraudulent. 2. The computer system of claim 1, wherein the at least one hardware processor is further configured, in response to determining that the candidate Internet domain is fraudulent, to transmit a fraud assessment indicator to another computer system, the fraud assessment indicator configured to cause the other computer system to block access to a resource hosted by the candidate Internet domain. 3. The computer system of claim 1, wherein determining whether the candidate Internet domain satisfies the registration condition comprises comparing domain name registration data characterizing the candidate Internet domain with domain name registration data characterizing the known fraudulent Internet domain. 4. The computer system of claim 3, wherein determining whether the candidate Internet domain satisfies the registration condition comprises comparing a registration timestamp of the candidate Internet domain to a registration timestamp of the known fraudulent Internet domain. 5. The computer system of claim 1, wherein domain name registration data characterizing the candidate Internet domain comprises an email address, and wherein the at least one hardware processor is configured to determine whether the candidate Internet domain satisfies the registration condition according to the email address. 6. The computer system of claim 5, wherein the at least one hardware processor is configured to determine whether the candidate Internet domain satisfies the registration condition according to at least one of a length of the email address and a randomness of the email address. 7. The computer system of claim 5, wherein the at least one hardware processor is configured to determine whether the candidate Internet domain satisfies the registration condition according to an identity of a mail server handling email sent to the email address. 8. The computer system of claim 5, wherein the at least one hardware processor is configured to determine whether the candidate Internet domain satisfies the registration condition according to whether a provider of the email address allows anonymous email accounts. 9. The computer system of claim 1, wherein domain name registration data characterizing the candidate Internet domain comprises a telephone number, and wherein the at least one hardware processor is configured to determine whether the candidate Internet domain satisfies the registration condition according to the telephone number. 10. The computer system of claim 9, wherein determining whether the candidate Internet domain satisfies the registration condition comprises performing a reverse telephone number lookup to determine an entity owning the telephone number. 11. A computer-implemented method of identifying fraudulent Internet domains, the method comprising: in response to identifying a known fraudulent Internet domain located at an Internet Protocol (IP) address, employing at least one hardware processor of a computer system to select a candidate Internet domain according to whether the candidate Internet domain is located at the IP address; in response to selecting the candidate Internet domain, employing at least one hardware processor of the computer system to determine whether the candidate Internet domain satisfies a registration condition according to domain name registration data characterizing the candidate Internet domain; in response, when the candidate Internet domain satisfies the registration condition, employing at least one hardware processor of the computer system to analyze an electronic document distributed by the candidate Internet domain to determine whether the electronic document is fraudulent; and in response to analyzing the electronic document, when the electronic document is fraudulent, employing at least one hardware processor of the computer system to determine that the candidate Internet domain is fraudulent. 12. The method of claim 11, further comprising, in response to determining that the candidate Internet domain is fraudulent, employing at least one hardware processor of the computer system to transmit a fraud assessment indicator to a client computer system, the fraud assessment indicator configured to cause the client computer system to block access to a resource hosted by the candidate Internet domain. 13. The method of claim 11, wherein determining whether the candidate Internet domain satisfies the registration condition comprises comparing domain name registration data characterizing the candidate Internet domain with domain name registration data characterizing the known fraudulent Internet domain. 14. The method of claim 13, wherein determining whether the candidate Internet domain satisfies the registration condition comprises comparing a registration timestamp of the candidate Internet domain to a registration timestamp of the known fraudulent Internet domain. 15. The method of claim 11, wherein domain name registration data characterizing the candidate Internet domain comprises an email address, the method comprising determining whether the candidate Internet domain satisfies the registration condition according to the email address. 16. The method of claim 15, comprising determining whether the candidate Internet domain satisfies the registration condition according to at least one of a length of the email address and a randomness of the email address. 17. The method of claim 15, comprising determining whether the candidate Internet domain satisfies the registration condition according to an identity of a mail server handling email sent to the email address. 18. The method of claim 15, comprising determining whether the candidate Internet domain satisfies the registration condition according to whether a provider of the email address allows anonymous email accounts. 19. The method of claim 11, wherein domain name registration data characterizing the candidate Internet domain comprises a telephone number, the method comprising determining whether the candidate Internet domain satisfies the registration condition according to the telephone number. 20. The method of claim 19, wherein determining whether the candidate Internet domain satisfies the registration condition comprises performing a reverse telephone number lookup to determine an entity owning the telephone number. 21. A non-transitory computer-readable medium storing instructions which, when executed by at least one hardware processor of a computer system, cause the at least one hardware processor to perform the steps of: in response to identifying a known fraudulent Internet domain located at an Internet Protocol (IP) address, selecting a candidate Internet domain according to whether the candidate Internet domain is located at the IP address; in response to selecting the candidate Internet domain, determining whether the candidate Internet domain satisfies a registration condition according to domain name registration data characterizing the candidate Internet domain; in response, when the candidate Internet domain satisfies the registration condition, analyzing an electronic document distributed by the candidate Internet domain to determine whether the electronic document is fraudulent; and in response to analyzing the electronic document, when the electronic document is fraudulent, determining that the candidate Internet domain is fraudulent.
Described systems and methods enable a swift and efficient detection of fraudulent Internet domains, i.e., domains used to host or distribute fraudulent electronic documents such as fraudulent webpages and electronic messages. Some embodiments use a reverse IP analysis to select a set of fraud candidates from among a set of domains hosted at the same IP address as a known fraudulent domain. The candidate set is further filtered according to domain registration data. Online content hosted at each filtered candidate domain is further analyzed to identify truly fraudulent domains. A security module may then prevent users from accessing a content of such domains.1. A computer system comprising at least one hardware processor configured to: in response to identifying a known fraudulent Internet domain located at an Internet Protocol (IP) address, select a candidate Internet domain according to whether the candidate Internet domain is located at the IP address; in response to selecting the candidate Internet domain, determine whether the candidate Internet domain satisfies a registration condition according to domain name registration data characterizing the candidate Internet domain; in response, when the candidate Internet domain satisfies the registration condition, analyze an electronic document distributed by the candidate Internet domain to determine whether the electronic document is fraudulent; and in response to analyzing the electronic document, when the electronic document is fraudulent, determine that the candidate Internet domain is fraudulent. 2. The computer system of claim 1, wherein the at least one hardware processor is further configured, in response to determining that the candidate Internet domain is fraudulent, to transmit a fraud assessment indicator to another computer system, the fraud assessment indicator configured to cause the other computer system to block access to a resource hosted by the candidate Internet domain. 3. The computer system of claim 1, wherein determining whether the candidate Internet domain satisfies the registration condition comprises comparing domain name registration data characterizing the candidate Internet domain with domain name registration data characterizing the known fraudulent Internet domain. 4. The computer system of claim 3, wherein determining whether the candidate Internet domain satisfies the registration condition comprises comparing a registration timestamp of the candidate Internet domain to a registration timestamp of the known fraudulent Internet domain. 5. The computer system of claim 1, wherein domain name registration data characterizing the candidate Internet domain comprises an email address, and wherein the at least one hardware processor is configured to determine whether the candidate Internet domain satisfies the registration condition according to the email address. 6. The computer system of claim 5, wherein the at least one hardware processor is configured to determine whether the candidate Internet domain satisfies the registration condition according to at least one of a length of the email address and a randomness of the email address. 7. The computer system of claim 5, wherein the at least one hardware processor is configured to determine whether the candidate Internet domain satisfies the registration condition according to an identity of a mail server handling email sent to the email address. 8. The computer system of claim 5, wherein the at least one hardware processor is configured to determine whether the candidate Internet domain satisfies the registration condition according to whether a provider of the email address allows anonymous email accounts. 9. The computer system of claim 1, wherein domain name registration data characterizing the candidate Internet domain comprises a telephone number, and wherein the at least one hardware processor is configured to determine whether the candidate Internet domain satisfies the registration condition according to the telephone number. 10. The computer system of claim 9, wherein determining whether the candidate Internet domain satisfies the registration condition comprises performing a reverse telephone number lookup to determine an entity owning the telephone number. 11. A computer-implemented method of identifying fraudulent Internet domains, the method comprising: in response to identifying a known fraudulent Internet domain located at an Internet Protocol (IP) address, employing at least one hardware processor of a computer system to select a candidate Internet domain according to whether the candidate Internet domain is located at the IP address; in response to selecting the candidate Internet domain, employing at least one hardware processor of the computer system to determine whether the candidate Internet domain satisfies a registration condition according to domain name registration data characterizing the candidate Internet domain; in response, when the candidate Internet domain satisfies the registration condition, employing at least one hardware processor of the computer system to analyze an electronic document distributed by the candidate Internet domain to determine whether the electronic document is fraudulent; and in response to analyzing the electronic document, when the electronic document is fraudulent, employing at least one hardware processor of the computer system to determine that the candidate Internet domain is fraudulent. 12. The method of claim 11, further comprising, in response to determining that the candidate Internet domain is fraudulent, employing at least one hardware processor of the computer system to transmit a fraud assessment indicator to a client computer system, the fraud assessment indicator configured to cause the client computer system to block access to a resource hosted by the candidate Internet domain. 13. The method of claim 11, wherein determining whether the candidate Internet domain satisfies the registration condition comprises comparing domain name registration data characterizing the candidate Internet domain with domain name registration data characterizing the known fraudulent Internet domain. 14. The method of claim 13, wherein determining whether the candidate Internet domain satisfies the registration condition comprises comparing a registration timestamp of the candidate Internet domain to a registration timestamp of the known fraudulent Internet domain. 15. The method of claim 11, wherein domain name registration data characterizing the candidate Internet domain comprises an email address, the method comprising determining whether the candidate Internet domain satisfies the registration condition according to the email address. 16. The method of claim 15, comprising determining whether the candidate Internet domain satisfies the registration condition according to at least one of a length of the email address and a randomness of the email address. 17. The method of claim 15, comprising determining whether the candidate Internet domain satisfies the registration condition according to an identity of a mail server handling email sent to the email address. 18. The method of claim 15, comprising determining whether the candidate Internet domain satisfies the registration condition according to whether a provider of the email address allows anonymous email accounts. 19. The method of claim 11, wherein domain name registration data characterizing the candidate Internet domain comprises a telephone number, the method comprising determining whether the candidate Internet domain satisfies the registration condition according to the telephone number. 20. The method of claim 19, wherein determining whether the candidate Internet domain satisfies the registration condition comprises performing a reverse telephone number lookup to determine an entity owning the telephone number. 21. A non-transitory computer-readable medium storing instructions which, when executed by at least one hardware processor of a computer system, cause the at least one hardware processor to perform the steps of: in response to identifying a known fraudulent Internet domain located at an Internet Protocol (IP) address, selecting a candidate Internet domain according to whether the candidate Internet domain is located at the IP address; in response to selecting the candidate Internet domain, determining whether the candidate Internet domain satisfies a registration condition according to domain name registration data characterizing the candidate Internet domain; in response, when the candidate Internet domain satisfies the registration condition, analyzing an electronic document distributed by the candidate Internet domain to determine whether the electronic document is fraudulent; and in response to analyzing the electronic document, when the electronic document is fraudulent, determining that the candidate Internet domain is fraudulent.
