Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
9,200
9,200
13,811,581
2,483
The present disclosure provides a method and apparatus for subband-coding a frequency conversion unit and a video encoding/decoding method a video encoding/decoding apparatus using the same. The method and the apparatus for subband-coding the frequency conversion unit include generating an encoding stream by splitting the frequency conversion unit into one or more frequency domains, generating frequency domain encoding information according to whether there is a non-zero frequency coefficient in each frequency domain, scanning the frequency coefficient of each frequency domain to generate a frequency domain frequency coefficient stream, and binarizing and encoding the frequency domain encoding information and the scanned frequency domain frequency coefficient stream.
1-11. (canceled) 12. A video decoding apparatus, comprising: a decoder for receiving encoded data to extract frequency domain encoding information and a frequency domain frequency coefficient stream, splitting a frequency conversion unit into one or more frequency domains according to the frequency domain encoding information, and inversely scanning the frequency domain frequency coefficient stream according to the frequency domain encoding information and setting a quantization coefficient to reconstruct a transformed and quantized frequency conversion block; an inverse quantizer and inverse transformer for inversely quantizing and inversely transforming the frequency conversion block to reconstruct a residual block; a predictor for predicting a current block to generate a predicted block; and an adder for adding a reconstructed residual block and the predicted block to reconstruct the current block. 13. The video decoding apparatus of claim 12, wherein, the decoder sets all quantization coefficients of a corresponding frequency domain of the frequency conversion unit to “0” when the frequency domain has frequency domain encoding information which is “0”, and inversely scans the corresponding frequency domain frequency coefficient stream when the frequency domain has the frequency domain encoding information which is not “0”. 14. The video decoding apparatus of claim 12, wherein the decoder extracts the frequency domain encoding information from the encoded data with reference to a probability that the frequency domain encoding information is generated. 15. The video decoding apparatus of claim 12, wherein the decoder splits the frequency conversion unit by the unit of 4×4 subblocks or 8×8 subblocks. 16. The video decoding apparatus of claim 12, wherein the decoder splits the frequency conversion unit into a low frequency domain and one or more remaining domains except for the low frequency domain. 17. The video decoding apparatus of claim 16, wherein the low frequency domain is a left uppermost domain of the frequency conversion unit when a length and a width of the frequency conversion unit are equally split in half, respectively. 18. The video decoding apparatus of claim 12, wherein the decoder inversely scans the frequency domain frequency coefficient stream in parallel for each frequency domain. 19-38. (canceled) 39. A video decoding method, comprising: performing a decoding by receiving encoded data to extract frequency domain encoding information and a frequency domain frequency coefficient stream, splitting a frequency conversion unit into one or more frequency domains according to the frequency domain encoding information, inversely scanning a frequency domain frequency coefficient stream according to the frequency domain encoding information and setting a quantization coefficient to reconstruct a transformed and quantized frequency conversion block; inversely quantizing and inversely transforming a frequency conversion block to reconstruct a residual block; predicting a current block to generate a predicted block; and adding a reconstructed residual block and the predicted block to reconstruct the current block. 40. The video decoding method of claim 39, wherein the process of performing the decoding comprises setting all quantization coefficients of a corresponding frequency domain of the frequency conversion unit to “0” when the frequency domain has frequency domain encoding information which is “0”, and inversely scanning a corresponding frequency domain frequency coefficient stream when the frequency domain has the frequency domain encoding information which is not “0”. 41. The video decoding method of claim 39, wherein the process of performing the decoding comprises extracting the frequency domain encoding information from the encoded data with reference to a probability that the frequency domain encoding information is generated. 42. The video decoding method of claim 39, wherein the process of performing the decoding comprises splitting the frequency conversion unit by the unit of 4×4 subblocks or 8×8 subblocks. 43. The video decoding method of claim 39, wherein the process of performing the decoding comprises splitting the frequency conversion unit into a low frequency domain and one or more remaining domains except for the low frequency domain. 44. The video decoding method of claim 43, wherein the low frequency domain is a left uppermost domain of the frequency conversion unit when a length and a width of the frequency conversion unit are equally split in half, respectively. 45. The video decoding method of claim 39, wherein the process of performing the decoding comprises inversely scanning the frequency domain frequency coefficient stream in parallel for each frequency domain. 46-54. (canceled)
The present disclosure provides a method and apparatus for subband-coding a frequency conversion unit and a video encoding/decoding method a video encoding/decoding apparatus using the same. The method and the apparatus for subband-coding the frequency conversion unit include generating an encoding stream by splitting the frequency conversion unit into one or more frequency domains, generating frequency domain encoding information according to whether there is a non-zero frequency coefficient in each frequency domain, scanning the frequency coefficient of each frequency domain to generate a frequency domain frequency coefficient stream, and binarizing and encoding the frequency domain encoding information and the scanned frequency domain frequency coefficient stream.1-11. (canceled) 12. A video decoding apparatus, comprising: a decoder for receiving encoded data to extract frequency domain encoding information and a frequency domain frequency coefficient stream, splitting a frequency conversion unit into one or more frequency domains according to the frequency domain encoding information, and inversely scanning the frequency domain frequency coefficient stream according to the frequency domain encoding information and setting a quantization coefficient to reconstruct a transformed and quantized frequency conversion block; an inverse quantizer and inverse transformer for inversely quantizing and inversely transforming the frequency conversion block to reconstruct a residual block; a predictor for predicting a current block to generate a predicted block; and an adder for adding a reconstructed residual block and the predicted block to reconstruct the current block. 13. The video decoding apparatus of claim 12, wherein, the decoder sets all quantization coefficients of a corresponding frequency domain of the frequency conversion unit to “0” when the frequency domain has frequency domain encoding information which is “0”, and inversely scans the corresponding frequency domain frequency coefficient stream when the frequency domain has the frequency domain encoding information which is not “0”. 14. The video decoding apparatus of claim 12, wherein the decoder extracts the frequency domain encoding information from the encoded data with reference to a probability that the frequency domain encoding information is generated. 15. The video decoding apparatus of claim 12, wherein the decoder splits the frequency conversion unit by the unit of 4×4 subblocks or 8×8 subblocks. 16. The video decoding apparatus of claim 12, wherein the decoder splits the frequency conversion unit into a low frequency domain and one or more remaining domains except for the low frequency domain. 17. The video decoding apparatus of claim 16, wherein the low frequency domain is a left uppermost domain of the frequency conversion unit when a length and a width of the frequency conversion unit are equally split in half, respectively. 18. The video decoding apparatus of claim 12, wherein the decoder inversely scans the frequency domain frequency coefficient stream in parallel for each frequency domain. 19-38. (canceled) 39. A video decoding method, comprising: performing a decoding by receiving encoded data to extract frequency domain encoding information and a frequency domain frequency coefficient stream, splitting a frequency conversion unit into one or more frequency domains according to the frequency domain encoding information, inversely scanning a frequency domain frequency coefficient stream according to the frequency domain encoding information and setting a quantization coefficient to reconstruct a transformed and quantized frequency conversion block; inversely quantizing and inversely transforming a frequency conversion block to reconstruct a residual block; predicting a current block to generate a predicted block; and adding a reconstructed residual block and the predicted block to reconstruct the current block. 40. The video decoding method of claim 39, wherein the process of performing the decoding comprises setting all quantization coefficients of a corresponding frequency domain of the frequency conversion unit to “0” when the frequency domain has frequency domain encoding information which is “0”, and inversely scanning a corresponding frequency domain frequency coefficient stream when the frequency domain has the frequency domain encoding information which is not “0”. 41. The video decoding method of claim 39, wherein the process of performing the decoding comprises extracting the frequency domain encoding information from the encoded data with reference to a probability that the frequency domain encoding information is generated. 42. The video decoding method of claim 39, wherein the process of performing the decoding comprises splitting the frequency conversion unit by the unit of 4×4 subblocks or 8×8 subblocks. 43. The video decoding method of claim 39, wherein the process of performing the decoding comprises splitting the frequency conversion unit into a low frequency domain and one or more remaining domains except for the low frequency domain. 44. The video decoding method of claim 43, wherein the low frequency domain is a left uppermost domain of the frequency conversion unit when a length and a width of the frequency conversion unit are equally split in half, respectively. 45. The video decoding method of claim 39, wherein the process of performing the decoding comprises inversely scanning the frequency domain frequency coefficient stream in parallel for each frequency domain. 46-54. (canceled)
2,400
9,201
9,201
15,655,864
2,456
Techniques for managing static and dynamic partitions in software-defined infrastructures (SDI) are described. An SDI manager component may include one or more processor circuits to access one or more resources. The SDI manager component may include a partition manager to create one or more partitions using the one or more resources, the one or more partitions each including a plurality of nodes of a similar resource type. The SDI manager may generate an update to a pre-composed partition table, stored within a non-transitory computer-readable storage medium, including the created one or more partitions, and receive a request from an orchestrator for a node. The SDI manager may select one of the created one or more partitions to the orchestrator based upon the pre-composed partition table, and identify the selected partition to the orchestrator. Other embodiments are described and claimed.
1. A software-defined infrastructure (SDI) system, comprising: an SDI manager component, including one or more processor circuits to access one or more resources, the SDI manager component including a partition manager to: create one or more partitions using the one or more resources, the one or more partitions each including a plurality of nodes of a similar resource type; generate an update to a pre-composed partition table, stored within a non-transitory computer-readable storage medium, including the created one or more partitions; receive a request from an orchestrator for a node; selecting one of the created one or more partitions to the orchestrator based upon the pre-composed partition table; and identifying the selected partition to the orchestrator. 2. The SDI system of claim 1, the partition manager to receive an instruction from the orchestrator to create a partition prior to the orchestrator running an application. 3. The SDI system of claim 1, the one or more partitions are created based upon user-defined settings stored within the SDI system. 4. The SDI system of claim 3, wherein the one or more partitions are created at boot time. 5. The SDI system of claim 1, wherein the one or more partitions are created based upon a dynamically generated instruction from the orchestrator. 6. The SDI system of claim 5, wherein the dynamically generated instruction is based upon detected demand within the SDI system for nodes of a type that are not available in existing partitions. 7. The SDI system of claim 2, wherein the instruction to create a partition indicates that an existing partition should be extended. 8. The SDI system of claim 2, wherein the instruction to create a partition indicates that an existing partition should be reduced in size. 9. The SDI system of claim 1, wherein the orchestrator runs an application on the identified partition. 10. The SDI system of claim 1, wherein the partition manager to: receive an instruction to create a partition using the one or more remote resources; and update an orchestrator of the SDI system indicating that the partition has been created. 11. A computer-implemented method, comprising: creating one or more partitions using the one or more resources, the one or more partitions each including a plurality of nodes of a similar resource type; generating an update to a pre-composed partition table, stored within a non-transitory computer-readable storage medium, including the created one or more partitions; receiving a request from an orchestrator for a node; selecting one of the created one or more partitions to the orchestrator based upon the pre-composed partition table; and identifying the selected partition to the orchestrator. 12. The method of claim 11, further comprising receiving an instruction from the orchestrator to create a partition prior to the orchestrator running an application. 13. The method of claim 11, the one or more partitions are created based upon user-defined settings stored within the SDI system. 14. The method of claim 11, wherein the request from the orchestrator for a node identifies a resource type. 15. The method of claim 11, wherein the one or more partitions are created based upon a dynamically generated instruction from the orchestrator. 16. The method of claim 15, wherein the dynamically generated instruction is based upon detected demand within the SDI system for nodes of a type that are not available in existing partitions within the pre-composed partition table. 17. The method of claim 12, wherein the instruction to create a partition indicates that an existing partition should be extended. 18. The method of claim 12, wherein the instruction to create a partition indicates that an existing partition should be reduced in size. 19. The method of claim 11, wherein the orchestrator runs an application on the identified partition. 20. The method of claim 11, the partition manager to further: receive an instruction to create a partition using the one or more remote resources; and communicate to the orchestrator that the partition has been created. 21. A non-transitory computer-readable storage medium that stores instructions for execution by processing circuitry of a software-defined infrastructure (SDI) system, the instructions to cause a SDI manager component of the SDI system to: create one or more partitions using the one or more resources, the one or more partitions each including a plurality of nodes of a similar resource type; generate an update to a pre-composed partition table, stored within a non-transitory computer-readable storage medium, including the created one or more partitions; receive a request from an orchestrator for a node; select one of the created one or more partitions to the orchestrator based upon the pre-composed partition table; and identify the selected partition to the orchestrator. 22. The non-transitory computer-readable storage medium of claim 21, further comprising receiving an instruction from the orchestrator to create a partition prior to the orchestrator running an application. 23. The non-transitory computer-readable storage medium of claim 21, the one or more partitions are created based upon user-defined settings stored within the SDI system. 24. A software-defined infrastructure (SDI) system, comprising: means for creating one or more partitions using the one or more resources, the one or more partitions each including a plurality of nodes of a similar resource type; means for generating an update to a pre-composed partition table, stored within a non-transitory computer-readable storage medium, including the created one or more partitions; means for receiving a request from an orchestrator for a node; means for selecting one of the created one or more partitions to the orchestrator based upon the pre-composed partition table; and means for identifying the selected partition to the orchestrator. 25. The system of claim 24, further comprising means for receiving an instruction from the orchestrator to create a partition prior to the orchestrator running an application.
Techniques for managing static and dynamic partitions in software-defined infrastructures (SDI) are described. An SDI manager component may include one or more processor circuits to access one or more resources. The SDI manager component may include a partition manager to create one or more partitions using the one or more resources, the one or more partitions each including a plurality of nodes of a similar resource type. The SDI manager may generate an update to a pre-composed partition table, stored within a non-transitory computer-readable storage medium, including the created one or more partitions, and receive a request from an orchestrator for a node. The SDI manager may select one of the created one or more partitions to the orchestrator based upon the pre-composed partition table, and identify the selected partition to the orchestrator. Other embodiments are described and claimed.1. A software-defined infrastructure (SDI) system, comprising: an SDI manager component, including one or more processor circuits to access one or more resources, the SDI manager component including a partition manager to: create one or more partitions using the one or more resources, the one or more partitions each including a plurality of nodes of a similar resource type; generate an update to a pre-composed partition table, stored within a non-transitory computer-readable storage medium, including the created one or more partitions; receive a request from an orchestrator for a node; selecting one of the created one or more partitions to the orchestrator based upon the pre-composed partition table; and identifying the selected partition to the orchestrator. 2. The SDI system of claim 1, the partition manager to receive an instruction from the orchestrator to create a partition prior to the orchestrator running an application. 3. The SDI system of claim 1, the one or more partitions are created based upon user-defined settings stored within the SDI system. 4. The SDI system of claim 3, wherein the one or more partitions are created at boot time. 5. The SDI system of claim 1, wherein the one or more partitions are created based upon a dynamically generated instruction from the orchestrator. 6. The SDI system of claim 5, wherein the dynamically generated instruction is based upon detected demand within the SDI system for nodes of a type that are not available in existing partitions. 7. The SDI system of claim 2, wherein the instruction to create a partition indicates that an existing partition should be extended. 8. The SDI system of claim 2, wherein the instruction to create a partition indicates that an existing partition should be reduced in size. 9. The SDI system of claim 1, wherein the orchestrator runs an application on the identified partition. 10. The SDI system of claim 1, wherein the partition manager to: receive an instruction to create a partition using the one or more remote resources; and update an orchestrator of the SDI system indicating that the partition has been created. 11. A computer-implemented method, comprising: creating one or more partitions using the one or more resources, the one or more partitions each including a plurality of nodes of a similar resource type; generating an update to a pre-composed partition table, stored within a non-transitory computer-readable storage medium, including the created one or more partitions; receiving a request from an orchestrator for a node; selecting one of the created one or more partitions to the orchestrator based upon the pre-composed partition table; and identifying the selected partition to the orchestrator. 12. The method of claim 11, further comprising receiving an instruction from the orchestrator to create a partition prior to the orchestrator running an application. 13. The method of claim 11, the one or more partitions are created based upon user-defined settings stored within the SDI system. 14. The method of claim 11, wherein the request from the orchestrator for a node identifies a resource type. 15. The method of claim 11, wherein the one or more partitions are created based upon a dynamically generated instruction from the orchestrator. 16. The method of claim 15, wherein the dynamically generated instruction is based upon detected demand within the SDI system for nodes of a type that are not available in existing partitions within the pre-composed partition table. 17. The method of claim 12, wherein the instruction to create a partition indicates that an existing partition should be extended. 18. The method of claim 12, wherein the instruction to create a partition indicates that an existing partition should be reduced in size. 19. The method of claim 11, wherein the orchestrator runs an application on the identified partition. 20. The method of claim 11, the partition manager to further: receive an instruction to create a partition using the one or more remote resources; and communicate to the orchestrator that the partition has been created. 21. A non-transitory computer-readable storage medium that stores instructions for execution by processing circuitry of a software-defined infrastructure (SDI) system, the instructions to cause a SDI manager component of the SDI system to: create one or more partitions using the one or more resources, the one or more partitions each including a plurality of nodes of a similar resource type; generate an update to a pre-composed partition table, stored within a non-transitory computer-readable storage medium, including the created one or more partitions; receive a request from an orchestrator for a node; select one of the created one or more partitions to the orchestrator based upon the pre-composed partition table; and identify the selected partition to the orchestrator. 22. The non-transitory computer-readable storage medium of claim 21, further comprising receiving an instruction from the orchestrator to create a partition prior to the orchestrator running an application. 23. The non-transitory computer-readable storage medium of claim 21, the one or more partitions are created based upon user-defined settings stored within the SDI system. 24. A software-defined infrastructure (SDI) system, comprising: means for creating one or more partitions using the one or more resources, the one or more partitions each including a plurality of nodes of a similar resource type; means for generating an update to a pre-composed partition table, stored within a non-transitory computer-readable storage medium, including the created one or more partitions; means for receiving a request from an orchestrator for a node; means for selecting one of the created one or more partitions to the orchestrator based upon the pre-composed partition table; and means for identifying the selected partition to the orchestrator. 25. The system of claim 24, further comprising means for receiving an instruction from the orchestrator to create a partition prior to the orchestrator running an application.
2,400
9,202
9,202
15,187,172
2,439
The disclosure provides a method and system for authenticating a user using biometric data and geographic location of the user's device (client device). The method involves establishing a connection between a server and a client. After the connection is established, the client device sends biometric data and location information to the server. The server then determines whether the biometric data is valid. In the event, the biometric data is valid, the server checks the location information received to determine whether the user is at a known or approved location. If the user is at an approved location, the authentication process is successful, and the server is permitted to provide data to the user according to the user's access rights.
1. A method to authenticate a user, the method performed by a biometric server with at least one processor, memory, and non-transitory computer readable storage medium, the method comprising: connecting, by the biometric server, to a client device; receiving, by the biometric server, biometric data and location information from the client device; determining, by the biometric server, whether biometric data is valid; and in response to said determining that biometric data is valid, determining, by the biometric server, whether location information is valid. 2. The method of claim 1, further comprising: obtaining, by the biometric server, a security certificate from the client device; determining, by the biometric server, whether the security certificate is valid; and in response to said determining, when the security certificate is not valid, terminating, by the biometric server, the connection to the client device. 3. The method of claim 2, wherein the security certificate is at least one of a Secure Sockets Layer (SSL) certificate and a Transport Layer Security (TLS) certificate. 4. The method of claim 3, wherein the security certificate supports one algorithm selected from the group consisting of: RSA algorithm, Digital Signature Algorithm (DSA), and Elliptic Curve Cryptography (ECC) algorithm. 5. The method of claim 1, further comprising: conditionally retrieving, by the biometric server, information from a database when location information is valid; and providing, by the biometric server, the information retrieved to the client device. 6. The method of claim 5, wherein the information retrieved is encrypted and the biometric data contains the decryption key. 7. The method of claim 1, further comprising: conditionally performing, by the biometric server, a security protocol when location information is invalid, wherein the security protocol comprises requesting additional information from the client device. 8. The method of claim 7, wherein the additional information comprises an identification number and a security question. 9. The method of claim 1, wherein the biometric data comprises data obtained from at least one of an iris scan, a retinal scan, fingerprint, blood sample, DNA, palm print, facial recognition, palm veins. 10. The method of claim 1, wherein the location data comprises data derived from at least one of Global Positioning Systems (GPS), cellular tower triangulation, Subscriber Identity Module (SIM), Wi-Fi Positioning Systems. 11. The method of claim 1, wherein the determining whether location information is valid comprises: retrieving, by the biometric server, from a database a set of known locations associated with the user; retrieving, by the biometric server, from the database a set of approved locations; comparing, by the biometric server, the location information to the set of known locations and the set of approved locations; and determining whether the location information is contained at least one of the set of known locations and the set of approved locations. 12. A system for biometrically authenticating a user, the system comprising: a client device comprising at least one processor, at least one network interface, and memory, the client device configured to obtain location information and biometric data; at least one communication network; at least one location service, the at least one location service configured to assist the client device in obtaining location information; and at least one server, configured to: receive the biometric data and the location information from the client device, determine whether the biometric data is valid, and conditionally determine whether the location information is valid when the biometric data is valid; wherein the client device, the at least one location service, and the at least one server are communicably coupled through the at least one communication network. 13. The system of claim 12, wherein the at least one server is further configured to: obtain a security certificate from the client device; determine whether the security certificate is valid; and conditionally terminate the connection to the client device when the security certificate is not valid. 14. The system of claim 13, wherein the security certificate is at least one of a Secure Sockets Layer (SSL) certificate and a Transport Layer Security (TLS) certificate. 15. The system of claim 12, further comprising: at least one database, wherein the at least one server is further configured to: conditionally retrieve information from the at least one database when location information is valid, and provide the information retrieved to the client device. 16. The system of claim 15, wherein data in the at least one database is encrypted and the biometric data contains the key to decrypt the information retrieved. 17. The system of claim 12, wherein the at least one server is further configured to: conditionally perform a security protocol when the location information is invalid, wherein the security protocol comprises requesting additional information from the client device. 18. The system of claim 12, wherein the client device further comprises at least one of a near infrared camera, a camera, a fingerprint sensor, an ultrasonic sensor, a capacitive sensor, and an optical sensor. 19. The system of claim 12, wherein the client device further comprises at least one of a Global Positioning Systems (GPS) receiver, a Wi-Fi network interface, a cellular network interface, and a Subscriber Identity Module (SIM) card. 20. A non-transitory computer readable medium for authenticating a user, the non-transitory computer readable medium having computer executable instructions for performing the steps of: connecting a biometric server to a client device; receiving, at the biometric server, biometric data and location information sent by the client device; determining, at the biometric server, whether the biometric data is valid; and in response to said determining that biometric data is valid, determining, at the biometric server, whether the location information is valid.
The disclosure provides a method and system for authenticating a user using biometric data and geographic location of the user's device (client device). The method involves establishing a connection between a server and a client. After the connection is established, the client device sends biometric data and location information to the server. The server then determines whether the biometric data is valid. In the event, the biometric data is valid, the server checks the location information received to determine whether the user is at a known or approved location. If the user is at an approved location, the authentication process is successful, and the server is permitted to provide data to the user according to the user's access rights.1. A method to authenticate a user, the method performed by a biometric server with at least one processor, memory, and non-transitory computer readable storage medium, the method comprising: connecting, by the biometric server, to a client device; receiving, by the biometric server, biometric data and location information from the client device; determining, by the biometric server, whether biometric data is valid; and in response to said determining that biometric data is valid, determining, by the biometric server, whether location information is valid. 2. The method of claim 1, further comprising: obtaining, by the biometric server, a security certificate from the client device; determining, by the biometric server, whether the security certificate is valid; and in response to said determining, when the security certificate is not valid, terminating, by the biometric server, the connection to the client device. 3. The method of claim 2, wherein the security certificate is at least one of a Secure Sockets Layer (SSL) certificate and a Transport Layer Security (TLS) certificate. 4. The method of claim 3, wherein the security certificate supports one algorithm selected from the group consisting of: RSA algorithm, Digital Signature Algorithm (DSA), and Elliptic Curve Cryptography (ECC) algorithm. 5. The method of claim 1, further comprising: conditionally retrieving, by the biometric server, information from a database when location information is valid; and providing, by the biometric server, the information retrieved to the client device. 6. The method of claim 5, wherein the information retrieved is encrypted and the biometric data contains the decryption key. 7. The method of claim 1, further comprising: conditionally performing, by the biometric server, a security protocol when location information is invalid, wherein the security protocol comprises requesting additional information from the client device. 8. The method of claim 7, wherein the additional information comprises an identification number and a security question. 9. The method of claim 1, wherein the biometric data comprises data obtained from at least one of an iris scan, a retinal scan, fingerprint, blood sample, DNA, palm print, facial recognition, palm veins. 10. The method of claim 1, wherein the location data comprises data derived from at least one of Global Positioning Systems (GPS), cellular tower triangulation, Subscriber Identity Module (SIM), Wi-Fi Positioning Systems. 11. The method of claim 1, wherein the determining whether location information is valid comprises: retrieving, by the biometric server, from a database a set of known locations associated with the user; retrieving, by the biometric server, from the database a set of approved locations; comparing, by the biometric server, the location information to the set of known locations and the set of approved locations; and determining whether the location information is contained at least one of the set of known locations and the set of approved locations. 12. A system for biometrically authenticating a user, the system comprising: a client device comprising at least one processor, at least one network interface, and memory, the client device configured to obtain location information and biometric data; at least one communication network; at least one location service, the at least one location service configured to assist the client device in obtaining location information; and at least one server, configured to: receive the biometric data and the location information from the client device, determine whether the biometric data is valid, and conditionally determine whether the location information is valid when the biometric data is valid; wherein the client device, the at least one location service, and the at least one server are communicably coupled through the at least one communication network. 13. The system of claim 12, wherein the at least one server is further configured to: obtain a security certificate from the client device; determine whether the security certificate is valid; and conditionally terminate the connection to the client device when the security certificate is not valid. 14. The system of claim 13, wherein the security certificate is at least one of a Secure Sockets Layer (SSL) certificate and a Transport Layer Security (TLS) certificate. 15. The system of claim 12, further comprising: at least one database, wherein the at least one server is further configured to: conditionally retrieve information from the at least one database when location information is valid, and provide the information retrieved to the client device. 16. The system of claim 15, wherein data in the at least one database is encrypted and the biometric data contains the key to decrypt the information retrieved. 17. The system of claim 12, wherein the at least one server is further configured to: conditionally perform a security protocol when the location information is invalid, wherein the security protocol comprises requesting additional information from the client device. 18. The system of claim 12, wherein the client device further comprises at least one of a near infrared camera, a camera, a fingerprint sensor, an ultrasonic sensor, a capacitive sensor, and an optical sensor. 19. The system of claim 12, wherein the client device further comprises at least one of a Global Positioning Systems (GPS) receiver, a Wi-Fi network interface, a cellular network interface, and a Subscriber Identity Module (SIM) card. 20. A non-transitory computer readable medium for authenticating a user, the non-transitory computer readable medium having computer executable instructions for performing the steps of: connecting a biometric server to a client device; receiving, at the biometric server, biometric data and location information sent by the client device; determining, at the biometric server, whether the biometric data is valid; and in response to said determining that biometric data is valid, determining, at the biometric server, whether the location information is valid.
2,400
9,203
9,203
14,238,597
2,473
The invention proposes a method, in a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, and the group of secondary cells belonging to the at least one group of secondary cells, wherein in the event that the group of primary cells and the at least one group of secondary cells each is configured with a time alignment timer, the method comprises the steps of: terminating the uplink transmission of the user equipment over at least one activated secondary cell in the group of secondary cells when the time alignment timer of the group of primary cells expires; in the event that the group of primary cells and the at least one group of secondary cells are configured with a common time alignment timer, the method comprises the steps of: determining whether a time alignment value of the group of secondary cells is valid when the time alignment timer is in operation; and if not, terminating the uplink transmission of the user equipment over the at least one activated secondary cell in the group of secondary cells and transmitting a notification message to a base station.
1. A method, in a user equipment of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of the user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells each being configured with a time alignment timer, wherein the method comprises: terminating the uplink transmission over at least one activated secondary cell in the group of secondary cells when the time alignment timer of the group of primary cells expires. 2. The method according to claim 1, wherein the uplink transmission comprises sounding reference signal transmission. 3. The method according to claim 1, wherein the terminating comprises: de-configuring automatically configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells. 4. The method according to claim 1, wherein the terminating comprises: receiving a first RRC message from a base station, the first RRC message being used for de-configuring configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells; and de-configuring the configuration of the sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells in response to the first RRC message. 5. The method according to claim 3, wherein the plurality of secondary cells comprise the at least one activated secondary cell. 6. The method according to claim 1, wherein the terminating comprises: deactivating automatically the at least one activated secondary cell in the group of secondary cells. 7. The method according to claim 1, wherein the terminating comprises: receiving a first MAC CE message from a base station, the first MAC CE message being used for deactivating the at least one activated secondary cell in the group of secondary cells; and deactivating the at least one activated secondary cell in the group of secondary cells in response to the first MAC CE message. 8. The method according to claim 3, wherein when the time alignment timer of the group of primary cells restarts counting, the method further comprises: receiving a second RRC message from a base station, the second RRC message being used for reconfiguring the configuration of the sounding reference signal transmission of the de-configured secondary cells in the group of secondary cells; and reconfiguring the configuration of the sounding reference signal transmission of the de-configured secondary cells in the group of secondary cells in response to the second RRC message. 9. The method according to claim 6, wherein when the time alignment timer of the group of primary cells restarts counting, the method further comprises: reactivating automatically the deactivated secondary cells in the group of secondary cells. 10. The method according to claim 6, wherein the method further comprises: receiving a second MAC CE message from a base station, the second MAC CE message being used for reactivating the deactivated secondary cells in the group of secondary cells; and reactivating the deactivated secondary cells in the group of secondary cells in response to the second MAC CE message. 11. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells each being configured with a time alignment timer, wherein the method comprises: transmitting a first RRC message to the user equipment when the time alignment timer of the group of primary cells expires, the first RRC message being used for de-configuring configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells. 12. The method according to claim 11, wherein the plurality of secondary cells comprise at least one activated secondary cell. 13. The method according to claim 11, wherein when the time alignment timer of the group of primary cells restarts counting, the method further comprises: transmitting a second RRC message to the user equipment, the second RRC message being used for reconfiguring the configuration of the sounding reference signal transmission of the de-configured secondary cells in the group of secondary cells. 14. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells each being configured with a time alignment timer, wherein the method comprises: transmitting a first MAC CE message to the user equipment when the time alignment timer of the group of primary cells expires, the first MAC CE message being used for deactivating at least one activated secondary cell in the group of secondary cells. 15. The method according to claim 14, wherein when the time alignment timer of the group of primary cells restarts counting, the method further comprises: transmitting a second MAC CE message to the user equipment, the second MAC CE message being used for reactivating the deactivated secondary cells in the group of secondary cells. 16. A method, in a user equipment of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of the user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein the method comprises: determining whether a time alignment value of the group of secondary cells is valid when the time alignment timer is in operation; and if the time alignment value of the group of secondary cells is invalid, terminating the uplink transmission over at least one activated secondary cell in the group of secondary cells and transmitting a notification message to a base station. 17. The method according to claim 16, wherein the uplink transmission comprises sounding reference signal transmission. 18. The method according to claim 16, wherein if the time alignment value of the group of secondary cells is invalid, terminating the uplink transmission over at least one activated secondary cell in the group of secondary cells and transmitting a notification message to a base station comprises: de-configuring automatically configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells; and wherein the notification message is used for notifying the base station that the configuration of the sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells is removed. 19. The method according to claim 18, wherein the plurality of secondary cells comprises the at least one activated secondary cell. 20. The method according to claim 16, wherein if the time alignment value of the group of secondary cells is invalid, terminating the uplink transmission over at least one activated secondary cell in the group of secondary cells and transmitting a notification message to a base station comprises: deactivating automatically the at least one activated secondary cell in the group of secondary cells; and wherein the notification message is used for notifying the base station that the at least one activated secondary cell in the group of secondary cells is de-activated. 21. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein the method comprises: determining whether a time alignment value of the group of secondary cells is valid when the time alignment timer is in operation; and the time alignment value of the group of secondary cells is invalid, transmitting an RRC message to the user equipment, the RRC message being used for de-configuring configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells. 22. The method according to claim 21, wherein the plurality of secondary cells comprises at least one activated secondary cell. 23. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein the method comprises: determining whether a time alignment value of the group of secondary cells is valid when the time alignment timer is in operation; and if the time alignment value of the group of secondary cells is invalid, transmitting an MAC CE message to the user equipment, the MAC CE message being used for deactivating at least one activated secondary cell in the group of secondary cells. 24. A method, in a user equipment of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of the user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein the method comprises: determining whether a time alignment value of the group of secondary cells is valid when the time alignment timer is in operation; and if the time alignment value of the group of secondary cells is invalid, transmitting a notification message to the base station, the notification message being used for notifying the base station that the time alignment value of the group of secondary cells is invalid. 25. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein the method comprises: receiving a notification message from the user equipment, the notification message being used for notifying the base station that a time alignment value of the group of secondary cells is invalid; and in response to the notification message, transmitting an RRC message to the user equipment, the RRC message being used for de-configuring configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells, or transmitting an MAC CE message to the user equipment, the MAC CE message being used for deactivating at least one activated secondary cell in the group of secondary cells. 26. The method according to claim 25, wherein the plurality of secondary cells comprises the at least one activated secondary cell. 27. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein when the time alignment timer expires, the method comprises: determining whether a time alignment value of the group of secondary cells is valid; if the time alignment value of the group of secondary cells is valid, keeping the valid time alignment value of the group of secondary cells; and if the time alignment value of the group of secondary cells is invalid, discarding the time alignment value of the group of secondary cells. 28. The method according to claim 27, wherein when the time alignment timer restarts counting and the base station keeps the valid time alignment value of the group of secondary cells, the method further comprises: transmitting the valid time alignment value of the group of secondary cells to the user equipment via a second message. 29. The method according to claim 28, wherein the second message comprises any one of: an RRC message; and an MAC CE message. 30. The method according to claim 27, wherein when the time alignment timer restarts counting and the base station discards the time alignment value of the group of secondary cells, the method comprises: if configuration of sounding reference signal transmission of at least one activated secondary cell in the group of secondary cells is de-configured, transmitting a PDCCH order signaling to the user equipment to instruct the user equipment to trigger a random access procedure over the group of secondary cells, and then transmitting an RRC message to the user equipment to instruct the user equipment to reconfigure the configuration of the sounding reference signal transmission of the de-configured secondary cells in the group of secondary cells; and if the at least one activated secondary cell in the group of secondary cells is deactivated, transmitting an MAC CE message to the user equipment to instruct the user equipment to reactivate the deactivated secondary cells in the group of secondary cells and to instruct the user equipment not to perform the uplink transmission, and then transmitting a PDCCH order signaling to instruct the user equipment to trigger the random access procedure over the group of secondary cells. 31. A method, in a user equipment of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of the user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein when the time alignment timer expires, the method comprises: discarding a time alignment value of the group of secondary cells. 32. The method according to claim 31, wherein when the time alignment timer restarts counting, the method further comprises: receiving a second message from a base station, the second message including a valid time alignment value of the group of secondary cells. 33. The method according to claim 31, wherein when the time alignment timer restarts counting, the method further comprises: terminating uplink transmission over all secondary cells in the group of secondary cells; if a secondary cell configured with random access in the group of secondary cells is in an active status, triggering initiatively a random access procedure over the secondary cell configured with the random access, or triggering the random access procedure over the secondary cell configured with the random access in response to a PDCCH order signaling from a base station; and if the secondary cell configured with the random access in the group of secondary cells is in an inactive status, activating the secondary cell configured with the random access in the group of secondary cells in response to an MAC CE message from the base station and triggering automatically the random access procedure over the secondary cell configured with the random access, or activating the secondary cell configured with the random access in the group of secondary cells in response to the MAC CE message from the base station and triggering the random access procedure over the secondary cell configured with the random access in response to the PDCCH order signaling from the base station. 34. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein when the time alignment timer expires, the method comprises: discarding a time alignment value of the group of secondary cells. 35. The method according to claim 34, wherein when the time alignment timer restarts counting, the method comprises: transmitting an RRC message to the user equipment, the RRC message being used for de-configuring configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells, or transmitting an MAC CE message to the user equipment, the MAC CE message being used for deactivating at least one activated secondary cell in the group of secondary cells; if a secondary cell configured with random access in the group of secondary cells is in an active status, transmitting a PDCCH order signaling to the user equipment, the PDCCH order signaling being used for instructing the user equipment to trigger a random access procedure; and if the secondary cell configured with the random access in the group of secondary cells is in an inactive status, transmitting an MAC CE message to the user equipment, the MAC CE message being used for instructing the user equipment to activate the secondary cell configured with the random access in the group of secondary cells and instructing the user equipment not to perform uplink transmission after 8ms and for instructing the user equipment to trigger the random access procedure, or transmitting an MAC CE message to the user equipment and then transmitting a PDCCH order signaling to the user equipment, the MAC CE message being used for instructing the user equipment to activate the secondary cell configured with the random access in the group of secondary cells and instructing the user equipment not to perform the uplink transmission after 8ms, and the PDCCH order signaling being used for instructing the user equipment to trigger the random access procedure. 36. A method, in a user equipment of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of the user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein when the time alignment timer expires, the method comprises: keeping a time alignment value of the group of secondary cells. 37. The method according to claim 36, wherein when the time alignment timer restarts counting, the method further comprises: resuming automatically the uplink transmission with the kept time alignment value until a new time alignment value is received from a base station.
The invention proposes a method, in a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, and the group of secondary cells belonging to the at least one group of secondary cells, wherein in the event that the group of primary cells and the at least one group of secondary cells each is configured with a time alignment timer, the method comprises the steps of: terminating the uplink transmission of the user equipment over at least one activated secondary cell in the group of secondary cells when the time alignment timer of the group of primary cells expires; in the event that the group of primary cells and the at least one group of secondary cells are configured with a common time alignment timer, the method comprises the steps of: determining whether a time alignment value of the group of secondary cells is valid when the time alignment timer is in operation; and if not, terminating the uplink transmission of the user equipment over the at least one activated secondary cell in the group of secondary cells and transmitting a notification message to a base station.1. A method, in a user equipment of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of the user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells each being configured with a time alignment timer, wherein the method comprises: terminating the uplink transmission over at least one activated secondary cell in the group of secondary cells when the time alignment timer of the group of primary cells expires. 2. The method according to claim 1, wherein the uplink transmission comprises sounding reference signal transmission. 3. The method according to claim 1, wherein the terminating comprises: de-configuring automatically configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells. 4. The method according to claim 1, wherein the terminating comprises: receiving a first RRC message from a base station, the first RRC message being used for de-configuring configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells; and de-configuring the configuration of the sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells in response to the first RRC message. 5. The method according to claim 3, wherein the plurality of secondary cells comprise the at least one activated secondary cell. 6. The method according to claim 1, wherein the terminating comprises: deactivating automatically the at least one activated secondary cell in the group of secondary cells. 7. The method according to claim 1, wherein the terminating comprises: receiving a first MAC CE message from a base station, the first MAC CE message being used for deactivating the at least one activated secondary cell in the group of secondary cells; and deactivating the at least one activated secondary cell in the group of secondary cells in response to the first MAC CE message. 8. The method according to claim 3, wherein when the time alignment timer of the group of primary cells restarts counting, the method further comprises: receiving a second RRC message from a base station, the second RRC message being used for reconfiguring the configuration of the sounding reference signal transmission of the de-configured secondary cells in the group of secondary cells; and reconfiguring the configuration of the sounding reference signal transmission of the de-configured secondary cells in the group of secondary cells in response to the second RRC message. 9. The method according to claim 6, wherein when the time alignment timer of the group of primary cells restarts counting, the method further comprises: reactivating automatically the deactivated secondary cells in the group of secondary cells. 10. The method according to claim 6, wherein the method further comprises: receiving a second MAC CE message from a base station, the second MAC CE message being used for reactivating the deactivated secondary cells in the group of secondary cells; and reactivating the deactivated secondary cells in the group of secondary cells in response to the second MAC CE message. 11. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells each being configured with a time alignment timer, wherein the method comprises: transmitting a first RRC message to the user equipment when the time alignment timer of the group of primary cells expires, the first RRC message being used for de-configuring configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells. 12. The method according to claim 11, wherein the plurality of secondary cells comprise at least one activated secondary cell. 13. The method according to claim 11, wherein when the time alignment timer of the group of primary cells restarts counting, the method further comprises: transmitting a second RRC message to the user equipment, the second RRC message being used for reconfiguring the configuration of the sounding reference signal transmission of the de-configured secondary cells in the group of secondary cells. 14. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells each being configured with a time alignment timer, wherein the method comprises: transmitting a first MAC CE message to the user equipment when the time alignment timer of the group of primary cells expires, the first MAC CE message being used for deactivating at least one activated secondary cell in the group of secondary cells. 15. The method according to claim 14, wherein when the time alignment timer of the group of primary cells restarts counting, the method further comprises: transmitting a second MAC CE message to the user equipment, the second MAC CE message being used for reactivating the deactivated secondary cells in the group of secondary cells. 16. A method, in a user equipment of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of the user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein the method comprises: determining whether a time alignment value of the group of secondary cells is valid when the time alignment timer is in operation; and if the time alignment value of the group of secondary cells is invalid, terminating the uplink transmission over at least one activated secondary cell in the group of secondary cells and transmitting a notification message to a base station. 17. The method according to claim 16, wherein the uplink transmission comprises sounding reference signal transmission. 18. The method according to claim 16, wherein if the time alignment value of the group of secondary cells is invalid, terminating the uplink transmission over at least one activated secondary cell in the group of secondary cells and transmitting a notification message to a base station comprises: de-configuring automatically configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells; and wherein the notification message is used for notifying the base station that the configuration of the sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells is removed. 19. The method according to claim 18, wherein the plurality of secondary cells comprises the at least one activated secondary cell. 20. The method according to claim 16, wherein if the time alignment value of the group of secondary cells is invalid, terminating the uplink transmission over at least one activated secondary cell in the group of secondary cells and transmitting a notification message to a base station comprises: deactivating automatically the at least one activated secondary cell in the group of secondary cells; and wherein the notification message is used for notifying the base station that the at least one activated secondary cell in the group of secondary cells is de-activated. 21. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein the method comprises: determining whether a time alignment value of the group of secondary cells is valid when the time alignment timer is in operation; and the time alignment value of the group of secondary cells is invalid, transmitting an RRC message to the user equipment, the RRC message being used for de-configuring configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells. 22. The method according to claim 21, wherein the plurality of secondary cells comprises at least one activated secondary cell. 23. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein the method comprises: determining whether a time alignment value of the group of secondary cells is valid when the time alignment timer is in operation; and if the time alignment value of the group of secondary cells is invalid, transmitting an MAC CE message to the user equipment, the MAC CE message being used for deactivating at least one activated secondary cell in the group of secondary cells. 24. A method, in a user equipment of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of the user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein the method comprises: determining whether a time alignment value of the group of secondary cells is valid when the time alignment timer is in operation; and if the time alignment value of the group of secondary cells is invalid, transmitting a notification message to the base station, the notification message being used for notifying the base station that the time alignment value of the group of secondary cells is invalid. 25. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein the method comprises: receiving a notification message from the user equipment, the notification message being used for notifying the base station that a time alignment value of the group of secondary cells is invalid; and in response to the notification message, transmitting an RRC message to the user equipment, the RRC message being used for de-configuring configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells, or transmitting an MAC CE message to the user equipment, the MAC CE message being used for deactivating at least one activated secondary cell in the group of secondary cells. 26. The method according to claim 25, wherein the plurality of secondary cells comprises the at least one activated secondary cell. 27. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein when the time alignment timer expires, the method comprises: determining whether a time alignment value of the group of secondary cells is valid; if the time alignment value of the group of secondary cells is valid, keeping the valid time alignment value of the group of secondary cells; and if the time alignment value of the group of secondary cells is invalid, discarding the time alignment value of the group of secondary cells. 28. The method according to claim 27, wherein when the time alignment timer restarts counting and the base station keeps the valid time alignment value of the group of secondary cells, the method further comprises: transmitting the valid time alignment value of the group of secondary cells to the user equipment via a second message. 29. The method according to claim 28, wherein the second message comprises any one of: an RRC message; and an MAC CE message. 30. The method according to claim 27, wherein when the time alignment timer restarts counting and the base station discards the time alignment value of the group of secondary cells, the method comprises: if configuration of sounding reference signal transmission of at least one activated secondary cell in the group of secondary cells is de-configured, transmitting a PDCCH order signaling to the user equipment to instruct the user equipment to trigger a random access procedure over the group of secondary cells, and then transmitting an RRC message to the user equipment to instruct the user equipment to reconfigure the configuration of the sounding reference signal transmission of the de-configured secondary cells in the group of secondary cells; and if the at least one activated secondary cell in the group of secondary cells is deactivated, transmitting an MAC CE message to the user equipment to instruct the user equipment to reactivate the deactivated secondary cells in the group of secondary cells and to instruct the user equipment not to perform the uplink transmission, and then transmitting a PDCCH order signaling to instruct the user equipment to trigger the random access procedure over the group of secondary cells. 31. A method, in a user equipment of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of the user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein when the time alignment timer expires, the method comprises: discarding a time alignment value of the group of secondary cells. 32. The method according to claim 31, wherein when the time alignment timer restarts counting, the method further comprises: receiving a second message from a base station, the second message including a valid time alignment value of the group of secondary cells. 33. The method according to claim 31, wherein when the time alignment timer restarts counting, the method further comprises: terminating uplink transmission over all secondary cells in the group of secondary cells; if a secondary cell configured with random access in the group of secondary cells is in an active status, triggering initiatively a random access procedure over the secondary cell configured with the random access, or triggering the random access procedure over the secondary cell configured with the random access in response to a PDCCH order signaling from a base station; and if the secondary cell configured with the random access in the group of secondary cells is in an inactive status, activating the secondary cell configured with the random access in the group of secondary cells in response to an MAC CE message from the base station and triggering automatically the random access procedure over the secondary cell configured with the random access, or activating the secondary cell configured with the random access in the group of secondary cells in response to the MAC CE message from the base station and triggering the random access procedure over the secondary cell configured with the random access in response to the PDCCH order signaling from the base station. 34. A method, in a base station of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of a user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein when the time alignment timer expires, the method comprises: discarding a time alignment value of the group of secondary cells. 35. The method according to claim 34, wherein when the time alignment timer restarts counting, the method comprises: transmitting an RRC message to the user equipment, the RRC message being used for de-configuring configuration of sounding reference signal transmission of the plurality of secondary cells in the group of secondary cells, or transmitting an MAC CE message to the user equipment, the MAC CE message being used for deactivating at least one activated secondary cell in the group of secondary cells; if a secondary cell configured with random access in the group of secondary cells is in an active status, transmitting a PDCCH order signaling to the user equipment, the PDCCH order signaling being used for instructing the user equipment to trigger a random access procedure; and if the secondary cell configured with the random access in the group of secondary cells is in an inactive status, transmitting an MAC CE message to the user equipment, the MAC CE message being used for instructing the user equipment to activate the secondary cell configured with the random access in the group of secondary cells and instructing the user equipment not to perform uplink transmission after 8ms and for instructing the user equipment to trigger the random access procedure, or transmitting an MAC CE message to the user equipment and then transmitting a PDCCH order signaling to the user equipment, the MAC CE message being used for instructing the user equipment to activate the secondary cell configured with the random access in the group of secondary cells and instructing the user equipment not to perform the uplink transmission after 8ms, and the PDCCH order signaling being used for instructing the user equipment to trigger the random access procedure. 36. A method, in a user equipment of a carrier aggregation transmission-based radio communication network, of controlling uplink transmission of the user equipment over a plurality of secondary cells in a group of secondary cells, the user equipment being configured with a group of primary cells and at least one group of secondary cells, the group of secondary cells belonging to the at least one group of secondary cells, and the group of primary cells and the at least one group of secondary cells being configured with a common time alignment timer, wherein when the time alignment timer expires, the method comprises: keeping a time alignment value of the group of secondary cells. 37. The method according to claim 36, wherein when the time alignment timer restarts counting, the method further comprises: resuming automatically the uplink transmission with the kept time alignment value until a new time alignment value is received from a base station.
2,400
9,204
9,204
15,912,430
2,437
Natural language processing is enhanced by linguistically extracting intelligence about a user. A history of user queries is analyzed by a natural language classifier to determine various user intents, and these intents are combined to form a user intent profile. The profile includes elements of sentiment, emotion and tone. The profile can be used in various ways including restricting access to documents in a collection, or refining a cognitive analysis of a query. For access restriction, a determination is made that the user intent is inconsistent with a document, and the user is denied access to the document. This determination involves a user intent score which is compared to a score of the document. For cognitive analysis, searching of reference documents is filtered by excluding documents based on the user intent. The searching includes a comparison of meta-data tags of the documents to the user intent.
1. A method of controlling access to a collection comprising: receiving a request from a user to access a document in the collection, by executing first instructions in a computer system; receiving a user profile associated with the user, the user profile having an indication of user intent which includes one or more of sentiment, emotion and tone, by executing second instructions in the computer system; determining that the user intent is inconsistent with an access restriction of the document, by executing third instructions in the computer system; and responsively denying the user access to the document, by executing fourth instructions in the computer system. 2. The method of claim 1 further comprising: monitoring the user to form a user searching history; and updating the user profile based on the user searching history. 3. The method of claim 1 wherein the user profile includes multiple intent elements including at least one sentiment element, at least one emotion element and at least one tone element. 4. The method of claim 1 wherein said determining includes: generating a user intent score based on the user profile; and comparing the user intent score to a document score of the document. 5. The method of claim 4 wherein the user profile includes multiple intent elements, and the user intent score is based on a combination of individual scores for each of the multiple intent elements. 6. The method of claim 1 further comprising parsing the request to determine a current intent of the user; and detecting a shift in user intent by comparing the current intent to the user profile. 7. The method of claim 6 further comprising generating an alert in response to said detecting. 8. A computer system comprising: one or more processors which process program instructions; a memory device connected to said one or more processors; and program instructions residing in said memory device for controlling access to a collection by receiving a request from a user to access a document in the collection, receiving a user profile associated with the user wherein the user profile has an indication of user intent which includes one or more of sentiment, emotion and tone, determining that the user intent is inconsistent with an access restriction of the document, and responsively denying the user access to the document. 9. The computer system of claim 8 wherein said program instructions further monitor the user to form a user searching history, and update the user profile based on the user searching history. 10. The computer system of claim 8 wherein the user profile includes multiple intent elements including at least one sentiment element, at least one emotion element and at least one tone element. 11. The computer system of claim 8 wherein the user intent is determined to be inconsistent with the access restriction of the document by generating a user intent score based on the user profile, and comparing the user intent score to a document score of the document. 12. The computer system of claim 11 wherein the user profile includes multiple intent elements, and the user intent score is based on a combination of individual scores for each of the multiple intent elements. 13. The computer system of claim 8 wherein said program instructions further parse the request to determine a current intent of the user, and detect a shift in user intent by comparing the current intent to the user profile. 14. The computer system of claim 13 wherein said program instructions further generate an alert in response to detecting the shift in user intent. 15. A computer program product comprising: a computer readable storage medium; and program instructions residing in said storage medium for controlling access to a collection by receiving a request from a user to access a document in the collection, receiving a user profile associated with the user wherein the user profile has an indication of user intent which includes one or more of sentiment, emotion and tone, determining that the user intent is inconsistent with an access restriction of the document, and responsively denying the user access to the document. 16. The computer program product of claim 15 wherein said program instructions further monitor the user to form a user searching history, and update the user profile based on the user searching history. 17. The computer program product of claim 15 wherein the user profile includes multiple intent elements including at least one sentiment element, at least one emotion element and at least one tone element. 18. The computer program product of claim 15 wherein the user intent is determined to be inconsistent with the access restriction of the document by generating a user intent score based on the user profile, and comparing the user intent score to a document score of the document. 19. The computer program product of claim 18 wherein the user profile includes multiple intent elements, and the user intent score is based on a combination of individual scores for each of the multiple intent elements. 20. The computer program product of claim 15 wherein said program instructions further parse the request to determine a current intent of the user, detect a shift in user intent by comparing the current intent to the user profile, and responsively generate an alert.
Natural language processing is enhanced by linguistically extracting intelligence about a user. A history of user queries is analyzed by a natural language classifier to determine various user intents, and these intents are combined to form a user intent profile. The profile includes elements of sentiment, emotion and tone. The profile can be used in various ways including restricting access to documents in a collection, or refining a cognitive analysis of a query. For access restriction, a determination is made that the user intent is inconsistent with a document, and the user is denied access to the document. This determination involves a user intent score which is compared to a score of the document. For cognitive analysis, searching of reference documents is filtered by excluding documents based on the user intent. The searching includes a comparison of meta-data tags of the documents to the user intent.1. A method of controlling access to a collection comprising: receiving a request from a user to access a document in the collection, by executing first instructions in a computer system; receiving a user profile associated with the user, the user profile having an indication of user intent which includes one or more of sentiment, emotion and tone, by executing second instructions in the computer system; determining that the user intent is inconsistent with an access restriction of the document, by executing third instructions in the computer system; and responsively denying the user access to the document, by executing fourth instructions in the computer system. 2. The method of claim 1 further comprising: monitoring the user to form a user searching history; and updating the user profile based on the user searching history. 3. The method of claim 1 wherein the user profile includes multiple intent elements including at least one sentiment element, at least one emotion element and at least one tone element. 4. The method of claim 1 wherein said determining includes: generating a user intent score based on the user profile; and comparing the user intent score to a document score of the document. 5. The method of claim 4 wherein the user profile includes multiple intent elements, and the user intent score is based on a combination of individual scores for each of the multiple intent elements. 6. The method of claim 1 further comprising parsing the request to determine a current intent of the user; and detecting a shift in user intent by comparing the current intent to the user profile. 7. The method of claim 6 further comprising generating an alert in response to said detecting. 8. A computer system comprising: one or more processors which process program instructions; a memory device connected to said one or more processors; and program instructions residing in said memory device for controlling access to a collection by receiving a request from a user to access a document in the collection, receiving a user profile associated with the user wherein the user profile has an indication of user intent which includes one or more of sentiment, emotion and tone, determining that the user intent is inconsistent with an access restriction of the document, and responsively denying the user access to the document. 9. The computer system of claim 8 wherein said program instructions further monitor the user to form a user searching history, and update the user profile based on the user searching history. 10. The computer system of claim 8 wherein the user profile includes multiple intent elements including at least one sentiment element, at least one emotion element and at least one tone element. 11. The computer system of claim 8 wherein the user intent is determined to be inconsistent with the access restriction of the document by generating a user intent score based on the user profile, and comparing the user intent score to a document score of the document. 12. The computer system of claim 11 wherein the user profile includes multiple intent elements, and the user intent score is based on a combination of individual scores for each of the multiple intent elements. 13. The computer system of claim 8 wherein said program instructions further parse the request to determine a current intent of the user, and detect a shift in user intent by comparing the current intent to the user profile. 14. The computer system of claim 13 wherein said program instructions further generate an alert in response to detecting the shift in user intent. 15. A computer program product comprising: a computer readable storage medium; and program instructions residing in said storage medium for controlling access to a collection by receiving a request from a user to access a document in the collection, receiving a user profile associated with the user wherein the user profile has an indication of user intent which includes one or more of sentiment, emotion and tone, determining that the user intent is inconsistent with an access restriction of the document, and responsively denying the user access to the document. 16. The computer program product of claim 15 wherein said program instructions further monitor the user to form a user searching history, and update the user profile based on the user searching history. 17. The computer program product of claim 15 wherein the user profile includes multiple intent elements including at least one sentiment element, at least one emotion element and at least one tone element. 18. The computer program product of claim 15 wherein the user intent is determined to be inconsistent with the access restriction of the document by generating a user intent score based on the user profile, and comparing the user intent score to a document score of the document. 19. The computer program product of claim 18 wherein the user profile includes multiple intent elements, and the user intent score is based on a combination of individual scores for each of the multiple intent elements. 20. The computer program product of claim 15 wherein said program instructions further parse the request to determine a current intent of the user, detect a shift in user intent by comparing the current intent to the user profile, and responsively generate an alert.
2,400
9,205
9,205
16,043,224
2,449
The present invention faces the issue of authorizing redirection services in PCC architecture and provides for a PCRF server adapted to determine redirection per service in an IP-CAN session, a PCEF device adapted to receive redirection information per service basis, to determine redirection per service request and to trigger the redirection; and a method of authorizing a redirection service in a PCC architecture, comprising: upon an IP-CAN session establishment or modification, a PCEF device requesting control rules; a PCRF server determining services requiring redirection and answering with control rules and redirection information per service basis; installing at the PCEF device the control rules and redirection information; upon a first request for a service, the PCEF device determining the service redirection and returning a redirection message with a redirection identifier; and upon completion of the service redirection, the first request for the service reaching the PCEF, the PCEF verifying the service is authorized and submitting a service allowance towards the service server in charge of the service.
1. A method of authorizing a service with a Policy and Charging Control (PCC) architecture, the method applying at a Policy and Charging control Rules Function (PCRF) server and comprising: upon establishment or modification of an Internet Protocol (IP) Connectivity Access Network (IP-CAN) session for a user equipment (UE), receiving a request for control rules from a Policy and Charging Enforcement Function (PCEF) device; determining control rules to be applied per service basis for the IP-CAN session; determining, based on redirection policy criteria, redirection information for a service that requires a redirection before being authorized; and transmitting, to the PCEF device, the control rules per service basis and the redirection information for the service that requires the redirection, wherein the redirection information includes a service redirection identifier indicating where the UE is to be redirected for the service. 2. The method of claim 1, wherein the redirection information for the service that requires the redirection includes a redirection activation indicator indicating whether the redirection is to be set or not for the service. 3. The method of claim 1, wherein the redirection information for the service that requires the redirection includes a redirection expiry selected from: a time during which the redirection takes place, an event for which the redirection is set or reset, and a one-time indicator indicating the redirection for a first service request in the IP-CAN session and no further redirection for subsequent service requests in the IP-CAN session. 4. The method of claim 1, wherein the redirection information for the service that requires the redirection includes at least one of: a redirection code indicating a reason for redirection, and a redirection confirmation indicating whether the PCRF server requires confirmation when redirection has been applied. 5. The method of claim 1, wherein the redirection policy criteria indicate at least one condition of: whether the UE is in a roaming condition or in a non-roaming condition, a radio access type and a location. 6. The method of claim 1, wherein the redirection policy criteria indicate at least one condition of: an accumulated usage for the IP-CAN session, a usage limit for the IP-CAN session and a reset period for the accumulated usage. 7. A Policy and Charging control Rules Function (PCRF) server for provisioning control rules to be enforced by a Policy and Charging Enforcement Function (PCEF) device, the PCRF server configured to: receive, from a PCEF device via a receiver and upon establishment or modification of an Internet Protocol (IP) Connectivity Access Network (IP-CAN) session for a user equipment (UE), a request for control rules; determine control rules to be applied per service basis for the IP-CAN session; determine, based on redirection policy criteria, redirection information for a service that requires a redirection before being authorized; and transmit, to the PCEF device via a transmitter, the control rules per service basis and the redirection information for the service that requires the redirection, wherein the redirection information includes a service redirection identifier indicating where the UE is to be redirected for the service. 8. The PCRF server of claim 7, further configured to determine the control rules based on information received through at least one interface of Rx, Gx and Sp of a Policy and Charging Control (PCC) architecture and on locally configured information at the PCRF server. 9. The PCRF server of claim 7, wherein the redirection information for the service that requires the redirection includes a redirection activation indicator indicating whether the redirection is to be set or not for the service. 10. The PCRF server of claim 7, wherein the redirection information for the service that requires the redirection includes a redirection expiry selected from: a time during which the redirection takes place, an event for which the redirection is set or reset, and a one-time indicator indicating the redirection for a first service request in the IP-CAN session and no further redirection for subsequent service requests in the IP-CAN session. 11. The PCRF server of claim 7, wherein the redirection information for the service that requires the redirection includes at least one of: a redirection code indicating a reason for redirection, and a redirection confirmation indicating whether the PCRF server requires confirmation when redirection has been applied. 12. The PCRF server of claim 7, wherein the redirection policy criteria indicate at least one condition of: whether the UE is in a roaming condition or in a non-roaming condition, a radio access type and a location. 13. The PCRF server of claim 7, wherein the redirection policy criteria indicate at least one condition of: an accumulated usage for the IP-CAN session, a usage limit for the IP-CAN session and a reset period for the accumulated usage. 14. A method of authorizing a service with a Policy and Charging Control (PCC) architecture, the method applying at a Policy and Charging Enforcement Function (PCEF) device and comprising: upon establishment or modification of an Internet Protocol (IP) Connectivity Access Network (IP-CAN) session for a user equipment (UE), transmitting a request for control rules to a Policy and Charging control Rules Function (PCRF) server; receiving, from the PCRF server, control rules per service basis and redirection information for a service that requires a redirection before being authorized, wherein the redirection information includes a service redirection identifier indicating where the UE is to be redirected for the service; installing the control rules per service basis and the redirection information for the service that requires the redirection; upon a service request, received from the UE, for a destined service identified by a service destination identifier, determining that the destined service corresponds to the service that requires the redirection, and returning toward the UE a redirection message with the service redirection identifier and the service destination identifier; receiving again, upon completion of the redirection, the service request for the destined service identified by the service destination identifier; verifying that the destined service identified by the service destination identifier can be authorized; and transmitting, toward a service server handling the destined service, a service allowance message for the service request. 15. The method of claim 14, wherein the redirection information for the service that requires the redirection includes a redirection activation indicator indicating whether the redirection is to be set or not for the service. 16. The method of claim 14, wherein the redirection information for the service that requires the redirection includes a redirection expiry selected from: a time during which the redirection takes place, an event for which the redirection is set or reset, and a one-time indicator indicating the redirection for a first service request in the IP-CAN session and no further redirection for subsequent service requests in the IP-CAN session. 17. The method of claim 14, wherein the redirection information for the service that requires the redirection includes at least one of: a redirection code indicating a reason for redirection, and a redirection confirmation indicating whether the PCRF server requires confirmation when redirection has been applied. 18. A Policy and Charging Enforcement Function (PCEF) device for enforcing control rules to authorize a service with a Policy and Charging Control (PCC) architecture, the PCEF device configured to: transmit, upon establishment or modification of an Internet Protocol (IP) Connectivity Access Network (IP-CAN) session for a user equipment (UE), a request for control rules to a Policy and Charging control Rules Function (PCRF) server via a transmitter; receive, from the PCRF server via a receiver, control rules per service basis and redirection information for a service that requires a redirection before being authorized, wherein the redirection information includes a service redirection identifier indicating where the UE is to be redirected for the service; install the control rules per service basis and the redirection information for the service that requires the redirection; upon a service request, received from the UE via the receiver, for a destined service identified by a service destination identifier, determine that the destined service corresponds to the service that requires the redirection and return, toward the UE via the transmitter, a redirection message with the service redirection identifier and the service destination identifier; receive again via the receiver, upon completion of the redirection, the service request for the destined service identified by the service destination identifier; verify that the destined service identified by the service destination identifier can be authorized; and transmit, via the transmitter toward a service server handling the destined service, a service allowance message for the service request. 19. The PCEF device of claim 18, wherein the redirection information for the service that requires the redirection includes a redirection activation indicator indicating whether the redirection is to be set or not for the service. 20. The PCEF device of claim 18, wherein the redirection information for the service that requires the redirection includes a redirection expiry selected from: a time during which the redirection takes place, an event for which the redirection is set or reset, and a one-time indicator indicating the redirection for a first service request in the IP-CAN session and no further redirection for subsequent service requests in the IP-CAN session. 21. The PCEF device of claim 18, wherein the redirection information for the service that requires the redirection includes at least one of: a redirection code indicating a reason for redirection, and a redirection confirmation indicating whether the PCRF server requires confirmation when redirection has been applied.
The present invention faces the issue of authorizing redirection services in PCC architecture and provides for a PCRF server adapted to determine redirection per service in an IP-CAN session, a PCEF device adapted to receive redirection information per service basis, to determine redirection per service request and to trigger the redirection; and a method of authorizing a redirection service in a PCC architecture, comprising: upon an IP-CAN session establishment or modification, a PCEF device requesting control rules; a PCRF server determining services requiring redirection and answering with control rules and redirection information per service basis; installing at the PCEF device the control rules and redirection information; upon a first request for a service, the PCEF device determining the service redirection and returning a redirection message with a redirection identifier; and upon completion of the service redirection, the first request for the service reaching the PCEF, the PCEF verifying the service is authorized and submitting a service allowance towards the service server in charge of the service.1. A method of authorizing a service with a Policy and Charging Control (PCC) architecture, the method applying at a Policy and Charging control Rules Function (PCRF) server and comprising: upon establishment or modification of an Internet Protocol (IP) Connectivity Access Network (IP-CAN) session for a user equipment (UE), receiving a request for control rules from a Policy and Charging Enforcement Function (PCEF) device; determining control rules to be applied per service basis for the IP-CAN session; determining, based on redirection policy criteria, redirection information for a service that requires a redirection before being authorized; and transmitting, to the PCEF device, the control rules per service basis and the redirection information for the service that requires the redirection, wherein the redirection information includes a service redirection identifier indicating where the UE is to be redirected for the service. 2. The method of claim 1, wherein the redirection information for the service that requires the redirection includes a redirection activation indicator indicating whether the redirection is to be set or not for the service. 3. The method of claim 1, wherein the redirection information for the service that requires the redirection includes a redirection expiry selected from: a time during which the redirection takes place, an event for which the redirection is set or reset, and a one-time indicator indicating the redirection for a first service request in the IP-CAN session and no further redirection for subsequent service requests in the IP-CAN session. 4. The method of claim 1, wherein the redirection information for the service that requires the redirection includes at least one of: a redirection code indicating a reason for redirection, and a redirection confirmation indicating whether the PCRF server requires confirmation when redirection has been applied. 5. The method of claim 1, wherein the redirection policy criteria indicate at least one condition of: whether the UE is in a roaming condition or in a non-roaming condition, a radio access type and a location. 6. The method of claim 1, wherein the redirection policy criteria indicate at least one condition of: an accumulated usage for the IP-CAN session, a usage limit for the IP-CAN session and a reset period for the accumulated usage. 7. A Policy and Charging control Rules Function (PCRF) server for provisioning control rules to be enforced by a Policy and Charging Enforcement Function (PCEF) device, the PCRF server configured to: receive, from a PCEF device via a receiver and upon establishment or modification of an Internet Protocol (IP) Connectivity Access Network (IP-CAN) session for a user equipment (UE), a request for control rules; determine control rules to be applied per service basis for the IP-CAN session; determine, based on redirection policy criteria, redirection information for a service that requires a redirection before being authorized; and transmit, to the PCEF device via a transmitter, the control rules per service basis and the redirection information for the service that requires the redirection, wherein the redirection information includes a service redirection identifier indicating where the UE is to be redirected for the service. 8. The PCRF server of claim 7, further configured to determine the control rules based on information received through at least one interface of Rx, Gx and Sp of a Policy and Charging Control (PCC) architecture and on locally configured information at the PCRF server. 9. The PCRF server of claim 7, wherein the redirection information for the service that requires the redirection includes a redirection activation indicator indicating whether the redirection is to be set or not for the service. 10. The PCRF server of claim 7, wherein the redirection information for the service that requires the redirection includes a redirection expiry selected from: a time during which the redirection takes place, an event for which the redirection is set or reset, and a one-time indicator indicating the redirection for a first service request in the IP-CAN session and no further redirection for subsequent service requests in the IP-CAN session. 11. The PCRF server of claim 7, wherein the redirection information for the service that requires the redirection includes at least one of: a redirection code indicating a reason for redirection, and a redirection confirmation indicating whether the PCRF server requires confirmation when redirection has been applied. 12. The PCRF server of claim 7, wherein the redirection policy criteria indicate at least one condition of: whether the UE is in a roaming condition or in a non-roaming condition, a radio access type and a location. 13. The PCRF server of claim 7, wherein the redirection policy criteria indicate at least one condition of: an accumulated usage for the IP-CAN session, a usage limit for the IP-CAN session and a reset period for the accumulated usage. 14. A method of authorizing a service with a Policy and Charging Control (PCC) architecture, the method applying at a Policy and Charging Enforcement Function (PCEF) device and comprising: upon establishment or modification of an Internet Protocol (IP) Connectivity Access Network (IP-CAN) session for a user equipment (UE), transmitting a request for control rules to a Policy and Charging control Rules Function (PCRF) server; receiving, from the PCRF server, control rules per service basis and redirection information for a service that requires a redirection before being authorized, wherein the redirection information includes a service redirection identifier indicating where the UE is to be redirected for the service; installing the control rules per service basis and the redirection information for the service that requires the redirection; upon a service request, received from the UE, for a destined service identified by a service destination identifier, determining that the destined service corresponds to the service that requires the redirection, and returning toward the UE a redirection message with the service redirection identifier and the service destination identifier; receiving again, upon completion of the redirection, the service request for the destined service identified by the service destination identifier; verifying that the destined service identified by the service destination identifier can be authorized; and transmitting, toward a service server handling the destined service, a service allowance message for the service request. 15. The method of claim 14, wherein the redirection information for the service that requires the redirection includes a redirection activation indicator indicating whether the redirection is to be set or not for the service. 16. The method of claim 14, wherein the redirection information for the service that requires the redirection includes a redirection expiry selected from: a time during which the redirection takes place, an event for which the redirection is set or reset, and a one-time indicator indicating the redirection for a first service request in the IP-CAN session and no further redirection for subsequent service requests in the IP-CAN session. 17. The method of claim 14, wherein the redirection information for the service that requires the redirection includes at least one of: a redirection code indicating a reason for redirection, and a redirection confirmation indicating whether the PCRF server requires confirmation when redirection has been applied. 18. A Policy and Charging Enforcement Function (PCEF) device for enforcing control rules to authorize a service with a Policy and Charging Control (PCC) architecture, the PCEF device configured to: transmit, upon establishment or modification of an Internet Protocol (IP) Connectivity Access Network (IP-CAN) session for a user equipment (UE), a request for control rules to a Policy and Charging control Rules Function (PCRF) server via a transmitter; receive, from the PCRF server via a receiver, control rules per service basis and redirection information for a service that requires a redirection before being authorized, wherein the redirection information includes a service redirection identifier indicating where the UE is to be redirected for the service; install the control rules per service basis and the redirection information for the service that requires the redirection; upon a service request, received from the UE via the receiver, for a destined service identified by a service destination identifier, determine that the destined service corresponds to the service that requires the redirection and return, toward the UE via the transmitter, a redirection message with the service redirection identifier and the service destination identifier; receive again via the receiver, upon completion of the redirection, the service request for the destined service identified by the service destination identifier; verify that the destined service identified by the service destination identifier can be authorized; and transmit, via the transmitter toward a service server handling the destined service, a service allowance message for the service request. 19. The PCEF device of claim 18, wherein the redirection information for the service that requires the redirection includes a redirection activation indicator indicating whether the redirection is to be set or not for the service. 20. The PCEF device of claim 18, wherein the redirection information for the service that requires the redirection includes a redirection expiry selected from: a time during which the redirection takes place, an event for which the redirection is set or reset, and a one-time indicator indicating the redirection for a first service request in the IP-CAN session and no further redirection for subsequent service requests in the IP-CAN session. 21. The PCEF device of claim 18, wherein the redirection information for the service that requires the redirection includes at least one of: a redirection code indicating a reason for redirection, and a redirection confirmation indicating whether the PCRF server requires confirmation when redirection has been applied.
2,400
9,206
9,206
14,302,313
2,462
Methods and apparatus for determining a desired or optimal location for one or more access points within a premises. In one embodiment, software is provided to wireless-enabled client devices in a user premises; the software enables each of the devices to communicate with one another and collect a plurality of data relating to the connectivity of each at various locations within the premises. The data is used to determine a desired or optimal location for placement of an access point. Once the optimal location is determined, the access point is placed, and the client devices communicate therewith. In one variant, ongoing data may be collected as the system operates to ensure continued optimization. In the instance changes in the topology or environment of the user premises cause significant alterations to the communication signals or connectivity, a new optimal location for the access point may be determined.
1. A method of determining a desired location within a premises for a wireless access point, said method comprising: placing each of a plurality of wireless-enabled client devices in respective ones of a plurality of locations within said premises; utilizing said plurality of client devices to exchange signals between one another to collect data relating to one or more radio frequency characteristics at each of said plurality of locations; and utilizing said collected data to determine said desired location. 2. The method of claim 1, wherein said wireless access point and said plurality of client devices are each compliant with an IEEE-802.11 Wi-Fi standard. 3. The method of claim 1, wherein said utilizing said collected data comprises utilizing one of said plurality of client devices configured to: aggregating said collected data from each of said other plurality of client devices; and running at least one software application configured to evaluating said aggregated data in order for determining said desired location. 4. The method of claim 1, wherein said utilizing said collected data comprises utilizing one of said plurality of client devices configured to: aggregating said collected data from each of said other plurality of client devices; and transmitting said aggregated data to a data processing entity, said data processing entity configured to determining said desired location using at least said aggregated data. 5. The method of claim 4, wherein said data processing entity comprises a wireless access point. 6. The method of claim 4, wherein said data processing entity comprises an entity of a managed content delivery network. 7. The method of claim 1, wherein said collected data relating to one or more radio frequency characteristics comprises data relating to received wireless signal strength or intensity as measured at one of said plurality of client devices. 8. The method of claim 7, wherein evaluating said aggregated data in order for determining said desired location comprises evaluating sufficiency of said wireless signal strength or intensity for data communications at each of said plurality of locations. 9. A computer readable apparatus comprising a storage medium, said storage medium comprising at least one computer program having a plurality of instructions, said plurality of instructions configured to, when executed on a processing apparatus, to: access a plurality of link data obtained from a plurality of wireless client devices, at least a portion of said data gathered by each of said wireless client devices while monitoring wireless signals from at least one other of said plurality of client devices; and evaluate said plurality of link data to identify at least one optimized location from a plurality of candidate locations, said optimized location meeting at least one acceptance criteria for wireless performance. 10. The apparatus of claim 9, wherein said access of said plurality of link data comprises access of a data structure compiled by one of said wireless client devices. 11. The apparatus of claim 9, wherein said evaluation of said plurality of link data comprises apply weight factors associated with respective ones of said candidate locations, said weight factors relate to anticipated use of respective ones of said candidate locations by a user. 12. The apparatus of claim 11, wherein said apply said weight factors comprises apply factors to said link data associated with said respective candidate locations. 13. A method of remotely installing a wireless access point within a user premises, said method comprising: causing a user to place each of a plurality of wireless-enabled client devices in respective ones of a plurality of locations within said user premises, and utilize said plurality of client devices to exchange signals between one another to collect data relating to one or more radio frequency characteristics at each of said plurality of locations; receiving said collected data; utilizing said collected data for determining a desired location; and transmitting information relating to said determined desired location to said user, said information enabling said user to place said wireless access point within said user premises at said desired location. 14. The method of claim 13, wherein said exchange of signals is conducted according to a prescribed sequence, said prescribed sequence causing at least: (i) a first client device to radiate radio frequency signals, and a second client device to receive said radio frequency signals; and (ii) said second client device to radiate radio frequency signals, and a third client device to receive said radio frequency signals of said second device. 15. A method of determining an optimized placement of a wireless access point at a premises, said method comprising: utilizing a plurality of wireless enabled devices to transmit and receive signals in a substantially round-robin fashion in order to characterize a performance of each of a plurality of wireless links between said wireless enabled devices; and utilizing said characterizations of said plurality of wireless link performances for identifying at least one location where said performance of said plurality of wireless links is optimized when considered in an aggregate. 16. The method of claim 15, wherein said substantially round-robin fashion is conducted according to a sequence, said sequence causing at least: (i) a first client device to radiate signals, and a second client device to receive said signals; and (ii) said second client device to radiate signals, and a third client device to receive said signals of said second device. 17. The method of claim 15, wherein each of said plurality of wireless-enabled devices is placed in respective ones of a plurality of locations within said premises. 18. The method of claim 15, wherein said characterizations relates to one or more radio frequency characteristics comprising data relating to received wireless signal strength or intensity as received at one of said plurality of wireless enabled devices. 19. The method of claim 15, further comprising transmitting information relating to said identified at least one location to a user, said information enabling said user to place a wireless access point within said premises at said identified at least one location.
Methods and apparatus for determining a desired or optimal location for one or more access points within a premises. In one embodiment, software is provided to wireless-enabled client devices in a user premises; the software enables each of the devices to communicate with one another and collect a plurality of data relating to the connectivity of each at various locations within the premises. The data is used to determine a desired or optimal location for placement of an access point. Once the optimal location is determined, the access point is placed, and the client devices communicate therewith. In one variant, ongoing data may be collected as the system operates to ensure continued optimization. In the instance changes in the topology or environment of the user premises cause significant alterations to the communication signals or connectivity, a new optimal location for the access point may be determined.1. A method of determining a desired location within a premises for a wireless access point, said method comprising: placing each of a plurality of wireless-enabled client devices in respective ones of a plurality of locations within said premises; utilizing said plurality of client devices to exchange signals between one another to collect data relating to one or more radio frequency characteristics at each of said plurality of locations; and utilizing said collected data to determine said desired location. 2. The method of claim 1, wherein said wireless access point and said plurality of client devices are each compliant with an IEEE-802.11 Wi-Fi standard. 3. The method of claim 1, wherein said utilizing said collected data comprises utilizing one of said plurality of client devices configured to: aggregating said collected data from each of said other plurality of client devices; and running at least one software application configured to evaluating said aggregated data in order for determining said desired location. 4. The method of claim 1, wherein said utilizing said collected data comprises utilizing one of said plurality of client devices configured to: aggregating said collected data from each of said other plurality of client devices; and transmitting said aggregated data to a data processing entity, said data processing entity configured to determining said desired location using at least said aggregated data. 5. The method of claim 4, wherein said data processing entity comprises a wireless access point. 6. The method of claim 4, wherein said data processing entity comprises an entity of a managed content delivery network. 7. The method of claim 1, wherein said collected data relating to one or more radio frequency characteristics comprises data relating to received wireless signal strength or intensity as measured at one of said plurality of client devices. 8. The method of claim 7, wherein evaluating said aggregated data in order for determining said desired location comprises evaluating sufficiency of said wireless signal strength or intensity for data communications at each of said plurality of locations. 9. A computer readable apparatus comprising a storage medium, said storage medium comprising at least one computer program having a plurality of instructions, said plurality of instructions configured to, when executed on a processing apparatus, to: access a plurality of link data obtained from a plurality of wireless client devices, at least a portion of said data gathered by each of said wireless client devices while monitoring wireless signals from at least one other of said plurality of client devices; and evaluate said plurality of link data to identify at least one optimized location from a plurality of candidate locations, said optimized location meeting at least one acceptance criteria for wireless performance. 10. The apparatus of claim 9, wherein said access of said plurality of link data comprises access of a data structure compiled by one of said wireless client devices. 11. The apparatus of claim 9, wherein said evaluation of said plurality of link data comprises apply weight factors associated with respective ones of said candidate locations, said weight factors relate to anticipated use of respective ones of said candidate locations by a user. 12. The apparatus of claim 11, wherein said apply said weight factors comprises apply factors to said link data associated with said respective candidate locations. 13. A method of remotely installing a wireless access point within a user premises, said method comprising: causing a user to place each of a plurality of wireless-enabled client devices in respective ones of a plurality of locations within said user premises, and utilize said plurality of client devices to exchange signals between one another to collect data relating to one or more radio frequency characteristics at each of said plurality of locations; receiving said collected data; utilizing said collected data for determining a desired location; and transmitting information relating to said determined desired location to said user, said information enabling said user to place said wireless access point within said user premises at said desired location. 14. The method of claim 13, wherein said exchange of signals is conducted according to a prescribed sequence, said prescribed sequence causing at least: (i) a first client device to radiate radio frequency signals, and a second client device to receive said radio frequency signals; and (ii) said second client device to radiate radio frequency signals, and a third client device to receive said radio frequency signals of said second device. 15. A method of determining an optimized placement of a wireless access point at a premises, said method comprising: utilizing a plurality of wireless enabled devices to transmit and receive signals in a substantially round-robin fashion in order to characterize a performance of each of a plurality of wireless links between said wireless enabled devices; and utilizing said characterizations of said plurality of wireless link performances for identifying at least one location where said performance of said plurality of wireless links is optimized when considered in an aggregate. 16. The method of claim 15, wherein said substantially round-robin fashion is conducted according to a sequence, said sequence causing at least: (i) a first client device to radiate signals, and a second client device to receive said signals; and (ii) said second client device to radiate signals, and a third client device to receive said signals of said second device. 17. The method of claim 15, wherein each of said plurality of wireless-enabled devices is placed in respective ones of a plurality of locations within said premises. 18. The method of claim 15, wherein said characterizations relates to one or more radio frequency characteristics comprising data relating to received wireless signal strength or intensity as received at one of said plurality of wireless enabled devices. 19. The method of claim 15, further comprising transmitting information relating to said identified at least one location to a user, said information enabling said user to place a wireless access point within said premises at said identified at least one location.