2,400
9,094
9,094
16,312,045
2,485
Disclosed is a 3D scanner for recording the 3D topography of an object, the 3D scanner including: a projector unit configured for projecting a structured beam of probe light onto the object; an imaging unit arranged to acquire 2D images of the object when the object is illuminated by the structured probe light beam; and an actuator unit arranged to control the position of the structured probe light beam at the object by rotating a movable portion of the projector unit around a pivoting axis, the actuator unit including a rotation motor including or arranged to drive a wheel, where the surface of the wheel operatively coupled to the movable portion of the projector unit has a radial distance from the axis of the rotation motor which changes with the rotation.
1. A 3D scanner for recording a digital 3D representation of an object, the 3D scanner comprising: a projector unit configured for projecting a structured beam of probe light onto the object; an imaging unit arranged to acquire 2D images of the object when the object is illuminated by the structured probe light beam; and an actuator unit arranged to control the position of the structured probe light beam at the object by rotating a movable portion of the projector unit around a pivoting axis, the actuator unit comprising a rotation motor comprising or arranged to drive a wheel, where the surface of the wheel operatively coupled to the movable portion of the projector unit has a radial distance from the axis of the rotation motor which changes with the rotation. 2. The 3D scanner according to claim 1, wherein the pivoting axis is substantially perpendicular to and intersects the optical axis of the projector unit. 3. The 3D scanner according to claim 1, wherein the actuator unit comprises a low-friction element arranged in contact with said wheel surface, where the low-friction element is operatively coupled to the movable portion of the projector unit. 4. The 3D scanner according to claim 1, wherein the actuator unit is arranged to directly engage the movable portion of the projector unit. 5. The 3D scanner according to claim 1, wherein a force-transferring member is part of or is attached to the movable portion of the projector unit, and where the actuator unit is arranged to engage a distal end of the force-transferring member. 6. The 3D scanner according to claim 1, wherein said wheel surface is eccentric or is shaped according to an Archimedes spiral. 7. The 3D scanner according to claim 1, wherein said wheel surface is smooth. 8. The 3D scanner according to claim 5, wherein the force-transferring member comprises an elongated member. 9. The 3D scanner according to claim 8, wherein the length of the elongated member is at least 2 cm. 10. The 3D scanner according to claim 1, wherein the axis of the rotation motor is perpendicular to the optical axis of the projector unit. 11. The 3D scanner according to claim 1, wherein the projector unit comprises a light source and a mask arranged to introduce the structure in the probe light beam, where the mask has a fixed geometry. 12. The 3D scanner according to claim 1, wherein the imaging unit is fixed relative to the framework.
Disclosed is a 3D scanner for recording the 3D topography of an object, the 3D scanner including: a projector unit configured for projecting a structured beam of probe light onto the object; an imaging unit arranged to acquire 2D images of the object when the object is illuminated by the structured probe light beam; and an actuator unit arranged to control the position of the structured probe light beam at the object by rotating a movable portion of the projector unit around a pivoting axis, the actuator unit including a rotation motor including or arranged to drive a wheel, where the surface of the wheel operatively coupled to the movable portion of the projector unit has a radial distance from the axis of the rotation motor which changes with the rotation.1. A 3D scanner for recording a digital 3D representation of an object, the 3D scanner comprising: a projector unit configured for projecting a structured beam of probe light onto the object; an imaging unit arranged to acquire 2D images of the object when the object is illuminated by the structured probe light beam; and an actuator unit arranged to control the position of the structured probe light beam at the object by rotating a movable portion of the projector unit around a pivoting axis, the actuator unit comprising a rotation motor comprising or arranged to drive a wheel, where the surface of the wheel operatively coupled to the movable portion of the projector unit has a radial distance from the axis of the rotation motor which changes with the rotation. 2. The 3D scanner according to claim 1, wherein the pivoting axis is substantially perpendicular to and intersects the optical axis of the projector unit. 3. The 3D scanner according to claim 1, wherein the actuator unit comprises a low-friction element arranged in contact with said wheel surface, where the low-friction element is operatively coupled to the movable portion of the projector unit. 4. The 3D scanner according to claim 1, wherein the actuator unit is arranged to directly engage the movable portion of the projector unit. 5. The 3D scanner according to claim 1, wherein a force-transferring member is part of or is attached to the movable portion of the projector unit, and where the actuator unit is arranged to engage a distal end of the force-transferring member. 6. The 3D scanner according to claim 1, wherein said wheel surface is eccentric or is shaped according to an Archimedes spiral. 7. The 3D scanner according to claim 1, wherein said wheel surface is smooth. 8. The 3D scanner according to claim 5, wherein the force-transferring member comprises an elongated member. 9. The 3D scanner according to claim 8, wherein the length of the elongated member is at least 2 cm. 10. The 3D scanner according to claim 1, wherein the axis of the rotation motor is perpendicular to the optical axis of the projector unit. 11. The 3D scanner according to claim 1, wherein the projector unit comprises a light source and a mask arranged to introduce the structure in the probe light beam, where the mask has a fixed geometry. 12. The 3D scanner according to claim 1, wherein the imaging unit is fixed relative to the framework.
2,400
9,095
9,095
13,788,363
2,453
A decentralised computer storage network is described comprising a plurality of hypervisors or nodes HV1, HV2, HVn. Each storage region in a node is controlled by an associated software controller 11, 12. Each node is configured to prepare a compressed metadata file detailing a snapshot of the data stored in its storage drive. The nodes can broadcast their metadata files so that they can be received by other nodes in the network. This allows each node to be aware of the data stored in the other nodes. By maintaining a local record of metadata files received over the network, each storage node can establish a live picture of the data stored in other storage nodes. This can permit any individual storage node to take decisions that control the distribution of data in the network.