2,400
9,207
9,207
15,387,279
2,465
Methods, apparatuses, and computer readable media for resource allocation signaling in a high efficiency wireless local area network (WLAN) are disclosed. A transmitter may identify a first indicator identifying a number of multi-user multiple-input/multiple-output (MU-MIMO) stations associated with a first resource unit (RU) in a first content channel of a transmission frame. The transmitter may generate a first common portion of a WLAN signaling field in the first content channel. The first common portion may include the first indicator. The transmitter may identify a second indicator identifying an absence of MU-MIMO stations associated with a second RU in a second content channel of the transmission frame. The transmitter may generate a second common portion of the WLAN signaling field in the second content channel. The second common portion may include the second indicator. The transmitter may transmit the transmission frame including the WLAN signaling field.
1. A method for wireless communication, comprising: identifying a first indicator identifying a number of multi-user multiple input multiple output (MU-MIMO) stations associated with a first resource unit (RU) in a first content channel of a transmission frame; generating a first common portion of a wireless local area network (WLAN) signaling field in the first content channel of the transmission frame, wherein the first common portion includes the first indicator; identifying a second indicator identifying an absence of MU-MIMO stations associated with a second RU in a second content channel of the transmission frame; generating a second common portion of the WLAN signaling field in the second content channel of the transmission frame, wherein the second common portion includes the second indicator; and transmitting the transmission frame that includes the WLAN signaling field. 2. The method of claim 1, wherein: the first common portion comprises a first common block field and the second common portion comprises a second common block field of the WLAN signaling field. 3. The method of claim 1, wherein: the WLAN signaling field comprises a high efficiency (HE) signaling B (HE-SIG-B) field. 4. The method of claim 1, further comprising: identifying a tone plan for the transmission frame; allocating RUs for a plurality of users for the transmission frame; determining that a RU of the tone plan is unallocated; and generating, for the transmission frame, a station identification in a user specific portion of the WLAN signaling field that indicates that the RU is unallocated. 5. The method of claim 4, further comprising: generating a predetermined bit sequence for the station identification that indicates that the RU is unallocated. 6. The method of claim 1, further comprising: generating a first RU allocation field in the first common portion of the WLAN signaling field to convey the indication of the first indicator; and generating a second RU allocation field in the first common portion of the WLAN signaling field to convey the indication of the second indicator. 7. A method for wireless communication, comprising: receiving a transmission frame associated with a plurality of channels, the transmission frame including a wireless local area network (WLAN) signaling field; identifying a first number of stations associated with the WLAN signaling field for a first channel of the plurality of channels; identifying a second number of stations associated with the WLAN signaling field for a second channel of the plurality of channels; and determining whether a data portion of the transmission frame contains multi-user multiple input multiple output (MU-MIMO) content based at least in part on the identified first number of stations and the identified second number of stations. 8. The method of claim 7, further comprising: determining that a combination of the first number of stations and the second number of stations is greater than one; and determining that the data portion of the transmission frame contains MU-MIMO content. 9. The method of claim 7, further comprising: determining that a combination of the first number of stations and the second number of stations is equal to one; and determining that the data portion of the transmission frame contains single user (SU) content. 10. The method of claim 7, wherein: the WLAN signaling field comprises a high efficiency (HE) signaling B (HE-SIG-B) field. 11. The method of claim 7, further comprising: receiving a first content channel associated with the transmission frame, the first content channel including the WLAN signaling field; and identifying, based on at least in part on an indication in the WLAN signaling field, a first number of users associated with the first content channel and a second number of users associated with a second content channel of the transmission frame. 12. The method of claim 11, further comprising: decoding a common block field of the WLAN signaling field for the first channel to identify the first number of users; and decoding the common block field of the WLAN signaling field for the second channel to identify the second number of users. 13. The method of claim 11, wherein: the common block field comprises resource unit (RU) allocation field. 14. An apparatus for wireless communication, comprising: a memory; and a processor coupled with the memory and configured to: identify a first indicator identifying a number of multi-user multiple input multiple output (MU-MIMO) stations associated with a first resource unit (RU) in a first content channel of a transmission frame; generate a first common portion of a wireless local area network (WLAN) signaling field in the first content channel of the transmission frame, wherein the first common portion includes the first indicator; identify a second indicator identifying an absence of MU-MIMO stations associated with a second RU in a second content channel of the transmission frame; generate a second common portion of the WLAN signaling field in the second content channel of the transmission frame, wherein the second common portion includes the second indicator; and transmit the transmission frame that includes the WLAN signaling field. 15. The apparatus of claim 14, wherein: the first common portion comprises a first common block field and the second common portion comprises a second common block field of the WLAN signaling field. 16. The apparatus of claim 14, wherein: the WLAN signaling field comprises a high efficiency (HE) signaling B (HE-SIG-B) field. 17. The apparatus of claim 14, wherein the processor and memory are further configured to: identify a tone plan for the transmission frame; allocate RUs for a plurality of users for the transmission frame; determine that a RU of the tone plan is unallocated; and generate, for the transmission frame, a station identification in a user specific portion of the WLAN signaling field that indicates that the RU is unallocated. 18. The apparatus of claim 17, wherein the processor and memory are further configured to: generate a predetermined bit sequence for the station identification that indicates that the RU is unallocated. 19. The apparatus of claim 14, wherein the processor and memory are further configured to: generate a first RU allocation field in the first common portion of the WLAN signaling field to convey the indication of the first indicator; and generate a second RU allocation field in the first common portion of the WLAN signaling field to convey the indication of the second indicator. 20. An apparatus for wireless communication, comprising: a memory; and a processor coupled with the memory and configured to: receive a transmission frame associated with a plurality of channels, the transmission frame including a wireless local area network (WLAN) signaling field; identify a first number of stations associated with the WLAN signaling field for a first channel of the plurality of channels; identify a second number of stations associated with the WLAN signaling field for a second channel of the plurality of channels; and determine whether a data portion of the transmission frame contains multi-user multiple input multiple output (MU-MIMO) content based at least in part on the identified first number of stations and the identified second number of stations. 21. The apparatus of claim 20, wherein the processor and memory are further configured to: determine that a combination of the first number of stations and the second number of stations is greater than one; and determine that the data portion of the transmission frame contains MU-MIMO content. 22. The apparatus of claim 20, wherein the processor and memory are further configured to: determine that a combination of the first number of stations and the second number of stations is equal to one; and determine that the data portion of the transmission frame contains single user (SU) content. 23. The apparatus of claim 20, wherein: the WLAN signaling field comprises a high efficiency (HE) signaling B (HE-SIG-B) field. 24. The apparatus of claim 20, wherein the processor and memory are further configured to: receive a first content channel associated with the transmission frame, the first content channel including the WLAN signaling field; and identify, based on at least in part on an indication in the WLAN signaling field, a first number of users associated with the first content channel and a second number of users associated with a second content channel of the transmission frame. 25. The apparatus of claim 24, wherein the processor and memory are further configured to: decode a common block field of the WLAN signaling field for the first channel to identify the first number of users; and decode the common block field of the WLAN signaling field for the second channel to identify the second number of users. 26. The apparatus of claim 24, wherein: the common block field comprises resource unit (RU) allocation field.
Methods, apparatuses, and computer readable media for resource allocation signaling in a high efficiency wireless local area network (WLAN) are disclosed. A transmitter may identify a first indicator identifying a number of multi-user multiple-input/multiple-output (MU-MIMO) stations associated with a first resource unit (RU) in a first content channel of a transmission frame. The transmitter may generate a first common portion of a WLAN signaling field in the first content channel. The first common portion may include the first indicator. The transmitter may identify a second indicator identifying an absence of MU-MIMO stations associated with a second RU in a second content channel of the transmission frame. The transmitter may generate a second common portion of the WLAN signaling field in the second content channel. The second common portion may include the second indicator. The transmitter may transmit the transmission frame including the WLAN signaling field.1. A method for wireless communication, comprising: identifying a first indicator identifying a number of multi-user multiple input multiple output (MU-MIMO) stations associated with a first resource unit (RU) in a first content channel of a transmission frame; generating a first common portion of a wireless local area network (WLAN) signaling field in the first content channel of the transmission frame, wherein the first common portion includes the first indicator; identifying a second indicator identifying an absence of MU-MIMO stations associated with a second RU in a second content channel of the transmission frame; generating a second common portion of the WLAN signaling field in the second content channel of the transmission frame, wherein the second common portion includes the second indicator; and transmitting the transmission frame that includes the WLAN signaling field. 2. The method of claim 1, wherein: the first common portion comprises a first common block field and the second common portion comprises a second common block field of the WLAN signaling field. 3. The method of claim 1, wherein: the WLAN signaling field comprises a high efficiency (HE) signaling B (HE-SIG-B) field. 4. The method of claim 1, further comprising: identifying a tone plan for the transmission frame; allocating RUs for a plurality of users for the transmission frame; determining that a RU of the tone plan is unallocated; and generating, for the transmission frame, a station identification in a user specific portion of the WLAN signaling field that indicates that the RU is unallocated. 5. The method of claim 4, further comprising: generating a predetermined bit sequence for the station identification that indicates that the RU is unallocated. 6. The method of claim 1, further comprising: generating a first RU allocation field in the first common portion of the WLAN signaling field to convey the indication of the first indicator; and generating a second RU allocation field in the first common portion of the WLAN signaling field to convey the indication of the second indicator. 7. A method for wireless communication, comprising: receiving a transmission frame associated with a plurality of channels, the transmission frame including a wireless local area network (WLAN) signaling field; identifying a first number of stations associated with the WLAN signaling field for a first channel of the plurality of channels; identifying a second number of stations associated with the WLAN signaling field for a second channel of the plurality of channels; and determining whether a data portion of the transmission frame contains multi-user multiple input multiple output (MU-MIMO) content based at least in part on the identified first number of stations and the identified second number of stations. 8. The method of claim 7, further comprising: determining that a combination of the first number of stations and the second number of stations is greater than one; and determining that the data portion of the transmission frame contains MU-MIMO content. 9. The method of claim 7, further comprising: determining that a combination of the first number of stations and the second number of stations is equal to one; and determining that the data portion of the transmission frame contains single user (SU) content. 10. The method of claim 7, wherein: the WLAN signaling field comprises a high efficiency (HE) signaling B (HE-SIG-B) field. 11. The method of claim 7, further comprising: receiving a first content channel associated with the transmission frame, the first content channel including the WLAN signaling field; and identifying, based on at least in part on an indication in the WLAN signaling field, a first number of users associated with the first content channel and a second number of users associated with a second content channel of the transmission frame. 12. The method of claim 11, further comprising: decoding a common block field of the WLAN signaling field for the first channel to identify the first number of users; and decoding the common block field of the WLAN signaling field for the second channel to identify the second number of users. 13. The method of claim 11, wherein: the common block field comprises resource unit (RU) allocation field. 14. An apparatus for wireless communication, comprising: a memory; and a processor coupled with the memory and configured to: identify a first indicator identifying a number of multi-user multiple input multiple output (MU-MIMO) stations associated with a first resource unit (RU) in a first content channel of a transmission frame; generate a first common portion of a wireless local area network (WLAN) signaling field in the first content channel of the transmission frame, wherein the first common portion includes the first indicator; identify a second indicator identifying an absence of MU-MIMO stations associated with a second RU in a second content channel of the transmission frame; generate a second common portion of the WLAN signaling field in the second content channel of the transmission frame, wherein the second common portion includes the second indicator; and transmit the transmission frame that includes the WLAN signaling field. 15. The apparatus of claim 14, wherein: the first common portion comprises a first common block field and the second common portion comprises a second common block field of the WLAN signaling field. 16. The apparatus of claim 14, wherein: the WLAN signaling field comprises a high efficiency (HE) signaling B (HE-SIG-B) field. 17. The apparatus of claim 14, wherein the processor and memory are further configured to: identify a tone plan for the transmission frame; allocate RUs for a plurality of users for the transmission frame; determine that a RU of the tone plan is unallocated; and generate, for the transmission frame, a station identification in a user specific portion of the WLAN signaling field that indicates that the RU is unallocated. 18. The apparatus of claim 17, wherein the processor and memory are further configured to: generate a predetermined bit sequence for the station identification that indicates that the RU is unallocated. 19. The apparatus of claim 14, wherein the processor and memory are further configured to: generate a first RU allocation field in the first common portion of the WLAN signaling field to convey the indication of the first indicator; and generate a second RU allocation field in the first common portion of the WLAN signaling field to convey the indication of the second indicator. 20. An apparatus for wireless communication, comprising: a memory; and a processor coupled with the memory and configured to: receive a transmission frame associated with a plurality of channels, the transmission frame including a wireless local area network (WLAN) signaling field; identify a first number of stations associated with the WLAN signaling field for a first channel of the plurality of channels; identify a second number of stations associated with the WLAN signaling field for a second channel of the plurality of channels; and determine whether a data portion of the transmission frame contains multi-user multiple input multiple output (MU-MIMO) content based at least in part on the identified first number of stations and the identified second number of stations. 21. The apparatus of claim 20, wherein the processor and memory are further configured to: determine that a combination of the first number of stations and the second number of stations is greater than one; and determine that the data portion of the transmission frame contains MU-MIMO content. 22. The apparatus of claim 20, wherein the processor and memory are further configured to: determine that a combination of the first number of stations and the second number of stations is equal to one; and determine that the data portion of the transmission frame contains single user (SU) content. 23. The apparatus of claim 20, wherein: the WLAN signaling field comprises a high efficiency (HE) signaling B (HE-SIG-B) field. 24. The apparatus of claim 20, wherein the processor and memory are further configured to: receive a first content channel associated with the transmission frame, the first content channel including the WLAN signaling field; and identify, based on at least in part on an indication in the WLAN signaling field, a first number of users associated with the first content channel and a second number of users associated with a second content channel of the transmission frame. 25. The apparatus of claim 24, wherein the processor and memory are further configured to: decode a common block field of the WLAN signaling field for the first channel to identify the first number of users; and decode the common block field of the WLAN signaling field for the second channel to identify the second number of users. 26. The apparatus of claim 24, wherein: the common block field comprises resource unit (RU) allocation field.
2,400
9,208
9,208
15,580,861
2,461
A plurality of communication devices form a network, including a first communication device configured to send and receive communication data to and from other communication devices within the network using time division multiple access protocol; wherein the first communication device is configured to store data indicating whether another communication device is in a master state; wherein in advance of sending communication data, if another communication device is not in the master state, then the first communication device will enter the master state; wherein in advance of sending communication data, if another communication device is in the master state, then the first communication device will enter a lowest available time slot; and wherein all of the communication devices in the network synchronize to the communication device in the master state. Other embodiments are also included herein.
1. A plurality of communication devices that form a network, comprising: a first communication device configured to send and receive communication data to and from other communication devices within the network using time division multiple access protocol; wherein the first communication device is configured to store data indicating whether another communication device is in a master state; wherein in advance of sending communication data, if another communication device is not in the master state, then the first communication device will enter the master state; wherein in advance of sending communication data, if another communication device is in the master state, then the first communication device will enter a lowest available time slot; and wherein all of the communication devices in the network synchronize to the communication device in the master state. 2. The plurality of communication devices that form the network of claim 1, wherein the network is fully occupied if all available time slots are occupied by communication devices other than the first communication device; wherein if the network is fully occupied, the first communication device will not be able to send any communication data to other communication devices; wherein the network being fully occupied does not prevent the first communication device from receiving the communication data from other communication devices. 3. The plurality of communication devices that form the network of claim 1, wherein upon receiving a communication from a communication device in the master state, the first communication device can enter a slave state, wherein in the slave state the first communication device is able to receive communication data and send communication data. 4. The plurality of communication devices that form the network of claim 1, wherein upon losing contact with a communication device in the master state, the communication device that is in a next occupied time slot in a predetermined order of time slots enters the master state. 5. The plurality of communication devices that form the network of claim 4, wherein a communication device in the master state is lost, if other communication devices not in the master state do not receive any communication data from the communication device in the master state within a master transmission time period. 6. The plurality of communication devices that form the network of claim 5, wherein the master transmission time period is at least 0.5 second. 7. The plurality of communication devices that form the network of claim 1, wherein the network does not include a designated base station. 8. The plurality of communication devices that form the network of claim 1, wherein all of the communication devices initially have equal access and ability to enter the master state. 9. The plurality of communication devices that form the network of claim 1, wherein when a second communication device is greater than a first threshold distance away from the first communication device in the master state, communication data sent by the first communication device will have a volume output of zero by the second communication device. 10. The plurality of communication devices that form the network of claim 9, wherein the first threshold distance is at least 10 m. 11. The plurality of communication devices that form the network of claim 9, wherein when the second communication device is between a second threshold distance and a first threshold distance, a communication sent by the first communication device will have a non-zero reduced volume output by the second communication device. 12. The plurality of communication devices that form the network of claim 11, wherein the second threshold distance is at least 4 m and less than or equal to 10 m, and the first threshold distance is at least 10 m and less than or equal to 20 m. 13. The plurality of communication devices that form the network of claim 9, wherein the distance between two communication devices is calculated using a received signal strength indicator value. 14. The plurality of communication devices that form a network of claim 1, wherein the first communication device comprises: a speaker operatively coupled to a processor, the speaker configured to output a sound wave based on an output from the processor; and a first ear cup and a second ear cup, the first ear cup coupled to the second ear cup with a headband; wherein the speaker disposed in at least one of the first ear cup or the second ear cup. 15. The plurality of communication devices that form a network of claim 1, wherein the first communication device is selected from one of the following: a welding mask, a hearing protection headset, and a respiration mask. 16. A communication device, comprising a receiver operatively coupled to a processor, wherein the receiver receives communication data from other communication devices; a speaker operatively coupled to the processor, the speaker configured to output a sound wave based on an output from the processor; wherein the processor determines a distance from another communication device transmitting communication data to the communication device, wherein a volume of the sound wave is reduced in proportion to the distance between the communication device and the other device. 17. The communication device of claim 16, wherein when the distance is greater than or equal to a first threshold distance, the volume is zero. 18. The communication device of claim 17, wherein the first threshold distance is 40 m or less. 19. The communication device of claim 17, wherein the first threshold distance is at least 10 m and less than 50 m. 20. The communication device of claim 16, wherein the distance is calculated using received signal strength indicator. 21. The communication device of claim 17, wherein the volume is reduced to a non-zero value between a second threshold distance and the first threshold distance, wherein the second threshold distance is smaller than the first threshold distance. 22. The communication device of claim 21, wherein the second threshold distance is greater than 4 m and less than 10 m. 23. The communication device of claim 21, wherein the second threshold distance is greater than 4 m and less than 10 m, and the first threshold distance is greater than 30 m and less than 50 m.
A plurality of communication devices form a network, including a first communication device configured to send and receive communication data to and from other communication devices within the network using time division multiple access protocol; wherein the first communication device is configured to store data indicating whether another communication device is in a master state; wherein in advance of sending communication data, if another communication device is not in the master state, then the first communication device will enter the master state; wherein in advance of sending communication data, if another communication device is in the master state, then the first communication device will enter a lowest available time slot; and wherein all of the communication devices in the network synchronize to the communication device in the master state. Other embodiments are also included herein.1. A plurality of communication devices that form a network, comprising: a first communication device configured to send and receive communication data to and from other communication devices within the network using time division multiple access protocol; wherein the first communication device is configured to store data indicating whether another communication device is in a master state; wherein in advance of sending communication data, if another communication device is not in the master state, then the first communication device will enter the master state; wherein in advance of sending communication data, if another communication device is in the master state, then the first communication device will enter a lowest available time slot; and wherein all of the communication devices in the network synchronize to the communication device in the master state. 2. The plurality of communication devices that form the network of claim 1, wherein the network is fully occupied if all available time slots are occupied by communication devices other than the first communication device; wherein if the network is fully occupied, the first communication device will not be able to send any communication data to other communication devices; wherein the network being fully occupied does not prevent the first communication device from receiving the communication data from other communication devices. 3. The plurality of communication devices that form the network of claim 1, wherein upon receiving a communication from a communication device in the master state, the first communication device can enter a slave state, wherein in the slave state the first communication device is able to receive communication data and send communication data. 4. The plurality of communication devices that form the network of claim 1, wherein upon losing contact with a communication device in the master state, the communication device that is in a next occupied time slot in a predetermined order of time slots enters the master state. 5. The plurality of communication devices that form the network of claim 4, wherein a communication device in the master state is lost, if other communication devices not in the master state do not receive any communication data from the communication device in the master state within a master transmission time period. 6. The plurality of communication devices that form the network of claim 5, wherein the master transmission time period is at least 0.5 second. 7. The plurality of communication devices that form the network of claim 1, wherein the network does not include a designated base station. 8. The plurality of communication devices that form the network of claim 1, wherein all of the communication devices initially have equal access and ability to enter the master state. 9. The plurality of communication devices that form the network of claim 1, wherein when a second communication device is greater than a first threshold distance away from the first communication device in the master state, communication data sent by the first communication device will have a volume output of zero by the second communication device. 10. The plurality of communication devices that form the network of claim 9, wherein the first threshold distance is at least 10 m. 11. The plurality of communication devices that form the network of claim 9, wherein when the second communication device is between a second threshold distance and a first threshold distance, a communication sent by the first communication device will have a non-zero reduced volume output by the second communication device. 12. The plurality of communication devices that form the network of claim 11, wherein the second threshold distance is at least 4 m and less than or equal to 10 m, and the first threshold distance is at least 10 m and less than or equal to 20 m. 13. The plurality of communication devices that form the network of claim 9, wherein the distance between two communication devices is calculated using a received signal strength indicator value. 14. The plurality of communication devices that form a network of claim 1, wherein the first communication device comprises: a speaker operatively coupled to a processor, the speaker configured to output a sound wave based on an output from the processor; and a first ear cup and a second ear cup, the first ear cup coupled to the second ear cup with a headband; wherein the speaker disposed in at least one of the first ear cup or the second ear cup. 15. The plurality of communication devices that form a network of claim 1, wherein the first communication device is selected from one of the following: a welding mask, a hearing protection headset, and a respiration mask. 16. A communication device, comprising a receiver operatively coupled to a processor, wherein the receiver receives communication data from other communication devices; a speaker operatively coupled to the processor, the speaker configured to output a sound wave based on an output from the processor; wherein the processor determines a distance from another communication device transmitting communication data to the communication device, wherein a volume of the sound wave is reduced in proportion to the distance between the communication device and the other device. 17. The communication device of claim 16, wherein when the distance is greater than or equal to a first threshold distance, the volume is zero. 18. The communication device of claim 17, wherein the first threshold distance is 40 m or less. 19. The communication device of claim 17, wherein the first threshold distance is at least 10 m and less than 50 m. 20. The communication device of claim 16, wherein the distance is calculated using received signal strength indicator. 21. The communication device of claim 17, wherein the volume is reduced to a non-zero value between a second threshold distance and the first threshold distance, wherein the second threshold distance is smaller than the first threshold distance. 22. The communication device of claim 21, wherein the second threshold distance is greater than 4 m and less than 10 m. 23. The communication device of claim 21, wherein the second threshold distance is greater than 4 m and less than 10 m, and the first threshold distance is greater than 30 m and less than 50 m.
2,400
9,209
9,209
15,397,934
2,413
Certain aspects of the present disclosure relate to methods and apparatus for pilot design for Narrow-Band Internet of Things (NB-IoT). In certain aspects, the method generally includes determining at least one binary code sequence to use as a demodulation reference signal (DMRS) for a channel transmitted across one or more subframes using one or more tones within a resource block (RB) allocated to the UE for narrowband communication, and transmitting the channel including the DMRS using the one or more tones and the determined binary code sequence. In certain aspects, the binary code sequence may be determined based on a binary random sequence, such as pseudo noise (PN) or Gold sequence.
1. A method for wireless communications by a user equipment (UE), comprising: determining at least one binary code sequence to use as a demodulation reference signal (DMRS) for a channel transmitted across one or more subframes using one or more tones within a resource block (RB) allocated to the UE for narrowband communication, wherein the binary code sequence is determined based on a binary random sequence; and transmitting the channel including the DMRS using the one or more tones and the determined binary code sequence. 2. The method of claim 1, wherein the binary code sequence is determined based on a product of a Hadamard sequence and the binary random sequence. 3. The method of claim 2, wherein the Hadamard sequence is length 16. 4. The method of claim 2, wherein the Hadamard sequence is cell-ID dependent. 5. The method of claim 2, wherein the binary random sequence comprises pseudo noise (PN) or Gold sequence. 6. The method of claim 5, wherein the PN or Gold sequence is reset in a first symbol of the binary code sequence. 7. The method of claim 5, wherein the pseudo noise (PN) and gold sequence are common among multiple cells, and wherein the Hadamard sequence is cell ID dependent. 8. The method of claim 1, wherein the binary code sequence is determined based on a product of a codeword from a linear cyclic code and the binary random sequence. 9. The method of claim 1, wherein: a length of the binary code sequence depends, at least in part, on a bundling length of the channel. 10. The method of claim 1, wherein: the binary code sequence is obtained from a binary code block having a high minimum Hamming distance, wherein the binary code block having the high minimum Hamming distance comprises a cyclic code block. 11. The method of claim 1, wherein the binary code sequence is determined as a linear combination of a set of known basis vectors. 12. The method of claim 1, wherein the binary code sequence is determined from a Hadamard matrix formed with orthogonal columns. 13. The method of claim 1, wherein the binary code sequence is determined from at least first and second Hadamard matrices, wherein the first Hadamard matrix is formed with orthogonal columns and the second Hadamard matrix that is formed by flipping the first Hadamard matrix. 14. The method of claim 1, wherein the determining comprises determining: a first binary code sequence for transmitting DMRS on a first tone is selected from a first Hadamard matrix formed with orthogonal columns; and a second binary code sequence for transmitting DMRS on a second tone is selected from a second Hadamard matrix formed with orthogonal columns. 15. The method of claim 14, wherein the second Hadamard matrix is formed by flipping the first Hadamard matrix. 16. The method of claim 1, wherein: a first binary code sequence for transmitting DMRS on a first tone is selected from a first Hadamard matrix; and a second binary code sequence for transmitting DMRS on a second tone is also selected from the first Hadamard matrix. 17. The method of claim 1, further comprising: receiving a system information block (SIB) message, wherein the SIB message comprises an indication of a base sequence, wherein determining the binary code sequence is based on the indication. 18. The method of claim 1, wherein determining the binary code sequence comprises determining a base sequence based on a cell-ID. 19. The method of claim 1, wherein the determination of the binary code sequence is based on three cyclic shifts if the at least one tone comprises three tones, and wherein the determination of the binary code sequence is based on four cyclic shifts if the at least one tone comprises six tones. 20. The method of claim 1, further comprising: receiving a system information block (SIB) message, wherein the SIB message comprises an indication of a number of cyclic shifts, wherein determining the binary code sequence is based on the indication. 21. The method of claim 1, wherein the binary code sequence is determined from 12 base sequences if the at least one tone comprises three tones, and wherein the binary code sequence is determined from 14 base sequences if the at least one tone comprises six tones. 22. The method of claim 1, wherein the binary code sequence is transmitted with a Quadrature Phase Shift Keying (QPSK) modulation scheme in frequency domain. 23. The method of claim 1, further comprising applying a cyclic shift to the binary code sequence, wherein the cyclic shift is determined based on at least one of a cell ID, a UE ID, or slot index. 24. The method of claim 1, wherein the one or more subframes comprise a plurality of subframes and the determining comprises determining different binary code sequences to use as a DMRS for each of the subframes. 25. The method of claim 1, wherein the binary code sequence is randomized using a scrambling sequence, wherein the scrambling sequence is determined based on at least one of a cell ID, a UE ID, or a slot number. 26. The method of claim 1, wherein the one or more tones comprises multiple tones, and wherein determining the binary code sequence comprise determining different binary code sequences for each of the multiple tones. 27. A method for wireless communications by a base station, comprising: determining at least one binary code sequence that is a candidate for use as a demodulation reference signal (DMRS) for a channel transmitted, by a user equipment (UE), across one or more subframes using one or more tones within a resource block (RB) allocated to the UE for narrowband communication, wherein the binary code sequence is determined based on a binary random sequence; and monitoring the one or more tones during the one or more subframes for the channel including the DMRS using the one or more tones and the determined binary code sequence. 28. The method of claim 27, wherein the binary code sequence is determined based on a product of a Hadamard sequence and the binary random sequence. 29. The method of claim 28, wherein the Hadamard sequence is length 16. 30. The method of claim 28, wherein the Hadamard sequence is cell-ID dependent. 31. The method of claim 28, wherein the binary random sequence comprises pseudo noise (PN) or gold sequence. 32. The method of claim 31, wherein the PN or Gold sequence is reset in a first symbol of the binary code sequence. 33. The method of claim 31, wherein the pseudo noise (PN) and gold sequence are common among multiple cells, and wherein the Hadamard sequence is cell ID dependent. 34. The method of claim 27, wherein the binary code sequence is determined based on a product of a codeword from a linear cyclic code and the binary random sequence. 35. The method of claim 27, wherein: a length of the binary code sequence depends, at least in part, on a bundling length of the channel. 36. The method of claim 27, wherein: the binary code sequence is obtained from a binary code block having a high minimum Hamming distance, wherein the binary code block having the high minimum Hamming distance comprises a cyclic code block. 37. The method of claim 27, wherein the binary code sequence is determined as a linear combination of a set of known basis vectors. 38. The method of claim 27, wherein the binary code sequence is determined from at least a first Hadamard matrix formed with orthogonal columns. 39. The method of claim 27, wherein the binary code sequence is determined from at least first and second Hadamard matrices, wherein the first Hadamard matrix is formed with orthogonal columns and the second Hadamard matrix that is formed by flipping the first Hadamard matrix. 40. The method of claim 27, wherein: a first binary code sequence for transmitting DMRS on a first tone is selected from a first Hadamard matrix formed with orthogonal columns; and a second binary code sequence for transmitting DMRS on a second tone is selected from a second Hadamard matrix formed with orthogonal columns. 41. The method of claim 40, wherein the second Hadamard matrix is formed by flipping the first Hadamard matrix. 42. The method of claim 27, wherein: a first binary code sequence is determined for DMRS on a first tone is selected from a first Hadamard matrix; and a second binary code sequence is determined for DMRS on a second tone is also selected from the first Hadamard matrix. 43. The method of claim 27, further comprising: transmitting a system information block (SIB) message, wherein the SIB message comprises an indication of a base sequence used to determine the binary code sequence. 44. The method of claim 27, wherein determining the binary code sequence comprises determining a base sequence based on a cell-ID. 45. The method of claim 27, wherein the determination of the binary code sequence is based on three cyclic shifts if the at least one tone comprises three tones, and wherein the determination of the binary code sequence is based on four cyclic shifts if the at least one tone comprises six tones. 46. The method of claim 27, further comprising: transmitting a system information block (SIB) message, wherein the SIB message comprises an indication of a number of cyclic shifts used to determine the binary code sequence. 47. The method of claim 27, wherein the binary code sequence is determined from 12 base sequences if the at least one tone comprises three tones, and wherein the binary code sequence is determined from 14 base sequences if the at least one tone comprises six tones. 48. The method of claim 27, wherein the binary code sequence is transmitted with a Quadrature Phase Shift Keying (QPSK) modulation scheme in frequency domain. 49. The method of claim 27, wherein the monitoring comprises monitoring for a cyclic shift applied to the binary code sequence by the UE, wherein the cyclic shift is determined based on at least one of a cell ID, a UE ID, or slot index. 50. The method of claim 27, wherein the one or more subframes comprise a plurality of subframes and the determining comprises determining different binary code sequences to use as a DMRS for each of the subframes. 51. The method of claim 27, wherein the binary code sequence comprises a scrambling sequence, wherein the scrambling sequence is determined based on at least one of a cell ID, a UE ID, or a slot number. 52. The method of claim 27, wherein the one or more tones comprises multiple tones, and wherein determining the binary code sequence comprise determining different binary code sequences for each of the multiple tones. 53. An apparatus for wireless communications, comprising: means for determining at least one binary code sequence to use as a demodulation reference signal (DMRS) for a channel transmitted across one or more subframes using one or more tones within a resource block (RB) allocated to the UE for narrowband communication, wherein the binary code sequence is determined based on a binary random sequence; and means for transmitting the channel including the DMRS using the one or more tones and the determined binary code sequence. 54. An apparatus for wireless communications, comprising: means for determining at least one binary code sequence that is a candidate for use as a demodulation reference signal (DMRS) for a channel transmitted, by a user equipment (UE), across one or more subframes using one or more tones within a resource block (RB) allocated to the UE for narrowband communication, wherein the binary code sequence is determined based on a binary random sequence; and means for monitoring the one or more tones during the one or more subframes for the channel including the DMRS using the one or more tones and the determined binary code sequence.
Certain aspects of the present disclosure relate to methods and apparatus for pilot design for Narrow-Band Internet of Things (NB-IoT). In certain aspects, the method generally includes determining at least one binary code sequence to use as a demodulation reference signal (DMRS) for a channel transmitted across one or more subframes using one or more tones within a resource block (RB) allocated to the UE for narrowband communication, and transmitting the channel including the DMRS using the one or more tones and the determined binary code sequence. In certain aspects, the binary code sequence may be determined based on a binary random sequence, such as pseudo noise (PN) or Gold sequence.1. A method for wireless communications by a user equipment (UE), comprising: determining at least one binary code sequence to use as a demodulation reference signal (DMRS) for a channel transmitted across one or more subframes using one or more tones within a resource block (RB) allocated to the UE for narrowband communication, wherein the binary code sequence is determined based on a binary random sequence; and transmitting the channel including the DMRS using the one or more tones and the determined binary code sequence. 2. The method of claim 1, wherein the binary code sequence is determined based on a product of a Hadamard sequence and the binary random sequence. 3. The method of claim 2, wherein the Hadamard sequence is length 16. 4. The method of claim 2, wherein the Hadamard sequence is cell-ID dependent. 5. The method of claim 2, wherein the binary random sequence comprises pseudo noise (PN) or Gold sequence. 6. The method of claim 5, wherein the PN or Gold sequence is reset in a first symbol of the binary code sequence. 7. The method of claim 5, wherein the pseudo noise (PN) and gold sequence are common among multiple cells, and wherein the Hadamard sequence is cell ID dependent. 8. The method of claim 1, wherein the binary code sequence is determined based on a product of a codeword from a linear cyclic code and the binary random sequence. 9. The method of claim 1, wherein: a length of the binary code sequence depends, at least in part, on a bundling length of the channel. 10. The method of claim 1, wherein: the binary code sequence is obtained from a binary code block having a high minimum Hamming distance, wherein the binary code block having the high minimum Hamming distance comprises a cyclic code block. 11. The method of claim 1, wherein the binary code sequence is determined as a linear combination of a set of known basis vectors. 12. The method of claim 1, wherein the binary code sequence is determined from a Hadamard matrix formed with orthogonal columns. 13. The method of claim 1, wherein the binary code sequence is determined from at least first and second Hadamard matrices, wherein the first Hadamard matrix is formed with orthogonal columns and the second Hadamard matrix that is formed by flipping the first Hadamard matrix. 14. The method of claim 1, wherein the determining comprises determining: a first binary code sequence for transmitting DMRS on a first tone is selected from a first Hadamard matrix formed with orthogonal columns; and a second binary code sequence for transmitting DMRS on a second tone is selected from a second Hadamard matrix formed with orthogonal columns. 15. The method of claim 14, wherein the second Hadamard matrix is formed by flipping the first Hadamard matrix. 16. The method of claim 1, wherein: a first binary code sequence for transmitting DMRS on a first tone is selected from a first Hadamard matrix; and a second binary code sequence for transmitting DMRS on a second tone is also selected from the first Hadamard matrix. 17. The method of claim 1, further comprising: receiving a system information block (SIB) message, wherein the SIB message comprises an indication of a base sequence, wherein determining the binary code sequence is based on the indication. 18. The method of claim 1, wherein determining the binary code sequence comprises determining a base sequence based on a cell-ID. 19. The method of claim 1, wherein the determination of the binary code sequence is based on three cyclic shifts if the at least one tone comprises three tones, and wherein the determination of the binary code sequence is based on four cyclic shifts if the at least one tone comprises six tones. 20. The method of claim 1, further comprising: receiving a system information block (SIB) message, wherein the SIB message comprises an indication of a number of cyclic shifts, wherein determining the binary code sequence is based on the indication. 21. The method of claim 1, wherein the binary code sequence is determined from 12 base sequences if the at least one tone comprises three tones, and wherein the binary code sequence is determined from 14 base sequences if the at least one tone comprises six tones. 22. The method of claim 1, wherein the binary code sequence is transmitted with a Quadrature Phase Shift Keying (QPSK) modulation scheme in frequency domain. 23. The method of claim 1, further comprising applying a cyclic shift to the binary code sequence, wherein the cyclic shift is determined based on at least one of a cell ID, a UE ID, or slot index. 24. The method of claim 1, wherein the one or more subframes comprise a plurality of subframes and the determining comprises determining different binary code sequences to use as a DMRS for each of the subframes. 25. The method of claim 1, wherein the binary code sequence is randomized using a scrambling sequence, wherein the scrambling sequence is determined based on at least one of a cell ID, a UE ID, or a slot number. 26. The method of claim 1, wherein the one or more tones comprises multiple tones, and wherein determining the binary code sequence comprise determining different binary code sequences for each of the multiple tones. 27. A method for wireless communications by a base station, comprising: determining at least one binary code sequence that is a candidate for use as a demodulation reference signal (DMRS) for a channel transmitted, by a user equipment (UE), across one or more subframes using one or more tones within a resource block (RB) allocated to the UE for narrowband communication, wherein the binary code sequence is determined based on a binary random sequence; and monitoring the one or more tones during the one or more subframes for the channel including the DMRS using the one or more tones and the determined binary code sequence. 28. The method of claim 27, wherein the binary code sequence is determined based on a product of a Hadamard sequence and the binary random sequence. 29. The method of claim 28, wherein the Hadamard sequence is length 16. 30. The method of claim 28, wherein the Hadamard sequence is cell-ID dependent. 31. The method of claim 28, wherein the binary random sequence comprises pseudo noise (PN) or gold sequence. 32. The method of claim 31, wherein the PN or Gold sequence is reset in a first symbol of the binary code sequence. 33. The method of claim 31, wherein the pseudo noise (PN) and gold sequence are common among multiple cells, and wherein the Hadamard sequence is cell ID dependent. 34. The method of claim 27, wherein the binary code sequence is determined based on a product of a codeword from a linear cyclic code and the binary random sequence. 35. The method of claim 27, wherein: a length of the binary code sequence depends, at least in part, on a bundling length of the channel. 36. The method of claim 27, wherein: the binary code sequence is obtained from a binary code block having a high minimum Hamming distance, wherein the binary code block having the high minimum Hamming distance comprises a cyclic code block. 37. The method of claim 27, wherein the binary code sequence is determined as a linear combination of a set of known basis vectors. 38. The method of claim 27, wherein the binary code sequence is determined from at least a first Hadamard matrix formed with orthogonal columns. 39. The method of claim 27, wherein the binary code sequence is determined from at least first and second Hadamard matrices, wherein the first Hadamard matrix is formed with orthogonal columns and the second Hadamard matrix that is formed by flipping the first Hadamard matrix. 40. The method of claim 27, wherein: a first binary code sequence for transmitting DMRS on a first tone is selected from a first Hadamard matrix formed with orthogonal columns; and a second binary code sequence for transmitting DMRS on a second tone is selected from a second Hadamard matrix formed with orthogonal columns. 41. The method of claim 40, wherein the second Hadamard matrix is formed by flipping the first Hadamard matrix. 42. The method of claim 27, wherein: a first binary code sequence is determined for DMRS on a first tone is selected from a first Hadamard matrix; and a second binary code sequence is determined for DMRS on a second tone is also selected from the first Hadamard matrix. 43. The method of claim 27, further comprising: transmitting a system information block (SIB) message, wherein the SIB message comprises an indication of a base sequence used to determine the binary code sequence. 44. The method of claim 27, wherein determining the binary code sequence comprises determining a base sequence based on a cell-ID. 45. The method of claim 27, wherein the determination of the binary code sequence is based on three cyclic shifts if the at least one tone comprises three tones, and wherein the determination of the binary code sequence is based on four cyclic shifts if the at least one tone comprises six tones. 46. The method of claim 27, further comprising: transmitting a system information block (SIB) message, wherein the SIB message comprises an indication of a number of cyclic shifts used to determine the binary code sequence. 47. The method of claim 27, wherein the binary code sequence is determined from 12 base sequences if the at least one tone comprises three tones, and wherein the binary code sequence is determined from 14 base sequences if the at least one tone comprises six tones. 48. The method of claim 27, wherein the binary code sequence is transmitted with a Quadrature Phase Shift Keying (QPSK) modulation scheme in frequency domain. 49. The method of claim 27, wherein the monitoring comprises monitoring for a cyclic shift applied to the binary code sequence by the UE, wherein the cyclic shift is determined based on at least one of a cell ID, a UE ID, or slot index. 50. The method of claim 27, wherein the one or more subframes comprise a plurality of subframes and the determining comprises determining different binary code sequences to use as a DMRS for each of the subframes. 51. The method of claim 27, wherein the binary code sequence comprises a scrambling sequence, wherein the scrambling sequence is determined based on at least one of a cell ID, a UE ID, or a slot number. 52. The method of claim 27, wherein the one or more tones comprises multiple tones, and wherein determining the binary code sequence comprise determining different binary code sequences for each of the multiple tones. 53. An apparatus for wireless communications, comprising: means for determining at least one binary code sequence to use as a demodulation reference signal (DMRS) for a channel transmitted across one or more subframes using one or more tones within a resource block (RB) allocated to the UE for narrowband communication, wherein the binary code sequence is determined based on a binary random sequence; and means for transmitting the channel including the DMRS using the one or more tones and the determined binary code sequence. 54. An apparatus for wireless communications, comprising: means for determining at least one binary code sequence that is a candidate for use as a demodulation reference signal (DMRS) for a channel transmitted, by a user equipment (UE), across one or more subframes using one or more tones within a resource block (RB) allocated to the UE for narrowband communication, wherein the binary code sequence is determined based on a binary random sequence; and means for monitoring the one or more tones during the one or more subframes for the channel including the DMRS using the one or more tones and the determined binary code sequence.
2,400
9,210
9,210
15,086,982
2,449
In general, techniques are described for providing user nomadicity in wireline broadband networks. A network device positioned in a wireline broadband network comprising a processor and an interface may be configured to perform the techniques. The processor may be configured to execute a first virtual customer premises equipment to provide, to a first subscriber, access to the wireline broadband network from a first subscription point in accordance with a first subscription. The processor may also be configured to provide, to a second subscriber, access to the wireline broadband network from the first subscription point in accordance with a second subscription. The interface may be configured to forward, in accordance with the first subscription, traffic received from the first subscription point and associated with the first subscriber, and forward, in accordance with the second subscription, traffic received from the first subscription point and associated with the second subscriber.
1. A method comprising: executing, by a network device positioned in a wireline broadband network, a first virtual customer premises equipment to provide, to a first subscriber, access to the wireline broadband network from a first subscription point in accordance with a first subscription associated with the first subscriber and the first subscription point; providing, by the network device to a second subscriber, access to the wireline broadband network from the first subscription point in accordance with a second subscription associated with the second subscriber and a second subscription point; forwarding, by the network device in accordance with the first subscription, traffic received from the first subscription point and associated with the first subscriber; and forwarding, by the network device in accordance with the second subscription, traffic received from the first subscription point and associated with the second subscriber. 2. The method of claim 1, wherein providing access to the wireline broadband network for the second subscriber comprises executing a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 3. The method of claim 1, wherein providing access to the wireline broadband network for the second subscriber comprises: executing a proxy virtual customer premises equipment for the second subscriber separate from the first virtual customer premises equipment executed for the first subscriber; and creating a tunnel from the proxy virtual customer premises equipment to a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 4. The method of claim 1, wherein providing access to the wireline broadband network for the second subscriber comprises configuring the first virtual customer premises equipment associated with the first subscriber to: act as a proxy virtual customer premises equipment for the second subscriber; and create a tunnel from the proxy virtual customer premises equipment to a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 5. The method of claim 4, wherein configuring the first virtual customer premises equipment associated with the first subscriber to act as the proxy virtual customer premises equipment for the second subscriber comprises: retrieving, during authentication of the second subscriber to access the wireline broadband network, information identifying the second virtual customer premises equipment; configuring the tunnel from the proxy virtual customer premises equipment to the second virtual customer premises equipment; and installing a firewall filter that directs all traffic from a device associated with the second subscriber through the tunnel to the second virtual customer premises equipment. 6. The method of claim 5, wherein the network device comprises a first network device that executes both the first virtual customer premises equipment and the proxy virtual customer premises equipment, and wherein a second network device executes the second virtual customer premises equipment. 7. The method of claim 5, further comprising: receiving, with the proxy virtual customer premises equipment, subscriber credentials associated with the second subscriber via an authentication portal served by the wireline broadband network; and initiating the authentication of the second subscriber based on the subscriber credentials. 8. The method of claim 5, further comprising receiving a change of authorization from a different network device authorizing the installation of the firewall filter as a result of authenticating subscriber credentials associated with the second subscriber. 9. The method of claim 1, wherein providing access to the wireline broadband network for the second subscriber comprises executing a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point without establishing a tunnel to redirect traffic to a third virtual customer premises equipment executed to provide access to the wireline broadband network for the second subscription point. 10. The method of claim 9, wherein providing access to the wireline broadband network for the second subscriber comprises executing a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network from the first subscription point in accordance with the second subscription associated with the second subscription point concurrent to execution of a third virtual customer premises equipment executed to provide access to the wireline broadband network for the second subscription point. 11. The method of claim 9, wherein providing access to the wireline broadband network for the second subscriber comprises transferring execution of a second virtual customer premises equipment for the second subscriber to the network device so as to provide the access to the wireline broadband network from the first subscription point in accordance with the second subscription associated with the second subscription point 12. The method of claim 1, wherein the network device comprises one of a service gateway and a broadband network gateway. 13. A network device positioned in a wireline broadband network, comprising: one or more processors configured to execute a first virtual customer premises equipment to provide, to a first subscriber, access to the wireline broadband network from a first subscription point in accordance with a first subscription associated with the first subscriber and the first subscription point, and provide, to a second subscriber, access to the wireline broadband network from the first subscription point in accordance with a second subscription associated with the second subscriber and a second subscription point; and one or more interfaces configured to forward, in accordance with the first subscription, traffic received from the first subscription point and associated with the first subscriber, and forward, in accordance with the second subscription, traffic received from the first subscription point and associated with the second subscriber. 14. The network device of claim 13, wherein the one or more processors are configured to execute a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 15. The network device of claim 13, wherein the one or more processors are configured to: execute a proxy virtual customer premises equipment for the second subscriber separate from the first virtual customer premises equipment executed for the first subscriber; and create a tunnel from the proxy virtual customer premises equipment to a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 16. The network device of claim 13, wherein the one or more processors are configured to configure the first virtual customer premises equipment associated with the first subscriber to: act as a proxy virtual customer premises equipment for the second subscriber; and create a tunnel from the proxy virtual customer premises equipment to a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 17. The network device of claim 16, wherein the one or more processors are configured to: retrieve, during authentication of the second subscriber to access the wireline broadband network, information identifying the second virtual customer premises equipment; configure the tunnel from the proxy virtual customer premises equipment to the second virtual customer premises equipment; and install a firewall filter that directs all traffic from a device associated with the second subscriber through the tunnel to the second virtual customer premises equipment. 18. The network device of claim 17, wherein the network device comprises a first network device that executes both the first virtual customer premises equipment and the proxy virtual customer premises equipment, and wherein a second network device executes the second virtual customer premises equipment. 19. The network device of claim 17, wherein the one or more processors are further configured to: receive, with the proxy virtual customer premises equipment, subscriber credentials associated with the second subscriber via an authentication portal served by the wireline broadband network; and initiate the authentication of the second subscriber based on the subscriber credentials. 20. The network device of claim 17, wherein the one or more interfaces are further configured to receive a change of authorization from a different network device authorizing the installation of the firewall filter as a result of authenticating subscriber credentials associated with the second subscriber. 21. The network device of claim 13, wherein the one or more processors are configured to execute a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point without establishing a tunnel to redirect traffic to a third virtual customer premises equipment executed to provide access to the wireline broadband network for the second subscription point. 22. The network device of claim 21, wherein the one or more processors are configured to execute a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network from the first subscription point in accordance with the second subscription associated with the second subscription point concurrent to execution of a third virtual customer premises equipment executed to provide access to the wireline broadband network for the second subscription point. 23. The network device of claim 21, wherein the one or more processors are configured to transfer execution of a second virtual customer premises equipment for the second subscriber to the network device so as to provide the access to the wireline broadband network from the first subscription point in accordance with the second subscription associated with the second subscription point 24. The network device of claim 13, wherein the network device comprises one of a service gateway and a broadband network gateway. 25. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed, cause one or more processors of a network device positioned in the wireline broadband network to: execute a first virtual customer premises equipment to provide, to a first subscriber, access to the wireline broadband network from a first subscription point in accordance with a first subscription associated with the first subscriber and the first subscription point; provide, to a second subscriber, access to the wireline broadband network from the first subscription point in accordance with a second subscription associated with the second subscriber and a second subscription point; forward, in accordance with the first subscription, traffic received from the first subscription point and associated with the first subscriber; and forward, in accordance with the second subscription, traffic received from the first subscription point and associated with the second subscriber. 26. A network system comprising: a wireline broadband network configured to provide access to a public network; and a network device positioned in the wireline broadband network, the network device comprising: one or more processors configured to execute a first virtual customer premises equipment to provide, to a first subscriber, access to the wireline broadband network from a first subscription point in accordance with a first subscription associated with the first subscriber and the first subscription point, and provide, to a second subscriber, access to the wireline broadband network from the first subscription point in accordance with a second subscription associated with the second subscriber and a second subscription point; and one or more interfaces configured to forward, in accordance with the first subscription, traffic received from the first subscription point and associated with the first subscriber, and forward, in accordance with the second subscription, traffic received from the first subscription point and associated with the second subscriber.
In general, techniques are described for providing user nomadicity in wireline broadband networks. A network device positioned in a wireline broadband network comprising a processor and an interface may be configured to perform the techniques. The processor may be configured to execute a first virtual customer premises equipment to provide, to a first subscriber, access to the wireline broadband network from a first subscription point in accordance with a first subscription. The processor may also be configured to provide, to a second subscriber, access to the wireline broadband network from the first subscription point in accordance with a second subscription. The interface may be configured to forward, in accordance with the first subscription, traffic received from the first subscription point and associated with the first subscriber, and forward, in accordance with the second subscription, traffic received from the first subscription point and associated with the second subscriber.1. A method comprising: executing, by a network device positioned in a wireline broadband network, a first virtual customer premises equipment to provide, to a first subscriber, access to the wireline broadband network from a first subscription point in accordance with a first subscription associated with the first subscriber and the first subscription point; providing, by the network device to a second subscriber, access to the wireline broadband network from the first subscription point in accordance with a second subscription associated with the second subscriber and a second subscription point; forwarding, by the network device in accordance with the first subscription, traffic received from the first subscription point and associated with the first subscriber; and forwarding, by the network device in accordance with the second subscription, traffic received from the first subscription point and associated with the second subscriber. 2. The method of claim 1, wherein providing access to the wireline broadband network for the second subscriber comprises executing a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 3. The method of claim 1, wherein providing access to the wireline broadband network for the second subscriber comprises: executing a proxy virtual customer premises equipment for the second subscriber separate from the first virtual customer premises equipment executed for the first subscriber; and creating a tunnel from the proxy virtual customer premises equipment to a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 4. The method of claim 1, wherein providing access to the wireline broadband network for the second subscriber comprises configuring the first virtual customer premises equipment associated with the first subscriber to: act as a proxy virtual customer premises equipment for the second subscriber; and create a tunnel from the proxy virtual customer premises equipment to a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 5. The method of claim 4, wherein configuring the first virtual customer premises equipment associated with the first subscriber to act as the proxy virtual customer premises equipment for the second subscriber comprises: retrieving, during authentication of the second subscriber to access the wireline broadband network, information identifying the second virtual customer premises equipment; configuring the tunnel from the proxy virtual customer premises equipment to the second virtual customer premises equipment; and installing a firewall filter that directs all traffic from a device associated with the second subscriber through the tunnel to the second virtual customer premises equipment. 6. The method of claim 5, wherein the network device comprises a first network device that executes both the first virtual customer premises equipment and the proxy virtual customer premises equipment, and wherein a second network device executes the second virtual customer premises equipment. 7. The method of claim 5, further comprising: receiving, with the proxy virtual customer premises equipment, subscriber credentials associated with the second subscriber via an authentication portal served by the wireline broadband network; and initiating the authentication of the second subscriber based on the subscriber credentials. 8. The method of claim 5, further comprising receiving a change of authorization from a different network device authorizing the installation of the firewall filter as a result of authenticating subscriber credentials associated with the second subscriber. 9. The method of claim 1, wherein providing access to the wireline broadband network for the second subscriber comprises executing a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point without establishing a tunnel to redirect traffic to a third virtual customer premises equipment executed to provide access to the wireline broadband network for the second subscription point. 10. The method of claim 9, wherein providing access to the wireline broadband network for the second subscriber comprises executing a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network from the first subscription point in accordance with the second subscription associated with the second subscription point concurrent to execution of a third virtual customer premises equipment executed to provide access to the wireline broadband network for the second subscription point. 11. The method of claim 9, wherein providing access to the wireline broadband network for the second subscriber comprises transferring execution of a second virtual customer premises equipment for the second subscriber to the network device so as to provide the access to the wireline broadband network from the first subscription point in accordance with the second subscription associated with the second subscription point 12. The method of claim 1, wherein the network device comprises one of a service gateway and a broadband network gateway. 13. A network device positioned in a wireline broadband network, comprising: one or more processors configured to execute a first virtual customer premises equipment to provide, to a first subscriber, access to the wireline broadband network from a first subscription point in accordance with a first subscription associated with the first subscriber and the first subscription point, and provide, to a second subscriber, access to the wireline broadband network from the first subscription point in accordance with a second subscription associated with the second subscriber and a second subscription point; and one or more interfaces configured to forward, in accordance with the first subscription, traffic received from the first subscription point and associated with the first subscriber, and forward, in accordance with the second subscription, traffic received from the first subscription point and associated with the second subscriber. 14. The network device of claim 13, wherein the one or more processors are configured to execute a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 15. The network device of claim 13, wherein the one or more processors are configured to: execute a proxy virtual customer premises equipment for the second subscriber separate from the first virtual customer premises equipment executed for the first subscriber; and create a tunnel from the proxy virtual customer premises equipment to a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 16. The network device of claim 13, wherein the one or more processors are configured to configure the first virtual customer premises equipment associated with the first subscriber to: act as a proxy virtual customer premises equipment for the second subscriber; and create a tunnel from the proxy virtual customer premises equipment to a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point. 17. The network device of claim 16, wherein the one or more processors are configured to: retrieve, during authentication of the second subscriber to access the wireline broadband network, information identifying the second virtual customer premises equipment; configure the tunnel from the proxy virtual customer premises equipment to the second virtual customer premises equipment; and install a firewall filter that directs all traffic from a device associated with the second subscriber through the tunnel to the second virtual customer premises equipment. 18. The network device of claim 17, wherein the network device comprises a first network device that executes both the first virtual customer premises equipment and the proxy virtual customer premises equipment, and wherein a second network device executes the second virtual customer premises equipment. 19. The network device of claim 17, wherein the one or more processors are further configured to: receive, with the proxy virtual customer premises equipment, subscriber credentials associated with the second subscriber via an authentication portal served by the wireline broadband network; and initiate the authentication of the second subscriber based on the subscriber credentials. 20. The network device of claim 17, wherein the one or more interfaces are further configured to receive a change of authorization from a different network device authorizing the installation of the firewall filter as a result of authenticating subscriber credentials associated with the second subscriber. 21. The network device of claim 13, wherein the one or more processors are configured to execute a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network in accordance with the second subscription associated with the second subscription point without establishing a tunnel to redirect traffic to a third virtual customer premises equipment executed to provide access to the wireline broadband network for the second subscription point. 22. The network device of claim 21, wherein the one or more processors are configured to execute a second virtual customer premises equipment for the second subscriber to provide the access to the wireline broadband network from the first subscription point in accordance with the second subscription associated with the second subscription point concurrent to execution of a third virtual customer premises equipment executed to provide access to the wireline broadband network for the second subscription point. 23. The network device of claim 21, wherein the one or more processors are configured to transfer execution of a second virtual customer premises equipment for the second subscriber to the network device so as to provide the access to the wireline broadband network from the first subscription point in accordance with the second subscription associated with the second subscription point 24. The network device of claim 13, wherein the network device comprises one of a service gateway and a broadband network gateway. 25. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed, cause one or more processors of a network device positioned in the wireline broadband network to: execute a first virtual customer premises equipment to provide, to a first subscriber, access to the wireline broadband network from a first subscription point in accordance with a first subscription associated with the first subscriber and the first subscription point; provide, to a second subscriber, access to the wireline broadband network from the first subscription point in accordance with a second subscription associated with the second subscriber and a second subscription point; forward, in accordance with the first subscription, traffic received from the first subscription point and associated with the first subscriber; and forward, in accordance with the second subscription, traffic received from the first subscription point and associated with the second subscriber. 26. A network system comprising: a wireline broadband network configured to provide access to a public network; and a network device positioned in the wireline broadband network, the network device comprising: one or more processors configured to execute a first virtual customer premises equipment to provide, to a first subscriber, access to the wireline broadband network from a first subscription point in accordance with a first subscription associated with the first subscriber and the first subscription point, and provide, to a second subscriber, access to the wireline broadband network from the first subscription point in accordance with a second subscription associated with the second subscriber and a second subscription point; and one or more interfaces configured to forward, in accordance with the first subscription, traffic received from the first subscription point and associated with the first subscriber, and forward, in accordance with the second subscription, traffic received from the first subscription point and associated with the second subscriber.
2,400
9,211
9,211
16,286,453
2,495
An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.
1. A method for migrating data, comprising: obtaining user credentials that provide access to a source system; receiving confirmation of details of a migration; receiving details of a directory structure associated with the source system; building at least a portion of the directory structure on a target system; monitoring a status of the migration as the migration occurs, wherein the status of the migration includes an error report that is selectable to display error information associated with one or more of data migration errors or populating errors; requesting communication data from the source system; and populating the target system with the communication data. 2. The method of claim 1, further comprising initiating the migration from the source system to the target system. 3. The method of claim 1, wherein obtaining the user credentials further comprises obtaining an email address from a user. 4. The method of claim 1, wherein the status of the migration includes information regarding a number of mailboxes processed. 5. The method of claim 1, wherein requesting the communication data from the source system includes requesting one or more of contacts, calendar items, and email messages. 6. The method of claim 5, wherein the email messages include all email items. 7. The method of claim 1, wherein the directory structure includes email addresses. 8. The method of claim 7, wherein populating the target system further comprises creating a mailbox for each of the email addresses. 9. A computing device, comprising: a processing unit; and a system memory connected to the processing unit, the system memory including instructions that, when executed by the processing unit, cause the processing unit to: obtain user credentials that provide access to a source system; receive confirmation of details of a migration; receive details of a directory structure associated with the source system; build at least a portion of the directory structure on a target system; monitor a status of the migration as the migration occurs, wherein the status of the migration includes an error report that is selectable to display error information associated with one or more of data migration errors or populating errors; request communication data from the source system; and populate the target system with the communication data. 10. The computing device of claim 9, wherein the computing device is further programmed to initiate the migration from the source system to the target system. 11. The computing device of claim 9, wherein to obtain the user credentials further comprises obtaining an email address from a user. 12. The computing device of claim 9, wherein the status of the migration includes information regarding a number of mailboxes processed. 13. The computing device of claim 9, wherein to request the communication data from the source system includes requesting one or more of contacts, calendar items, and email messages. 14. The computing device of claim 13, wherein the email messages include all email items. 15. The computing device of claim 9, wherein the directory structure includes email addresses. 16. The computing device of claim 15, wherein to populate the target system further comprises creating a mailbox for each of the email addresses. 17. A computer readable storage device including computer instructions, which when executed by a processor, perform a method for migrating data from a source system to a target system, the method comprising: obtaining user credentials that provide access to the source system; receiving confirmation of details of a migration; receiving details of a directory structure associated with the source system; building at least a portion of the directory structure on the target system; monitoring a status of the migration as the migration occurs, wherein the status of the migration includes an error report that is selectable to display error information associated with one or more of data migration errors or populating errors; requesting communication data from the source system; and populating the target system with the communication data. 18. The computer readable storage device of claim 17, wherein obtaining the user credentials further comprises obtaining an email address from a user. 19. The computer readable storage device of claim 17, wherein requesting the communication data from the source system includes requesting one or more of contacts, calendar items, and email messages. 20. The computer readable storage device of claim 19, wherein the email messages include all email items.
An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.1. A method for migrating data, comprising: obtaining user credentials that provide access to a source system; receiving confirmation of details of a migration; receiving details of a directory structure associated with the source system; building at least a portion of the directory structure on a target system; monitoring a status of the migration as the migration occurs, wherein the status of the migration includes an error report that is selectable to display error information associated with one or more of data migration errors or populating errors; requesting communication data from the source system; and populating the target system with the communication data. 2. The method of claim 1, further comprising initiating the migration from the source system to the target system. 3. The method of claim 1, wherein obtaining the user credentials further comprises obtaining an email address from a user. 4. The method of claim 1, wherein the status of the migration includes information regarding a number of mailboxes processed. 5. The method of claim 1, wherein requesting the communication data from the source system includes requesting one or more of contacts, calendar items, and email messages. 6. The method of claim 5, wherein the email messages include all email items. 7. The method of claim 1, wherein the directory structure includes email addresses. 8. The method of claim 7, wherein populating the target system further comprises creating a mailbox for each of the email addresses. 9. A computing device, comprising: a processing unit; and a system memory connected to the processing unit, the system memory including instructions that, when executed by the processing unit, cause the processing unit to: obtain user credentials that provide access to a source system; receive confirmation of details of a migration; receive details of a directory structure associated with the source system; build at least a portion of the directory structure on a target system; monitor a status of the migration as the migration occurs, wherein the status of the migration includes an error report that is selectable to display error information associated with one or more of data migration errors or populating errors; request communication data from the source system; and populate the target system with the communication data. 10. The computing device of claim 9, wherein the computing device is further programmed to initiate the migration from the source system to the target system. 11. The computing device of claim 9, wherein to obtain the user credentials further comprises obtaining an email address from a user. 12. The computing device of claim 9, wherein the status of the migration includes information regarding a number of mailboxes processed. 13. The computing device of claim 9, wherein to request the communication data from the source system includes requesting one or more of contacts, calendar items, and email messages. 14. The computing device of claim 13, wherein the email messages include all email items. 15. The computing device of claim 9, wherein the directory structure includes email addresses. 16. The computing device of claim 15, wherein to populate the target system further comprises creating a mailbox for each of the email addresses. 17. A computer readable storage device including computer instructions, which when executed by a processor, perform a method for migrating data from a source system to a target system, the method comprising: obtaining user credentials that provide access to the source system; receiving confirmation of details of a migration; receiving details of a directory structure associated with the source system; building at least a portion of the directory structure on the target system; monitoring a status of the migration as the migration occurs, wherein the status of the migration includes an error report that is selectable to display error information associated with one or more of data migration errors or populating errors; requesting communication data from the source system; and populating the target system with the communication data. 18. The computer readable storage device of claim 17, wherein obtaining the user credentials further comprises obtaining an email address from a user. 19. The computer readable storage device of claim 17, wherein requesting the communication data from the source system includes requesting one or more of contacts, calendar items, and email messages. 20. The computer readable storage device of claim 19, wherein the email messages include all email items.
2,400
9,212
9,212
14,658,179
2,483
Systems, methods, and devices are disclosed for performing adaptive residue color space conversion. A video bitstream may be received and a first flag may be determined based on the video bitstream. A residual may also be generated based on the video bitstream. The residual may be converted from a first color space to a second color space in response to the first flag.
1. A method for decoding video content, the method comprising: receiving a video bitstream; determining a first flag based on the video bitstream; generating a residual based on the video bitstream; determining to convert the residual from a first color space to a second color space based on the first flag; and converting the residual from the first color space to the second color space. 2. The method of claim 1, wherein determining the first flag comprises receiving the first flag at a coding unit level, and wherein the first flag is associated with a coding unit. 3. The method of claim 2, wherein the first flag is received only when a second flag at the coding unit level indicates there is at least one residual with a non-zero value in the coding unit. 4. The method of claim 1, wherein converting the residual from the first color space to the second color space comprises applying a color space conversion matrix. 5. The method of claim 4, wherein the color space conversion matrix corresponds to one of an irreversible YCgCo to RGB conversion matrix or a reversible YCgCo to RGB conversion matrix. 6. The method of claim 5, wherein: where the color space conversion matrix corresponds to the irreversible YCgCo to RGB conversion matrix, the irreversible YCgCo to RGB conversion matrix is applied in lossy coding, and where the color space conversion matrix corresponds to the reversible YCgCo to RGB conversion matrix, the reversible YCgCo to RGB conversion matrix is applied in lossless coding. 7. The method of claim 4, wherein converting the residual from the first color space to the second color space further comprises applying a matrix of scale factors. 8. The method of claim 7, wherein the color space conversion matrix is not normalized, and wherein each row of the matrix of scale factors comprises scale factors corresponding to a norm of a corresponding row of the non-normalized color space conversion matrix. 9. The method of claim 4, wherein the color space conversion matrix comprises at least one fixed-point precision coefficient. 10. The method of claim 1, further comprising determining a second flag based on the video bitstream, wherein the second flag is signaled at one of a sequence level, a picture level, or a slice level, and wherein the second flag indicates whether a process of converting the residual from the first color space to the second color space is enabled for the sequence level, picture level, or slice level, respectively. 11. A wireless transmit/receive unit (WTRU) comprising: a receiver configured to receive a video bitstream; and a processor configured to: determine a first flag based on the video bitstream; generate a residual based on the video bitstream; determine to convert the residual from a first color space to a second color space based on the first flag; and convert the residual from the first color space to the second color space. 12. The WTRU of claim 11, wherein the receiver is further configured to receive the first flag at a coding unit level, and wherein the first flag is associated with a coding unit. 13. The WTRU of claim 12, wherein the receiver is further configured to receive the first flag only when a second flag at the coding unit level indicates there is at least one residual with a non-zero value in the coding unit. 14. The WTRU of claim 11, wherein the processor is configured to convert the residual from the first color space to the second color space by applying a color space conversion matrix. 15. The WTRU of claim 14, wherein the color space conversion matrix corresponds to one of an irreversible YCgCo to RGB conversion matrix or a reversible YCgCo to RGB conversion matrix. 16. The WTRU of claim 15, wherein: where the color space conversion matrix corresponds to the irreversible YCgCo to RGB conversion matrix, the irreversible YCgCo to RGB conversion matrix is applied in lossy coding, and where the color space conversion matrix corresponds to the reversible YCgCo to RGB conversion matrix, the reversible YCgCo to RGB conversion matrix is applied in lossless coding. 17. The WTRU of claim 14, wherein the processor is further configured to convert the residual from the first color space to the second color space by applying a matrix of scale factors. 18. The WTRU of claim 17, wherein the color space conversion matrix is not normalized, and wherein each row of the matrix of scale factors comprises scale factors corresponding to a norm of a corresponding row of the non-normalized color space conversion matrix. 19. The WTRU of claim 14, wherein the color space conversion matrix comprises at least one fixed-point precision coefficient. 20. The WTRU of claim 11, wherein the processor is further configured to determine a second flag based on the video bitstream, wherein the second flag is signaled at one of a sequence level, a picture level, or a slice level, and wherein the second flag indicates whether a process of converting the residual from the first color space to the second color space is enabled for the sequence level, picture level, or slice level, respectively.
Systems, methods, and devices are disclosed for performing adaptive residue color space conversion. A video bitstream may be received and a first flag may be determined based on the video bitstream. A residual may also be generated based on the video bitstream. The residual may be converted from a first color space to a second color space in response to the first flag.1. A method for decoding video content, the method comprising: receiving a video bitstream; determining a first flag based on the video bitstream; generating a residual based on the video bitstream; determining to convert the residual from a first color space to a second color space based on the first flag; and converting the residual from the first color space to the second color space. 2. The method of claim 1, wherein determining the first flag comprises receiving the first flag at a coding unit level, and wherein the first flag is associated with a coding unit. 3. The method of claim 2, wherein the first flag is received only when a second flag at the coding unit level indicates there is at least one residual with a non-zero value in the coding unit. 4. The method of claim 1, wherein converting the residual from the first color space to the second color space comprises applying a color space conversion matrix. 5. The method of claim 4, wherein the color space conversion matrix corresponds to one of an irreversible YCgCo to RGB conversion matrix or a reversible YCgCo to RGB conversion matrix. 6. The method of claim 5, wherein: where the color space conversion matrix corresponds to the irreversible YCgCo to RGB conversion matrix, the irreversible YCgCo to RGB conversion matrix is applied in lossy coding, and where the color space conversion matrix corresponds to the reversible YCgCo to RGB conversion matrix, the reversible YCgCo to RGB conversion matrix is applied in lossless coding. 7. The method of claim 4, wherein converting the residual from the first color space to the second color space further comprises applying a matrix of scale factors. 8. The method of claim 7, wherein the color space conversion matrix is not normalized, and wherein each row of the matrix of scale factors comprises scale factors corresponding to a norm of a corresponding row of the non-normalized color space conversion matrix. 9. The method of claim 4, wherein the color space conversion matrix comprises at least one fixed-point precision coefficient. 10. The method of claim 1, further comprising determining a second flag based on the video bitstream, wherein the second flag is signaled at one of a sequence level, a picture level, or a slice level, and wherein the second flag indicates whether a process of converting the residual from the first color space to the second color space is enabled for the sequence level, picture level, or slice level, respectively. 11. A wireless transmit/receive unit (WTRU) comprising: a receiver configured to receive a video bitstream; and a processor configured to: determine a first flag based on the video bitstream; generate a residual based on the video bitstream; determine to convert the residual from a first color space to a second color space based on the first flag; and convert the residual from the first color space to the second color space. 12. The WTRU of claim 11, wherein the receiver is further configured to receive the first flag at a coding unit level, and wherein the first flag is associated with a coding unit. 13. The WTRU of claim 12, wherein the receiver is further configured to receive the first flag only when a second flag at the coding unit level indicates there is at least one residual with a non-zero value in the coding unit. 14. The WTRU of claim 11, wherein the processor is configured to convert the residual from the first color space to the second color space by applying a color space conversion matrix. 15. The WTRU of claim 14, wherein the color space conversion matrix corresponds to one of an irreversible YCgCo to RGB conversion matrix or a reversible YCgCo to RGB conversion matrix. 16. The WTRU of claim 15, wherein: where the color space conversion matrix corresponds to the irreversible YCgCo to RGB conversion matrix, the irreversible YCgCo to RGB conversion matrix is applied in lossy coding, and where the color space conversion matrix corresponds to the reversible YCgCo to RGB conversion matrix, the reversible YCgCo to RGB conversion matrix is applied in lossless coding. 17. The WTRU of claim 14, wherein the processor is further configured to convert the residual from the first color space to the second color space by applying a matrix of scale factors. 18. The WTRU of claim 17, wherein the color space conversion matrix is not normalized, and wherein each row of the matrix of scale factors comprises scale factors corresponding to a norm of a corresponding row of the non-normalized color space conversion matrix. 19. The WTRU of claim 14, wherein the color space conversion matrix comprises at least one fixed-point precision coefficient. 20. The WTRU of claim 11, wherein the processor is further configured to determine a second flag based on the video bitstream, wherein the second flag is signaled at one of a sequence level, a picture level, or a slice level, and wherein the second flag indicates whether a process of converting the residual from the first color space to the second color space is enabled for the sequence level, picture level, or slice level, respectively.
2,400
9,213
9,213
15,893,161
2,444
Methods and systems comprising receiving travel request data; retrieving schedule data associated with the travel request data, the schedule data being further associated with a scheduled travel time; retrieving availability data associated with the travel request data, the availability data being further associated with an available travel time; generating representation data representing the schedule data and the availability data, the representation data representing the schedule data and/or the availability data differently based on a whether an itinerary complies with an organization's travel policies; and sending the representation data.
1. A method comprising: performing processing associated with receiving, with a client interface module in communication with a computer comprising a database and a cache, travel request data; performing processing associated with retrieving, with a database query module in communication with the computer, schedule data associated with the travel request data from the database, the schedule data being further associated with a scheduled travel time; and performing processing associated with retrieving, with a cache query module in communication with the computer, availability data associated with the travel request data from the cache, the availability data being further associated with an available travel time. 2. The method of claim 1, wherein the cache comprises global distribution (GDS) data and/or supplier inventory data. 3. A system comprising: a processor configured for: receiving, with a client interface computer module comprising a database and a cache, travel request data; retrieving, with a database query module, schedule data associated with the travel request data from the database, the schedule data being further associated with a scheduled travel time; and retrieving, with a cache query module, availability data associated with the travel request data from the cache, the availability data being further associated with an available travel time. 4. The system of claim 3, wherein the cache comprises global distribution (GDS) data and/or supplier inventory data.
Methods and systems comprising receiving travel request data; retrieving schedule data associated with the travel request data, the schedule data being further associated with a scheduled travel time; retrieving availability data associated with the travel request data, the availability data being further associated with an available travel time; generating representation data representing the schedule data and the availability data, the representation data representing the schedule data and/or the availability data differently based on a whether an itinerary complies with an organization's travel policies; and sending the representation data.1. A method comprising: performing processing associated with receiving, with a client interface module in communication with a computer comprising a database and a cache, travel request data; performing processing associated with retrieving, with a database query module in communication with the computer, schedule data associated with the travel request data from the database, the schedule data being further associated with a scheduled travel time; and performing processing associated with retrieving, with a cache query module in communication with the computer, availability data associated with the travel request data from the cache, the availability data being further associated with an available travel time. 2. The method of claim 1, wherein the cache comprises global distribution (GDS) data and/or supplier inventory data. 3. A system comprising: a processor configured for: receiving, with a client interface computer module comprising a database and a cache, travel request data; retrieving, with a database query module, schedule data associated with the travel request data from the database, the schedule data being further associated with a scheduled travel time; and retrieving, with a cache query module, availability data associated with the travel request data from the cache, the availability data being further associated with an available travel time. 4. The system of claim 3, wherein the cache comprises global distribution (GDS) data and/or supplier inventory data.
2,400
9,214
9,214
14,576,157
2,459
Embodiments described herein provide systems, methods, and computer readable storage media for facilitating an in-place web communication related to content of a webpage. In a particular embodiment, a method provides determining that an indicator is positioned by a user of the user system over a first location on a webpage of a website displayed on the user system and receiving a user selection from the user that requests a communication with an agent system. In response to the user selection, the method provides transferring information associated with the first location to a collaboration system. The collaboration system uses the information to determine a subject matter context for the communication and transfers an indication of the subject matter context to the agent system for use during the communication. Furthermore, the method provides establishing the communication with the agent system via the collaboration system.
1. A non-transitory computer readable storage medium having instructions stored thereon that, when executed by a user system, direct the user system to perform a method of facilitating an in-place web communication related to content of a webpage, the method comprising: determining that an indicator is positioned by a user of the user system over a first location on a webpage of a website displayed on the user system; receiving a user selection from the user that requests a communication with an agent system; in response to the user selection, transferring information associated with the first location to a collaboration system, wherein the collaboration system uses the information to determine a subject matter context for the communication and transfers an indication of the subject matter context to the agent system for use during the communication; and establishing the communication with the agent system via the collaboration system. 2. The non-transitory computer readable storage medium of claim 1, wherein the method further comprises: in response to determining that the indicator is positioned over the first location, displaying a selectable graphical element through which the user selection is received. 3. The non-transitory computer readable storage medium of claim 1, wherein the collaboration system stores a recording of the communication for future access. 4. The non-transitory computer readable storage medium of claim 3, wherein the method further comprises: after the communication, displaying the webpage at a second time, receiving the recording of the communication from the collaboration system, and presenting the recording to the user in relation to the first location. 5. The non-transitory computer readable storage medium of claim 1, wherein the method further comprises: displaying a second webpage of the website on the user system; and continuing the communication on the second webpage. 6. The non-transitory computer readable storage medium of claim 1, wherein the method further comprises: determining that the indicator is positioned by the user over a second location on the webpage; receiving a second user selection from the user that requests a second communication with a second agent system; in response to the second user selection, transferring second information associated with the second location to the collaboration system, wherein the collaboration system uses the second information to determine a second subject matter context for the second communication and transfers an indication of the second subject matter context to the second agent system for use during the second communication; and establishing the second communication with the second agent system via the collaboration system. 7. The non-transitory computer readable storage medium of claim 1, wherein the communication begins in a first medium and the method further comprising: receiving an instruction to change the communication to a second medium; and continuing the communication in the second medium. 8. A non-transitory computer readable storage medium having instructions stored thereon that, when executed by a collaboration system, direct the collaboration system to perform a method of facilitating an in-place web communication related to content of a webpage, the method comprising: in response to a user selection from a user of a user system that requests a communication with an agent system, receiving information associated with a first location on a webpage of a website displayed on the user system over which an indicator is positioned by the user; determining a subject matter context for the communication using the information; transferring an indication of the subject matter context to the agent system for use during the communication; and establishing the communication between the user system and the agent system. 9. The non-transitory computer readable storage medium of claim 8, wherein the user system displays a selectable graphical element through which the user selection is received. 10. The non-transitory computer readable storage medium of claim 8, wherein the method further comprises: storing a recording of the communication for future access. 11. The non-transitory computer readable storage medium of claim 10, wherein after the communication, the user system displays the webpage at a second time, and the method further comprising: transferring the recording of the communication from the collaboration system to the user system for presenting the recording to the user in relation to the first location. 12. The non-transitory computer readable storage medium of claim 8, wherein the user system displays a second webpage of the website and the method further comprises: continuing the communication with the user system on the second webpage. 13. The non-transitory computer readable storage medium of claim 8, wherein the method further comprises: in response to a second user selection from the user that requests a second communication with a second agent system, receiving second information associated with a second location on the webpage over which the indicator is positioned by the user; determining a second subject matter context for the second communication using the second information; transferring an indication of the second subject matter context to the second agent system for use during the second communication; and establishing the second communication between the user system and the second agent system. 14. The non-transitory computer readable storage medium of claim 8, wherein the communication begins in a first medium and the method further comprising: receiving an instruction to change the communication to a second medium; and continuing the communication in the second medium. 15. A collaboration system for facilitating an in-place web communication related to content of a webpage, the collaboration system comprising: a communication interface configured to, in response to a user selection from a user of a user system that requests a communication with an agent system, receive information associated with a first location on a webpage of a website displayed on the user system over which an indicator is positioned by the user and transfer an indication of a subject matter context for the communication to the agent system for use during the communication; and a processing system configured to determine the subject matter context using the information and establish the communication between the user system and the agent system. 16. The collaboration system of claim 15, wherein the user system displays a selectable graphical element through which the user selection is received. 17. The collaboration system of claim 15, further comprising: a storage system configured to store a recording of the communication for future access. 18. The collaboration system of claim 17, wherein after the communication, the user system displays the webpage at a second time, and the collaboration system further comprising: the communication interface configured to transfer the recording of the communication to the user system for presenting the recording to the user in relation to the first location. 19. The collaboration system of claim 15, wherein the user system displays a second webpage of the website and the collaboration system further comprising: the processing system configured to continue the communication with the user system on the second webpage. 20. The collaboration system of claim 15, further comprising: the communication interface configured to, in response to a second user selection from the user that requests a second communication with a second agent system, receive second information associated with a second location on the webpage over which the indicator is positioned by the user and transfer an indication of a second subject matter context for the second communication to the second agent system for use during the second communication; the processing system configured to determine the second subject matter context using the second information and establish the second communication between the user system and the second agent system.