1. A computer data storage network, comprising: a plurality of storage nodes connected together to provide an integrated storage resource; wherein each storage node is configured to broadcast metadata across the network concerning its stored data, and each storage node is configured to receive metadata that are broadcast from other storage nodes; and wherein each storage node is configured to maintain a local record of the metadata received over the network. 2. The computer data storage system of claim 1 wherein each storage node is configured to manage its own stored data as well as communications with other storage nodes in the network. 3. The computer data storage system of claim 1 wherein each storage node comprises a storage unit in which data can be stored, and a software controller for controlling read/write operations, communications with other storage nodes, and the broadcast metadata. 4. The computer data storage system of claim 1 wherein one or more of the storage nodes includes an interface through which a user can upload, modify and/or access data. 5. The computer data storage system of claim 4 wherein a storage node is configured to select a number of storage nodes when new data are uploaded via the interface, wherein the selection is made using the local record of metadata received over the network. 6. The computer data storage system of claim 5 wherein the storage nodes are selected according to at least one of physical location, available data storage capacity, redundancy properties, and maximum bandwidth. 7. The computer data storage system of claim 5 wherein the storage node that performs the selection is also configured to upload the new data to the selected storage nodes. 8. The computer data storage system of claim 7 wherein the storage node is configured to stripe and replicate the new data before it is uploaded to the selected storage nodes. 9. The computer data storage system of claim 1 wherein each storage node is configured to broadcast metadata to the network repeatedly, with a predetermined frequency. 10. The computer data storage system of claim 9 wherein the frequency is selected in dependence on the number of storage nodes in the network according to the local record of the received metadata. 11. The computer data storage system of claim 1 wherein each storage node comprises a re-balancing module that is configured to re-balance data in the network when predetermined criteria are satisfied. 12. The computer data storage system of claim 1 wherein the metadata broadcast by each storage node also includes information concerning the properties of the node. 13. The computer data storage system of claim 1 wherein each storage node includes a de-duplication module that is configured to remove duplicate entries in its stored data. 14. A method of operating a computer data storage network that comprises a plurality of storage nodes connected together to provide an integrated storage resource, the method comprising the steps of: providing independent control logic at each storage node; broadcasting metadata across the network from each storage node concerning the data stored therein; receiving the broadcast metadata at each storage node; and maintaining a record at each storage node concerning the metadata received over the network. 15. A computer readable storage medium having a computer program stored thereon, the computer program comprising: a program module configured to provide control logic at a storage node so that the storage node can communicate with other storage nodes in a network; a program module configured to broadcast metadata from a storage node, across the network, concerning the data stored therein; a program module configured to receive the broadcast metadata from other storage nodes in the network; and a program module configured to maintain a record concerning the metadata received over the network.
A decentralised computer storage network is described comprising a plurality of hypervisors or nodes HV1, HV2, HVn. Each storage region in a node is controlled by an associated software controller 11, 12. Each node is configured to prepare a compressed metadata file detailing a snapshot of the data stored in its storage drive. The nodes can broadcast their metadata files so that they can be received by other nodes in the network. This allows each node to be aware of the data stored in the other nodes. By maintaining a local record of metadata files received over the network, each storage node can establish a live picture of the data stored in other storage nodes. This can permit any individual storage node to take decisions that control the distribution of data in the network.1. A computer data storage network, comprising: a plurality of storage nodes connected together to provide an integrated storage resource; wherein each storage node is configured to broadcast metadata across the network concerning its stored data, and each storage node is configured to receive metadata that are broadcast from other storage nodes; and wherein each storage node is configured to maintain a local record of the metadata received over the network. 2. The computer data storage system of claim 1 wherein each storage node is configured to manage its own stored data as well as communications with other storage nodes in the network. 3. The computer data storage system of claim 1 wherein each storage node comprises a storage unit in which data can be stored, and a software controller for controlling read/write operations, communications with other storage nodes, and the broadcast metadata. 4. The computer data storage system of claim 1 wherein one or more of the storage nodes includes an interface through which a user can upload, modify and/or access data. 5. The computer data storage system of claim 4 wherein a storage node is configured to select a number of storage nodes when new data are uploaded via the interface, wherein the selection is made using the local record of metadata received over the network. 6. The computer data storage system of claim 5 wherein the storage nodes are selected according to at least one of physical location, available data storage capacity, redundancy properties, and maximum bandwidth. 7. The computer data storage system of claim 5 wherein the storage node that performs the selection is also configured to upload the new data to the selected storage nodes. 8. The computer data storage system of claim 7 wherein the storage node is configured to stripe and replicate the new data before it is uploaded to the selected storage nodes. 9. The computer data storage system of claim 1 wherein each storage node is configured to broadcast metadata to the network repeatedly, with a predetermined frequency. 10. The computer data storage system of claim 9 wherein the frequency is selected in dependence on the number of storage nodes in the network according to the local record of the received metadata. 11. The computer data storage system of claim 1 wherein each storage node comprises a re-balancing module that is configured to re-balance data in the network when predetermined criteria are satisfied. 12. The computer data storage system of claim 1 wherein the metadata broadcast by each storage node also includes information concerning the properties of the node. 13. The computer data storage system of claim 1 wherein each storage node includes a de-duplication module that is configured to remove duplicate entries in its stored data. 14. A method of operating a computer data storage network that comprises a plurality of storage nodes connected together to provide an integrated storage resource, the method comprising the steps of: providing independent control logic at each storage node; broadcasting metadata across the network from each storage node concerning the data stored therein; receiving the broadcast metadata at each storage node; and maintaining a record at each storage node concerning the metadata received over the network. 15. A computer readable storage medium having a computer program stored thereon, the computer program comprising: a program module configured to provide control logic at a storage node so that the storage node can communicate with other storage nodes in a network; a program module configured to broadcast metadata from a storage node, across the network, concerning the data stored therein; a program module configured to receive the broadcast metadata from other storage nodes in the network; and a program module configured to maintain a record concerning the metadata received over the network.
2,400
9,096
9,096
16,010,078
2,483
Methods and apparatus to detect blank images in a digital video broadcast signal are disclosed. An example method of detecting a blank image includes receiving a compressed digital image including a plurality of DC values, analyzing a total number of bits in the digital image to determine if the digital image has a data size small enough to be a blank frame candidate, if the data size is small enough for the digital image to be a blank frame candidate, analyzing multiple areas of the digital image to determine if the multiple areas exhibit substantially a same complexity, if the multiple areas exhibit substantially the same complexity, determining a number of DC values in the plurality of DC values that meet a criterion, comparing the determined number of DC values meeting the criterion to a threshold, and identifying the received digital image as a blank image if the determined number of DC values exceeds the threshold.
1. (canceled) 2. A computer readable storage disk or storage device comprising instructions that, when executed, cause a processor to at least: store a compressed digital image in a memory device, the compressed digital image being a frame of a compressed media signal; analyze a total number of bits in the compressed digital image stored in the memory device to determine if the compressed digital image has a data size less than a first threshold; when the data size is less than the first threshold, determine a number of bits in multiple predetermined areas of the compressed digital image and store the number of bits associated with each of the multiple predetermined areas in the memory device; analyze the number of bits in multiple predetermined areas of the compressed digital image stored in the memory device to determine if a deviation between the number of bits within the multiple predetermined areas is less than a second threshold; when the deviation between the number of bits within the multiple predetermined areas is less than the second threshold, identify, via the logic circuit, the compressed digital image as a blank image candidate; when the compressed digital image is not identified as a blank image candidate, discard the compressed digital image from the memory device; when the compressed digital image is identified as a blank image candidate, determine a number of DC values of the blank image candidate that meet a criterion and store the DC values in the memory device; compare the determined number of DC values stored in the memory device meeting the criterion to a third threshold; and identify the compressed digital image as the blank image if the determined number of DC values exceeds the third threshold. 3. The computer readable storage disk or storage device of claim 2, wherein the DC values are included within a same slice of a frame. 4. The computer readable storage disk or storage device of claim 2, wherein, when the compressed digital image is identified as a blank image within a predetermined period of time after another blank image is identified, the instructions, when executed, further cause the processor to output a signal indicating that a portion of the media signal between the blank images is an advertisement. 5. The computer readable storage disk or storage device of claim 2, wherein determining the number of DC values meeting the criterion includes, for each DC value except for a first DC value in the plurality, determining if a difference between the DC value and a previous DC value is substantially zero. 6. The computer readable storage disk or storage device of claim 2, wherein determining the number of DC values meeting the criterion is performed without decompressing the compressed digital image. 7. The computer readable storage disk or storage device of claim 2, wherein determining the number of DC values meeting the criterion includes determining a number of relative DC values that are substantially equal to zero. 8. The computer readable storage disk or storage device of claim 2, wherein determining the number of DC values meeting the criterion includes determining a number of relative DC values that are less than a DC value threshold. 9. An apparatus to detect a blank image within a compressed media signal, the apparatus comprising: a buffer to store a compressed digital image, the compressed digital image being a frame of the compressed media signal; a blank frame candidate identifier to: analyze a total number of bits in the compressed digital image stored in the buffer to determine if the compressed digital image has a data size less than a first threshold; when the data size is less than the first threshold, determine a number of bits in multiple predetermined areas of the compressed digital image and store the number of bits associated with each of the multiple predetermined areas in the buffer; analyze the number of bits in multiple predetermined areas of the compressed digital image stored in the buffer to determine if a deviation between the number of bits within the multiple predetermined areas is less than a second threshold; when the deviation between the number of bits within the multiple predetermined areas is less than the second threshold, identify the compressed digital image as a blank image candidate; and when the compressed digital image is not identified as a blank image candidate, discard the compressed digital image from the buffer; and a blank frame tester to: when the compressed digital image is identified as a blank image candidate, determine a number of DC values of the blank image candidate that meet a criterion and store the DC values in the buffer; compare the determined number of DC values stored in the buffer meeting the criterion to a third threshold; and identify the compressed digital image as the blank image if the determined number of DC values exceeds the third threshold. 10. The apparatus of claim 9, wherein the DC values are included within a same slice of a frame. 11. The apparatus of claim 9, wherein, when the compressed digital image is identified as a blank image within a predetermined period of time after another blank image is identified, the blank frame tester is further to output a signal indicating that a portion of the media signal between the blank images is an advertisement. 12. The apparatus of claim 9, wherein the blank frame tester determines the number of DC values meeting the criterion by, for each DC value except for a first DC value in a plurality of DC values, determining if a difference between the DC value and a previous DC value is substantially zero. 13. The apparatus of claim 9, wherein the blank frame tester determines the number of DC values meeting the criterion without decompressing the compressed digital image. 14. The apparatus of claim 9, wherein the blank frame tester determines the number of DC values meeting the criterion by determining a number of relative DC values that are substantially equal to zero. 15. The apparatus of claim 9, wherein the blank frame tester determines the number of DC values meeting the criterion by determining a number of relative DC values that are less than a DC value threshold. 16. A method to detect a blank image within a compressed media signal, the method comprising: storing a compressed digital image in a memory device, the compressed digital image being a frame of the compressed media signal; analyzing, via a logic circuit, a total number of bits in the compressed digital image stored in the memory device to determine if the compressed digital image has a data size less than a first threshold; when the data size is less than the first threshold, determining, via the logic circuit, a number of bits in multiple predetermined areas of the compressed digital image and storing the number of bits associated with each of the multiple predetermined areas in the memory device; analyzing, via the logic circuit, the number of bits in multiple predetermined areas of the compressed digital image stored in the memory device to determine if a deviation between the number of bits within the multiple predetermined areas is less than a second threshold; when the deviation between the number of bits within the multiple predetermined areas is less than the second threshold, identifying, via the logic circuit, the compressed digital image as a blank image candidate; when the compressed digital image is not identified as a blank image candidate, discarding, via the logic circuit, the compressed digital image from the memory device; when the compressed digital image is identified as a blank image candidate, determining, via the logic circuit, a number of DC values of the blank image candidate that meet a criterion and storing the DC values in the memory device; comparing, via the logic circuit, the determined number of DC values stored in the memory device meeting the criterion to a third threshold; and identifying, via the logic circuit, the compressed digital image as the blank image if the determined number of DC values exceeds the third threshold. 17. The method of claim 16, wherein the DC values are included within a same slice of a frame. 18. The method of claim 16, further including, when the compressed digital image is identified as a blank image within a predetermined period of time after another blank image is identified, outputting a signal indicating that a portion of the media signal between the blank images is an advertisement. 19. The method of claim 16, wherein determining the number of DC values meeting the criterion includes, for each DC value except for a first DC value in the plurality, determining if a difference between the DC value and a previous DC value is substantially zero. 20. The method of claim 16, wherein determining the number of DC values meeting the criterion is performed without decompressing the compressed digital image. 21. The method of claim 16, wherein determining the number of DC values meeting the criterion includes determining a number of relative DC values that are substantially equal to zero.
Methods and apparatus to detect blank images in a digital video broadcast signal are disclosed. An example method of detecting a blank image includes receiving a compressed digital image including a plurality of DC values, analyzing a total number of bits in the digital image to determine if the digital image has a data size small enough to be a blank frame candidate, if the data size is small enough for the digital image to be a blank frame candidate, analyzing multiple areas of the digital image to determine if the multiple areas exhibit substantially a same complexity, if the multiple areas exhibit substantially the same complexity, determining a number of DC values in the plurality of DC values that meet a criterion, comparing the determined number of DC values meeting the criterion to a threshold, and identifying the received digital image as a blank image if the determined number of DC values exceeds the threshold.1. (canceled) 2. A computer readable storage disk or storage device comprising instructions that, when executed, cause a processor to at least: store a compressed digital image in a memory device, the compressed digital image being a frame of a compressed media signal; analyze a total number of bits in the compressed digital image stored in the memory device to determine if the compressed digital image has a data size less than a first threshold; when the data size is less than the first threshold, determine a number of bits in multiple predetermined areas of the compressed digital image and store the number of bits associated with each of the multiple predetermined areas in the memory device; analyze the number of bits in multiple predetermined areas of the compressed digital image stored in the memory device to determine if a deviation between the number of bits within the multiple predetermined areas is less than a second threshold; when the deviation between the number of bits within the multiple predetermined areas is less than the second threshold, identify, via the logic circuit, the compressed digital image as a blank image candidate; when the compressed digital image is not identified as a blank image candidate, discard the compressed digital image from the memory device; when the compressed digital image is identified as a blank image candidate, determine a number of DC values of the blank image candidate that meet a criterion and store the DC values in the memory device; compare the determined number of DC values stored in the memory device meeting the criterion to a third threshold; and identify the compressed digital image as the blank image if the determined number of DC values exceeds the third threshold. 3. The computer readable storage disk or storage device of claim 2, wherein the DC values are included within a same slice of a frame. 4. The computer readable storage disk or storage device of claim 2, wherein, when the compressed digital image is identified as a blank image within a predetermined period of time after another blank image is identified, the instructions, when executed, further cause the processor to output a signal indicating that a portion of the media signal between the blank images is an advertisement. 5. The computer readable storage disk or storage device of claim 2, wherein determining the number of DC values meeting the criterion includes, for each DC value except for a first DC value in the plurality, determining if a difference between the DC value and a previous DC value is substantially zero. 6. The computer readable storage disk or storage device of claim 2, wherein determining the number of DC values meeting the criterion is performed without decompressing the compressed digital image. 7. The computer readable storage disk or storage device of claim 2, wherein determining the number of DC values meeting the criterion includes determining a number of relative DC values that are substantially equal to zero. 8. The computer readable storage disk or storage device of claim 2, wherein determining the number of DC values meeting the criterion includes determining a number of relative DC values that are less than a DC value threshold. 9. An apparatus to detect a blank image within a compressed media signal, the apparatus comprising: a buffer to store a compressed digital image, the compressed digital image being a frame of the compressed media signal; a blank frame candidate identifier to: analyze a total number of bits in the compressed digital image stored in the buffer to determine if the compressed digital image has a data size less than a first threshold; when the data size is less than the first threshold, determine a number of bits in multiple predetermined areas of the compressed digital image and store the number of bits associated with each of the multiple predetermined areas in the buffer; analyze the number of bits in multiple predetermined areas of the compressed digital image stored in the buffer to determine if a deviation between the number of bits within the multiple predetermined areas is less than a second threshold; when the deviation between the number of bits within the multiple predetermined areas is less than the second threshold, identify the compressed digital image as a blank image candidate; and when the compressed digital image is not identified as a blank image candidate, discard the compressed digital image from the buffer; and a blank frame tester to: when the compressed digital image is identified as a blank image candidate, determine a number of DC values of the blank image candidate that meet a criterion and store the DC values in the buffer; compare the determined number of DC values stored in the buffer meeting the criterion to a third threshold; and identify the compressed digital image as the blank image if the determined number of DC values exceeds the third threshold. 10. The apparatus of claim 9, wherein the DC values are included within a same slice of a frame. 11. The apparatus of claim 9, wherein, when the compressed digital image is identified as a blank image within a predetermined period of time after another blank image is identified, the blank frame tester is further to output a signal indicating that a portion of the media signal between the blank images is an advertisement. 12. The apparatus of claim 9, wherein the blank frame tester determines the number of DC values meeting the criterion by, for each DC value except for a first DC value in a plurality of DC values, determining if a difference between the DC value and a previous DC value is substantially zero. 13. The apparatus of claim 9, wherein the blank frame tester determines the number of DC values meeting the criterion without decompressing the compressed digital image. 14. The apparatus of claim 9, wherein the blank frame tester determines the number of DC values meeting the criterion by determining a number of relative DC values that are substantially equal to zero. 15. The apparatus of claim 9, wherein the blank frame tester determines the number of DC values meeting the criterion by determining a number of relative DC values that are less than a DC value threshold. 16. A method to detect a blank image within a compressed media signal, the method comprising: storing a compressed digital image in a memory device, the compressed digital image being a frame of the compressed media signal; analyzing, via a logic circuit, a total number of bits in the compressed digital image stored in the memory device to determine if the compressed digital image has a data size less than a first threshold; when the data size is less than the first threshold, determining, via the logic circuit, a number of bits in multiple predetermined areas of the compressed digital image and storing the number of bits associated with each of the multiple predetermined areas in the memory device; analyzing, via the logic circuit, the number of bits in multiple predetermined areas of the compressed digital image stored in the memory device to determine if a deviation between the number of bits within the multiple predetermined areas is less than a second threshold; when the deviation between the number of bits within the multiple predetermined areas is less than the second threshold, identifying, via the logic circuit, the compressed digital image as a blank image candidate; when the compressed digital image is not identified as a blank image candidate, discarding, via the logic circuit, the compressed digital image from the memory device; when the compressed digital image is identified as a blank image candidate, determining, via the logic circuit, a number of DC values of the blank image candidate that meet a criterion and storing the DC values in the memory device; comparing, via the logic circuit, the determined number of DC values stored in the memory device meeting the criterion to a third threshold; and identifying, via the logic circuit, the compressed digital image as the blank image if the determined number of DC values exceeds the third threshold. 17. The method of claim 16, wherein the DC values are included within a same slice of a frame. 18. The method of claim 16, further including, when the compressed digital image is identified as a blank image within a predetermined period of time after another blank image is identified, outputting a signal indicating that a portion of the media signal between the blank images is an advertisement. 19. The method of claim 16, wherein determining the number of DC values meeting the criterion includes, for each DC value except for a first DC value in the plurality, determining if a difference between the DC value and a previous DC value is substantially zero. 20. The method of claim 16, wherein determining the number of DC values meeting the criterion is performed without decompressing the compressed digital image. 21. The method of claim 16, wherein determining the number of DC values meeting the criterion includes determining a number of relative DC values that are substantially equal to zero.