Embodiments described herein provide systems, methods, and computer readable storage media for facilitating an in-place web communication related to content of a webpage. In a particular embodiment, a method provides determining that an indicator is positioned by a user of the user system over a first location on a webpage of a website displayed on the user system and receiving a user selection from the user that requests a communication with an agent system. In response to the user selection, the method provides transferring information associated with the first location to a collaboration system. The collaboration system uses the information to determine a subject matter context for the communication and transfers an indication of the subject matter context to the agent system for use during the communication. Furthermore, the method provides establishing the communication with the agent system via the collaboration system.1. A non-transitory computer readable storage medium having instructions stored thereon that, when executed by a user system, direct the user system to perform a method of facilitating an in-place web communication related to content of a webpage, the method comprising: determining that an indicator is positioned by a user of the user system over a first location on a webpage of a website displayed on the user system; receiving a user selection from the user that requests a communication with an agent system; in response to the user selection, transferring information associated with the first location to a collaboration system, wherein the collaboration system uses the information to determine a subject matter context for the communication and transfers an indication of the subject matter context to the agent system for use during the communication; and establishing the communication with the agent system via the collaboration system. 2. The non-transitory computer readable storage medium of claim 1, wherein the method further comprises: in response to determining that the indicator is positioned over the first location, displaying a selectable graphical element through which the user selection is received. 3. The non-transitory computer readable storage medium of claim 1, wherein the collaboration system stores a recording of the communication for future access. 4. The non-transitory computer readable storage medium of claim 3, wherein the method further comprises: after the communication, displaying the webpage at a second time, receiving the recording of the communication from the collaboration system, and presenting the recording to the user in relation to the first location. 5. The non-transitory computer readable storage medium of claim 1, wherein the method further comprises: displaying a second webpage of the website on the user system; and continuing the communication on the second webpage. 6. The non-transitory computer readable storage medium of claim 1, wherein the method further comprises: determining that the indicator is positioned by the user over a second location on the webpage; receiving a second user selection from the user that requests a second communication with a second agent system; in response to the second user selection, transferring second information associated with the second location to the collaboration system, wherein the collaboration system uses the second information to determine a second subject matter context for the second communication and transfers an indication of the second subject matter context to the second agent system for use during the second communication; and establishing the second communication with the second agent system via the collaboration system. 7. The non-transitory computer readable storage medium of claim 1, wherein the communication begins in a first medium and the method further comprising: receiving an instruction to change the communication to a second medium; and continuing the communication in the second medium. 8. A non-transitory computer readable storage medium having instructions stored thereon that, when executed by a collaboration system, direct the collaboration system to perform a method of facilitating an in-place web communication related to content of a webpage, the method comprising: in response to a user selection from a user of a user system that requests a communication with an agent system, receiving information associated with a first location on a webpage of a website displayed on the user system over which an indicator is positioned by the user; determining a subject matter context for the communication using the information; transferring an indication of the subject matter context to the agent system for use during the communication; and establishing the communication between the user system and the agent system. 9. The non-transitory computer readable storage medium of claim 8, wherein the user system displays a selectable graphical element through which the user selection is received. 10. The non-transitory computer readable storage medium of claim 8, wherein the method further comprises: storing a recording of the communication for future access. 11. The non-transitory computer readable storage medium of claim 10, wherein after the communication, the user system displays the webpage at a second time, and the method further comprising: transferring the recording of the communication from the collaboration system to the user system for presenting the recording to the user in relation to the first location. 12. The non-transitory computer readable storage medium of claim 8, wherein the user system displays a second webpage of the website and the method further comprises: continuing the communication with the user system on the second webpage. 13. The non-transitory computer readable storage medium of claim 8, wherein the method further comprises: in response to a second user selection from the user that requests a second communication with a second agent system, receiving second information associated with a second location on the webpage over which the indicator is positioned by the user; determining a second subject matter context for the second communication using the second information; transferring an indication of the second subject matter context to the second agent system for use during the second communication; and establishing the second communication between the user system and the second agent system. 14. The non-transitory computer readable storage medium of claim 8, wherein the communication begins in a first medium and the method further comprising: receiving an instruction to change the communication to a second medium; and continuing the communication in the second medium. 15. A collaboration system for facilitating an in-place web communication related to content of a webpage, the collaboration system comprising: a communication interface configured to, in response to a user selection from a user of a user system that requests a communication with an agent system, receive information associated with a first location on a webpage of a website displayed on the user system over which an indicator is positioned by the user and transfer an indication of a subject matter context for the communication to the agent system for use during the communication; and a processing system configured to determine the subject matter context using the information and establish the communication between the user system and the agent system. 16. The collaboration system of claim 15, wherein the user system displays a selectable graphical element through which the user selection is received. 17. The collaboration system of claim 15, further comprising: a storage system configured to store a recording of the communication for future access. 18. The collaboration system of claim 17, wherein after the communication, the user system displays the webpage at a second time, and the collaboration system further comprising: the communication interface configured to transfer the recording of the communication to the user system for presenting the recording to the user in relation to the first location. 19. The collaboration system of claim 15, wherein the user system displays a second webpage of the website and the collaboration system further comprising: the processing system configured to continue the communication with the user system on the second webpage. 20. The collaboration system of claim 15, further comprising: the communication interface configured to, in response to a second user selection from the user that requests a second communication with a second agent system, receive second information associated with a second location on the webpage over which the indicator is positioned by the user and transfer an indication of a second subject matter context for the second communication to the second agent system for use during the second communication; the processing system configured to determine the second subject matter context using the second information and establish the second communication between the user system and the second agent system.
2,400
9,215
9,215
16,036,815
2,444
Enhancements described support transparent remote execution of development tool extensions. Compute-intensive extensions may be executed on an extension machine external to a developer machine which runs a user interface renderer of the development tool. User interface extensions may run locally. Instead of sharing a filesystem, the renderer on the developer machine and an extension host and extension(s) on the extension machine may access distinct respective machine filesystems. Instead of spawning debug extension and other extension-support processes locally, the renderer may instruct the extension host or an extension host agent to spawn the processes remotely on the extension machine. No change is needed to extensions; existing extensions and newly created extensions are binary-compatible with single-machine or multi-machine development tool deployments. Project files remain inside a firewalled and data-loss-prevention environment while nonetheless being fully accessible to authorized developers working remotely and to operations performed by language servers, debug adapters, and tool extensions.
1. An extension machine suitable for use in a development tool system and configured to interoperate with a development tool extension (“extension”) which upon execution performs software development operations on file contents, the extension machine comprising: a processor; a memory in operable communication with the processor; an extension host agent (“agent”) which upon execution with the processor communicates with a development tool user interface renderer (“renderer”) that resides on a developer machine external to the extension machine; an extension host (“host”) which is configured for operable communication with the agent and with the extension and with a store which has a filesystem containing software development files (“files”); wherein multiple files in the store are identified in at least one place outside the extension machine by respective uniform resource identifiers (“URI”) file IDs, and those URI file IDs get mapped to filesystem paths for use in the extension to identify the files in order to obtain the file contents. 2. The extension machine of claim 1, further comprising the extension. 3. The extension machine of claim 1, wherein at least one of the following deployment conditions is satisfied: the developer machine is a physical machine, and the extension machine is a different physical machine than the developer machine; the developer machine is a physical machine, the extension machine is a different physical machine than the developer machine, and the extension machine processor is faster than any processor of the developer machine; the developer machine is a physical machine, the extension machine is a different physical machine than the developer machine, and the extension machine has more processor cores than the developer machine; the developer machine is a physical machine, the extension machine is a different physical machine than the developer machine, and the extension machine memory has more random access memory capacity than any memory of the developer machine; the developer machine is a virtual machine, and the extension machine is a different virtual machine than the developer machine; the developer machine and the extension machine are each a respective virtual machine, and both of these virtual machines are running on one and the same physical machine. 4. The extension machine of claim 1, wherein at least one of the following mapping conditions is satisfied: the agent maps the URI file IDs to respective filesystem paths for use by the extension to identify the files to obtain the file contents; the host maps the URI file IDs to respective filesystem paths for use by the extension to identify the files to obtain the file contents. 5. The extension machine of claim 1, wherein at least one of the following URI format conditions is satisfied by at least one URI file ID which gets mapped to a filesystem path used by the extension: a URI in the URI file ID includes an IP address and port of the extension machine; a URI in the URI file ID includes a symbolic name which is resolvable to a network socket of the extension machine. 6. The extension machine of claim 1, wherein the extension runs in a compatibility layer, and the compatibility layer is configured to provide functional compatibility between two operating systems of different kinds. 7. The extension machine of claim 1, wherein the extension machine and the developer machine are located on different respective sides of a firewall. 8. The extension machine of claim 1, wherein the extension runs in a sandbox and the renderer is located outside the sandbox. 9. The extension machine of claim 1, wherein at least one of the following synchronization conditions is satisfied: the extension includes an extension application program interface (“API”) which is configured to operate synchronously when reading and asynchronously when writing; the extension includes an extension API which is configured to read and write through a data model layer; the host is configured to execute independently of the renderer. 10. A developer machine suitable for use in a development tool system and configured to interoperate with a development tool extension (“extension”) which upon execution performs software development operations on file contents, the developer machine comprising: a processor; a memory in operable communication with the processor; a development tool user interface renderer (“renderer”) which upon execution with the processor communicates with the extension by sending and receiving inter-machine communications which identify one or more of the software development operations, the extension residing on an extension machine that is external to the developer machine, the renderer configured to use uniform resource identifiers (“URIs”) to identify files in a filesystem in a store on the extension machine; wherein the renderer is further configured to specify in one or more of the inter-machine communications one or more development processes to be spawned on the extension machine instead of the renderer spawning those development processes on the developer machine. 11. The developer machine of claim 10, wherein the renderer is configured to specify, in one or more of the inter-machine communications, one or more of the following development processes to be spawned on the extension machine: execution of a script on the extension machine; a terminal emulation; a static analysis tool; a filesystem search process; a process which accesses an environment variable of the extension machine; a process that compiles source code into binary form which is tailored for execution on the extension machine; a debug extension process; a programming language server process. 12. The developer machine of claim 10, in combination with the extension machine, the extension machine comprising: an extension machine processor; an extension machine memory in operable communication with the extension machine processor; an extension host agent (“agent”) which upon execution with the extension machine processor communicates with the renderer; and an extension host (“host”) which is configured for operable communication with the agent and with the extension and with the store. 13. A method for executing a development tool extension (“extension”) to perform software development operations on file contents, the method comprising: running a development tool user interface renderer (“renderer”) on a developer machine; connecting the developer machine to an extension machine for inter-machine communications; executing the extension on the extension machine, the extension machine having a store which is configured by a filesystem containing software development files; identifying at least one of the software development files in the renderer using a uniform resource identifier file identification (“URI file ID”); automatically mapping the URI file ID into a filesystem path file identification (“path file ID”) of the software development file; accessing the software development file in the store using the path file ID; and operating on file contents of the accessed software development file in the extension. 14. The method of claim 13, wherein the method provides transparent remote execution of the development tool extension in at least one of the following ways: the extension operates equally on the file contents regardless of whether the developer machine and the extension machine share the same filesystem or have separate respective filesystems; the extension operates equally on the file contents regardless of whether the renderer and the extension are running on the same physical machine or on separate respective physical machines. 15. The method of claim 13, wherein the developer machine and the extension machine become disconnected after being connected, and the method further comprises the renderer interpreting user input while the machines are not connected. 16. The method of claim 13, further comprising caching in the developer machine a copy of at least part of a software development file which is stored in the filesystem in the store on the extension machine. 17. The method of claim 13, wherein mapping the URI file ID into the path file ID occurs in the renderer. 18. The method of claim 13, wherein connecting the developer machine to the extension machine includes obtaining a network connection. 19. The method of claim 13, wherein the extension is a first development tool extension (“first extension”), and the renderer communicates with the first extension by communications which are subject to a first latency level, and the method further comprises running a second development tool extension (“second extension”) on a machine which is not the same extension machine running the first extension, and the renderer communicates with the second extension by communications which are subject to a second latency level which is less than the first latency level. 20. The method of claim 13, further comprising automatically synchronizing copies of at least one of the software development files in response to detecting which network or which other machine, if any, the developer machine is connected to over a network connection.
Enhancements described support transparent remote execution of development tool extensions. Compute-intensive extensions may be executed on an extension machine external to a developer machine which runs a user interface renderer of the development tool. User interface extensions may run locally. Instead of sharing a filesystem, the renderer on the developer machine and an extension host and extension(s) on the extension machine may access distinct respective machine filesystems. Instead of spawning debug extension and other extension-support processes locally, the renderer may instruct the extension host or an extension host agent to spawn the processes remotely on the extension machine. No change is needed to extensions; existing extensions and newly created extensions are binary-compatible with single-machine or multi-machine development tool deployments. Project files remain inside a firewalled and data-loss-prevention environment while nonetheless being fully accessible to authorized developers working remotely and to operations performed by language servers, debug adapters, and tool extensions.1. An extension machine suitable for use in a development tool system and configured to interoperate with a development tool extension (“extension”) which upon execution performs software development operations on file contents, the extension machine comprising: a processor; a memory in operable communication with the processor; an extension host agent (“agent”) which upon execution with the processor communicates with a development tool user interface renderer (“renderer”) that resides on a developer machine external to the extension machine; an extension host (“host”) which is configured for operable communication with the agent and with the extension and with a store which has a filesystem containing software development files (“files”); wherein multiple files in the store are identified in at least one place outside the extension machine by respective uniform resource identifiers (“URI”) file IDs, and those URI file IDs get mapped to filesystem paths for use in the extension to identify the files in order to obtain the file contents. 2. The extension machine of claim 1, further comprising the extension. 3. The extension machine of claim 1, wherein at least one of the following deployment conditions is satisfied: the developer machine is a physical machine, and the extension machine is a different physical machine than the developer machine; the developer machine is a physical machine, the extension machine is a different physical machine than the developer machine, and the extension machine processor is faster than any processor of the developer machine; the developer machine is a physical machine, the extension machine is a different physical machine than the developer machine, and the extension machine has more processor cores than the developer machine; the developer machine is a physical machine, the extension machine is a different physical machine than the developer machine, and the extension machine memory has more random access memory capacity than any memory of the developer machine; the developer machine is a virtual machine, and the extension machine is a different virtual machine than the developer machine; the developer machine and the extension machine are each a respective virtual machine, and both of these virtual machines are running on one and the same physical machine. 4. The extension machine of claim 1, wherein at least one of the following mapping conditions is satisfied: the agent maps the URI file IDs to respective filesystem paths for use by the extension to identify the files to obtain the file contents; the host maps the URI file IDs to respective filesystem paths for use by the extension to identify the files to obtain the file contents. 5. The extension machine of claim 1, wherein at least one of the following URI format conditions is satisfied by at least one URI file ID which gets mapped to a filesystem path used by the extension: a URI in the URI file ID includes an IP address and port of the extension machine; a URI in the URI file ID includes a symbolic name which is resolvable to a network socket of the extension machine. 6. The extension machine of claim 1, wherein the extension runs in a compatibility layer, and the compatibility layer is configured to provide functional compatibility between two operating systems of different kinds. 7. The extension machine of claim 1, wherein the extension machine and the developer machine are located on different respective sides of a firewall. 8. The extension machine of claim 1, wherein the extension runs in a sandbox and the renderer is located outside the sandbox. 9. The extension machine of claim 1, wherein at least one of the following synchronization conditions is satisfied: the extension includes an extension application program interface (“API”) which is configured to operate synchronously when reading and asynchronously when writing; the extension includes an extension API which is configured to read and write through a data model layer; the host is configured to execute independently of the renderer. 10. A developer machine suitable for use in a development tool system and configured to interoperate with a development tool extension (“extension”) which upon execution performs software development operations on file contents, the developer machine comprising: a processor; a memory in operable communication with the processor; a development tool user interface renderer (“renderer”) which upon execution with the processor communicates with the extension by sending and receiving inter-machine communications which identify one or more of the software development operations, the extension residing on an extension machine that is external to the developer machine, the renderer configured to use uniform resource identifiers (“URIs”) to identify files in a filesystem in a store on the extension machine; wherein the renderer is further configured to specify in one or more of the inter-machine communications one or more development processes to be spawned on the extension machine instead of the renderer spawning those development processes on the developer machine. 11. The developer machine of claim 10, wherein the renderer is configured to specify, in one or more of the inter-machine communications, one or more of the following development processes to be spawned on the extension machine: execution of a script on the extension machine; a terminal emulation; a static analysis tool; a filesystem search process; a process which accesses an environment variable of the extension machine; a process that compiles source code into binary form which is tailored for execution on the extension machine; a debug extension process; a programming language server process. 12. The developer machine of claim 10, in combination with the extension machine, the extension machine comprising: an extension machine processor; an extension machine memory in operable communication with the extension machine processor; an extension host agent (“agent”) which upon execution with the extension machine processor communicates with the renderer; and an extension host (“host”) which is configured for operable communication with the agent and with the extension and with the store. 13. A method for executing a development tool extension (“extension”) to perform software development operations on file contents, the method comprising: running a development tool user interface renderer (“renderer”) on a developer machine; connecting the developer machine to an extension machine for inter-machine communications; executing the extension on the extension machine, the extension machine having a store which is configured by a filesystem containing software development files; identifying at least one of the software development files in the renderer using a uniform resource identifier file identification (“URI file ID”); automatically mapping the URI file ID into a filesystem path file identification (“path file ID”) of the software development file; accessing the software development file in the store using the path file ID; and operating on file contents of the accessed software development file in the extension. 14. The method of claim 13, wherein the method provides transparent remote execution of the development tool extension in at least one of the following ways: the extension operates equally on the file contents regardless of whether the developer machine and the extension machine share the same filesystem or have separate respective filesystems; the extension operates equally on the file contents regardless of whether the renderer and the extension are running on the same physical machine or on separate respective physical machines. 15. The method of claim 13, wherein the developer machine and the extension machine become disconnected after being connected, and the method further comprises the renderer interpreting user input while the machines are not connected. 16. The method of claim 13, further comprising caching in the developer machine a copy of at least part of a software development file which is stored in the filesystem in the store on the extension machine. 17. The method of claim 13, wherein mapping the URI file ID into the path file ID occurs in the renderer. 18. The method of claim 13, wherein connecting the developer machine to the extension machine includes obtaining a network connection. 19. The method of claim 13, wherein the extension is a first development tool extension (“first extension”), and the renderer communicates with the first extension by communications which are subject to a first latency level, and the method further comprises running a second development tool extension (“second extension”) on a machine which is not the same extension machine running the first extension, and the renderer communicates with the second extension by communications which are subject to a second latency level which is less than the first latency level. 20. The method of claim 13, further comprising automatically synchronizing copies of at least one of the software development files in response to detecting which network or which other machine, if any, the developer machine is connected to over a network connection.
2,400
9,216
9,216
15,452,397
2,437
Certain embodiments involve automatically reducing an attack surface of an application program on a computing device. For example, a processor installs an application program on a computing device by copying application program data associated with the application program on a memory of the computing device. The application program data includes installation data for installing the application program on the computing device and execution data for executing a function of the application program on the computing device. The processor accesses the application program data on the memory and identifies, based on an analysis of the application program data, the installation data and the execution data. The processor reduces an attack surface of the application program by automatically removing the identified installation data from the memory of the computing device. The attack surface corresponding to a vulnerability of the application program or the computing device to access by an unauthorized user.
1. A method for automatically reducing an attack surface of an application program on a computing device, the method comprising: installing, by a processor, an application program on a computing device, wherein installing the application program on the computing device comprises copying application program data associated with the application program on a memory of the computing device, the application program data comprising installation data for installing the application program on the computing device and execution data for executing a function of the application program on the computing device; accessing, by the processor, the application program data on the memory; identifying, by the processor and based on an analysis of the application program data on the computing device, the installation data and the execution data; and reducing, by the processor, an attack surface of the application program by automatically removing the identified installation data from the memory of the computing device, the attack surface corresponding to a vulnerability of the application program or the computing device to access by an unauthorized user. 2. The method of claim 1, wherein the installation data comprises program code executable by the processor to cause the processor to output a request for user input prior to completing installation of the application program on the computing device. 3. The method of claim 2, wherein the request for user input comprises a request for a password prior to completing installation of the application program on the computing device. 4. The method of claim 2, wherein the request for user input comprises a request for user input indicating confirmation to install the application program on the computing device. 5. The method of claim 1, wherein the installation data comprises program code executable by the processor to cause the processor to perform a function when installing the application program code and wherein the method further comprises removing, by the processor, the installation data after the function is performed. 6. A system comprising: a processing device; and a non-transitory computer-readable medium communicatively coupled to the processing device, wherein the processing device is configured to perform operations comprising: installing an application program on a computing device, wherein installing the application program on the computing device comprises copying application program data associated with the application program on a memory of the computing device, the application program data comprising installation data for installing the application program on the computing device and execution data for executing a function of the application program on the computing device; accessing the application program data on the memory; identifying, based on an analysis of the application program data on the computing device, the installation data and the execution data; and reducing, by the processor, an attack surface of the application program by automatically removing the identified installation data from the memory of the computing device, the attack surface corresponding to a vulnerability of the application program or the computing device to access by an unauthorized user. 7. The system of claim 6, wherein the installation data comprises program code executable by the processing device to cause the processing device to output a request for user input prior to completing installation of the application program on the computing device. 8. The system of claim 7, wherein the request for user input comprises a request for a password prior to completing installation of the application program on the computing device. 9. The system of claim 7, wherein the request for user input comprises a request for user input indicating confirmation to install the application program on the computing device. 10. The system of claim 6, wherein the installation data comprises program code executable by the processing device to cause the processing device to perform a function when installing the application program code and wherein the processing device is further configured to remove the installation data after the function is performed. 11. A non-transitory computer-readable medium storing program code executable by a processor for automatically reducing an attack surface of an application program on a computing device, the program code comprising: program code for installing, by the processor, an application program on a computing device, wherein installing the application program on the computing device comprises copying application program data associated with the application program on a memory of the computing device, the application program data comprising installation data for installing the application program on the computing device and execution data for executing a function of the application program on the computing device; program code for accessing, by the processor, the application program data on the memory; program code for identifying, by the processor and based on an analysis of the application program data on the computing device, the installation data and the execution data; and program code for reducing, by the processor, an attack surface of the application program by automatically removing the identified installation data from the memory of the computing device, the attack surface corresponding to a vulnerability of the application program or the computing device to access by an unauthorized user. 12. The non-transitory computer-readable medium of claim 11, wherein the installation data comprises program code executable by the processor to cause the processor to output a request for user input prior to completing installation of the application program on the computing device. 13. The non-transitory computer-readable medium of claim 12, wherein the request for user input comprises a request for a password prior to completing installation of the application program on the computing device. 14. The non-transitory computer-readable medium of claim 12, wherein the request for user input comprises a request for user input indicating confirmation to install the application program on the computing device. 15. The non-transitory computer-readable medium of claim 11, wherein the installation data comprises program code executable by the processor to cause the processor to perform a function when installing the application program code and wherein the method further comprises removing, by the processor, the installation data after the function is performed. 16. (canceled) 17. (canceled) 18. (canceled) 19. (canceled)
Certain embodiments involve automatically reducing an attack surface of an application program on a computing device. For example, a processor installs an application program on a computing device by copying application program data associated with the application program on a memory of the computing device. The application program data includes installation data for installing the application program on the computing device and execution data for executing a function of the application program on the computing device. The processor accesses the application program data on the memory and identifies, based on an analysis of the application program data, the installation data and the execution data. The processor reduces an attack surface of the application program by automatically removing the identified installation data from the memory of the computing device. The attack surface corresponding to a vulnerability of the application program or the computing device to access by an unauthorized user.1. A method for automatically reducing an attack surface of an application program on a computing device, the method comprising: installing, by a processor, an application program on a computing device, wherein installing the application program on the computing device comprises copying application program data associated with the application program on a memory of the computing device, the application program data comprising installation data for installing the application program on the computing device and execution data for executing a function of the application program on the computing device; accessing, by the processor, the application program data on the memory; identifying, by the processor and based on an analysis of the application program data on the computing device, the installation data and the execution data; and reducing, by the processor, an attack surface of the application program by automatically removing the identified installation data from the memory of the computing device, the attack surface corresponding to a vulnerability of the application program or the computing device to access by an unauthorized user. 2. The method of claim 1, wherein the installation data comprises program code executable by the processor to cause the processor to output a request for user input prior to completing installation of the application program on the computing device. 3. The method of claim 2, wherein the request for user input comprises a request for a password prior to completing installation of the application program on the computing device. 4. The method of claim 2, wherein the request for user input comprises a request for user input indicating confirmation to install the application program on the computing device. 5. The method of claim 1, wherein the installation data comprises program code executable by the processor to cause the processor to perform a function when installing the application program code and wherein the method further comprises removing, by the processor, the installation data after the function is performed. 6. A system comprising: a processing device; and a non-transitory computer-readable medium communicatively coupled to the processing device, wherein the processing device is configured to perform operations comprising: installing an application program on a computing device, wherein installing the application program on the computing device comprises copying application program data associated with the application program on a memory of the computing device, the application program data comprising installation data for installing the application program on the computing device and execution data for executing a function of the application program on the computing device; accessing the application program data on the memory; identifying, based on an analysis of the application program data on the computing device, the installation data and the execution data; and reducing, by the processor, an attack surface of the application program by automatically removing the identified installation data from the memory of the computing device, the attack surface corresponding to a vulnerability of the application program or the computing device to access by an unauthorized user. 7. The system of claim 6, wherein the installation data comprises program code executable by the processing device to cause the processing device to output a request for user input prior to completing installation of the application program on the computing device. 8. The system of claim 7, wherein the request for user input comprises a request for a password prior to completing installation of the application program on the computing device. 9. The system of claim 7, wherein the request for user input comprises a request for user input indicating confirmation to install the application program on the computing device. 10. The system of claim 6, wherein the installation data comprises program code executable by the processing device to cause the processing device to perform a function when installing the application program code and wherein the processing device is further configured to remove the installation data after the function is performed. 11. A non-transitory computer-readable medium storing program code executable by a processor for automatically reducing an attack surface of an application program on a computing device, the program code comprising: program code for installing, by the processor, an application program on a computing device, wherein installing the application program on the computing device comprises copying application program data associated with the application program on a memory of the computing device, the application program data comprising installation data for installing the application program on the computing device and execution data for executing a function of the application program on the computing device; program code for accessing, by the processor, the application program data on the memory; program code for identifying, by the processor and based on an analysis of the application program data on the computing device, the installation data and the execution data; and program code for reducing, by the processor, an attack surface of the application program by automatically removing the identified installation data from the memory of the computing device, the attack surface corresponding to a vulnerability of the application program or the computing device to access by an unauthorized user. 12. The non-transitory computer-readable medium of claim 11, wherein the installation data comprises program code executable by the processor to cause the processor to output a request for user input prior to completing installation of the application program on the computing device. 13. The non-transitory computer-readable medium of claim 12, wherein the request for user input comprises a request for a password prior to completing installation of the application program on the computing device. 14. The non-transitory computer-readable medium of claim 12, wherein the request for user input comprises a request for user input indicating confirmation to install the application program on the computing device. 15. The non-transitory computer-readable medium of claim 11, wherein the installation data comprises program code executable by the processor to cause the processor to perform a function when installing the application program code and wherein the method further comprises removing, by the processor, the installation data after the function is performed. 16. (canceled) 17. (canceled) 18. (canceled) 19. (canceled)
2,400
9,217
9,217
16,492,563
2,492
The invention relates to methods and devices for updating encrypted biometric data of a user at a trusted network node. In an aspect of the invention a method performed by a first client device is provided of updating encrypted biometric data of a user, the encrypted biometric data to be updated having been previously captured by the first client device and registered at a trusted network node.
1. A method performed by a first client device of updating encrypted biometric data of a user, the encrypted biometric data to be updated having been previously captured by the first client device and registered at a trusted network node, comprising: capturing biometric data of the user to be used for updating the registered encrypted biometric data; encrypting the captured biometric data using a key shared with a second client device which subsequently is to access the updated encrypted biometric data; creating a first authentication token associated with the encrypted biometric data, which first token is configured to comprise a secret to be shared between the second client device and the trusted network node upon the second client device requesting the updated encrypted biometric data; and submitting the encrypted biometric data and the first authentication token to the trusted network node over a secure communication channel. 2. The method of claim 1, further comprising: receiving a message from the trusted network node that the previously registered encrypted biometric data has been replaced with the submitted encrypted biometric data, if the trusted network node successfully has authenticated the first authentication token. 3. The method of claim 1, further comprising: generating a plurality of secrets to be shared between the second client device and the trusted network node. 4. The method of claim 3, wherein the encryption of biometric data further comprises: encrypting a plurality of captured biometric data set using keys shared with a second client device which subsequently is to access the updated encrypted biometric data. 5. The method of claim 4, wherein the creation of the first authentication token further comprises: creating the first authentication token associated with the encrypted biometric data, which first token is configured to comprise the plurality of secrets to be shared between the second client device and the trusted network node upon the second client device requesting the updated encrypted biometric data, each of the encrypted biometric data sets, and an identifier indicating the encrypted biometric data set to be replaced. 6. The method of claim 5, wherein the creation of the first authentication token further comprises: digitally signing the first authentication token with a private key of the first client device, wherein the submitting of the first authentication token to the trusted network node further comprises: submitting the digitally signed first authentication token to the trusted network node. 7. A method performed by a second client device of acquiring updated encrypted biometric data of a user of the second client device from a trusted network node, the encrypted biometric data having been updated at the trusted network node by a first client device, comprising: submitting a request to the trusted network node over a secure communication channel to receive the updated encrypted biometric data which has replaced previously registered encrypted biometric data of the user, the request comprising a second authentication token associated with the previously registered encrypted biometric data; receiving an authentication challenge from the trusted network node, if the trusted network node is capable of authenticating the second authentication token; providing an authentication response to the received authentication challenge using a shared secret and the authentication challenge, the shared secret having been received earlier from the trusted network node upon the second client device acquiring the previously registered encrypted biometric data, and if the authentication response is correct; receiving the updated encrypted biometric data from the trusted network node and a new shared secret associated with the updated encrypted biometric data. 8. The method of claim 7, further comprising: receiving, from a 3rd party network node with which the user of the second client device is to be authenticated, a secret key capable of decrypting the updated encrypted biometric data. 9. The method of claim 8, further comprising: decrypting the updated encrypted biometric data using the received secret key; and storing the updated biometric data in a secure storage. 10. The method of claim 7, the second authentication token having been received from a 3rd party network node with which the user of the second client device is to be authenticated, and created by the first client device, the second authentication token comprising an encrypted data set including a generated random number, an identifier indicating the encrypted biometric data set to be replaced, and an index indicating a public key of the first client device used to authenticate the second authentication token. 11. The method of claim 10, the encrypted data set further having been digitally signed with a private key of the first client device. 12. A method performed by a trusted network node of updating previously registered encrypted biometric data of a user of a first client device, comprising: receiving, from the first client device over a secure communication channel, encrypted biometric data to be used for updating the registered encrypted biometric data and a first authentication token associated with the received encrypted biometric data, which first authentication token comprises a secret to be shared between a second client device and the trusted network node upon the second client device requesting the updated encrypted biometric data; authenticating the received first authentication token; and replacing the previously registered encrypted biometric data with the received encrypted biometric data and storing the secret to be shared. 13. The method of claim 12, further comprising: submitting a message to the first client device confirming that the previously registered encrypted biometric data has been successfully updated. 14. The method of claim 12, wherein the authenticating of the first authentication token comprises: acquiring a public key of the first client device, the method further comprising: verifying, using the public key, the first authentication token having been digitally signed by the first client device. 15. The method of claim 12, further comprising: receiving a request from a second client device over a secure communication channel to receive the updated encrypted biometric data which has replaced previously registered encrypted biometric data of the user, the request comprising a second authentication token associated with the previously registered encrypted biometric data; authenticating the received second authentication token; acquiring the updated encrypted biometric data, the secret to be shared with the second client device, and a shared secret associated with the encrypted biometric data that has been replaced, from a key repository; submitting an authentication challenge to the second client device; receiving an authentication response based on the shared secret associated with the encrypted biometric data that has been replaced and the authentication challenge, verifying that the authentication response has been correctly computed; and if so submitting the updated encrypted biometric data and the secret to be shared to the second client device. 16. The method of claim 15, further comprising: checking that the second client device belongs to a set of trusted devices. 17. The method of claim 16, wherein the checking that the second client device belongs to a set of trusted devices is performed using a Trusted Computing, TC, verification approach. 18. The method of claim 15, wherein the received second authentication token comprises: a data set including a random number generated by the first client device, an index indicating the public key of the first client device used to authenticate the second authentication token and an identifier indicating the encrypted biometric data to be replaced, the data set being encrypted with the public key of the trusted network node by the first client device; and the encrypted data set having been digitally signed with a private key of the first client device. 19. The method of claim 17, wherein the authenticating of the received second authentication token comprises: decrypting the encrypted data set to obtain the index and the identifier indicating the secret key used by the first client device to encrypt the biometric data and the reference information. 20. The method of claim 19, wherein the authentication of the received second authentication token further comprises: verifying that the second authentication token has not been previously presented to the trusted network node for said identifier other than for the encrypted biometric data that has been replaced, wherein if the second authentication token previously has been presented the authentication procedure is aborted. 21. The method of claim 20, wherein the verification that the second authentication token has not been previously presented to the trusted network node further comprises: verifying that the random number obtained from decrypting the encrypted data set has not been previously presented to the trusted network node for said identifier other than for the encrypted biometric data that has been replaced. 22. The method of claim 17, wherein the acquiring of the updated encrypted biometric data from the key repository further comprises: acquiring the public key of the first client device as indicated by said index, the method further comprising: verifying the digitally signed and encrypted data set using the acquired public key of the first client device. 23. The method of claim 15, wherein the verifying that the authentication response has been correctly computed further comprises removing the previously shared secret from the key repository upon successful verification. 24-50. (canceled)
The invention relates to methods and devices for updating encrypted biometric data of a user at a trusted network node. In an aspect of the invention a method performed by a first client device is provided of updating encrypted biometric data of a user, the encrypted biometric data to be updated having been previously captured by the first client device and registered at a trusted network node.1. A method performed by a first client device of updating encrypted biometric data of a user, the encrypted biometric data to be updated having been previously captured by the first client device and registered at a trusted network node, comprising: capturing biometric data of the user to be used for updating the registered encrypted biometric data; encrypting the captured biometric data using a key shared with a second client device which subsequently is to access the updated encrypted biometric data; creating a first authentication token associated with the encrypted biometric data, which first token is configured to comprise a secret to be shared between the second client device and the trusted network node upon the second client device requesting the updated encrypted biometric data; and submitting the encrypted biometric data and the first authentication token to the trusted network node over a secure communication channel. 2. The method of claim 1, further comprising: receiving a message from the trusted network node that the previously registered encrypted biometric data has been replaced with the submitted encrypted biometric data, if the trusted network node successfully has authenticated the first authentication token. 3. The method of claim 1, further comprising: generating a plurality of secrets to be shared between the second client device and the trusted network node. 4. The method of claim 3, wherein the encryption of biometric data further comprises: encrypting a plurality of captured biometric data set using keys shared with a second client device which subsequently is to access the updated encrypted biometric data. 5. The method of claim 4, wherein the creation of the first authentication token further comprises: creating the first authentication token associated with the encrypted biometric data, which first token is configured to comprise the plurality of secrets to be shared between the second client device and the trusted network node upon the second client device requesting the updated encrypted biometric data, each of the encrypted biometric data sets, and an identifier indicating the encrypted biometric data set to be replaced. 6. The method of claim 5, wherein the creation of the first authentication token further comprises: digitally signing the first authentication token with a private key of the first client device, wherein the submitting of the first authentication token to the trusted network node further comprises: submitting the digitally signed first authentication token to the trusted network node. 7. A method performed by a second client device of acquiring updated encrypted biometric data of a user of the second client device from a trusted network node, the encrypted biometric data having been updated at the trusted network node by a first client device, comprising: submitting a request to the trusted network node over a secure communication channel to receive the updated encrypted biometric data which has replaced previously registered encrypted biometric data of the user, the request comprising a second authentication token associated with the previously registered encrypted biometric data; receiving an authentication challenge from the trusted network node, if the trusted network node is capable of authenticating the second authentication token; providing an authentication response to the received authentication challenge using a shared secret and the authentication challenge, the shared secret having been received earlier from the trusted network node upon the second client device acquiring the previously registered encrypted biometric data, and if the authentication response is correct; receiving the updated encrypted biometric data from the trusted network node and a new shared secret associated with the updated encrypted biometric data. 8. The method of claim 7, further comprising: receiving, from a 3rd party network node with which the user of the second client device is to be authenticated, a secret key capable of decrypting the updated encrypted biometric data. 9. The method of claim 8, further comprising: decrypting the updated encrypted biometric data using the received secret key; and storing the updated biometric data in a secure storage. 10. The method of claim 7, the second authentication token having been received from a 3rd party network node with which the user of the second client device is to be authenticated, and created by the first client device, the second authentication token comprising an encrypted data set including a generated random number, an identifier indicating the encrypted biometric data set to be replaced, and an index indicating a public key of the first client device used to authenticate the second authentication token. 11. The method of claim 10, the encrypted data set further having been digitally signed with a private key of the first client device. 12. A method performed by a trusted network node of updating previously registered encrypted biometric data of a user of a first client device, comprising: receiving, from the first client device over a secure communication channel, encrypted biometric data to be used for updating the registered encrypted biometric data and a first authentication token associated with the received encrypted biometric data, which first authentication token comprises a secret to be shared between a second client device and the trusted network node upon the second client device requesting the updated encrypted biometric data; authenticating the received first authentication token; and replacing the previously registered encrypted biometric data with the received encrypted biometric data and storing the secret to be shared. 13. The method of claim 12, further comprising: submitting a message to the first client device confirming that the previously registered encrypted biometric data has been successfully updated. 14. The method of claim 12, wherein the authenticating of the first authentication token comprises: acquiring a public key of the first client device, the method further comprising: verifying, using the public key, the first authentication token having been digitally signed by the first client device. 15. The method of claim 12, further comprising: receiving a request from a second client device over a secure communication channel to receive the updated encrypted biometric data which has replaced previously registered encrypted biometric data of the user, the request comprising a second authentication token associated with the previously registered encrypted biometric data; authenticating the received second authentication token; acquiring the updated encrypted biometric data, the secret to be shared with the second client device, and a shared secret associated with the encrypted biometric data that has been replaced, from a key repository; submitting an authentication challenge to the second client device; receiving an authentication response based on the shared secret associated with the encrypted biometric data that has been replaced and the authentication challenge, verifying that the authentication response has been correctly computed; and if so submitting the updated encrypted biometric data and the secret to be shared to the second client device. 16. The method of claim 15, further comprising: checking that the second client device belongs to a set of trusted devices. 17. The method of claim 16, wherein the checking that the second client device belongs to a set of trusted devices is performed using a Trusted Computing, TC, verification approach. 18. The method of claim 15, wherein the received second authentication token comprises: a data set including a random number generated by the first client device, an index indicating the public key of the first client device used to authenticate the second authentication token and an identifier indicating the encrypted biometric data to be replaced, the data set being encrypted with the public key of the trusted network node by the first client device; and the encrypted data set having been digitally signed with a private key of the first client device. 19. The method of claim 17, wherein the authenticating of the received second authentication token comprises: decrypting the encrypted data set to obtain the index and the identifier indicating the secret key used by the first client device to encrypt the biometric data and the reference information. 20. The method of claim 19, wherein the authentication of the received second authentication token further comprises: verifying that the second authentication token has not been previously presented to the trusted network node for said identifier other than for the encrypted biometric data that has been replaced, wherein if the second authentication token previously has been presented the authentication procedure is aborted. 21. The method of claim 20, wherein the verification that the second authentication token has not been previously presented to the trusted network node further comprises: verifying that the random number obtained from decrypting the encrypted data set has not been previously presented to the trusted network node for said identifier other than for the encrypted biometric data that has been replaced. 22. The method of claim 17, wherein the acquiring of the updated encrypted biometric data from the key repository further comprises: acquiring the public key of the first client device as indicated by said index, the method further comprising: verifying the digitally signed and encrypted data set using the acquired public key of the first client device. 23. The method of claim 15, wherein the verifying that the authentication response has been correctly computed further comprises removing the previously shared secret from the key repository upon successful verification. 24-50. (canceled)
2,400
9,218
9,218
15,900,492
2,449
Systems and methods for energy aware transmission of data to a client device in a cloud environment during a remote session. The method includes, by a processor: establishing a remote session between the client device and a server, receiving a battery status corresponding to the client device, determining a battery profile associated with the received battery status for the client device, accessing a rule set to determine if there is at least one action associated with the battery profile. The at least one action corresponds to transmission of data from the server to the client device. The method further includes executing the at least one action if there is at least one action associated with the battery profile.