2,400
9,097
9,097
16,374,359
2,436
Novel techniques for averting unsanctioned access to on-board vehicle networks include obtaining indications of detected stimuli and/or conditions that are external to a target computing device, and determining whether or not the detected stimuli/conditions are indicative of the target computing device being utilized, operated, held, and/or carried by a person on-board the vehicle. External stimuli/conditions may include signals transmitted by other devices on-board the vehicle, ad-hoc data received via various interfaces of the target computing device, comparisons of vehicle heuristic data with data generated by components of the target computing device, etc. A confidence score may be generated (e.g., over time) based on detected stimuli/conditions. Access of the target computing device to an on-board vehicle network may be granted or denied based on the detected stimuli/conditions and/or the confidence score. Further, the novel techniques are not required to use any user input.
1. A method of averting unsanctioned access to a network on-board a vehicle, the network being an on-board network, and the method comprising: detecting, at a portable computing device disposed on-board the vehicle, multiple conditions; evaluating, by the portable computing device, at least one of a timing or a weighting of the detected multiple conditions to thereby determine a confidence score, the confidence score indicative of a likelihood of the portable computing device being operated, held, or carried by one or more persons on-board the vehicle; granting access of the portable computing device to the on-board network when the confidence score is above a threshold; and denying access of the portable computing device to the on-board network when the confidence score is below the threshold. 2. The method of claim 1, wherein detecting the multiple conditions includes detecting at least one condition generated external to the portable computing device. 3. The method of claim 1, wherein detecting the multiple conditions includes detecting at least one condition that is contextual to the vehicle. 4. The method of claim 3, wherein detecting the at least one condition that is contextual to the vehicle comprises detecting at least one signal generated by another device onboard the vehicle. 5. The method of claim 1, wherein detecting the multiple conditions includes detecting at least one condition via a sensor or a user interface of the portable computing device. 6. The method of claim 5, wherein detecting at least one condition via the sensor or the user interface of the portable computing device includes detecting a condition other than a user response to a challenge issued by the portable computing device. 7. The method of claim 1, wherein: detecting the multiple conditions comprises detecting one or more respective occurrences of one or more of the multiple conditions over an interval of time; and evaluating the at least one of the timing or the weighting of the detected multiple conditions to thereby determine the confidence score includes evaluating the timing of the detected one or more respective occurrences of the one or more multiple conditions over the interval of time to thereby determine the confidence score. 8. The method of claim 1, wherein evaluating the at least one of the timing or the weighting of the detected multiple conditions to thereby determine the confidence score comprises aggregating respective weight values of the detected multiple conditions to thereby determine the confidence score. 9. The method of claim 8, wherein aggregating the respective weight values of the detected multiple conditions to thereby determine the confidence score comprises aggregating the respective weight values of the detected multiple conditions over an interval of time to thereby determine the confidence score. 10. The method of claim 1, wherein the confidence score is above the threshold and access of the portable computing device to the on-board network is granted, and wherein the method further comprises: monitoring for any occurrences of any of the multiple conditions over an interval of time; maintaining access of the portable computing device to the on-board network when an occurrence of any of the multiple conditions is detected during the interval of time; and denying access of the portable computing device to the on-board network when no occurrence of any of the multiple conditions is detected during the interval of time. 11. A system for averting unsanctioned access to a network on-board a vehicle, the network being an on-board network, and the system comprising a portable computing device having: one or more wireless interfaces; one or more processors; and one or more non-transitory, tangible memory storing computer-executable instructions thereon that, when executed by the one or more processors, cause the portable computing device to: detect multiple conditions; evaluate at least one of a timing or a weighting of the detected multiple conditions to thereby determine a confidence score, the confidence score indicative of a likelihood of the portable computing device being operated, held, or carried by one or more persons on-board the vehicle; grant wireless access of the portable computing device to the on-board network when the confidence score is above a threshold; and deny wireless access of the portable computing device to the on-board network when the confidence score is below the threshold. 12. The system of claim 11, wherein the multiple conditions include at least one condition generated external to the portable computing device. 13. The system of claim 11, wherein the multiple conditions include at least one condition that is contextual to the vehicle. 14. The system of claim 13, wherein the at least one condition that is contextual to the vehicle includes at least one signal generated by another device onboard the vehicle. 15. The system of claim 11, wherein the multiple conditions include at least one condition detected via a sensor or a user interface of the portable computing device. 16. The system of claim 15, wherein the at least one condition detected via the sensor or the user interface of the portable computing device includes a condition other than a user response to a challenge issued by the portable computing device. 17. The system of claim 11, wherein: the multiple conditions include one or more respective occurrences of one or more of the multiple conditions over an interval of time; and the timing of the detected one or more respective occurrences of the one or more multiple conditions is evaluated over the interval of time to thereby determine the confidence score. 18. The system of claim 11, wherein the evaluation of the at least one of the timing or the weighting of the detected multiple conditions comprises an aggregation of respective weight values of the detected multiple conditions. 19. The system of claim 18, wherein the aggregation of the respective weight values of the detected multiple conditions comprises an aggregation of the respective weight values of the detected multiple conditions over an interval of time. 20. The system of claim 11, wherein the confidence score is above the threshold and access of the portable computing device to the on-board network is granted, and wherein the computer-executable instructions, when executed by the one or more processors, cause the portable computing device further to: monitor for any occurrences of any of the multiple conditions over an interval of time; maintain access of the portable computing device to the on-board network when an occurrence of any of the multiple conditions is detected during the interval of time; and deny access of the portable computing device to the on-board network when no occurrence of any of the multiple conditions is detected during the interval of time.
Novel techniques for averting unsanctioned access to on-board vehicle networks include obtaining indications of detected stimuli and/or conditions that are external to a target computing device, and determining whether or not the detected stimuli/conditions are indicative of the target computing device being utilized, operated, held, and/or carried by a person on-board the vehicle. External stimuli/conditions may include signals transmitted by other devices on-board the vehicle, ad-hoc data received via various interfaces of the target computing device, comparisons of vehicle heuristic data with data generated by components of the target computing device, etc. A confidence score may be generated (e.g., over time) based on detected stimuli/conditions. Access of the target computing device to an on-board vehicle network may be granted or denied based on the detected stimuli/conditions and/or the confidence score. Further, the novel techniques are not required to use any user input.1. A method of averting unsanctioned access to a network on-board a vehicle, the network being an on-board network, and the method comprising: detecting, at a portable computing device disposed on-board the vehicle, multiple conditions; evaluating, by the portable computing device, at least one of a timing or a weighting of the detected multiple conditions to thereby determine a confidence score, the confidence score indicative of a likelihood of the portable computing device being operated, held, or carried by one or more persons on-board the vehicle; granting access of the portable computing device to the on-board network when the confidence score is above a threshold; and denying access of the portable computing device to the on-board network when the confidence score is below the threshold. 2. The method of claim 1, wherein detecting the multiple conditions includes detecting at least one condition generated external to the portable computing device. 3. The method of claim 1, wherein detecting the multiple conditions includes detecting at least one condition that is contextual to the vehicle. 4. The method of claim 3, wherein detecting the at least one condition that is contextual to the vehicle comprises detecting at least one signal generated by another device onboard the vehicle. 5. The method of claim 1, wherein detecting the multiple conditions includes detecting at least one condition via a sensor or a user interface of the portable computing device. 6. The method of claim 5, wherein detecting at least one condition via the sensor or the user interface of the portable computing device includes detecting a condition other than a user response to a challenge issued by the portable computing device. 7. The method of claim 1, wherein: detecting the multiple conditions comprises detecting one or more respective occurrences of one or more of the multiple conditions over an interval of time; and evaluating the at least one of the timing or the weighting of the detected multiple conditions to thereby determine the confidence score includes evaluating the timing of the detected one or more respective occurrences of the one or more multiple conditions over the interval of time to thereby determine the confidence score. 8. The method of claim 1, wherein evaluating the at least one of the timing or the weighting of the detected multiple conditions to thereby determine the confidence score comprises aggregating respective weight values of the detected multiple conditions to thereby determine the confidence score. 9. The method of claim 8, wherein aggregating the respective weight values of the detected multiple conditions to thereby determine the confidence score comprises aggregating the respective weight values of the detected multiple conditions over an interval of time to thereby determine the confidence score. 10. The method of claim 1, wherein the confidence score is above the threshold and access of the portable computing device to the on-board network is granted, and wherein the method further comprises: monitoring for any occurrences of any of the multiple conditions over an interval of time; maintaining access of the portable computing device to the on-board network when an occurrence of any of the multiple conditions is detected during the interval of time; and denying access of the portable computing device to the on-board network when no occurrence of any of the multiple conditions is detected during the interval of time. 11. A system for averting unsanctioned access to a network on-board a vehicle, the network being an on-board network, and the system comprising a portable computing device having: one or more wireless interfaces; one or more processors; and one or more non-transitory, tangible memory storing computer-executable instructions thereon that, when executed by the one or more processors, cause the portable computing device to: detect multiple conditions; evaluate at least one of a timing or a weighting of the detected multiple conditions to thereby determine a confidence score, the confidence score indicative of a likelihood of the portable computing device being operated, held, or carried by one or more persons on-board the vehicle; grant wireless access of the portable computing device to the on-board network when the confidence score is above a threshold; and deny wireless access of the portable computing device to the on-board network when the confidence score is below the threshold. 12. The system of claim 11, wherein the multiple conditions include at least one condition generated external to the portable computing device. 13. The system of claim 11, wherein the multiple conditions include at least one condition that is contextual to the vehicle. 14. The system of claim 13, wherein the at least one condition that is contextual to the vehicle includes at least one signal generated by another device onboard the vehicle. 15. The system of claim 11, wherein the multiple conditions include at least one condition detected via a sensor or a user interface of the portable computing device. 16. The system of claim 15, wherein the at least one condition detected via the sensor or the user interface of the portable computing device includes a condition other than a user response to a challenge issued by the portable computing device. 17. The system of claim 11, wherein: the multiple conditions include one or more respective occurrences of one or more of the multiple conditions over an interval of time; and the timing of the detected one or more respective occurrences of the one or more multiple conditions is evaluated over the interval of time to thereby determine the confidence score. 18. The system of claim 11, wherein the evaluation of the at least one of the timing or the weighting of the detected multiple conditions comprises an aggregation of respective weight values of the detected multiple conditions. 19. The system of claim 18, wherein the aggregation of the respective weight values of the detected multiple conditions comprises an aggregation of the respective weight values of the detected multiple conditions over an interval of time. 20. The system of claim 11, wherein the confidence score is above the threshold and access of the portable computing device to the on-board network is granted, and wherein the computer-executable instructions, when executed by the one or more processors, cause the portable computing device further to: monitor for any occurrences of any of the multiple conditions over an interval of time; maintain access of the portable computing device to the on-board network when an occurrence of any of the multiple conditions is detected during the interval of time; and deny access of the portable computing device to the on-board network when no occurrence of any of the multiple conditions is detected during the interval of time.
2,400
9,098
9,098
16,516,117
2,439
A device may select an individual that is a candidate for authentication by facial recognition. The device may identify a facial area of the individual and an area of exposed skin of the individual. The device may obtain a first temperature associated with the facial area of the individual and a second temperature associated with the area of exposed skin of the individual. The device may determine, based on the first temperature and the second temperature, whether an appearance of the facial area of the individual is likely altered by a face-altering technology. The device may selectively perform facial recognition on the facial area of the individual based on whether the appearance of the facial area of the individual is likely altered by the face-altering technology.
1. A method, comprising: selecting, by a device, an individual that is a candidate for authentication by facial recognition; identifying, by the device and based on selecting the individual, a facial area of the individual and an area of exposed skin of the individual, wherein the area of exposed skin of the individual is not associated with the facial area of the individual; obtaining, by the device, a first temperature associated with the facial area of the individual and a second temperature associated with the area of exposed skin of the individual; determining, by the device and based on a comparison of the first temperature and the second temperature, whether the first temperature is between an upper temperature threshold and a lower temperature threshold, the upper temperature threshold and the lower temperature threshold being based on the second temperature; determining, by the device and based on determining whether the first temperature is between the upper temperature threshold and the lower temperature threshold, whether an appearance of the facial area of the individual is likely altered by a face-altering technology, wherein the first temperature being between the upper temperature threshold and the lower temperature threshold indicates that the appearance of the facial area of the individual is likely not altered by the face-altering technology, wherein the first temperature being above the upper temperature threshold or below the lower temperature threshold indicates that the appearance of the facial area of the individual is likely altered by the face-altering technology; and selectively performing, by the device, facial recognition on the facial area of the individual based on whether the appearance of the facial area of the individual is likely altered by the face-altering technology. 2. The method of claim 1, wherein selecting the individual that is the candidate for authentication by facial recognition comprises: selecting the individual that is the candidate for authentication by facial recognition based on a proximity of the individual to a transaction device. 3. The method of claim 1, further comprising: determining a first perspiration level on the facial area of the individual and determining a second perspiration level on the area of exposed skin of the individual, wherein the first temperature corresponding to the second temperature and the first perspiration level corresponding to the second perspiration level indicates that the appearance of the facial area of the individual is likely not altered by the face-altering technology, wherein the first temperature not corresponding to the second temperature or the first perspiration level not corresponding to the second perspiration level indicates that the appearance of the facial area of the individual is likely altered by the face-altering technology. 4. The method of claim 3, wherein the first perspiration level and the second perspiration level are determined by one or more of: computer vision, infrared moisture detection, or galvanic skin response detection. 5. The method of claim 1, further comprising: determining that the appearance of the facial area of the individual is likely not altered by the face-altering technology; and performing authentication of the individual using facial recognition. 6. The method of claim 1, further comprising: determining that the appearance of the facial area of the individual is likely altered by the face-altering technology; and performing authentication of the individual using a technique that does not include facial recognition. 7. The method of claim 1, wherein the face-altering technology is at least one of a mask, a facial prosthetic, a bandage, or an eyepatch. 8. A device, comprising: one or more memories; and one or more processors, communicatively coupled to the one or more memories, configured to: select an individual that is a candidate for authentication by facial recognition; obtain a first temperature associated with a facial area of the individual; obtain a second temperature associated with a non-facial area of exposed skin of the individual; determine, based on a comparison of the first temperature and the second temperature, whether the first temperature is between an upper temperature threshold and a lower temperature threshold, the upper temperature threshold and the lower temperature threshold being based on the second temperature; determine, based on determining whether the first temperature is between the upper temperature threshold and the lower temperature threshold, whether an appearance of the facial area of the individual is likely altered by a face-altering technology, wherein the first temperature being between the upper temperature threshold and the lower temperature threshold indicates that the appearance of the facial area of the individual is likely not altered by the face-altering technology, wherein the first temperature being above the upper temperature threshold or below the lower temperature threshold indicates that the appearance of the facial area of the individual is likely altered by the face-altering technology; and selectively perform facial recognition on the facial area of the individual based on whether the appearance of the facial area of the individual is likely altered by the face-altering technology. 9. The device of claim 8, wherein the one or more processors, when obtaining the first temperature and determining whether the first temperature is between the upper temperature threshold and the lower temperature threshold, are further configured to: obtain the first temperature and determine whether the first temperature is between the upper temperature threshold and the lower temperature threshold before the individual is within a threshold distance from a transaction device. 10. The device of claim 8, wherein the one or more processors are further configured to: determine that the appearance of the facial area of the individual is likely not altered by the face-altering technology; and perform authentication of the individual using facial recognition. 11. The device of claim 8, wherein the one or more processors are further configured to: determine that the appearance of the facial area of the individual is likely altered by the face-altering technology; and perform authentication of the individual using a technique that does not include facial recognition. 12. (canceled) 13. The device of claim 8, wherein the one or more processors are further configured to: determine whether a recess associated with an eye of the individual satisfies a threshold value, wherein the first temperature being between the upper temperature threshold and the lower temperature threshold, and the recess associated with the eye satisfying the threshold value, indicates that the appearance of the facial area of the individual is likely not altered by the face-altering technology, wherein the first temperature being above the upper temperature threshold or below the lower temperature threshold, or the recess associated with the eye failing to satisfy the threshold value, indicates that the appearance of the facial area of the individual is likely altered by the face-altering technology. 14. The device of claim 8, wherein the one or more processors are further configured to: determine that the appearance of the facial area of the individual is likely altered by the face-altering technology; request that the individual perform one or more facial expressions; determine that the one or more facial expressions indicate that the appearance of the facial area of the individual is likely altered by the face-altering technology; and determine that the individual is not to be authenticated according to facial recognition. 15. A non-transitory computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors, cause the one or more processors to: select an individual that is a candidate for authentication by facial recognition; identify, based on selecting the individual, a facial area of the individual and an area of exposed skin of the individual, wherein the area of exposed skin of the individual is not associated with the facial area of the individual; obtain a first temperature associated with the facial area of the individual and a second temperature associated with the area of exposed skin of the individual; determine, based on a comparison of the first temperature and the second temperature, whether the first temperature is between an upper temperature threshold and a lower temperature threshold, the upper temperature threshold and the lower temperature threshold being based on the second temperature; determine, based on determining whether the first temperature is between the upper temperature threshold and the lower temperature threshold, whether an appearance of the facial area of the individual is likely altered by a face-altering technology, wherein the first temperature being between the upper temperature threshold and the lower temperature threshold indicates that the appearance of the facial area of the individual is likely not altered by the face-altering technology, wherein the first temperature being above the upper temperature threshold or below the lower temperature threshold indicates that the appearance of the facial area of the individual is likely altered by the face-altering technology; and selectively perform facial recognition on the facial area of the individual based on whether the appearance of the facial area of the individual is likely altered by the face-altering technology. 16. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, that cause the one or more processors to select the individual that is the candidate for authentication by facial recognition, cause the one or more processors to: select the individual that is the candidate for authentication by facial recognition based on a request by the individual to access an account. 17. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine that the appearance of the facial area of the individual is likely not altered by the face-altering technology; and perform authentication of the individual using facial recognition. 18. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine that the appearance of the facial area of the individual is likely altered by the face-altering technology; and perform authentication of the individual using a technique that does not include facial recognition. 19. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, that cause the one or more processors to identify the facial area of the individual and the area of exposed skin of the individual, cause the one or more processors to: identify the facial area of the individual and the area of exposed skin of the individual using computer vision. 20. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, that cause the one or more processors to obtain the first temperature and the second temperature, cause the one or more processors to: obtain the first temperature and the second temperature from an infrared sensor. 21. The device of claim 8, wherein the one or more processors are further configured to: determine, using a machine learning model, an estimated level of moisture of the facial area; obtain data identifying an actual level of moisture of the facial area; and wherein the one or more processors, when determining whether the appearance of the facial area of the individual is likely altered by face-altering technology, are further configured to: determine whether the appearance of the facial area of the individual is likely altered by face-altering technology based on a comparison of the actual level of moisture to the estimated level of moisture.