1. A method for energy aware transmission of data to a client device in a cloud environment, the method comprising, by a processor: establishing a remote session between the client device and a server; receiving a battery status corresponding to the client device; determining, for the client device, a battery profile associated with the received battery status; accessing a rule set to determine if there is at least one action associated with the battery profile, wherein the at least one action corresponds to transmission of data from the server to the client device; and if there is at least one action associated with the battery profile, executing the at least one action. 2. The method of claim 1, wherein receiving the battery status corresponding to the client device comprises receiving one or more of the following: battery power level of one or more batteries of the client device, or an indication corresponding to whether or not the client device is connected to an external power source. 3. The method of claim 1, wherein determining the battery profile associated with the received battery status comprises determining a rate of power consumption by the client device, wherein the rate of power consumption is attributable to the remote session. 4. The method of claim 3, wherein determining the battery profile associated with the received battery status further comprises determining a time remaining until total discharge of client device power reserves based on the rate of power consumption and the battery status. 5. The method of claim 3, wherein determining the rate of power consumption comprises monitoring one or more characteristics of one or more active applications corresponding to the remote session, wherein the one or more characteristics are selected from the following: network connection bandwidth, network connection type, radio signal strength required for executing an application, processing power requirement for am application, user requested quality level, size of data being transmitted from the server to the client, data transmission rate, processing costs, or refresh rates associated an output screen. 6. The method of claim 1, wherein the at least one action is selected from one or more of the following: disabling one or more high bandwidth consumption virtual channels; adjusting the number of frames transmitted per second; selecting audio and/or video codec types that require less power for transmission and rendering on the client device; adjusting the image quality to optimize data processing at the client device while maximizing the battery life; providing prompts to a user of the client device to select applications whose execution consumes less power; transmitting and rendering only certain regions of a desktop on the client device; or caching stable regions of a desktop locally to avoid transmission and rendering of such regions. 7. The method of claim 1, wherein receiving the battery status corresponding to the client device comprises receiving the battery status from one or more of the following: an operating system of the client device, a redirected virtual battery, or from a client agent corresponding to the remote session. 8. The method of claim 1, wherein receiving the battery status corresponding to the client device comprises receiving the battery status continuously, periodically, or upon occurrence of a triggering event. 9. The method of claim 8, wherein the triggering event comprises one or more of the following: a threshold battery charge percentage, a threshold rate of power consumption, or a threshold time to complete discharge of a battery. 10. The method of claim 1, wherein the rule set comprises: one or more look up tables; and each look up table associates each of a plurality of battery profiles with one or more actions corresponding to transmission of data from the server to the client device. 11. The method of claim 1, further comprising: prompting a user to confirm execution of the at least one action. 12. A system for energy aware transmission of data to a client device in a cloud environment, the system comprising: a processor; and a non-transitory computer-readable storage medium comprising programming instructions that are configured to cause the processor to: establish a remote session between the client device and a server; receive a battery status corresponding to the client device; determine, for the client device, a battery profile associated with the received battery status; access a rule set to determine if there is at least one action associated with the battery profile, wherein the at least one action corresponds to transmission of data from the server to the client device; and if there is at least one action associated with the battery profile, execute the at least one action. 13. The system of claim 12, wherein the programming instruction that cause the processor to receive the battery status corresponding to the client device comprise instructions to receive one or more of the following: battery power level of one or more batteries of the client device, or an indication corresponding to whether or not the client device is connected to an external power source. 14. The system of claim 12, wherein the programming instruction that cause the processor to determine the battery profile associated with the received battery status comprise instructions to determine a rate of power consumption by the client device, wherein the rate of power consumption is attributable to the remote session. 15. The system of claim 14, wherein the programming instruction that cause the processor to determine the battery profile associated with the received battery status further comprise instructions to determine a time remaining until total discharge of client device power reserves based on the rate of power consumption and the battery status. 16. The system of claim 14, wherein the programming instruction that cause the processor to determine the rate of power consumption comprise instructions to monitor one or more characteristics of one or more active applications corresponding to the remote session, wherein the one or more characteristics are selected from the following: network connection bandwidth, network connection type, radio signal strength required for executing an application, processing power requirement for am application, user requested quality level, size of data being transmitted from the server to the client, data transmission rate, processing costs, or refresh rates associated an output screen. 17. The system of claim 12, wherein the at least one action is selected from one or more of the following: disabling one or more high bandwidth consumption virtual channels; adjusting the number of frames transmitted per second; selecting audio and/or video codec types that require less power for transmission and rendering on the client device; adjusting the image quality to optimize data processing at the client device while maximizing the battery life; providing prompts to a user of the client device to select applications whose execution consumes less power; transmitting and rendering only certain regions of a desktop on the client device; or caching stable regions of a desktop locally to avoid transmission and rendering of such regions. 18. The system of claim 12, wherein receiving the battery status corresponding to the client device comprises receiving the battery status from one or more of the following: an operating system of the client device, a redirected virtual battery, or from a client agent corresponding to the remote session. 19. The system of claim 12, wherein the programming instruction that cause the processor to receive the battery status corresponding to the client device comprise instructions to receive the battery status continuously, periodically, or upon occurrence of a triggering event. 20. The system of claim 19, wherein the triggering event comprises one or more of the following: a threshold battery charge percentage, a threshold rate of power consumption, or a threshold time to complete discharge of a battery. 21. The system of claim 12, wherein the rule set comprises: one or more look up tables; and each look up table associates each of a plurality of battery profiles with one or more actions corresponding to transmission of data from the server to the client device. 22. The system of claim 12, further comprising programming instructions that cause the processor to prompt a user to confirm execution of the at least one action.
Systems and methods for energy aware transmission of data to a client device in a cloud environment during a remote session. The method includes, by a processor: establishing a remote session between the client device and a server, receiving a battery status corresponding to the client device, determining a battery profile associated with the received battery status for the client device, accessing a rule set to determine if there is at least one action associated with the battery profile. The at least one action corresponds to transmission of data from the server to the client device. The method further includes executing the at least one action if there is at least one action associated with the battery profile.1. A method for energy aware transmission of data to a client device in a cloud environment, the method comprising, by a processor: establishing a remote session between the client device and a server; receiving a battery status corresponding to the client device; determining, for the client device, a battery profile associated with the received battery status; accessing a rule set to determine if there is at least one action associated with the battery profile, wherein the at least one action corresponds to transmission of data from the server to the client device; and if there is at least one action associated with the battery profile, executing the at least one action. 2. The method of claim 1, wherein receiving the battery status corresponding to the client device comprises receiving one or more of the following: battery power level of one or more batteries of the client device, or an indication corresponding to whether or not the client device is connected to an external power source. 3. The method of claim 1, wherein determining the battery profile associated with the received battery status comprises determining a rate of power consumption by the client device, wherein the rate of power consumption is attributable to the remote session. 4. The method of claim 3, wherein determining the battery profile associated with the received battery status further comprises determining a time remaining until total discharge of client device power reserves based on the rate of power consumption and the battery status. 5. The method of claim 3, wherein determining the rate of power consumption comprises monitoring one or more characteristics of one or more active applications corresponding to the remote session, wherein the one or more characteristics are selected from the following: network connection bandwidth, network connection type, radio signal strength required for executing an application, processing power requirement for am application, user requested quality level, size of data being transmitted from the server to the client, data transmission rate, processing costs, or refresh rates associated an output screen. 6. The method of claim 1, wherein the at least one action is selected from one or more of the following: disabling one or more high bandwidth consumption virtual channels; adjusting the number of frames transmitted per second; selecting audio and/or video codec types that require less power for transmission and rendering on the client device; adjusting the image quality to optimize data processing at the client device while maximizing the battery life; providing prompts to a user of the client device to select applications whose execution consumes less power; transmitting and rendering only certain regions of a desktop on the client device; or caching stable regions of a desktop locally to avoid transmission and rendering of such regions. 7. The method of claim 1, wherein receiving the battery status corresponding to the client device comprises receiving the battery status from one or more of the following: an operating system of the client device, a redirected virtual battery, or from a client agent corresponding to the remote session. 8. The method of claim 1, wherein receiving the battery status corresponding to the client device comprises receiving the battery status continuously, periodically, or upon occurrence of a triggering event. 9. The method of claim 8, wherein the triggering event comprises one or more of the following: a threshold battery charge percentage, a threshold rate of power consumption, or a threshold time to complete discharge of a battery. 10. The method of claim 1, wherein the rule set comprises: one or more look up tables; and each look up table associates each of a plurality of battery profiles with one or more actions corresponding to transmission of data from the server to the client device. 11. The method of claim 1, further comprising: prompting a user to confirm execution of the at least one action. 12. A system for energy aware transmission of data to a client device in a cloud environment, the system comprising: a processor; and a non-transitory computer-readable storage medium comprising programming instructions that are configured to cause the processor to: establish a remote session between the client device and a server; receive a battery status corresponding to the client device; determine, for the client device, a battery profile associated with the received battery status; access a rule set to determine if there is at least one action associated with the battery profile, wherein the at least one action corresponds to transmission of data from the server to the client device; and if there is at least one action associated with the battery profile, execute the at least one action. 13. The system of claim 12, wherein the programming instruction that cause the processor to receive the battery status corresponding to the client device comprise instructions to receive one or more of the following: battery power level of one or more batteries of the client device, or an indication corresponding to whether or not the client device is connected to an external power source. 14. The system of claim 12, wherein the programming instruction that cause the processor to determine the battery profile associated with the received battery status comprise instructions to determine a rate of power consumption by the client device, wherein the rate of power consumption is attributable to the remote session. 15. The system of claim 14, wherein the programming instruction that cause the processor to determine the battery profile associated with the received battery status further comprise instructions to determine a time remaining until total discharge of client device power reserves based on the rate of power consumption and the battery status. 16. The system of claim 14, wherein the programming instruction that cause the processor to determine the rate of power consumption comprise instructions to monitor one or more characteristics of one or more active applications corresponding to the remote session, wherein the one or more characteristics are selected from the following: network connection bandwidth, network connection type, radio signal strength required for executing an application, processing power requirement for am application, user requested quality level, size of data being transmitted from the server to the client, data transmission rate, processing costs, or refresh rates associated an output screen. 17. The system of claim 12, wherein the at least one action is selected from one or more of the following: disabling one or more high bandwidth consumption virtual channels; adjusting the number of frames transmitted per second; selecting audio and/or video codec types that require less power for transmission and rendering on the client device; adjusting the image quality to optimize data processing at the client device while maximizing the battery life; providing prompts to a user of the client device to select applications whose execution consumes less power; transmitting and rendering only certain regions of a desktop on the client device; or caching stable regions of a desktop locally to avoid transmission and rendering of such regions. 18. The system of claim 12, wherein receiving the battery status corresponding to the client device comprises receiving the battery status from one or more of the following: an operating system of the client device, a redirected virtual battery, or from a client agent corresponding to the remote session. 19. The system of claim 12, wherein the programming instruction that cause the processor to receive the battery status corresponding to the client device comprise instructions to receive the battery status continuously, periodically, or upon occurrence of a triggering event. 20. The system of claim 19, wherein the triggering event comprises one or more of the following: a threshold battery charge percentage, a threshold rate of power consumption, or a threshold time to complete discharge of a battery. 21. The system of claim 12, wherein the rule set comprises: one or more look up tables; and each look up table associates each of a plurality of battery profiles with one or more actions corresponding to transmission of data from the server to the client device. 22. The system of claim 12, further comprising programming instructions that cause the processor to prompt a user to confirm execution of the at least one action.
2,400
9,219
9,219
16,150,449
2,495
A computer implemented method wherein the computer implemented method enables its use on a user's smart device and runs on Android/IOS platforms and enables at least one user to use the computer implemented method on a smart device and also enables at least one mentor to use the same computer implemented method at the same time, wherein the use of this computer implemented method by the mentor enables the mentor to control the computer implemented method of the users through a lockdown mode to control the computer implemented method of the users and thus lock the smart devices of the users to restrain the users from opening any other application, close out of the computer implemented method, or receive any notifications during the use of the computer implemented method.
1. A computer implemented method comprising the steps of: providing a main computer device; wherein said main computer device is adapted to control a plurality of secondary computer devices; providing a plurality of secondary computer devices; wherein said a plurality of secondary computer devices are adapted to be controlled by said main computer device; providing and downloading a computer application upon said main computer device; wherein said computer application is adapted to allow said main computer device to control each of said plurality of secondary computer devices individually; and wherein said computer application is adapted to allow said main computer device to initiate a lockdown mode that locks down each of said plurality of secondary computer devices individually, such that a user controlling said main computer device can restrain users of each respective said secondary computer device from opening any other computer application, or receive any notifications during use of said secondary computer device, nor call, send texts, or open internet web sites, or take or send pictures; providing and downloading a computer application upon each of said secondary computer devices; wherein said computer application is adapted to allow said main computer device to control each of said plurality of secondary computer devices individually; and wherein said computer application is adapted to allow said main computer device to initiate a lockdown mode that locks down each of said plurality of secondary computer devices individually, such that a user controlling said main computer device can restrain users of each respective said secondary computer device from opening any other computer application, or receive any notifications during use of said secondary computer device, nor call, send texts, or open internet web sites, or take or send pictures; wherein said computer application downloaded to said main computer device is further adapted to allow said user of said main computer device to set a time period to which each respective said secondary computer device is in said lockdown mode. 2. The computer implemented method of claim 1, wherein said computer application downloaded to said main computer device is further adapted to create a lockdown exit code for each respective said plurality of secondary computer devices, such that each respective user of each respective one of said plurality of secondary computer devices is able to exit said lockdown mode by entering its respective lockdown exit code into its respective computer application when given thereto by said user of said main computer device. 3. The computer implemented method of claim 1, wherein said computer application downloaded to said main computer device is further adapted to provide a visual overview of a lockdown status of each respective said plurality of secondary computer devices upon a computer screen of said main computer device, such that said user of said main computer device can verify and monitor the lockdown status of each respective said plurality of secondary computer devices. 4. The computer implemented method of claim 3, wherein said visual overview of said lockdown status of each respective said plurality of secondary computer devices includes green and red colored symbols; wherein one of said green colored symbols appears next to the status of each of said plurality of secondary computer devices that are in compliance with said lockdown mode; and wherein one of said red colored symbols appears next to the status of each of said plurality of secondary computer devices that are in violation of said lockdown mode. 5. The computer implemented method of claim 4, wherein said computer application downloaded to said main computer device is further adapted to provide an audio alarm when one of said secondary computer devices are in violation of said lockdown mode. 6. The computer implemented method of claim 2, wherein said computer application downloaded to said main computer device is further adapted to create a time limit for the use of each respective said lockdown exit code.
A computer implemented method wherein the computer implemented method enables its use on a user's smart device and runs on Android/IOS platforms and enables at least one user to use the computer implemented method on a smart device and also enables at least one mentor to use the same computer implemented method at the same time, wherein the use of this computer implemented method by the mentor enables the mentor to control the computer implemented method of the users through a lockdown mode to control the computer implemented method of the users and thus lock the smart devices of the users to restrain the users from opening any other application, close out of the computer implemented method, or receive any notifications during the use of the computer implemented method.1. A computer implemented method comprising the steps of: providing a main computer device; wherein said main computer device is adapted to control a plurality of secondary computer devices; providing a plurality of secondary computer devices; wherein said a plurality of secondary computer devices are adapted to be controlled by said main computer device; providing and downloading a computer application upon said main computer device; wherein said computer application is adapted to allow said main computer device to control each of said plurality of secondary computer devices individually; and wherein said computer application is adapted to allow said main computer device to initiate a lockdown mode that locks down each of said plurality of secondary computer devices individually, such that a user controlling said main computer device can restrain users of each respective said secondary computer device from opening any other computer application, or receive any notifications during use of said secondary computer device, nor call, send texts, or open internet web sites, or take or send pictures; providing and downloading a computer application upon each of said secondary computer devices; wherein said computer application is adapted to allow said main computer device to control each of said plurality of secondary computer devices individually; and wherein said computer application is adapted to allow said main computer device to initiate a lockdown mode that locks down each of said plurality of secondary computer devices individually, such that a user controlling said main computer device can restrain users of each respective said secondary computer device from opening any other computer application, or receive any notifications during use of said secondary computer device, nor call, send texts, or open internet web sites, or take or send pictures; wherein said computer application downloaded to said main computer device is further adapted to allow said user of said main computer device to set a time period to which each respective said secondary computer device is in said lockdown mode. 2. The computer implemented method of claim 1, wherein said computer application downloaded to said main computer device is further adapted to create a lockdown exit code for each respective said plurality of secondary computer devices, such that each respective user of each respective one of said plurality of secondary computer devices is able to exit said lockdown mode by entering its respective lockdown exit code into its respective computer application when given thereto by said user of said main computer device. 3. The computer implemented method of claim 1, wherein said computer application downloaded to said main computer device is further adapted to provide a visual overview of a lockdown status of each respective said plurality of secondary computer devices upon a computer screen of said main computer device, such that said user of said main computer device can verify and monitor the lockdown status of each respective said plurality of secondary computer devices. 4. The computer implemented method of claim 3, wherein said visual overview of said lockdown status of each respective said plurality of secondary computer devices includes green and red colored symbols; wherein one of said green colored symbols appears next to the status of each of said plurality of secondary computer devices that are in compliance with said lockdown mode; and wherein one of said red colored symbols appears next to the status of each of said plurality of secondary computer devices that are in violation of said lockdown mode. 5. The computer implemented method of claim 4, wherein said computer application downloaded to said main computer device is further adapted to provide an audio alarm when one of said secondary computer devices are in violation of said lockdown mode. 6. The computer implemented method of claim 2, wherein said computer application downloaded to said main computer device is further adapted to create a time limit for the use of each respective said lockdown exit code.
2,400
9,220
9,220
15,702,102
2,433
Systems and methods for providing services are disclosed. One aspect comprises detecting a compromised state of a user device, determining a device identifier associated with the user device, locating a service identifier the device identifier, and transmitting the service identifier to the user device.
1. A method comprising: detecting a compromised state of a user device; determining a device identifier associated with the user device from a plurality of device identifiers; determining, based on the determined device identifier, an address element associated with the user device; determining, based on the address element, a service provider associated with the user device, wherein the service provider is determined from a plurality of service providers, and wherein at least one of the plurality of service providers is an Internet Service Provider; determining, based on the service provider and the compromised state of the user device, a service identifier, wherein the service identifier identifies a server associated with the determined service provider; and transmitting the service identifier to the user device.
Systems and methods for providing services are disclosed. One aspect comprises detecting a compromised state of a user device, determining a device identifier associated with the user device, locating a service identifier the device identifier, and transmitting the service identifier to the user device.1. A method comprising: detecting a compromised state of a user device; determining a device identifier associated with the user device from a plurality of device identifiers; determining, based on the determined device identifier, an address element associated with the user device; determining, based on the address element, a service provider associated with the user device, wherein the service provider is determined from a plurality of service providers, and wherein at least one of the plurality of service providers is an Internet Service Provider; determining, based on the service provider and the compromised state of the user device, a service identifier, wherein the service identifier identifies a server associated with the determined service provider; and transmitting the service identifier to the user device.
2,400
9,221
9,221
15,772,211
2,468
In response to an instruction received from a base station, a signal forwarding device applies a signal forwarding scheme selected from a plurality of signaling forwarding schemes by a scheduler. The signal forwarding scheme may be applied by the signal forwarding device to forward signals from the base station to a user equipment (UE) device and/or from the UE device to the base station. The scheduler selects the signal forwarding scheme based on channel characteristics of the channel between the signal forwarding device and the UE device and/or the channel between the signal forwarding device and the base station. Although at least some of the channel characteristics are determined by the base station, at least some of the channel characteristics can be determined by the signal forwarding device in some situations.
1. A signal forwarding device comprising: a receiver configured to receive a received signal and configured to receive a signal forwarding scheme instruction from a base station, the signal forwarding scheme instruction indicating a selected signal forwarding scheme selected from a plurality of signal forwarding schemes comprising a first signal forwarding scheme having a first decoding level and a second signal forwarding scheme having a second decoding level greater than the first decoding level; a transmitter configured to transmit a forwarded signal based on the received signal; and a signal forwarding processor configured to apply, in response to the scheme instruction, the selected signal forwarding scheme to the received signal to generate the forwarded signal. 2. The signal forwarding device of claim 1, wherein the receiver is configured to receive the received signal from a user equipment (UE) device served by the base station and wherein the transmitter is configured to transmit the forwarded signal to the base station. 3. The signal forwarding device of claim 1, wherein the receiver is configured to receive the received signal from the base station and wherein the transmitter is configured to transmit the forwarded signal to a user equipment (UE) device served by the base station 4. The signal forwarding device of claim 1, wherein the signal forwarding processor comprises: a relay transmission processor configured to apply a relay signal forwarding scheme that includes at least partial decoding of the received signal. 5. The signal forwarding device of claim 4, wherein the signal forwarding processor comprises: a retransmission processor configured to apply a retransmission signal forwarding scheme that does not include decoding of the receiver signal to generate the forwarded signal. 6. The signal forwarding device of claim 5, wherein the relay transmission processor is configured to apply a plurality of relay signal forwarding schemes comprising: a partial decode and forward (PDF) signal forwarding scheme including partial decoding of the received signal to generate the forwarded signal; and a decode and forward (DF) signal forwarding scheme including complete decoding of the received signal and coding to generate the forwarded signal. 7. The signal forwarding device of claim 6, wherein the plurality of relay signal forwarding schemes further comprises: another PDF signal forwarding scheme including a different level of partial decoding of the received signal than the PDF signal forwarding scheme to generate the forwarded signal. 8. The signal forwarding device of claim 1, wherein the transmitter is further configured to send channel information to the base station, the channel information indicative of channel characteristics of at least one of: a UE device to signal forwarding device (UE-SFD) channel between the UE device and the signal forwarding device; and a signal forwarding device to base station (SFD-BS) channel between the signal forwarding device and the base station. 9. The signal forwarding device of claim 8, wherein the channel information is indicative of whether the channel quality is above a threshold. 10. The signal forwarding device of claim 8, wherein the channel information comprises a retransmitted signal of a reference signal received from the UE device. 11. A base station comprising: a receiver configured to receive channel information from a signal forwarding device, the channel information indicative of channel characteristics of at least one of: a UE device to signal forwarding device (UE-SFD) channel between the UE device and the signal forwarding device; and a signal forwarding device to base station (SFD-BS) channel between the signal forwarding device and the base station; and a transmitter configured to send a signal forwarding scheme instruction to the signal forwarding device, the signal forwarding scheme instruction indicating a selected signal forwarding scheme for use by the signal forwarding device, the selected signal forwarding scheme selected from a plurality of signal forwarding schemes comprising a first signal forwarding scheme having a first decoding level and a second signal forwarding scheme having a second decoding level greater than the first decoding level, the selected signal forwarding scheme selected based on at least the channel information. 12. The base station of claim 11, wherein the selected signal forwarding scheme is applied by the signal forwarding device to receive a received signal from a user equipment (UE) device served by the base station and to transmit a forwarded signal based on the received signal to the base station. 13. The base station of claim 11, wherein the selected signal forwarding scheme is applied by the signal forwarding device to receive a received signal from the base station and to transmit a forwarded signal based on the received signal to a user equipment (UE) device served by the base station. 14. The base station of claim 11, wherein the plurality of signal forwarding schemes comprises a relay signal forwarding scheme that includes at least partial decoding of a received signal to generate a forwarded signal. 15. The base station of claim 14, wherein the plurality of signal forwarding schemes comprises a retransmission signal forwarding scheme that does not include decoding of the received signal to generate the forwarded signal. 16. The base station of claim 15, wherein the plurality of signal forwarding schemes comprises: a partial decode and forward (PDF) signal forwarding scheme including partial decoding of the received signal to generate the forwarded signal; and a decode and forward (DF) signal forwarding scheme including complete decoding of the received signal and coding to generate the forwarded signal. 17. The base station of claim 16, wherein the plurality of signal forwarding schemes further comprises: another PDF signal forwarding scheme including a different level of partial decoding of the received signal than the PDF signal forwarding scheme to generate the forwarded signal. 18. The base station of claim 11, wherein the channel information is indicative of whether the channel quality is above a threshold. 19. The base station of claim 11, wherein the channel information comprises a retransmitted signal of a reference signal received from the UE device. 20. A communication system comprising: a base station configured to provide wireless service to a user equipment (UE) device; a signal forwarding device configured to apply a selected signal forwarding scheme to a received signal to generate a forwarded signal, the signal forwarding device further configured to send channel information to the base station, the channel information indicative of channel characteristics of at least one of: the UE device to signal forwarding device (UE-SFD) channel between the UE device and the signal forwarding device; and the signal forwarding device to base station (SFD-BS) channel between the signal forwarding device and the base station; a scheduler communicatively coupled to the base station and configured to selected the selected signal forwarding scheme from a plurality of signal forwarding schemes comprising a first signal forwarding scheme having a first decoding level and a second signal forwarding scheme having a second decoding level greater than the first decoding level, the selected signal forwarding scheme selected based on at least the channel information, the base station configured to send a signal forwarding scheme instruction to the signal forwarding device, the signal forwarding scheme instruction indicating the selected signal forwarding scheme. 21. The communication system of claim 20, wherein the signal forwarding device is configured to receive the received signal from the UE device and to transmit the forwarded signal to the base station. 22. The communication system of claim 20, wherein the signal forwarding device is configured to receive the received signal from the base station to transmit the forwarded signal to the UE device.
In response to an instruction received from a base station, a signal forwarding device applies a signal forwarding scheme selected from a plurality of signaling forwarding schemes by a scheduler. The signal forwarding scheme may be applied by the signal forwarding device to forward signals from the base station to a user equipment (UE) device and/or from the UE device to the base station. The scheduler selects the signal forwarding scheme based on channel characteristics of the channel between the signal forwarding device and the UE device and/or the channel between the signal forwarding device and the base station. Although at least some of the channel characteristics are determined by the base station, at least some of the channel characteristics can be determined by the signal forwarding device in some situations.1. A signal forwarding device comprising: a receiver configured to receive a received signal and configured to receive a signal forwarding scheme instruction from a base station, the signal forwarding scheme instruction indicating a selected signal forwarding scheme selected from a plurality of signal forwarding schemes comprising a first signal forwarding scheme having a first decoding level and a second signal forwarding scheme having a second decoding level greater than the first decoding level; a transmitter configured to transmit a forwarded signal based on the received signal; and a signal forwarding processor configured to apply, in response to the scheme instruction, the selected signal forwarding scheme to the received signal to generate the forwarded signal. 2. The signal forwarding device of claim 1, wherein the receiver is configured to receive the received signal from a user equipment (UE) device served by the base station and wherein the transmitter is configured to transmit the forwarded signal to the base station. 3. The signal forwarding device of claim 1, wherein the receiver is configured to receive the received signal from the base station and wherein the transmitter is configured to transmit the forwarded signal to a user equipment (UE) device served by the base station 4. The signal forwarding device of claim 1, wherein the signal forwarding processor comprises: a relay transmission processor configured to apply a relay signal forwarding scheme that includes at least partial decoding of the received signal. 5. The signal forwarding device of claim 4, wherein the signal forwarding processor comprises: a retransmission processor configured to apply a retransmission signal forwarding scheme that does not include decoding of the receiver signal to generate the forwarded signal. 6. The signal forwarding device of claim 5, wherein the relay transmission processor is configured to apply a plurality of relay signal forwarding schemes comprising: a partial decode and forward (PDF) signal forwarding scheme including partial decoding of the received signal to generate the forwarded signal; and a decode and forward (DF) signal forwarding scheme including complete decoding of the received signal and coding to generate the forwarded signal. 7. The signal forwarding device of claim 6, wherein the plurality of relay signal forwarding schemes further comprises: another PDF signal forwarding scheme including a different level of partial decoding of the received signal than the PDF signal forwarding scheme to generate the forwarded signal. 8. The signal forwarding device of claim 1, wherein the transmitter is further configured to send channel information to the base station, the channel information indicative of channel characteristics of at least one of: a UE device to signal forwarding device (UE-SFD) channel between the UE device and the signal forwarding device; and a signal forwarding device to base station (SFD-BS) channel between the signal forwarding device and the base station. 9. The signal forwarding device of claim 8, wherein the channel information is indicative of whether the channel quality is above a threshold. 10. The signal forwarding device of claim 8, wherein the channel information comprises a retransmitted signal of a reference signal received from the UE device. 11. A base station comprising: a receiver configured to receive channel information from a signal forwarding device, the channel information indicative of channel characteristics of at least one of: a UE device to signal forwarding device (UE-SFD) channel between the UE device and the signal forwarding device; and a signal forwarding device to base station (SFD-BS) channel between the signal forwarding device and the base station; and a transmitter configured to send a signal forwarding scheme instruction to the signal forwarding device, the signal forwarding scheme instruction indicating a selected signal forwarding scheme for use by the signal forwarding device, the selected signal forwarding scheme selected from a plurality of signal forwarding schemes comprising a first signal forwarding scheme having a first decoding level and a second signal forwarding scheme having a second decoding level greater than the first decoding level, the selected signal forwarding scheme selected based on at least the channel information. 12. The base station of claim 11, wherein the selected signal forwarding scheme is applied by the signal forwarding device to receive a received signal from a user equipment (UE) device served by the base station and to transmit a forwarded signal based on the received signal to the base station. 13. The base station of claim 11, wherein the selected signal forwarding scheme is applied by the signal forwarding device to receive a received signal from the base station and to transmit a forwarded signal based on the received signal to a user equipment (UE) device served by the base station. 14. The base station of claim 11, wherein the plurality of signal forwarding schemes comprises a relay signal forwarding scheme that includes at least partial decoding of a received signal to generate a forwarded signal. 15. The base station of claim 14, wherein the plurality of signal forwarding schemes comprises a retransmission signal forwarding scheme that does not include decoding of the received signal to generate the forwarded signal. 16. The base station of claim 15, wherein the plurality of signal forwarding schemes comprises: a partial decode and forward (PDF) signal forwarding scheme including partial decoding of the received signal to generate the forwarded signal; and a decode and forward (DF) signal forwarding scheme including complete decoding of the received signal and coding to generate the forwarded signal. 17. The base station of claim 16, wherein the plurality of signal forwarding schemes further comprises: another PDF signal forwarding scheme including a different level of partial decoding of the received signal than the PDF signal forwarding scheme to generate the forwarded signal. 18. The base station of claim 11, wherein the channel information is indicative of whether the channel quality is above a threshold. 19. The base station of claim 11, wherein the channel information comprises a retransmitted signal of a reference signal received from the UE device. 20. A communication system comprising: a base station configured to provide wireless service to a user equipment (UE) device; a signal forwarding device configured to apply a selected signal forwarding scheme to a received signal to generate a forwarded signal, the signal forwarding device further configured to send channel information to the base station, the channel information indicative of channel characteristics of at least one of: the UE device to signal forwarding device (UE-SFD) channel between the UE device and the signal forwarding device; and the signal forwarding device to base station (SFD-BS) channel between the signal forwarding device and the base station; a scheduler communicatively coupled to the base station and configured to selected the selected signal forwarding scheme from a plurality of signal forwarding schemes comprising a first signal forwarding scheme having a first decoding level and a second signal forwarding scheme having a second decoding level greater than the first decoding level, the selected signal forwarding scheme selected based on at least the channel information, the base station configured to send a signal forwarding scheme instruction to the signal forwarding device, the signal forwarding scheme instruction indicating the selected signal forwarding scheme. 21. The communication system of claim 20, wherein the signal forwarding device is configured to receive the received signal from the UE device and to transmit the forwarded signal to the base station. 22. The communication system of claim 20, wherein the signal forwarding device is configured to receive the received signal from the base station to transmit the forwarded signal to the UE device.
2,400
9,222
9,222
15,394,176
2,486
A method, apparatus and computer program product are provided for varying panning speeds of images based on saliency such that 360-degree images, panoramic images, video images and/or other wide view area images may be efficiently displayed by varying the panning speed such that the user focuses on salient portions of the image. A panning speed is determined based on the currently displayed area and its saliency relative to the saliency of non-displayed or peripheral portions. As a user pans from one area to another, while the user pans over a salient portion of the image, the actual reflected panning may occur at a relatively slower speed than when the user pans over an area not including a salient portion, or a less salient portion.
1. A method comprising: receiving a panning indication comprising a panning direction relative to an image, wherein at least a displayed portion of the image is provided on a display; identifying one or more salient portions of the image relative to the displayed portion and the panning direction; and causing the image to be panned on the display in response to the panning indication at a panning speed that varies depending upon a position of the one or more salient portions relative to the displayed portion. 2. The method of claim 1, wherein the panning speed is slower in an instance the displayed portion comprises at least one of the one or more salient portions, relative to the panning speed in an instance the displayed portion comprises no salient portions. 3. The method of claim 1, wherein the panning speed is faster in an instance the panning direction is toward the at least one of the one or more salient portions and the salient portion is not displayed, relative to the panning speed in an instance the one or more salient portions is displayed. 4. The method of claim 1, wherein the panning speed is calculated as a predetermined multiplier times a user-indicated panning speed. 5. The method of claim 1, wherein the image is a video image and the panning speed varies further based on a temporal characteristic of the one or more salient portions of the image. 6. The method of claim 1, wherein the panning indication is received in response to movement of a wearable device. 7. The method of claim 1, wherein the panning indication is received in response to a scrolling input. 8. The method of claim 1, wherein the panning indication is received in response to a touch input. 9. The method of claim 1, wherein the panning speed varies further based on audio data relating to the one or more salient portions of the image. 10. A computer program product comprising at least one non-transitory computer-readable storage medium having computer-executable program code instructions stored therein, the computer-executable program code instructions comprising program code instructions to: receive a panning indication comprising a panning direction relative to an image, wherein at least a displayed portion of the image is provided on a display; identify one or more salient portions of the image relative to the displayed portion and the panning direction; and cause the image to be panned on the display in response to the panning indication at a panning speed that varies depending upon a position of the one or more salient portions relative to the displayed portion. 11. The computer program product of claim 10, wherein the panning speed is slower in an instance the displayed portion comprises at least one of the one or more salient portions, relative to the panning speed in an instance the displayed portion comprises no salient portions. 12. The computer program product of claim 10, wherein the panning speed is faster in an instance the panning direction is toward at least one of the one or more salient portions and the salient portion is not displayed, relative to the panning speed in an instance the one or more salient portions is displayed. 13. The computer program product of claim 10, wherein the panning speed is calculated as a predetermined multiplier times a user-indicated panning speed. 14. The computer program product of claim 10, wherein the image is a video image and the panning speed varies further based on a temporal characteristic of the one or more salient portions of the image. 15. The computer program product of claim 10, wherein the panning indication is received in response to movement of a wearable device. 16. The computer program product of claim 10, wherein the panning indication is received in response to a scrolling input. 17. The computer program product of claim 10, wherein the panning indication is received in response to a touch input. 18. The computer program product of claim 10, wherein the panning speed varies further based on audio data relating to the one or more salient portions of the image. 19. An apparatus comprising at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the processor, cause the apparatus to at least: receive a panning indication comprising a panning direction relative to an image, wherein at least a displayed portion of the image is provided on a display; identify one or more salient portions of the image relative to the displayed portion and the panning direction; and cause the image to be panned on the display in response to the panning indication at a panning speed that varies depending upon a position of the one or more salient portions relative to the displayed portion. 20. The apparatus of claim 19, wherein the panning speed is slower in an instance the displayed portion comprises at least one of the one or more salient portions, relative to the panning speed in an instance the displayed portion comprises no salient portions.
A method, apparatus and computer program product are provided for varying panning speeds of images based on saliency such that 360-degree images, panoramic images, video images and/or other wide view area images may be efficiently displayed by varying the panning speed such that the user focuses on salient portions of the image. A panning speed is determined based on the currently displayed area and its saliency relative to the saliency of non-displayed or peripheral portions. As a user pans from one area to another, while the user pans over a salient portion of the image, the actual reflected panning may occur at a relatively slower speed than when the user pans over an area not including a salient portion, or a less salient portion.1. A method comprising: receiving a panning indication comprising a panning direction relative to an image, wherein at least a displayed portion of the image is provided on a display; identifying one or more salient portions of the image relative to the displayed portion and the panning direction; and causing the image to be panned on the display in response to the panning indication at a panning speed that varies depending upon a position of the one or more salient portions relative to the displayed portion. 2. The method of claim 1, wherein the panning speed is slower in an instance the displayed portion comprises at least one of the one or more salient portions, relative to the panning speed in an instance the displayed portion comprises no salient portions. 3. The method of claim 1, wherein the panning speed is faster in an instance the panning direction is toward the at least one of the one or more salient portions and the salient portion is not displayed, relative to the panning speed in an instance the one or more salient portions is displayed. 4. The method of claim 1, wherein the panning speed is calculated as a predetermined multiplier times a user-indicated panning speed. 5. The method of claim 1, wherein the image is a video image and the panning speed varies further based on a temporal characteristic of the one or more salient portions of the image. 6. The method of claim 1, wherein the panning indication is received in response to movement of a wearable device. 7. The method of claim 1, wherein the panning indication is received in response to a scrolling input. 8. The method of claim 1, wherein the panning indication is received in response to a touch input. 9. The method of claim 1, wherein the panning speed varies further based on audio data relating to the one or more salient portions of the image. 10. A computer program product comprising at least one non-transitory computer-readable storage medium having computer-executable program code instructions stored therein, the computer-executable program code instructions comprising program code instructions to: receive a panning indication comprising a panning direction relative to an image, wherein at least a displayed portion of the image is provided on a display; identify one or more salient portions of the image relative to the displayed portion and the panning direction; and cause the image to be panned on the display in response to the panning indication at a panning speed that varies depending upon a position of the one or more salient portions relative to the displayed portion. 11. The computer program product of claim 10, wherein the panning speed is slower in an instance the displayed portion comprises at least one of the one or more salient portions, relative to the panning speed in an instance the displayed portion comprises no salient portions. 12. The computer program product of claim 10, wherein the panning speed is faster in an instance the panning direction is toward at least one of the one or more salient portions and the salient portion is not displayed, relative to the panning speed in an instance the one or more salient portions is displayed. 13. The computer program product of claim 10, wherein the panning speed is calculated as a predetermined multiplier times a user-indicated panning speed. 14. The computer program product of claim 10, wherein the image is a video image and the panning speed varies further based on a temporal characteristic of the one or more salient portions of the image. 15. The computer program product of claim 10, wherein the panning indication is received in response to movement of a wearable device. 16. The computer program product of claim 10, wherein the panning indication is received in response to a scrolling input. 17. The computer program product of claim 10, wherein the panning indication is received in response to a touch input. 18. The computer program product of claim 10, wherein the panning speed varies further based on audio data relating to the one or more salient portions of the image. 19. An apparatus comprising at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the processor, cause the apparatus to at least: receive a panning indication comprising a panning direction relative to an image, wherein at least a displayed portion of the image is provided on a display; identify one or more salient portions of the image relative to the displayed portion and the panning direction; and cause the image to be panned on the display in response to the panning indication at a panning speed that varies depending upon a position of the one or more salient portions relative to the displayed portion. 20. The apparatus of claim 19, wherein the panning speed is slower in an instance the displayed portion comprises at least one of the one or more salient portions, relative to the panning speed in an instance the displayed portion comprises no salient portions.
2,400
9,223
9,223
15,430,184
2,459
Methods, systems, and devices provide control over resources electronically communicated among computing devices. In some embodiments, a management application identifies multiple entities for communicating electronic content. The management application determines that at least a subset of the entities required for communicating the electronic content is available for electronic communication. The management application authorizes communication of at least some of the electronic content among the entities in response to determining that the required subset of entities is available for electronic communication.