A device may select an individual that is a candidate for authentication by facial recognition. The device may identify a facial area of the individual and an area of exposed skin of the individual. The device may obtain a first temperature associated with the facial area of the individual and a second temperature associated with the area of exposed skin of the individual. The device may determine, based on the first temperature and the second temperature, whether an appearance of the facial area of the individual is likely altered by a face-altering technology. The device may selectively perform facial recognition on the facial area of the individual based on whether the appearance of the facial area of the individual is likely altered by the face-altering technology.1. A method, comprising: selecting, by a device, an individual that is a candidate for authentication by facial recognition; identifying, by the device and based on selecting the individual, a facial area of the individual and an area of exposed skin of the individual, wherein the area of exposed skin of the individual is not associated with the facial area of the individual; obtaining, by the device, a first temperature associated with the facial area of the individual and a second temperature associated with the area of exposed skin of the individual; determining, by the device and based on a comparison of the first temperature and the second temperature, whether the first temperature is between an upper temperature threshold and a lower temperature threshold, the upper temperature threshold and the lower temperature threshold being based on the second temperature; determining, by the device and based on determining whether the first temperature is between the upper temperature threshold and the lower temperature threshold, whether an appearance of the facial area of the individual is likely altered by a face-altering technology, wherein the first temperature being between the upper temperature threshold and the lower temperature threshold indicates that the appearance of the facial area of the individual is likely not altered by the face-altering technology, wherein the first temperature being above the upper temperature threshold or below the lower temperature threshold indicates that the appearance of the facial area of the individual is likely altered by the face-altering technology; and selectively performing, by the device, facial recognition on the facial area of the individual based on whether the appearance of the facial area of the individual is likely altered by the face-altering technology. 2. The method of claim 1, wherein selecting the individual that is the candidate for authentication by facial recognition comprises: selecting the individual that is the candidate for authentication by facial recognition based on a proximity of the individual to a transaction device. 3. The method of claim 1, further comprising: determining a first perspiration level on the facial area of the individual and determining a second perspiration level on the area of exposed skin of the individual, wherein the first temperature corresponding to the second temperature and the first perspiration level corresponding to the second perspiration level indicates that the appearance of the facial area of the individual is likely not altered by the face-altering technology, wherein the first temperature not corresponding to the second temperature or the first perspiration level not corresponding to the second perspiration level indicates that the appearance of the facial area of the individual is likely altered by the face-altering technology. 4. The method of claim 3, wherein the first perspiration level and the second perspiration level are determined by one or more of: computer vision, infrared moisture detection, or galvanic skin response detection. 5. The method of claim 1, further comprising: determining that the appearance of the facial area of the individual is likely not altered by the face-altering technology; and performing authentication of the individual using facial recognition. 6. The method of claim 1, further comprising: determining that the appearance of the facial area of the individual is likely altered by the face-altering technology; and performing authentication of the individual using a technique that does not include facial recognition. 7. The method of claim 1, wherein the face-altering technology is at least one of a mask, a facial prosthetic, a bandage, or an eyepatch. 8. A device, comprising: one or more memories; and one or more processors, communicatively coupled to the one or more memories, configured to: select an individual that is a candidate for authentication by facial recognition; obtain a first temperature associated with a facial area of the individual; obtain a second temperature associated with a non-facial area of exposed skin of the individual; determine, based on a comparison of the first temperature and the second temperature, whether the first temperature is between an upper temperature threshold and a lower temperature threshold, the upper temperature threshold and the lower temperature threshold being based on the second temperature; determine, based on determining whether the first temperature is between the upper temperature threshold and the lower temperature threshold, whether an appearance of the facial area of the individual is likely altered by a face-altering technology, wherein the first temperature being between the upper temperature threshold and the lower temperature threshold indicates that the appearance of the facial area of the individual is likely not altered by the face-altering technology, wherein the first temperature being above the upper temperature threshold or below the lower temperature threshold indicates that the appearance of the facial area of the individual is likely altered by the face-altering technology; and selectively perform facial recognition on the facial area of the individual based on whether the appearance of the facial area of the individual is likely altered by the face-altering technology. 9. The device of claim 8, wherein the one or more processors, when obtaining the first temperature and determining whether the first temperature is between the upper temperature threshold and the lower temperature threshold, are further configured to: obtain the first temperature and determine whether the first temperature is between the upper temperature threshold and the lower temperature threshold before the individual is within a threshold distance from a transaction device. 10. The device of claim 8, wherein the one or more processors are further configured to: determine that the appearance of the facial area of the individual is likely not altered by the face-altering technology; and perform authentication of the individual using facial recognition. 11. The device of claim 8, wherein the one or more processors are further configured to: determine that the appearance of the facial area of the individual is likely altered by the face-altering technology; and perform authentication of the individual using a technique that does not include facial recognition. 12. (canceled) 13. The device of claim 8, wherein the one or more processors are further configured to: determine whether a recess associated with an eye of the individual satisfies a threshold value, wherein the first temperature being between the upper temperature threshold and the lower temperature threshold, and the recess associated with the eye satisfying the threshold value, indicates that the appearance of the facial area of the individual is likely not altered by the face-altering technology, wherein the first temperature being above the upper temperature threshold or below the lower temperature threshold, or the recess associated with the eye failing to satisfy the threshold value, indicates that the appearance of the facial area of the individual is likely altered by the face-altering technology. 14. The device of claim 8, wherein the one or more processors are further configured to: determine that the appearance of the facial area of the individual is likely altered by the face-altering technology; request that the individual perform one or more facial expressions; determine that the one or more facial expressions indicate that the appearance of the facial area of the individual is likely altered by the face-altering technology; and determine that the individual is not to be authenticated according to facial recognition. 15. A non-transitory computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors, cause the one or more processors to: select an individual that is a candidate for authentication by facial recognition; identify, based on selecting the individual, a facial area of the individual and an area of exposed skin of the individual, wherein the area of exposed skin of the individual is not associated with the facial area of the individual; obtain a first temperature associated with the facial area of the individual and a second temperature associated with the area of exposed skin of the individual; determine, based on a comparison of the first temperature and the second temperature, whether the first temperature is between an upper temperature threshold and a lower temperature threshold, the upper temperature threshold and the lower temperature threshold being based on the second temperature; determine, based on determining whether the first temperature is between the upper temperature threshold and the lower temperature threshold, whether an appearance of the facial area of the individual is likely altered by a face-altering technology, wherein the first temperature being between the upper temperature threshold and the lower temperature threshold indicates that the appearance of the facial area of the individual is likely not altered by the face-altering technology, wherein the first temperature being above the upper temperature threshold or below the lower temperature threshold indicates that the appearance of the facial area of the individual is likely altered by the face-altering technology; and selectively perform facial recognition on the facial area of the individual based on whether the appearance of the facial area of the individual is likely altered by the face-altering technology. 16. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, that cause the one or more processors to select the individual that is the candidate for authentication by facial recognition, cause the one or more processors to: select the individual that is the candidate for authentication by facial recognition based on a request by the individual to access an account. 17. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine that the appearance of the facial area of the individual is likely not altered by the face-altering technology; and perform authentication of the individual using facial recognition. 18. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine that the appearance of the facial area of the individual is likely altered by the face-altering technology; and perform authentication of the individual using a technique that does not include facial recognition. 19. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, that cause the one or more processors to identify the facial area of the individual and the area of exposed skin of the individual, cause the one or more processors to: identify the facial area of the individual and the area of exposed skin of the individual using computer vision. 20. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions, that cause the one or more processors to obtain the first temperature and the second temperature, cause the one or more processors to: obtain the first temperature and the second temperature from an infrared sensor. 21. The device of claim 8, wherein the one or more processors are further configured to: determine, using a machine learning model, an estimated level of moisture of the facial area; obtain data identifying an actual level of moisture of the facial area; and wherein the one or more processors, when determining whether the appearance of the facial area of the individual is likely altered by face-altering technology, are further configured to: determine whether the appearance of the facial area of the individual is likely altered by face-altering technology based on a comparison of the actual level of moisture to the estimated level of moisture.