1-20. (canceled) 21. A method, comprising: transmitting, by a client application executed by a computing device, a request to access at least one resource, the request being transmitted to a management application executed by a server system, the request being transmitted to the management application through a network connection with the computing device, the request including credentials associated with a user of the computing device and an identifier associated with the computing device, and the client application being configured to prevent access to the at least one resource by at least one additional application executed by the computing device; receiving, by the client application, the at least one resource; receiving, by the client application, at least one rule defining at least one requirement that must be satisfied for the client application to provide access to the at least one resource, the at least one rule requiring that a mobile device management module be installed on the computing device, the at least one rule further requiring that the computing device be in communication with the management application through the network connection, and the at least one rule further requiring that at least one additional computing device associated with a required entity be accessing the at least one resource; determining, by the client application, that at least a portion of the at least one rule is not satisfied; and, causing, by the client application, the at least one resource to be inaccessible by the computing device. 22. The method of claim 1, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the at least one resource to be erased from the computing device. 23. The method of claim 1, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the client application to be erased from the computing device. 24. The method of claim 1, wherein causing the at least one resource to be inaccessible by the computing device comprises causing a device wipe to be performed. 25. The method of claim 1, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the computing device to be locked. 26. The method of claim 1, further comprising: causing, by the client application, a notification to be transmitted to an administrative entity associated with the at least one resource. 27. The method of claim 1, further comprising: causing, by the client application, a software update to be installed on the computing device. 28. A non-transitory computer readable medium comprising executable instructions, which when executed by a processor, cause the processor to perform a method comprising: transmitting, by a client application executed by a computing device, a request to access at least one resource, the request being transmitted to a management application executed by a server system, the request being transmitted to the management application through a network connection with the computing device, the request including credentials associated with a user of the computing device and an identifier associated with the computing device, and the client application being configured to prevent access to the at least one resource by at least one additional application executed by the computing device; receiving, by the client application, the at least one resource; receiving, by the client application, at least one rule defining at least one requirement that must be satisfied for the client application to provide access to the at least one resource, the at least one rule requiring that a mobile device management module be installed on the computing device, the at least one rule further requiring that the computing device be in communication with the management application through the network connection, and the at least one rule further requiring that at least one additional computing device associated with a required entity be accessing the at least one resource; determining, by the client application, that at least a portion of the at least one rule is not satisfied; and, causing, by the client application, the at least one resource to be inaccessible by the computing device. 29. The non-transitory computer readable medium of claim 28, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the at least one resource to be erased from the computing device. 30. The non-transitory computer readable medium of claim 28, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the client application to be erased from the computing device. 31. The non-transitory computer readable medium of claim 28, wherein causing the at least one resource to be inaccessible by the computing device comprises causing a device wipe to be performed. 32. The non-transitory computer readable medium of claim 28, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the computing device to be locked. 33. The non-transitory computer readable medium of claim 28, further comprising: causing, by the client application, a notification to be transmitted to an administrative entity associated with the at least one resource. 34. The non-transitory computer readable medium of claim 1, further comprising: causing, by the client application, a software update to be installed on the computing device. 35. A system comprising: at least one processor; and a non-transitory computer-readable medium in communication with the at least one processor, wherein the at least one processor is configured to execute instructions embodied in the computer-readable medium to perform operations comprising: transmitting, by a client application executed by a computing device, a request to access at least one resource, the request being transmitted to a management application executed by a server system, the request being transmitted to the management application through a network connection with the computing device, the request including credentials associated with a user of the computing device and an identifier associated with the computing device, and the client application being configured to prevent access to the at least one resource by at least one additional application executed by the computing device; receiving, by the client application, the at least one resource; receiving, by the client application, at least one rule defining at least one requirement that must be satisfied for the client application to provide access to the at least one resource, the at least one rule requiring that a mobile device management module be installed on the computing device, the at least one rule further requiring that the computing device be in communication with the management application through the network connection, and the at least one rule further requiring that at least one additional computing device associated with a required entity be accessing the at least one resource; determining, by the client application, that at least a portion of the at least one rule is not satisfied; and, causing, by the client application, the at least one resource to be inaccessible by the computing device. 36. The system of claim 35, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the at least one resource to be erased from the computing device. 37. The system of claim 35, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the client application to be erased from the computing device. 38. The system of claim 35, wherein causing the at least one resource to be inaccessible by the computing device comprises causing a device wipe to be performed. 39. The system of claim 35, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the computing device to be locked. 40. The system of claim 35, further comprising: causing, by the client application, a notification to be transmitted to an administrative entity associated with the at least one resource.
Methods, systems, and devices provide control over resources electronically communicated among computing devices. In some embodiments, a management application identifies multiple entities for communicating electronic content. The management application determines that at least a subset of the entities required for communicating the electronic content is available for electronic communication. The management application authorizes communication of at least some of the electronic content among the entities in response to determining that the required subset of entities is available for electronic communication.1-20. (canceled) 21. A method, comprising: transmitting, by a client application executed by a computing device, a request to access at least one resource, the request being transmitted to a management application executed by a server system, the request being transmitted to the management application through a network connection with the computing device, the request including credentials associated with a user of the computing device and an identifier associated with the computing device, and the client application being configured to prevent access to the at least one resource by at least one additional application executed by the computing device; receiving, by the client application, the at least one resource; receiving, by the client application, at least one rule defining at least one requirement that must be satisfied for the client application to provide access to the at least one resource, the at least one rule requiring that a mobile device management module be installed on the computing device, the at least one rule further requiring that the computing device be in communication with the management application through the network connection, and the at least one rule further requiring that at least one additional computing device associated with a required entity be accessing the at least one resource; determining, by the client application, that at least a portion of the at least one rule is not satisfied; and, causing, by the client application, the at least one resource to be inaccessible by the computing device. 22. The method of claim 1, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the at least one resource to be erased from the computing device. 23. The method of claim 1, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the client application to be erased from the computing device. 24. The method of claim 1, wherein causing the at least one resource to be inaccessible by the computing device comprises causing a device wipe to be performed. 25. The method of claim 1, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the computing device to be locked. 26. The method of claim 1, further comprising: causing, by the client application, a notification to be transmitted to an administrative entity associated with the at least one resource. 27. The method of claim 1, further comprising: causing, by the client application, a software update to be installed on the computing device. 28. A non-transitory computer readable medium comprising executable instructions, which when executed by a processor, cause the processor to perform a method comprising: transmitting, by a client application executed by a computing device, a request to access at least one resource, the request being transmitted to a management application executed by a server system, the request being transmitted to the management application through a network connection with the computing device, the request including credentials associated with a user of the computing device and an identifier associated with the computing device, and the client application being configured to prevent access to the at least one resource by at least one additional application executed by the computing device; receiving, by the client application, the at least one resource; receiving, by the client application, at least one rule defining at least one requirement that must be satisfied for the client application to provide access to the at least one resource, the at least one rule requiring that a mobile device management module be installed on the computing device, the at least one rule further requiring that the computing device be in communication with the management application through the network connection, and the at least one rule further requiring that at least one additional computing device associated with a required entity be accessing the at least one resource; determining, by the client application, that at least a portion of the at least one rule is not satisfied; and, causing, by the client application, the at least one resource to be inaccessible by the computing device. 29. The non-transitory computer readable medium of claim 28, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the at least one resource to be erased from the computing device. 30. The non-transitory computer readable medium of claim 28, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the client application to be erased from the computing device. 31. The non-transitory computer readable medium of claim 28, wherein causing the at least one resource to be inaccessible by the computing device comprises causing a device wipe to be performed. 32. The non-transitory computer readable medium of claim 28, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the computing device to be locked. 33. The non-transitory computer readable medium of claim 28, further comprising: causing, by the client application, a notification to be transmitted to an administrative entity associated with the at least one resource. 34. The non-transitory computer readable medium of claim 1, further comprising: causing, by the client application, a software update to be installed on the computing device. 35. A system comprising: at least one processor; and a non-transitory computer-readable medium in communication with the at least one processor, wherein the at least one processor is configured to execute instructions embodied in the computer-readable medium to perform operations comprising: transmitting, by a client application executed by a computing device, a request to access at least one resource, the request being transmitted to a management application executed by a server system, the request being transmitted to the management application through a network connection with the computing device, the request including credentials associated with a user of the computing device and an identifier associated with the computing device, and the client application being configured to prevent access to the at least one resource by at least one additional application executed by the computing device; receiving, by the client application, the at least one resource; receiving, by the client application, at least one rule defining at least one requirement that must be satisfied for the client application to provide access to the at least one resource, the at least one rule requiring that a mobile device management module be installed on the computing device, the at least one rule further requiring that the computing device be in communication with the management application through the network connection, and the at least one rule further requiring that at least one additional computing device associated with a required entity be accessing the at least one resource; determining, by the client application, that at least a portion of the at least one rule is not satisfied; and, causing, by the client application, the at least one resource to be inaccessible by the computing device. 36. The system of claim 35, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the at least one resource to be erased from the computing device. 37. The system of claim 35, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the client application to be erased from the computing device. 38. The system of claim 35, wherein causing the at least one resource to be inaccessible by the computing device comprises causing a device wipe to be performed. 39. The system of claim 35, wherein causing the at least one resource to be inaccessible by the computing device comprises causing the computing device to be locked. 40. The system of claim 35, further comprising: causing, by the client application, a notification to be transmitted to an administrative entity associated with the at least one resource.
2,400
9,224
9,224
14,683,372
2,461
One embodiment provides a method, involving: identifying, using a processor, a characteristic of a network connection; identifying, using the processor, two or more bandwidth demands associated with the network connection; determining, based on the characteristic, that the two or more bandwidth demands require a bandwidth prioritization; and prioritizing, based on the determining, at least one of the two or more bandwidth demands. Other aspects are described and claimed.
1. A method, comprising: identifying, using a processor, a characteristic of a network connection; identifying, using the processor, two or more bandwidth demands associated with the network connection; determining, based on the characteristic, that the two or more bandwidth demands require a bandwidth prioritization; and prioritizing, based on the determining, at least one of the two or more bandwidth demands. 2. The method of claim 1, wherein the two or more bandwidth demands are from a single device. 3. The method of claim 1, further comprising providing a notification of an exceeded bandwidth capacity. 4. The method of claim 1, wherein the prioritizing is based on an internet protocol (IP) address of a device. 5. The method of claim 1, wherein the prioritizing is based on a media access control (MAC) address of a device. 6. The method of claim 1, wherein the prioritizing is based on an application characteristic. 7. The method of claim 1, wherein the prioritizing is based on a device characteristic. 8. The method of claim 1, wherein the prioritizing is based on a user. 9. The method of claim 1, wherein: the characteristic comprises a bandwidth capacity; and the prioritizing comprises adjusting the prioritized at least one of the two or more bandwidth demands based on the bandwidth capacity. 10. The method of claim 1, further comprising: storing usage pattern data for the network connection; wherein the prioritizing is based on the usage pattern data. 11. An information handling device, comprising: a processor; a memory device that stores instructions executable by the processor to: identify a characteristic of a network connection; identify two or more bandwidth demands associated with the network connection; determine, based on the characteristic, that the two or more bandwidth demands require a bandwidth prioritization; and prioritize, based on the determining, at least one of the two or more bandwidth demands. 12. The information handling device of claim 11, wherein the two or more bandwidth demands are from a single device. 13. The information handling device of claim 11, wherein the instructions are further executable by the process to: provide a notification of an exceeded bandwidth capacity. 14. The information handling device of claim 11, wherein the prioritizing is based on a device characteristic, wherein the characteristic comprises at least one of: an internet protocol (IP) address of a device and a media access control (MAC) address. 15. The information handling device of claim 11, wherein the prioritizing is based on an application characteristic. 16. The information handling device of claim 11, wherein the prioritizing is based on a device characteristic. 17. The information handling device of claim 11, wherein the prioritizing is based on a user. 18. The information handling device of claim 11, wherein: the characteristic comprises a bandwidth capacity; and the prioritizing comprises adjusting the prioritized at least one of the two or more bandwidth demands based on the bandwidth capacity. 19. The information handling device of claim 11, wherein the instructions are further executable by the process to: store usage pattern data for the network connection; wherein the prioritizing is based on the usage pattern data. 20. A product, comprising: a storage device having code stored therewith, the code being executable by a processor and comprising: code that identifies a characteristic of a network connection; code that identifies two or more bandwidth demands associated with the network connection; code that determines, based on the characteristic, that the two or more bandwidth demands require a bandwidth prioritization; and code that prioritizes, based on the determining, at least one of the two or more bandwidth demands.
One embodiment provides a method, involving: identifying, using a processor, a characteristic of a network connection; identifying, using the processor, two or more bandwidth demands associated with the network connection; determining, based on the characteristic, that the two or more bandwidth demands require a bandwidth prioritization; and prioritizing, based on the determining, at least one of the two or more bandwidth demands. Other aspects are described and claimed.1. A method, comprising: identifying, using a processor, a characteristic of a network connection; identifying, using the processor, two or more bandwidth demands associated with the network connection; determining, based on the characteristic, that the two or more bandwidth demands require a bandwidth prioritization; and prioritizing, based on the determining, at least one of the two or more bandwidth demands. 2. The method of claim 1, wherein the two or more bandwidth demands are from a single device. 3. The method of claim 1, further comprising providing a notification of an exceeded bandwidth capacity. 4. The method of claim 1, wherein the prioritizing is based on an internet protocol (IP) address of a device. 5. The method of claim 1, wherein the prioritizing is based on a media access control (MAC) address of a device. 6. The method of claim 1, wherein the prioritizing is based on an application characteristic. 7. The method of claim 1, wherein the prioritizing is based on a device characteristic. 8. The method of claim 1, wherein the prioritizing is based on a user. 9. The method of claim 1, wherein: the characteristic comprises a bandwidth capacity; and the prioritizing comprises adjusting the prioritized at least one of the two or more bandwidth demands based on the bandwidth capacity. 10. The method of claim 1, further comprising: storing usage pattern data for the network connection; wherein the prioritizing is based on the usage pattern data. 11. An information handling device, comprising: a processor; a memory device that stores instructions executable by the processor to: identify a characteristic of a network connection; identify two or more bandwidth demands associated with the network connection; determine, based on the characteristic, that the two or more bandwidth demands require a bandwidth prioritization; and prioritize, based on the determining, at least one of the two or more bandwidth demands. 12. The information handling device of claim 11, wherein the two or more bandwidth demands are from a single device. 13. The information handling device of claim 11, wherein the instructions are further executable by the process to: provide a notification of an exceeded bandwidth capacity. 14. The information handling device of claim 11, wherein the prioritizing is based on a device characteristic, wherein the characteristic comprises at least one of: an internet protocol (IP) address of a device and a media access control (MAC) address. 15. The information handling device of claim 11, wherein the prioritizing is based on an application characteristic. 16. The information handling device of claim 11, wherein the prioritizing is based on a device characteristic. 17. The information handling device of claim 11, wherein the prioritizing is based on a user. 18. The information handling device of claim 11, wherein: the characteristic comprises a bandwidth capacity; and the prioritizing comprises adjusting the prioritized at least one of the two or more bandwidth demands based on the bandwidth capacity. 19. The information handling device of claim 11, wherein the instructions are further executable by the process to: store usage pattern data for the network connection; wherein the prioritizing is based on the usage pattern data. 20. A product, comprising: a storage device having code stored therewith, the code being executable by a processor and comprising: code that identifies a characteristic of a network connection; code that identifies two or more bandwidth demands associated with the network connection; code that determines, based on the characteristic, that the two or more bandwidth demands require a bandwidth prioritization; and code that prioritizes, based on the determining, at least one of the two or more bandwidth demands.
2,400
9,225
9,225
14,983,450
2,414
A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network communications path of nodes through a network for the transfer of information from a first end node to a second end node; verifying the network communications path of nodes, by the first end node, before communicating by the first end node information intended for receipt by the second end node; and once the network communications path of nodes is verified by the first end node, communicating by the first end node, via the verified communications path of nodes, the information intended for receipt by the second end node; wherein the network watermark represents the verifiable network communications path of nodes.
1-49. (canceled) 50. A network authentication apparatus comprising: electronic components configured to: receive a connection-request of a first node, the connection-request initiating a connection that traverses a network path comprising a plurality of nodes, the network path ending at a second node; and authenticate, at one node in the network path, the connection-request based on a network watermark representing the network path, wherein the network path includes at least two entities. 51. The apparatus of claim 50, further comprising: a memory storing network watermark information, wherein the circuitry is configured to authenticate the received connection-request if a network watermark recorded in the received connection-request is validated based on the stored network watermark information. 52. A network authentication system comprising: a first node and a second node interconnected by a network, wherein the first node is configured to transmit a connection-request, the connection request initiating a connection that traverses a network path that ends at the second node, and the second node is configured to authenticate a received connection-request based on a network watermark representing a network path recorded in a received connection-request, wherein the network path includes at least two nodes. 53. A method for network authentication comprising: transmitting a connection-request from a first node in a network, the connection-request initiating a connection that traverses a network path that ends at a second node; and authenticating the connection-request at a particular node in the network based on a network watermark representing the network path, wherein the network path includes at least two entities. 54. The method of claim 53, wherein the particular node is the second node. 55. The method of claim 53, wherein the particular node is the first node.
A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network communications path of nodes through a network for the transfer of information from a first end node to a second end node; verifying the network communications path of nodes, by the first end node, before communicating by the first end node information intended for receipt by the second end node; and once the network communications path of nodes is verified by the first end node, communicating by the first end node, via the verified communications path of nodes, the information intended for receipt by the second end node; wherein the network watermark represents the verifiable network communications path of nodes.1-49. (canceled) 50. A network authentication apparatus comprising: electronic components configured to: receive a connection-request of a first node, the connection-request initiating a connection that traverses a network path comprising a plurality of nodes, the network path ending at a second node; and authenticate, at one node in the network path, the connection-request based on a network watermark representing the network path, wherein the network path includes at least two entities. 51. The apparatus of claim 50, further comprising: a memory storing network watermark information, wherein the circuitry is configured to authenticate the received connection-request if a network watermark recorded in the received connection-request is validated based on the stored network watermark information. 52. A network authentication system comprising: a first node and a second node interconnected by a network, wherein the first node is configured to transmit a connection-request, the connection request initiating a connection that traverses a network path that ends at the second node, and the second node is configured to authenticate a received connection-request based on a network watermark representing a network path recorded in a received connection-request, wherein the network path includes at least two nodes. 53. A method for network authentication comprising: transmitting a connection-request from a first node in a network, the connection-request initiating a connection that traverses a network path that ends at a second node; and authenticating the connection-request at a particular node in the network based on a network watermark representing the network path, wherein the network path includes at least two entities. 54. The method of claim 53, wherein the particular node is the second node. 55. The method of claim 53, wherein the particular node is the first node.
2,400
9,226
9,226
14,773,338
2,426
A multi-media presentation system includes an input subsystem operable to collect data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; a storage subsystem with a multiple of storage subsystems operable to store the data including the unassisted data input in a storage subsystem in a manner associated with a preference; and a server subsystem operable to selectively display a multi-media presentation in accordance with the preference.
1. A multi-media presentation system, comprising: an input subsystem operable to collect data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; a storage subsystem with a multiple of storage devices operable to store the data including the unassisted data input in a storage subsystem in a manner associated with a preference; and a server subsystem operable to selectively display a multi-media presentation in accordance with the preference. 2. The multi-media presentation system as recited in claim 1, wherein the preference is displayed in a manner most interesting to the viewer. 3. The multi-media presentation system as recited in claim 1, wherein the preference comprises characteristics appropriate to an advertisement strategy. 4. The multi-media presentation system as recited in claim 1, wherein the multiple of storage subsystems are arranged in a statistical paradigm with respect to a central storage subsystem. 5. The multi-media presentation system as recited in claim 1, wherein the multiple of storage subsystems are arranged in a normal distribution of a bell curve with respect to a central storage subsystem. 6. The multi-media presentation system as recited in claim 1, wherein the unassisted data input of the viewer is data collected from the viewer without the viewer providing an active input. 7. The multi-media presentation system as recited in claim 1, wherein the unassisted data input of the viewer is data collected from the environment of the viewer without the viewer providing an active input. 8. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is incorporated into a kiosk, transaction machine, vending machine, retail display, décor, mannequin, creature care system or phone system. 9. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system moves an object to engage a creature. 10. The multi-media presentation system as recited in claim 1, wherein data is also received from the viewer though an active input. 11. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is operable to dispense an item or service in addition to the multi-media presentation. 12. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is operable to communicate with at least one additional multi-media presentation system. 13. The multi-media presentation system as recited in claim 1, wherein the data is received from a remote device. 14. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to detect words or objects from a data input, to determine at least one associated word or object from the storage subsystem, to select additional data from the input subsystem that includes the at least one associated word or object, and to integrate the additional data into the presentation. 15. The multi-media presentation system as recited in claim 1, wherein the server subsystem uses statistical models to adjust the selection of data for display as the multi-media presentation in accordance with the preference. 16. The multi-media presentation system as recited in claim 1, wherein the server subsystem uses statistical models to adjust the multi-media presentation of data. 17. The multi-media presentation system as recited in claim 1, wherein the server subsystem uses statistical models to adjust the statistical models. 18. The multi-media presentation system as recited in claim 1, wherein the server subsystem refreshes the data storage when no viewer is present. 19. The multi-media presentation system as recited in claim 1, wherein the server subsystem incorporates recognition software. 20. The multi-media presentation system as recited in claim 1, wherein the server subsystem incorporates recognition software to record the relationship among separate viewers. 21. The multi-media presentation system as recited in claim 1, wherein the server subsystem incorporates recognition software to identify one of the viewers most contrary to a target presentation. 22. The multi-media presentation system as recited in claim 21, wherein the server subsystem is operable to analyze, select, record, and present data associated with the viewer most contrary to the target presentation. 23. The multi-media presentation system as recited in claim 1, wherein the server subsystem incorporates recognition software to identify one of the viewers with characteristics most appropriate to a target presentation. 24. The multi-media presentation system as recited in claim 23, wherein the server subsystem is operable to analyze, select, record, and present data associated with the viewer with characteristics most appropriate to the target presentation. 25. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to identify objects that move, move fastest, fly, occupy the greatest percentage of a field of vision, exceed a set size, or have a particular striking pattern or color. 26. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to record and retrieve a presentation as given through the responsive and creative multi-media presentation device of the multi-media presentation system. 27. The multi-media presentation system as recited in claim 26, wherein the retrieved presentation is associated with the viewer that engaged with the presentation. 28. The multi-media presentation system as recited in claim 1, wherein the viewer can select whether they can be viewed at another location through a second multi-media presentation system. 29. The multi-media presentation system as recited in claim 1, wherein the viewer can select to view another viewer at another location through a second multi-media presentation system. 30. The multi-media presentation system as recited in claim 1, wherein the input subsystem is operable to capture a vote, poll, choice or test answer or answers to further direct the server subsystem in selection, analysis, storage and presentation of data. 31. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to identify a physiological or psychological change in a viewer over time or in comparison to a group, and such identification enabling the server subsystem to adjust the selection, storage and presentation of data. 32. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to search for data that is news or otherwise has been created since a set time. 33. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to count the number of individual viewers or creatures and adjust the responsive and creative multi-media presentation in response to the count. 34. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is incorporated into a security system. 35. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is incorporated into a multi-media presentation system for a creature. 35. (canceled) 36. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is active during set time periods. 37. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is active for only a predetermined time. 38. A method to display a multi-media presentation, comprising: collecting data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; storing the data including the unassisted data input in a storage subsystem in a manner associated with a preference; and displaying a multi-media presentation in accordance with the preference. 39. The method as recited in claim 38, wherein the storage subsystem is arranged in a statistical distribution with respect to a central storage subsystem and secondary storage, and to include the normal distribution of a bell curve, a skewed distribution, or a bimodal distribution. 40. The method as recited in claim 38, wherein collecting the unassisted data input includes the most striking pattern, color or object within the natural, unaided sensing range of the viewer. 41. The method as recited in claim 38, wherein collecting the unassisted data input includes the most striking pattern, color or object of the viewer. 42. The method as recited in claim 38, wherein collecting the unassisted data input includes identifying a physiological or psychological change in an viewer over time 43. The method as recited in claim 38, wherein collecting the unassisted data input includes searching for data that is news or otherwise has been created since a set time. 44. The method as recited in claim 38, wherein the preference is associated with an advertisement strategy. 45. The method as recited in claim 38, further comprising remote monitoring of at least one additional multi-media presentation system for integration into the multi-media presentation system in real time with the presentation. 46. The method as recited in claim 38, further comprising integrating a presentation prepared from a previous time period. 47. The method as recited in claim 38, further comprising integration of inputs from a previous time period or a presentation prepared from a previous time period utilizing the preferences of a viewer who was not present at the previous time period. 48. A multi-media presentation system, comprising: an input subsystem operable to collect data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; and a storage subsystem with a multiple of storage devices operable to store the data including the unassisted data input in a multiple of storage devices in a manner associated with a preference, the multiple of storage devices arranged in a statistical distribution with respect to a central storage subsystem. 49. The multi-media presentation system as recited in claim 48, further comprising a server subsystem operable to selectively display a multi-media presentation on a display in accordance with the preference. 50. The multi-media presentation system as recited in claim 48, wherein the preference is displayed in a manner most interesting to the viewer. 51. The multi-media presentation system as recited in claim 48, wherein the unassisted data input of the viewer refers to data collected from the viewer without the viewer providing an active input. 52. The multi-media presentation system as recited in claim 48, wherein the multiple of storage subsystems contain segregated data to correspond to predetermined standard deviations of data. 53. The multi-media presentation system as recited in claim 48, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if not statistically different, then the data is stored in the central storage subsystem. 54. The multi-media presentation system as recited in claim 48, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if statistically different, then the data is stored in one of the multiple of storage subsystems. 55. The multi-media presentation system as recited in claim 48, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if the new data and the preference is less than one standard deviation according to a basic bell curve distribution, then the file is stored into the central storage subsystem. 56. The multi-media presentation system as recited in claim 48, wherein when new data is encountered, the data is compared to data files previously stored in the storage subsystem to which it is being assigned, and if the new data file is statistically similar to data files already stored then the new data file is tabulated and discarded, or if the new data file would represent an average such as mode, mean or median within that data set or the boundary in terms of the most or least representative of the data set but still within the data set then the new file is retained and other recorded data files there are discarded and only the tabulation retained. 57. The multi-media presentation system as recited in claim 48, wherein as new data is encountered, the data is compared to the statistical distribution and assigned to one of the multiple of storage subsystems according to the comparison. 58. The multi-media presentation system as recited in claim 57, wherein new files identified to be closer to a center of a statistical distribution within one of the multiple of storage subsystems are retained and the prior file is discarded except for the tabulation, the tabulations serving to adjust the statistical distribution. 59. The multi-media presentation system as recited in claim 48, wherein the normal distribution is a bell curve distribution. 60. A method to display a multi-media presentation, comprising: collecting data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; storing the data including the unassisted data input in a storage subsystem in a manner associated with a preference, the multiple of storage devices arranged in a normal distribution of a bell curve with respect to a central storage subsystem; and displaying a multi-media presentation in accordance with the preference. 61. The method as recited in claim 60, wherein the storage subsystem is arranged in a normal distribution of a bell curve with respect to a central storage subsystem. 62. The method as recited in claim 60, wherein collecting the unassisted data input includes the most striking pattern, color or object within the natural, unaided sensing range of the viewer. 63. The method as recited in claim 60, further comprising segregating data to correspond to a predetermined standard deviation of data associated with the preference. 64. The method as recited in claim 63, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if not statistically different, then the data is stored in the central storage subsystem. 65. The method as recited in claim 63, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if statistically different, then the data is stored in one of the multiple of storage subsystems. 66. The method as recited in claim 60, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if the new data and the preference are less than one standard deviation according to a basic bell curve distribution, then the file is tabulated into the central storage subsystem but not retained. 67. The method as recited in claim 60, wherein as new data is encountered, the data is compared to the preference in the central storage subsystem, and if the new data is determined to be less on a critical dimension by more than one standard deviation but within two standard deviations, then the rating is assigned to the file and stored to one of the multiple of storage subsystems, the one of the multiple of storage subsystems a first standard deviation storage subsystem. 68. The method as recited in claim 60, wherein when new files are identified to be closer to a center of this standard deviation, then the new files are retained and the prior file is discarded except for the tabulation which serves to adjust the statistical distribution. 69. The method as recited in claim 60, further comprising storing data to a backup storage subsystem to store and synthesize data, while defragmenting or otherwise optimizing the central storage subsystem. 70. A multi-media presentation system, comprising: a storage subsystem with a multiple of storage devices operable to store data including an unassisted data input in a manner associated with a preference; and a server subsystem operable to selectively display the multi-media presentation on a display in accordance with the preference. 71. The multi-media presentation system as recited in claim 70, further comprising an input subsystem operable to collect data including an unassisted data input of a viewer; 72. The multi-media presentation system as recited in claim 71, wherein the unassisted data input of the viewer refers to data collected from the viewer without the viewer providing an active input. 73. The multi-media presentation system as recited in claim 70, wherein the multiple of storage subsystems are arranged in a normal distribution of a bell curve with respect to a central storage subsystem. 74. The multi-media presentation system as recited in claim 70, wherein the multi-media presentation system is one of a multiple of multi-media presentation systems. 75. A multi-media presentation device, comprising: an input device operable to collect data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; a multiple of storage devices operable to store the data including the unassisted data input in a storage subsystem in a manner associated with a preference; a server operable to selectively output stimuli in accordance with the preference; and an output device providing stimuli perceptible to a viewer. 76. Hardware to present stimuli perceptible to a viewing human or creature, comprising: input sensors operable to collect data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; a multiple of storage devices operable to store the data including the unassisted data input in a manner associated with a preference; software to selectively output stimuli in accordance with the preference; and output devices projecting stimuli perceptible to a viewer. 77. The multi-media presentation system as recited in claim 1, wherein the storage subsystem includes data, archetypes or an organization scheme provided by an administrator or provider of the system. 78. The multi-media presentation system as recited in claim 1, wherein the input subsystem includes a control panel where an administrator, provider or a viewer can enter data or organization or can indicate preference or can select favored objects or stimuli. 79. The multi-media presentation system as recited in claim 1, wherein the system is incorporated with timing devices or alarms or incorporated into a household appliance or manufacturing machinery. 80. The multi-media presentation system as recited in claim 1, wherein the system is administered, controlled, adjusted or monitored through the internet, communication media or remote connection. 81. The multi-media presentation system as recited in claim 1, wherein the input subsystem further includes a proximity sensor or interrupt device to begin or adjust a routine, to identify a target object, viewer or relationship of a viewer, or to select or determine a preference. 82. The method as recited in claim 38, wherein the unassisted data input of a viewer is compared to a standard, to another viewer or to a data input over time to facilitate teaching, expertise, direction, indication or analysis. 83. The multi-media presentation system as recited in claim 13, wherein the server subsystem is operable to detect words or objects from a data input, to determine associated words or objects from the storage subsystem, to select additional data from the remote device that includes the associated word or object, and to integrate the additional data into the presentation.
A multi-media presentation system includes an input subsystem operable to collect data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; a storage subsystem with a multiple of storage subsystems operable to store the data including the unassisted data input in a storage subsystem in a manner associated with a preference; and a server subsystem operable to selectively display a multi-media presentation in accordance with the preference.1. A multi-media presentation system, comprising: an input subsystem operable to collect data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; a storage subsystem with a multiple of storage devices operable to store the data including the unassisted data input in a storage subsystem in a manner associated with a preference; and a server subsystem operable to selectively display a multi-media presentation in accordance with the preference. 2. The multi-media presentation system as recited in claim 1, wherein the preference is displayed in a manner most interesting to the viewer. 3. The multi-media presentation system as recited in claim 1, wherein the preference comprises characteristics appropriate to an advertisement strategy. 4. The multi-media presentation system as recited in claim 1, wherein the multiple of storage subsystems are arranged in a statistical paradigm with respect to a central storage subsystem. 5. The multi-media presentation system as recited in claim 1, wherein the multiple of storage subsystems are arranged in a normal distribution of a bell curve with respect to a central storage subsystem. 6. The multi-media presentation system as recited in claim 1, wherein the unassisted data input of the viewer is data collected from the viewer without the viewer providing an active input. 7. The multi-media presentation system as recited in claim 1, wherein the unassisted data input of the viewer is data collected from the environment of the viewer without the viewer providing an active input. 8. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is incorporated into a kiosk, transaction machine, vending machine, retail display, décor, mannequin, creature care system or phone system. 9. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system moves an object to engage a creature. 10. The multi-media presentation system as recited in claim 1, wherein data is also received from the viewer though an active input. 11. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is operable to dispense an item or service in addition to the multi-media presentation. 12. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is operable to communicate with at least one additional multi-media presentation system. 13. The multi-media presentation system as recited in claim 1, wherein the data is received from a remote device. 14. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to detect words or objects from a data input, to determine at least one associated word or object from the storage subsystem, to select additional data from the input subsystem that includes the at least one associated word or object, and to integrate the additional data into the presentation. 15. The multi-media presentation system as recited in claim 1, wherein the server subsystem uses statistical models to adjust the selection of data for display as the multi-media presentation in accordance with the preference. 16. The multi-media presentation system as recited in claim 1, wherein the server subsystem uses statistical models to adjust the multi-media presentation of data. 17. The multi-media presentation system as recited in claim 1, wherein the server subsystem uses statistical models to adjust the statistical models. 18. The multi-media presentation system as recited in claim 1, wherein the server subsystem refreshes the data storage when no viewer is present. 19. The multi-media presentation system as recited in claim 1, wherein the server subsystem incorporates recognition software. 20. The multi-media presentation system as recited in claim 1, wherein the server subsystem incorporates recognition software to record the relationship among separate viewers. 21. The multi-media presentation system as recited in claim 1, wherein the server subsystem incorporates recognition software to identify one of the viewers most contrary to a target presentation. 22. The multi-media presentation system as recited in claim 21, wherein the server subsystem is operable to analyze, select, record, and present data associated with the viewer most contrary to the target presentation. 23. The multi-media presentation system as recited in claim 1, wherein the server subsystem incorporates recognition software to identify one of the viewers with characteristics most appropriate to a target presentation. 24. The multi-media presentation system as recited in claim 23, wherein the server subsystem is operable to analyze, select, record, and present data associated with the viewer with characteristics most appropriate to the target presentation. 25. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to identify objects that move, move fastest, fly, occupy the greatest percentage of a field of vision, exceed a set size, or have a particular striking pattern or color. 26. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to record and retrieve a presentation as given through the responsive and creative multi-media presentation device of the multi-media presentation system. 27. The multi-media presentation system as recited in claim 26, wherein the retrieved presentation is associated with the viewer that engaged with the presentation. 28. The multi-media presentation system as recited in claim 1, wherein the viewer can select whether they can be viewed at another location through a second multi-media presentation system. 29. The multi-media presentation system as recited in claim 1, wherein the viewer can select to view another viewer at another location through a second multi-media presentation system. 30. The multi-media presentation system as recited in claim 1, wherein the input subsystem is operable to capture a vote, poll, choice or test answer or answers to further direct the server subsystem in selection, analysis, storage and presentation of data. 31. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to identify a physiological or psychological change in a viewer over time or in comparison to a group, and such identification enabling the server subsystem to adjust the selection, storage and presentation of data. 32. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to search for data that is news or otherwise has been created since a set time. 33. The multi-media presentation system as recited in claim 1, wherein the server subsystem is operable to count the number of individual viewers or creatures and adjust the responsive and creative multi-media presentation in response to the count. 34. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is incorporated into a security system. 35. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is incorporated into a multi-media presentation system for a creature. 35. (canceled) 36. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is active during set time periods. 37. The multi-media presentation system as recited in claim 1, wherein the multi-media presentation system is active for only a predetermined time. 38. A method to display a multi-media presentation, comprising: collecting data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; storing the data including the unassisted data input in a storage subsystem in a manner associated with a preference; and displaying a multi-media presentation in accordance with the preference. 39. The method as recited in claim 38, wherein the storage subsystem is arranged in a statistical distribution with respect to a central storage subsystem and secondary storage, and to include the normal distribution of a bell curve, a skewed distribution, or a bimodal distribution. 40. The method as recited in claim 38, wherein collecting the unassisted data input includes the most striking pattern, color or object within the natural, unaided sensing range of the viewer. 41. The method as recited in claim 38, wherein collecting the unassisted data input includes the most striking pattern, color or object of the viewer. 42. The method as recited in claim 38, wherein collecting the unassisted data input includes identifying a physiological or psychological change in an viewer over time 43. The method as recited in claim 38, wherein collecting the unassisted data input includes searching for data that is news or otherwise has been created since a set time. 44. The method as recited in claim 38, wherein the preference is associated with an advertisement strategy. 45. The method as recited in claim 38, further comprising remote monitoring of at least one additional multi-media presentation system for integration into the multi-media presentation system in real time with the presentation. 46. The method as recited in claim 38, further comprising integrating a presentation prepared from a previous time period. 47. The method as recited in claim 38, further comprising integration of inputs from a previous time period or a presentation prepared from a previous time period utilizing the preferences of a viewer who was not present at the previous time period. 48. A multi-media presentation system, comprising: an input subsystem operable to collect data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; and a storage subsystem with a multiple of storage devices operable to store the data including the unassisted data input in a multiple of storage devices in a manner associated with a preference, the multiple of storage devices arranged in a statistical distribution with respect to a central storage subsystem. 49. The multi-media presentation system as recited in claim 48, further comprising a server subsystem operable to selectively display a multi-media presentation on a display in accordance with the preference. 50. The multi-media presentation system as recited in claim 48, wherein the preference is displayed in a manner most interesting to the viewer. 51. The multi-media presentation system as recited in claim 48, wherein the unassisted data input of the viewer refers to data collected from the viewer without the viewer providing an active input. 52. The multi-media presentation system as recited in claim 48, wherein the multiple of storage subsystems contain segregated data to correspond to predetermined standard deviations of data. 53. The multi-media presentation system as recited in claim 48, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if not statistically different, then the data is stored in the central storage subsystem. 54. The multi-media presentation system as recited in claim 48, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if statistically different, then the data is stored in one of the multiple of storage subsystems. 55. The multi-media presentation system as recited in claim 48, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if the new data and the preference is less than one standard deviation according to a basic bell curve distribution, then the file is stored into the central storage subsystem. 56. The multi-media presentation system as recited in claim 48, wherein when new data is encountered, the data is compared to data files previously stored in the storage subsystem to which it is being assigned, and if the new data file is statistically similar to data files already stored then the new data file is tabulated and discarded, or if the new data file would represent an average such as mode, mean or median within that data set or the boundary in terms of the most or least representative of the data set but still within the data set then the new file is retained and other recorded data files there are discarded and only the tabulation retained. 57. The multi-media presentation system as recited in claim 48, wherein as new data is encountered, the data is compared to the statistical distribution and assigned to one of the multiple of storage subsystems according to the comparison. 58. The multi-media presentation system as recited in claim 57, wherein new files identified to be closer to a center of a statistical distribution within one of the multiple of storage subsystems are retained and the prior file is discarded except for the tabulation, the tabulations serving to adjust the statistical distribution. 59. The multi-media presentation system as recited in claim 48, wherein the normal distribution is a bell curve distribution. 60. A method to display a multi-media presentation, comprising: collecting data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; storing the data including the unassisted data input in a storage subsystem in a manner associated with a preference, the multiple of storage devices arranged in a normal distribution of a bell curve with respect to a central storage subsystem; and displaying a multi-media presentation in accordance with the preference. 61. The method as recited in claim 60, wherein the storage subsystem is arranged in a normal distribution of a bell curve with respect to a central storage subsystem. 62. The method as recited in claim 60, wherein collecting the unassisted data input includes the most striking pattern, color or object within the natural, unaided sensing range of the viewer. 63. The method as recited in claim 60, further comprising segregating data to correspond to a predetermined standard deviation of data associated with the preference. 64. The method as recited in claim 63, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if not statistically different, then the data is stored in the central storage subsystem. 65. The method as recited in claim 63, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if statistically different, then the data is stored in one of the multiple of storage subsystems. 66. The method as recited in claim 60, wherein as new data is encountered, the data is compared to preferences in the central storage subsystem, and if the new data and the preference are less than one standard deviation according to a basic bell curve distribution, then the file is tabulated into the central storage subsystem but not retained. 67. The method as recited in claim 60, wherein as new data is encountered, the data is compared to the preference in the central storage subsystem, and if the new data is determined to be less on a critical dimension by more than one standard deviation but within two standard deviations, then the rating is assigned to the file and stored to one of the multiple of storage subsystems, the one of the multiple of storage subsystems a first standard deviation storage subsystem. 68. The method as recited in claim 60, wherein when new files are identified to be closer to a center of this standard deviation, then the new files are retained and the prior file is discarded except for the tabulation which serves to adjust the statistical distribution. 69. The method as recited in claim 60, further comprising storing data to a backup storage subsystem to store and synthesize data, while defragmenting or otherwise optimizing the central storage subsystem. 70. A multi-media presentation system, comprising: a storage subsystem with a multiple of storage devices operable to store data including an unassisted data input in a manner associated with a preference; and a server subsystem operable to selectively display the multi-media presentation on a display in accordance with the preference. 71. The multi-media presentation system as recited in claim 70, further comprising an input subsystem operable to collect data including an unassisted data input of a viewer; 72. The multi-media presentation system as recited in claim 71, wherein the unassisted data input of the viewer refers to data collected from the viewer without the viewer providing an active input. 73. The multi-media presentation system as recited in claim 70, wherein the multiple of storage subsystems are arranged in a normal distribution of a bell curve with respect to a central storage subsystem. 74. The multi-media presentation system as recited in claim 70, wherein the multi-media presentation system is one of a multiple of multi-media presentation systems. 75. A multi-media presentation device, comprising: an input device operable to collect data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; a multiple of storage devices operable to store the data including the unassisted data input in a storage subsystem in a manner associated with a preference; a server operable to selectively output stimuli in accordance with the preference; and an output device providing stimuli perceptible to a viewer. 76. Hardware to present stimuli perceptible to a viewing human or creature, comprising: input sensors operable to collect data including an unassisted data input of a viewer from within a natural, unaided sensing range of the viewer; a multiple of storage devices operable to store the data including the unassisted data input in a manner associated with a preference; software to selectively output stimuli in accordance with the preference; and output devices projecting stimuli perceptible to a viewer. 77. The multi-media presentation system as recited in claim 1, wherein the storage subsystem includes data, archetypes or an organization scheme provided by an administrator or provider of the system. 78. The multi-media presentation system as recited in claim 1, wherein the input subsystem includes a control panel where an administrator, provider or a viewer can enter data or organization or can indicate preference or can select favored objects or stimuli. 79. The multi-media presentation system as recited in claim 1, wherein the system is incorporated with timing devices or alarms or incorporated into a household appliance or manufacturing machinery. 80. The multi-media presentation system as recited in claim 1, wherein the system is administered, controlled, adjusted or monitored through the internet, communication media or remote connection. 81. The multi-media presentation system as recited in claim 1, wherein the input subsystem further includes a proximity sensor or interrupt device to begin or adjust a routine, to identify a target object, viewer or relationship of a viewer, or to select or determine a preference. 82. The method as recited in claim 38, wherein the unassisted data input of a viewer is compared to a standard, to another viewer or to a data input over time to facilitate teaching, expertise, direction, indication or analysis. 83. The multi-media presentation system as recited in claim 13, wherein the server subsystem is operable to detect words or objects from a data input, to determine associated words or objects from the storage subsystem, to select additional data from the remote device that includes the associated word or object, and to integrate the additional data into the presentation.