2,400
9,099
9,099
16,697,813
2,448
A method and apparatus for performing a communication and collaboration session. The performance of the session can include a first participant selecting, during the ongoing communication and collaboration session, a second participant of the communication session with whom a follow-up conversation needs to be held after the termination of the ongoing communication and collaboration session and sending, during the ongoing communication and collaboration session, a notification about the intended follow-up conversation to the second participant. After the session is terminated, a communication line between the first participant and the second participant can be automatically established. A communication server that can host the session and support the automatic establishment of the follow-up conversation communication connection can be incorporated into a system or apparatus that can utilize an embodiment of the method.
1. A computer-implemented method of performing a communication and collaboration session, wherein a plurality of participants communicate with each other via a WebRTC communication and collaboration system comprising a communication server via which a plurality of clients used by the participants are connected to each other, the method comprising the following steps: during the communication session, maintaining a plurality of communication lines between each client of the plurality of clients and a communication server, selecting, during the ongoing communication and collaboration session, by a first participant, a second participant of the communication session, with whom a follow-up conversation needs to be held after the termination of the ongoing communication and collaboration session, sending, during the ongoing communication and collaboration session, a notification about the intended follow-up conversation to the second participant; terminating the communication and collaboration session by separating all communication lines between each client of the plurality of clients and the communication server, and automatically establishing a communication line between the first participant and the second participant. 2. The computer-implemented method according to claim 1, wherein the notification sent by the first participant is displayed on a screen of the second participant's client in a pop-up window. 3. The computer-implemented method according to claim 2, wherein the pop-up window comprises a message concerning the follow-up conversation generated by the first participant or generated automatically. 4. The computer-implemented method according to claim 1, wherein the sending of a notification is initiated by the first participant by clicking on a button provided on a screen of the first participant's client. 5. The computer-implemented method according to claim 1, wherein the follow-up conversation is initiated by the first participant by clicking on an avatar of the second participant. 6. The computer-implemented method according to claim 1, wherein the method further comprises a step of verifying whether the second participant is sharing his or her screen with the other participants of the communication and collaboration session. 7. The computer-implemented method according to claim 6, in response to determining that the the second participant is sharing his or her screen with the other participants of the communication and collaboration session, the notification is sent as a message from the first participant to the second participant as a private conversation to avoid notification of the intended follow-up conversation being displayed on the shared screen. 8. The computer-implemented method according to claim 1, wherein the communication and collaboration session is a telephone conference. 9. The computer-implemented method according to claim 1, wherein a predetermined time period at the end of the communication and collaboration session is recorded, and the recorded text is transcribed so as to be presented as an agenda in the follow-up conversation. 10. A communication and collaboration system comprising a communication server having a processor and a non-transitory computer readable medium having an application stored thereon, the application defining a method that is performed when the application is run by the processor, the method comprising: during the communication session, maintaining a plurality of communication lines between each client of the plurality of clients and a communication server, sending, during an ongoing communication and collaboration session, a notification about an intended follow-up conversation to a second participant in response to receiving a request for the intended follow-up conversation from a first participant during the ongoing communication and collaboration session, terminating the communication and collaboration session by separating all communication lines between each client of a plurality of clients and the communication server, and automatically establishing a communication line between the first participant and the second participant after the communication and collaboration session is terminated in response to the receipt of the request for the intended follow-up conversation from the first participant. 11. The communication and collaboration system of claim 10, comprising: the clients communicatively connectable to the communication server. 12. The communication and collaboration system of claim 11, wherein each of the clients includes a processor connected to a non-transitory computer readable medium. 13. The communication and collaboration system of claim 10, wherein the method further comprises the communication server verifying whether the second participant is sharing his or her screen with other participants of the communication and collaboration session, and in response to determining that the the second participant is sharing his or her screen with the other participants of the communication and collaboration session, sending the notification as a message from the first participant to the second participant included in a private conversation between the first participant and the second participant to avoid notification of the intended follow-up conversation being displayed on the shared screen. 14. The communication and collaboration system of claim 13, wherein the message of the private conversation is a text message or an instant message.
A method and apparatus for performing a communication and collaboration session. The performance of the session can include a first participant selecting, during the ongoing communication and collaboration session, a second participant of the communication session with whom a follow-up conversation needs to be held after the termination of the ongoing communication and collaboration session and sending, during the ongoing communication and collaboration session, a notification about the intended follow-up conversation to the second participant. After the session is terminated, a communication line between the first participant and the second participant can be automatically established. A communication server that can host the session and support the automatic establishment of the follow-up conversation communication connection can be incorporated into a system or apparatus that can utilize an embodiment of the method.1. A computer-implemented method of performing a communication and collaboration session, wherein a plurality of participants communicate with each other via a WebRTC communication and collaboration system comprising a communication server via which a plurality of clients used by the participants are connected to each other, the method comprising the following steps: during the communication session, maintaining a plurality of communication lines between each client of the plurality of clients and a communication server, selecting, during the ongoing communication and collaboration session, by a first participant, a second participant of the communication session, with whom a follow-up conversation needs to be held after the termination of the ongoing communication and collaboration session, sending, during the ongoing communication and collaboration session, a notification about the intended follow-up conversation to the second participant; terminating the communication and collaboration session by separating all communication lines between each client of the plurality of clients and the communication server, and automatically establishing a communication line between the first participant and the second participant. 2. The computer-implemented method according to claim 1, wherein the notification sent by the first participant is displayed on a screen of the second participant's client in a pop-up window. 3. The computer-implemented method according to claim 2, wherein the pop-up window comprises a message concerning the follow-up conversation generated by the first participant or generated automatically. 4. The computer-implemented method according to claim 1, wherein the sending of a notification is initiated by the first participant by clicking on a button provided on a screen of the first participant's client. 5. The computer-implemented method according to claim 1, wherein the follow-up conversation is initiated by the first participant by clicking on an avatar of the second participant. 6. The computer-implemented method according to claim 1, wherein the method further comprises a step of verifying whether the second participant is sharing his or her screen with the other participants of the communication and collaboration session. 7. The computer-implemented method according to claim 6, in response to determining that the the second participant is sharing his or her screen with the other participants of the communication and collaboration session, the notification is sent as a message from the first participant to the second participant as a private conversation to avoid notification of the intended follow-up conversation being displayed on the shared screen. 8. The computer-implemented method according to claim 1, wherein the communication and collaboration session is a telephone conference. 9. The computer-implemented method according to claim 1, wherein a predetermined time period at the end of the communication and collaboration session is recorded, and the recorded text is transcribed so as to be presented as an agenda in the follow-up conversation. 10. A communication and collaboration system comprising a communication server having a processor and a non-transitory computer readable medium having an application stored thereon, the application defining a method that is performed when the application is run by the processor, the method comprising: during the communication session, maintaining a plurality of communication lines between each client of the plurality of clients and a communication server, sending, during an ongoing communication and collaboration session, a notification about an intended follow-up conversation to a second participant in response to receiving a request for the intended follow-up conversation from a first participant during the ongoing communication and collaboration session, terminating the communication and collaboration session by separating all communication lines between each client of a plurality of clients and the communication server, and automatically establishing a communication line between the first participant and the second participant after the communication and collaboration session is terminated in response to the receipt of the request for the intended follow-up conversation from the first participant. 11. The communication and collaboration system of claim 10, comprising: the clients communicatively connectable to the communication server. 12. The communication and collaboration system of claim 11, wherein each of the clients includes a processor connected to a non-transitory computer readable medium. 13. The communication and collaboration system of claim 10, wherein the method further comprises the communication server verifying whether the second participant is sharing his or her screen with other participants of the communication and collaboration session, and in response to determining that the the second participant is sharing his or her screen with the other participants of the communication and collaboration session, sending the notification as a message from the first participant to the second participant included in a private conversation between the first participant and the second participant to avoid notification of the intended follow-up conversation being displayed on the shared screen. 14. The communication and collaboration system of claim 13, wherein the message of the private conversation is a text message or an instant message.
2,400