2,400
9,227
9,227
15,559,133
2,468
Various communication systems may benefit from the appropriate aggregation of multiple radio access technologies. For example, certain communication systems may benefit from optimized signaling for wireless local area network and third generation partnership projection aggregation. A method can include determining, by a network element, which parameters according to a first standard are also applicable according to a second standard for aggregation and/or interworking. The method can also include indicating the determined parameters to a user equipment.
1-41. (canceled) 42. A method, comprising: receiving a traffic steering command at a user equipment; and changing, responsive to receiving the command, at least one rule or parameter by which the user equipment operates with a radio access network. 43. The method of claim 42, wherein the changing comprises disabling a first standard behavior in favor of a second standard behavior when the traffic steering command is received. 44. The method of claim 42, wherein the at least one rule or parameter is applicable for an interworking mechanism. 45. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to receive a traffic steering command at a user equipment; and change, responsive to receiving the command, at least one rule or parameter by which the user equipment operates with a radio access network. 46. The apparatus of claim 45, wherein for changing the at least one rule or parameter, the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus to disable a first standard behavior in favor of a second standard behavior when the traffic steering command is received. 47. The apparatus of claim 45, wherein the at least one rule or parameter is applicable for an interworking mechanism. 48. A computer program product comprising a non-transitory computer-readable medium bearing computer program code embodied therein for use with a computer, the computer program code comprising code for receiving a traffic steering command at a user equipment; and code for changing, responsive to receiving the command, at least one rule or parameter by which the user equipment operates with a radio access network. 49. The computer program product of claim 48, wherein the code for changing the at least one rule or parameter, comprising code for disabling a first standard behavior in favor of a second standard behavior when the traffic steering command is received. 50. The computer program product of claim 48, wherein the at least one rule or parameter is applicable for an interworking mechanism.
Various communication systems may benefit from the appropriate aggregation of multiple radio access technologies. For example, certain communication systems may benefit from optimized signaling for wireless local area network and third generation partnership projection aggregation. A method can include determining, by a network element, which parameters according to a first standard are also applicable according to a second standard for aggregation and/or interworking. The method can also include indicating the determined parameters to a user equipment.1-41. (canceled) 42. A method, comprising: receiving a traffic steering command at a user equipment; and changing, responsive to receiving the command, at least one rule or parameter by which the user equipment operates with a radio access network. 43. The method of claim 42, wherein the changing comprises disabling a first standard behavior in favor of a second standard behavior when the traffic steering command is received. 44. The method of claim 42, wherein the at least one rule or parameter is applicable for an interworking mechanism. 45. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to receive a traffic steering command at a user equipment; and change, responsive to receiving the command, at least one rule or parameter by which the user equipment operates with a radio access network. 46. The apparatus of claim 45, wherein for changing the at least one rule or parameter, the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus to disable a first standard behavior in favor of a second standard behavior when the traffic steering command is received. 47. The apparatus of claim 45, wherein the at least one rule or parameter is applicable for an interworking mechanism. 48. A computer program product comprising a non-transitory computer-readable medium bearing computer program code embodied therein for use with a computer, the computer program code comprising code for receiving a traffic steering command at a user equipment; and code for changing, responsive to receiving the command, at least one rule or parameter by which the user equipment operates with a radio access network. 49. The computer program product of claim 48, wherein the code for changing the at least one rule or parameter, comprising code for disabling a first standard behavior in favor of a second standard behavior when the traffic steering command is received. 50. The computer program product of claim 48, wherein the at least one rule or parameter is applicable for an interworking mechanism.
2,400
9,228
9,228
16,032,226
2,468
One or more endpoints may be registered with a gateway at a premises. The gateway may include local physical interfaces for communicating with a first subset of the endpoints. The gateway may further include Session Initiation Protocol (SIP) proxy servers for communicating with a second subset of the endpoints. Incoming communications to the premises may be routed by the gateway to one or more of the endpoints via the local physical interfaces or the SIP proxy servers. One or more endpoints may initiate outgoing communications via the local physical interfaces or the SIP proxy servers.
1. A method comprising: receiving, by a computing device, a communication request associated with an incoming communication session and for a destination telephone number; determining, based on the destination telephone number and configuration information, whether data associated with the communication request is to be routed to a first device or a second device, wherein the configuration information indicates at least a first telephone number associated with the first device and a second telephone number associated with the second device, wherein the first device is registered with the computing device via a first interface that is associated with a Session Initiation Protocol (SIP), and wherein the second device is registered with the computing device via a second interface that is associated with a telecommunication protocol; and routing, based on the determining and to the first device or to the second device, the data associated with the communication request.
One or more endpoints may be registered with a gateway at a premises. The gateway may include local physical interfaces for communicating with a first subset of the endpoints. The gateway may further include Session Initiation Protocol (SIP) proxy servers for communicating with a second subset of the endpoints. Incoming communications to the premises may be routed by the gateway to one or more of the endpoints via the local physical interfaces or the SIP proxy servers. One or more endpoints may initiate outgoing communications via the local physical interfaces or the SIP proxy servers.1. A method comprising: receiving, by a computing device, a communication request associated with an incoming communication session and for a destination telephone number; determining, based on the destination telephone number and configuration information, whether data associated with the communication request is to be routed to a first device or a second device, wherein the configuration information indicates at least a first telephone number associated with the first device and a second telephone number associated with the second device, wherein the first device is registered with the computing device via a first interface that is associated with a Session Initiation Protocol (SIP), and wherein the second device is registered with the computing device via a second interface that is associated with a telecommunication protocol; and routing, based on the determining and to the first device or to the second device, the data associated with the communication request.
2,400
9,229
9,229
15,664,869
2,424
In some examples, an example method to provide a virtualized Carrier-grade Network Address Translation (CGN) at a first customer edge router may include establishing a tunnel between the first customer edge router and each aggregation router among one or more aggregation routers, performing a Network Address Translation (NAT) on a first data packet to create a NAT'ed first data packet, selecting a first aggregation router from amongst the one or more aggregation routers to send the NAT'ed first data packet to, encapsulating the NAT'ed first data packet with overlay information corresponding to a tunnel established between the first customer edge router and a first aggregation router, and sending the encapsulated NAT'ed first data packet through the tunnel to the first aggregation router.
1. A method to provide address translation at a first customer edge router, the first customer edge router being one of a plurality of customer edge routers, the method comprising: establishing, by the first customer edge router, a tunnel between the first customer edge router and each aggregation router among one or more aggregation routers; performing, by the first customer edge router, a Network Address Translation (NAT) on a first data packet to create a NAT'ed first data packet, the NAT being a translation of a private IP address to a public IP address; selecting, by the first customer edge router, a first aggregation router from amongst the one or more aggregation routers to send the NAT'ed first data packet to; encapsulating, by the first customer edge router, the NAT'ed first data packet with overlay information corresponding to a tunnel established between the first customer edge router and the first aggregation router; and sending, by the first customer edge router, the encapsulated NAT'ed first data packet through the tunnel to the first aggregation router. 2. The method of claim 1, wherein the public IP address is a device address of the first customer edge router. 3. The method of claim 2, wherein the device address is an individual IP address in a functional IP address space of the first aggregation router. 4. The method of claim 1, wherein the first customer edge router and the first aggregation router are provided by a first carrier, and the tunnel between the first customer edge router and the first aggregation router is established using a network circuit provided by the first carrier. 5. The method of claim 1, wherein the first customer edge router and the first aggregation router are provided by a first carrier, and the tunnel between the first customer edge router and the first aggregation router is established using a network circuit provided by a second carrier. 6. The method of claim 1, further comprising maintaining, by the first customer edge router, a record of the NAT from the private IP address to the public IP address. 7. The method of claim 1, wherein the overlay information includes an overlay header, the overlay header including a port address of the first customer edge router and a port address of the first aggregation router used to establish the tunnel between the first customer edge router and the first aggregation router. 8. The method of claim 1, further comprising: receiving, by the first customer edge router, a second data packet through the tunnel established between the first customer edge router and the first aggregation router; removing, by the first customer edge router, overlay information from the second data packet to create a de-encapsulated second data packet; performing, by the first customer edge router, a reverse NAT on the de-encapsulated second data packet; and forwarding the reverse NAT'ed de-encapsulated second data packet for delivery to a destination address specified in the reverse NAT'ed de-encapsulated second data packet. 9. A customer edge router configured to provide address translation, the customer edge router being one of a plurality of customer edge routers, the customer edge router comprising: a memory configured to store instructions; and a processor configured to execute the instructions, wherein execution of the instructions causes the processor to: establish an overlay network between the customer edge router and one or more aggregation routers, the overlay network including a respective tunnel between the customer edge router and each of the one or more aggregation routers; perform a Network Address Translation (NAT) on a first data packet to create a NAT'ed first data packet, the NAT being a translation of a private IP address to a public IP address; select an appropriate tunnel through which to send the NAT'ed first data packet; encapsulate the NAT'ed first data packet with overlay information corresponding to the selected tunnel; and send the encapsulated NAT'ed first data packet through the selected tunnel. 10. The customer edge router of claim 10, wherein the public IP address is a device address of the customer edge router. 11. The customer edge router of claim 11, wherein the device address is an individual IP address in a functional IP address space of the one or more aggregation routers. 12. The customer edge router of claim 10, wherein the customer edge router and the one or more aggregation routers are provided by a first carrier, and the respective tunnel between the customer edge router and each of the one or more aggregation routers is established using a network circuit provided by the first carrier. 13. The customer edge router of claim 10, wherein the customer edge router and the one or more aggregation routers are provided by a first carrier, and at least one tunnel of the respective tunnel between the customer edge router and each of the one or more aggregation routers is established using a network circuit provided by a second carrier. 14. The customer edge router of claim 10, wherein the overlay information includes an overlay header, the overlay header including a port address of the customer edge router and a port address of an aggregation router with which the tunnel is established. 15. The customer edge router of claim 10, wherein execution of the instructions causes the processor to: receive a second data packet through the selected tunnel; remove overlay information from the second data packet to create a de-encapsulated second data packet; perform a reverse NAT on the de-encapsulated second data packet; and forward the reverse NAT'ed de-encapsulated second data packet for delivery to a destination address specified in the reverse NAT'ed de-encapsulated second data packet. 16. A non-transitory computer-readable storage media storing thereon instructions that, in response to execution by a processor of a customer edge router, causes the processor to: establish an overlay network between the customer edge router and one or more aggregation routers, the overlay network including a respective tunnel between the customer edge router and each of the one or more aggregation routers; perform a Network Address Translation (NAT) on a first data packet to create a NAT'ed first data packet, the NAT being a translation of a private IP address to a public IP address; select an appropriate tunnel through which to send the NAT'ed first data packet; encapsulate the NAT'ed first data packet with overlay information corresponding to the selected tunnel; and send the encapsulated NAT'ed first data packet through the selected tunnel. 17. The non-transitory computer-readable storage media of claim 16, wherein the public IP address is a device address of the customer edge router, the device address being an individual IP address in a functional IP address space of the one or more aggregation routers. 18. The non-transitory computer-readable storage media of claim 16, wherein the customer edge router and the one or more aggregation routers are provided by a first carrier, and the respective tunnel between the customer edge router and each of the one or more aggregation routers is established using a network circuit provided by the first carrier. 19. The non-transitory computer-readable storage media of claim 16, wherein the customer edge router and the one or more aggregation routers are provided by a first carrier, and at least one tunnel of the respective tunnel between the customer edge router and each of the one or more aggregation routers is established using a network circuit provided by a second carrier. 20. The non-transitory computer-readable storage media of claim 16, further storing thereon instructions that, in response to execution by the processor, causes the processor to: receive a second data packet through the selected tunnel; remove overlay information from the second data packet to create a de-encapsulated second data packet; perform a reverse NAT on the de-encapsulated second data packet; and forward the reverse NAT'ed de-encapsulated second data packet for delivery to a destination address specified in the reverse NAT'ed de-encapsulated second data packet.
In some examples, an example method to provide a virtualized Carrier-grade Network Address Translation (CGN) at a first customer edge router may include establishing a tunnel between the first customer edge router and each aggregation router among one or more aggregation routers, performing a Network Address Translation (NAT) on a first data packet to create a NAT'ed first data packet, selecting a first aggregation router from amongst the one or more aggregation routers to send the NAT'ed first data packet to, encapsulating the NAT'ed first data packet with overlay information corresponding to a tunnel established between the first customer edge router and a first aggregation router, and sending the encapsulated NAT'ed first data packet through the tunnel to the first aggregation router.1. A method to provide address translation at a first customer edge router, the first customer edge router being one of a plurality of customer edge routers, the method comprising: establishing, by the first customer edge router, a tunnel between the first customer edge router and each aggregation router among one or more aggregation routers; performing, by the first customer edge router, a Network Address Translation (NAT) on a first data packet to create a NAT'ed first data packet, the NAT being a translation of a private IP address to a public IP address; selecting, by the first customer edge router, a first aggregation router from amongst the one or more aggregation routers to send the NAT'ed first data packet to; encapsulating, by the first customer edge router, the NAT'ed first data packet with overlay information corresponding to a tunnel established between the first customer edge router and the first aggregation router; and sending, by the first customer edge router, the encapsulated NAT'ed first data packet through the tunnel to the first aggregation router. 2. The method of claim 1, wherein the public IP address is a device address of the first customer edge router. 3. The method of claim 2, wherein the device address is an individual IP address in a functional IP address space of the first aggregation router. 4. The method of claim 1, wherein the first customer edge router and the first aggregation router are provided by a first carrier, and the tunnel between the first customer edge router and the first aggregation router is established using a network circuit provided by the first carrier. 5. The method of claim 1, wherein the first customer edge router and the first aggregation router are provided by a first carrier, and the tunnel between the first customer edge router and the first aggregation router is established using a network circuit provided by a second carrier. 6. The method of claim 1, further comprising maintaining, by the first customer edge router, a record of the NAT from the private IP address to the public IP address. 7. The method of claim 1, wherein the overlay information includes an overlay header, the overlay header including a port address of the first customer edge router and a port address of the first aggregation router used to establish the tunnel between the first customer edge router and the first aggregation router. 8. The method of claim 1, further comprising: receiving, by the first customer edge router, a second data packet through the tunnel established between the first customer edge router and the first aggregation router; removing, by the first customer edge router, overlay information from the second data packet to create a de-encapsulated second data packet; performing, by the first customer edge router, a reverse NAT on the de-encapsulated second data packet; and forwarding the reverse NAT'ed de-encapsulated second data packet for delivery to a destination address specified in the reverse NAT'ed de-encapsulated second data packet. 9. A customer edge router configured to provide address translation, the customer edge router being one of a plurality of customer edge routers, the customer edge router comprising: a memory configured to store instructions; and a processor configured to execute the instructions, wherein execution of the instructions causes the processor to: establish an overlay network between the customer edge router and one or more aggregation routers, the overlay network including a respective tunnel between the customer edge router and each of the one or more aggregation routers; perform a Network Address Translation (NAT) on a first data packet to create a NAT'ed first data packet, the NAT being a translation of a private IP address to a public IP address; select an appropriate tunnel through which to send the NAT'ed first data packet; encapsulate the NAT'ed first data packet with overlay information corresponding to the selected tunnel; and send the encapsulated NAT'ed first data packet through the selected tunnel. 10. The customer edge router of claim 10, wherein the public IP address is a device address of the customer edge router. 11. The customer edge router of claim 11, wherein the device address is an individual IP address in a functional IP address space of the one or more aggregation routers. 12. The customer edge router of claim 10, wherein the customer edge router and the one or more aggregation routers are provided by a first carrier, and the respective tunnel between the customer edge router and each of the one or more aggregation routers is established using a network circuit provided by the first carrier. 13. The customer edge router of claim 10, wherein the customer edge router and the one or more aggregation routers are provided by a first carrier, and at least one tunnel of the respective tunnel between the customer edge router and each of the one or more aggregation routers is established using a network circuit provided by a second carrier. 14. The customer edge router of claim 10, wherein the overlay information includes an overlay header, the overlay header including a port address of the customer edge router and a port address of an aggregation router with which the tunnel is established. 15. The customer edge router of claim 10, wherein execution of the instructions causes the processor to: receive a second data packet through the selected tunnel; remove overlay information from the second data packet to create a de-encapsulated second data packet; perform a reverse NAT on the de-encapsulated second data packet; and forward the reverse NAT'ed de-encapsulated second data packet for delivery to a destination address specified in the reverse NAT'ed de-encapsulated second data packet. 16. A non-transitory computer-readable storage media storing thereon instructions that, in response to execution by a processor of a customer edge router, causes the processor to: establish an overlay network between the customer edge router and one or more aggregation routers, the overlay network including a respective tunnel between the customer edge router and each of the one or more aggregation routers; perform a Network Address Translation (NAT) on a first data packet to create a NAT'ed first data packet, the NAT being a translation of a private IP address to a public IP address; select an appropriate tunnel through which to send the NAT'ed first data packet; encapsulate the NAT'ed first data packet with overlay information corresponding to the selected tunnel; and send the encapsulated NAT'ed first data packet through the selected tunnel. 17. The non-transitory computer-readable storage media of claim 16, wherein the public IP address is a device address of the customer edge router, the device address being an individual IP address in a functional IP address space of the one or more aggregation routers. 18. The non-transitory computer-readable storage media of claim 16, wherein the customer edge router and the one or more aggregation routers are provided by a first carrier, and the respective tunnel between the customer edge router and each of the one or more aggregation routers is established using a network circuit provided by the first carrier. 19. The non-transitory computer-readable storage media of claim 16, wherein the customer edge router and the one or more aggregation routers are provided by a first carrier, and at least one tunnel of the respective tunnel between the customer edge router and each of the one or more aggregation routers is established using a network circuit provided by a second carrier. 20. The non-transitory computer-readable storage media of claim 16, further storing thereon instructions that, in response to execution by the processor, causes the processor to: receive a second data packet through the selected tunnel; remove overlay information from the second data packet to create a de-encapsulated second data packet; perform a reverse NAT on the de-encapsulated second data packet; and forward the reverse NAT'ed de-encapsulated second data packet for delivery to a destination address specified in the reverse NAT'ed de-encapsulated second data packet.
2,400
9,230
9,230
15,757,812
2,463
A device, system, and method perform an adaptive link adaptation. The method, at a user equipment (UE) connected to a Long Term Evolution (LTE) network via an evolved Node B (eNB), includes determining a type of wireless traffic being utilized by the UE based upon at least one application executed on the UE, the wireless traffic being one of a data only, a voice only, or a combination thereof. The method includes determining a block error rate (BLER) target value to be used in a channel state feedback operation associated with a link adaptation operation for a connection between the UE and the eNB.
1. A method, comprising: at a user equipment (UE) connected to a Long Term Evolution (LTE) network via an evolved Node B (eNB): determining a type of wireless traffic being utilized by the UE based upon at least one application executed on the UE, the wireless traffic being one of a data only, a voice only, or a combination thereof; and determining a block error rate (BLER) target value to be used in a channel state feedback operation associated with a link adaptation operation for a connection between the UE and the eNB. 2. The method of claim 1, wherein the BLER target value for a data only wireless traffic is a first BLER value, wherein the BLER target value for a voice only wireless traffic is a second BLER value, and wherein the BLER target value for the combination wireless traffic is a third BLER value. 3. The method of claim 2, wherein the second BLER value is greater than the third BLER value, which is greater than the first BLER value. 4. The method of claim 2, wherein the combination wireless traffic has one of a priority to a voice portion and a balance between the voice portion and a data portion. 5. The method of claim 4, wherein the third BLER value is equal to the second BLER value when the priority is to the voice portion, wherein the third BLER value is between the first and second BLER values when the priority is to the balance. 6. The method of claim 1, further comprising: determining a type of link scenario present at the UE based upon connection-related information ; determining a further BLER target value based upon the type of link scenario; and determining an updated block error rate (BLER) target value to be used in the channel state feedback operation. 7. The method of claim 6, wherein the link scenario is at least one of a Doppler estimation, a signal to noise ratio (SNR) estimation, a mobility, an interference level, or a combination thereof. 8. The method of claim 6, wherein the connection-related information is indicative of at least one of a channel estimation, a cell-specific reference signal (CRS), a reference signal received power (RSRP), a collision of CRS from neighboring eNBs, or a network assisted interference cancellation and suppression (NAICS) signaling. 9. The method of claim 1, further comprising: determining connection-related information based upon at least one signal received from the eNB; performing the channel state feedback operation using the connection-related information, wherein the channel state feedback operation includes a channel estimation, a hypothesizing of a SNR, a first mapping of the SNR to a spectral efficiency (SE), a SE estimation, and a second mapping of the SE to a channel quality indicator (CQI). 10. The method of claim 1, wherein the BLER target is a parameter used in determining a CQI, the CQI being used in the channel state feedback operation. 11. A user equipment, comprising: a transceiver establishing a connection with an evolved Node B (eNB) of a Long Term Evolution (LTE) network; and a processor determining a type of wireless traffic being utilized by the UE based upon at least one application executed on the UE, the wireless traffic being one of a data only, a voice only, or a combination thereof, the processor determining a block error rate (BLER) target value to be used in a channel state feedback operation associated with a link adaptation operation for a connection between the UE and the eNB. 12. The user equipment of claim 11, wherein the BLER target value for a data only wireless traffic is a first BLER value, wherein the BLER target value for a voice only wireless traffic is a second BLER value, and wherein the BLER target value for the combination wireless traffic is a third BLER value. 13. The user equipment of claim 12, wherein the second BLER value is greater than the third BLER value, which is greater than the first BLER value. 14. The user equipment of claim 12, wherein the combination wireless traffic has one of a priority to a voice portion and a balance between the voice portion and a data portion. 15. The user equipment of claim 14, wherein the third BLER value is equal to the second BLER value when the priority is to the voice portion, wherein the third BLER value is between the first and second BLER values when the priority is to the balance. 16. The user equipment of claim 11, wherein the processor determines a type of link scenario present at the UE based upon connection-related information, determines a further BLER target value based upon the type of link scenario, and determines an updated block error rate (BLER) target value to be used in the channel state feedback operation. 17. The user equipment of claim 16, wherein the link scenario is at least one of a Doppler estimation, a signal to noise ratio (SNR) estimation, a mobility, an interference level, or a combination thereof. 18. The user equipment of claim 16, wherein the connection-related information from the eNB is indicative of at least one of a channel estimation, a cell-specific reference signal (CRS), a reference signal received power (RSRP), a collision of CRS from neighboring eNBs, or a network assisted interference cancellation and suppression (NAICS) signaling. 19. The user equipment of claim 11, wherein the processor determines connection-related information based upon at least one signal received from the eNB, the processor performing the channel state feedback operation using the connection-related information, wherein the channel state feedback operation includes a channel estimation, a hypothesizing of a SNR, a first mapping of the SNR to a spectral efficiency (SE), a SE estimation, and a second mapping of the SE to a channel quality indicator (CQI). 20. A method, comprising: at a user equipment (UE) connected to a Long Term Evolution (LTE) network via an evolved Node B (eNB): determining at least one of a type of wireless traffic being utilized by the UE and a link scenario present at the UE based upon at least one application executed on the UE and connection-related information; setting a parameter based upon the at least one of the type of wireless traffic and the link scenario; determining channel state information based upon the parameter; and generating a channel state feedback report to be transmitted to the eNB, the channel state feedback report including the channel state information. 21. The method of claim 20, wherein the parameter is a block error rate (BLER). 22. The method of claim 20, wherein the channel state information includes a channel quality indicator (CQI).
A device, system, and method perform an adaptive link adaptation. The method, at a user equipment (UE) connected to a Long Term Evolution (LTE) network via an evolved Node B (eNB), includes determining a type of wireless traffic being utilized by the UE based upon at least one application executed on the UE, the wireless traffic being one of a data only, a voice only, or a combination thereof. The method includes determining a block error rate (BLER) target value to be used in a channel state feedback operation associated with a link adaptation operation for a connection between the UE and the eNB.1. A method, comprising: at a user equipment (UE) connected to a Long Term Evolution (LTE) network via an evolved Node B (eNB): determining a type of wireless traffic being utilized by the UE based upon at least one application executed on the UE, the wireless traffic being one of a data only, a voice only, or a combination thereof; and determining a block error rate (BLER) target value to be used in a channel state feedback operation associated with a link adaptation operation for a connection between the UE and the eNB. 2. The method of claim 1, wherein the BLER target value for a data only wireless traffic is a first BLER value, wherein the BLER target value for a voice only wireless traffic is a second BLER value, and wherein the BLER target value for the combination wireless traffic is a third BLER value. 3. The method of claim 2, wherein the second BLER value is greater than the third BLER value, which is greater than the first BLER value. 4. The method of claim 2, wherein the combination wireless traffic has one of a priority to a voice portion and a balance between the voice portion and a data portion. 5. The method of claim 4, wherein the third BLER value is equal to the second BLER value when the priority is to the voice portion, wherein the third BLER value is between the first and second BLER values when the priority is to the balance. 6. The method of claim 1, further comprising: determining a type of link scenario present at the UE based upon connection-related information ; determining a further BLER target value based upon the type of link scenario; and determining an updated block error rate (BLER) target value to be used in the channel state feedback operation. 7. The method of claim 6, wherein the link scenario is at least one of a Doppler estimation, a signal to noise ratio (SNR) estimation, a mobility, an interference level, or a combination thereof. 8. The method of claim 6, wherein the connection-related information is indicative of at least one of a channel estimation, a cell-specific reference signal (CRS), a reference signal received power (RSRP), a collision of CRS from neighboring eNBs, or a network assisted interference cancellation and suppression (NAICS) signaling. 9. The method of claim 1, further comprising: determining connection-related information based upon at least one signal received from the eNB; performing the channel state feedback operation using the connection-related information, wherein the channel state feedback operation includes a channel estimation, a hypothesizing of a SNR, a first mapping of the SNR to a spectral efficiency (SE), a SE estimation, and a second mapping of the SE to a channel quality indicator (CQI). 10. The method of claim 1, wherein the BLER target is a parameter used in determining a CQI, the CQI being used in the channel state feedback operation. 11. A user equipment, comprising: a transceiver establishing a connection with an evolved Node B (eNB) of a Long Term Evolution (LTE) network; and a processor determining a type of wireless traffic being utilized by the UE based upon at least one application executed on the UE, the wireless traffic being one of a data only, a voice only, or a combination thereof, the processor determining a block error rate (BLER) target value to be used in a channel state feedback operation associated with a link adaptation operation for a connection between the UE and the eNB. 12. The user equipment of claim 11, wherein the BLER target value for a data only wireless traffic is a first BLER value, wherein the BLER target value for a voice only wireless traffic is a second BLER value, and wherein the BLER target value for the combination wireless traffic is a third BLER value. 13. The user equipment of claim 12, wherein the second BLER value is greater than the third BLER value, which is greater than the first BLER value. 14. The user equipment of claim 12, wherein the combination wireless traffic has one of a priority to a voice portion and a balance between the voice portion and a data portion. 15. The user equipment of claim 14, wherein the third BLER value is equal to the second BLER value when the priority is to the voice portion, wherein the third BLER value is between the first and second BLER values when the priority is to the balance. 16. The user equipment of claim 11, wherein the processor determines a type of link scenario present at the UE based upon connection-related information, determines a further BLER target value based upon the type of link scenario, and determines an updated block error rate (BLER) target value to be used in the channel state feedback operation. 17. The user equipment of claim 16, wherein the link scenario is at least one of a Doppler estimation, a signal to noise ratio (SNR) estimation, a mobility, an interference level, or a combination thereof. 18. The user equipment of claim 16, wherein the connection-related information from the eNB is indicative of at least one of a channel estimation, a cell-specific reference signal (CRS), a reference signal received power (RSRP), a collision of CRS from neighboring eNBs, or a network assisted interference cancellation and suppression (NAICS) signaling. 19. The user equipment of claim 11, wherein the processor determines connection-related information based upon at least one signal received from the eNB, the processor performing the channel state feedback operation using the connection-related information, wherein the channel state feedback operation includes a channel estimation, a hypothesizing of a SNR, a first mapping of the SNR to a spectral efficiency (SE), a SE estimation, and a second mapping of the SE to a channel quality indicator (CQI). 20. A method, comprising: at a user equipment (UE) connected to a Long Term Evolution (LTE) network via an evolved Node B (eNB): determining at least one of a type of wireless traffic being utilized by the UE and a link scenario present at the UE based upon at least one application executed on the UE and connection-related information; setting a parameter based upon the at least one of the type of wireless traffic and the link scenario; determining channel state information based upon the parameter; and generating a channel state feedback report to be transmitted to the eNB, the channel state feedback report including the channel state information. 21. The method of claim 20, wherein the parameter is a block error rate (BLER). 22. The method of claim 20, wherein the channel state information includes a channel quality indicator (CQI).
2,400
9,231
9,231
15,461,638
2,439
USB traffic is intercepted between a USB device and a computer system. It is determined whether the USB device has previously had a policy associated with it as to whether USB traffic from the device should be blocked, allowed, or sanitized. In response to not having a previous policy for the USB device, a request is made for a user to be prompted to provide a policy of one of block, allow, or sanitize for the USB device. In response to a user-provided-policy, one of the following are performed: blocking the traffic, allowing the traffic, or sanitizing the traffic between the USB device and the computer system. Apparatus, methods, and computer program products are disclosed.
1. A method, comprising: intercepting universal serial bus (USB) traffic between a USB device and a computer system; determining whether the USB device has previously had a policy associated with it as to whether USB traffic from the device should be blocked, allowed, or sanitized; in response to not having a previous policy for the USB device, requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device; and in response to a user-provided policy, performing one of blocking the traffic, allowing the traffic, or sanitizing the traffic between the USB device and the computer system. 2. The method of claim 1, further comprising storing the user-provided policy with information to identify the USB device. 3. (canceled) 4. The method of claim 1, wherein performing one of blocking the traffic, allowing the traffic, or sanitizing the traffic is performed in part by a packet filter using a set of rules corresponding to the USB device. 5. (canceled) 6. (canceled) 7. (canceled) 8. The method of claim 1, wherein requesting that a user be prompted to provide a policy comprises causing a message to be displayed on a user interface of a display, the message indicating the user should provide a policy of one of block, allow, or sanitize for the USB device and defined to allow the user to provide a policy of one of block, allow, or sanitize for the USB device. 9. The method of claim 1, wherein: the method is performed by a USB firewall device physically separate from the computer system and coupled to the computer system though at least one USB port; and requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB firewall device further comprises sending by the USB firewall device the request to the computer system to request the computer system to prompt the user to provide the policy. 10. The method of claim 1, wherein: the method is performed by a USB firewall installed in and executed on the computer system; and requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device further comprises sending by the USB firewall the request to a USB firewall user interface component implemented by the computer system and that causes the computer system to prompt the user to provide the policy. 11. The method of claim 1, wherein sanitizing the traffic between the USB device and the computer system further comprises sending untrusted packets from the USB device through the computer system and toward a sandbox on a network, and receiving sanitized packets through the computer system and from the sandbox. 12. (canceled) 13. An apparatus, comprising: one or more memories comprising computer readable code stored thereon; one or more processors, the one or more processors configured, in response to retrieval and execution of at least a portion of the computer readable code, to cause the apparatus to perform operations comprising: intercepting universal serial bus (USB) traffic between a USB device and a computer system; determining whether the USB device has previously had a policy associated with it as to whether USB traffic from the device should be blocked, allowed, or sanitized; in response to not having a previous policy for the USB device, requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device; in response to a user-provided policy, performing one of blocking the traffic, allowing the traffic, or sanitizing the traffic between the USB device and the computer system. 14. The apparatus of claim 13, wherein the one or more processors are configured, in response to retrieval and execution of at least a portion of the computer readable code, to cause the apparatus to perform operations comprising: storing the user-provided policy with information to identify the USB device. 15. The apparatus of claim 14, wherein the information to identify the USB device comprises one or more of an indication of a device class or information identifying a specific USB device. 16. The apparatus of claim 1, wherein performing one of blocking the traffic, allowing the traffic, or sanitizing the traffic is performed in part by a packet filter using a set of rules corresponding to the USB device, and the packet filter is embodied in the computer readable code and executed by the one or more processors. 17. The apparatus of claim 16, wherein: the set of rules is a first set of rules; the packet filter sends packets to a sanitizer based on the first set of rules; sanitizing the traffic further comprises the sanitizer using a second set of rules corresponding to the USB device to sanitize packets from the USB device toward the computer system. 18. The apparatus of claim 17, wherein the one or more processors are configured, in response to retrieval and execution of at least a portion of the computer readable code, to cause the apparatus to perform operations comprising: one of accessing the computer system to request one or both of the first or second set of rules or accessing a memory to retrieve one or both of the first or second set of rules. 19. The apparatus of claim 18, wherein accessing the computer system to request one or both of the first or second set of rules further comprises accessing through the computer system a network to request one or both of the first or second set of rules. 20. The apparatus of claim 13, wherein requesting that a user be prompted to provide a policy comprises causing a message to be displayed on a user interface of a display, the message indicating the user should provide a policy of one of block, allow, or sanitize for the USB device and defined to allow the user to provide a policy of one of block, allow, or sanitize for the USB device. 21. The apparatus of claim 13, wherein: the apparatus comprises a USB firewall device physically separate from the computer system and coupled to the computer system though at least one USB port, the USB firewall device comprising the one or more memories and the one or more processors; and requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device further comprises sending by the USB firewall device the request to the computer system to request the computer system to prompt the user to provide the policy. 22. The apparatus of claim 13, wherein: the apparatus comprises a USB firewall device and a USB firewall user interface component in the computer readable code and retrieved and executed by the one or more processors; and requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device further comprises sending by the USB firewall device the request to the USB firewall user interface component, wherein the USB firewall user interface component causes the computer system to prompt the user to provide the policy. 23. The apparatus of claim 13, wherein sanitizing the traffic between the USB device and the computer system further comprises sending untrusted packets from the USB device through the computer system and toward a sandbox on a network, and receiving sanitized packets through the computer system and from the sandbox. 24. The apparatus of claim 13, wherein sanitizing the traffic between the USB device and the computer system further comprises sending one or more untrusted packets from the USB device through the computer system and toward a sandbox on a network, receiving an abstract representation of the USB device through the computer system and from the sandbox, and implementing the abstract representation of the USB device to sanitize the one or more untrusted packets that were sent and to sanitize any additional packets from the USB device toward the computer system. 25. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a device to cause the device to perform operations comprising: intercepting universal serial bus (USB) traffic between a USB device and a computer system; determining whether the USB device has previously had a policy associated with it as to whether USB traffic from the device should be blocked, allowed, or sanitized; in response to not having a previous policy for the USB device, requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device; in response to a user-provided policy, performing one of blocking the traffic, allowing the traffic, or sanitizing the traffic between the USB device and the computer system.
USB traffic is intercepted between a USB device and a computer system. It is determined whether the USB device has previously had a policy associated with it as to whether USB traffic from the device should be blocked, allowed, or sanitized. In response to not having a previous policy for the USB device, a request is made for a user to be prompted to provide a policy of one of block, allow, or sanitize for the USB device. In response to a user-provided-policy, one of the following are performed: blocking the traffic, allowing the traffic, or sanitizing the traffic between the USB device and the computer system. Apparatus, methods, and computer program products are disclosed.1. A method, comprising: intercepting universal serial bus (USB) traffic between a USB device and a computer system; determining whether the USB device has previously had a policy associated with it as to whether USB traffic from the device should be blocked, allowed, or sanitized; in response to not having a previous policy for the USB device, requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device; and in response to a user-provided policy, performing one of blocking the traffic, allowing the traffic, or sanitizing the traffic between the USB device and the computer system. 2. The method of claim 1, further comprising storing the user-provided policy with information to identify the USB device. 3. (canceled) 4. The method of claim 1, wherein performing one of blocking the traffic, allowing the traffic, or sanitizing the traffic is performed in part by a packet filter using a set of rules corresponding to the USB device. 5. (canceled) 6. (canceled) 7. (canceled) 8. The method of claim 1, wherein requesting that a user be prompted to provide a policy comprises causing a message to be displayed on a user interface of a display, the message indicating the user should provide a policy of one of block, allow, or sanitize for the USB device and defined to allow the user to provide a policy of one of block, allow, or sanitize for the USB device. 9. The method of claim 1, wherein: the method is performed by a USB firewall device physically separate from the computer system and coupled to the computer system though at least one USB port; and requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB firewall device further comprises sending by the USB firewall device the request to the computer system to request the computer system to prompt the user to provide the policy. 10. The method of claim 1, wherein: the method is performed by a USB firewall installed in and executed on the computer system; and requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device further comprises sending by the USB firewall the request to a USB firewall user interface component implemented by the computer system and that causes the computer system to prompt the user to provide the policy. 11. The method of claim 1, wherein sanitizing the traffic between the USB device and the computer system further comprises sending untrusted packets from the USB device through the computer system and toward a sandbox on a network, and receiving sanitized packets through the computer system and from the sandbox. 12. (canceled) 13. An apparatus, comprising: one or more memories comprising computer readable code stored thereon; one or more processors, the one or more processors configured, in response to retrieval and execution of at least a portion of the computer readable code, to cause the apparatus to perform operations comprising: intercepting universal serial bus (USB) traffic between a USB device and a computer system; determining whether the USB device has previously had a policy associated with it as to whether USB traffic from the device should be blocked, allowed, or sanitized; in response to not having a previous policy for the USB device, requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device; in response to a user-provided policy, performing one of blocking the traffic, allowing the traffic, or sanitizing the traffic between the USB device and the computer system. 14. The apparatus of claim 13, wherein the one or more processors are configured, in response to retrieval and execution of at least a portion of the computer readable code, to cause the apparatus to perform operations comprising: storing the user-provided policy with information to identify the USB device. 15. The apparatus of claim 14, wherein the information to identify the USB device comprises one or more of an indication of a device class or information identifying a specific USB device. 16. The apparatus of claim 1, wherein performing one of blocking the traffic, allowing the traffic, or sanitizing the traffic is performed in part by a packet filter using a set of rules corresponding to the USB device, and the packet filter is embodied in the computer readable code and executed by the one or more processors. 17. The apparatus of claim 16, wherein: the set of rules is a first set of rules; the packet filter sends packets to a sanitizer based on the first set of rules; sanitizing the traffic further comprises the sanitizer using a second set of rules corresponding to the USB device to sanitize packets from the USB device toward the computer system. 18. The apparatus of claim 17, wherein the one or more processors are configured, in response to retrieval and execution of at least a portion of the computer readable code, to cause the apparatus to perform operations comprising: one of accessing the computer system to request one or both of the first or second set of rules or accessing a memory to retrieve one or both of the first or second set of rules. 19. The apparatus of claim 18, wherein accessing the computer system to request one or both of the first or second set of rules further comprises accessing through the computer system a network to request one or both of the first or second set of rules. 20. The apparatus of claim 13, wherein requesting that a user be prompted to provide a policy comprises causing a message to be displayed on a user interface of a display, the message indicating the user should provide a policy of one of block, allow, or sanitize for the USB device and defined to allow the user to provide a policy of one of block, allow, or sanitize for the USB device. 21. The apparatus of claim 13, wherein: the apparatus comprises a USB firewall device physically separate from the computer system and coupled to the computer system though at least one USB port, the USB firewall device comprising the one or more memories and the one or more processors; and requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device further comprises sending by the USB firewall device the request to the computer system to request the computer system to prompt the user to provide the policy. 22. The apparatus of claim 13, wherein: the apparatus comprises a USB firewall device and a USB firewall user interface component in the computer readable code and retrieved and executed by the one or more processors; and requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device further comprises sending by the USB firewall device the request to the USB firewall user interface component, wherein the USB firewall user interface component causes the computer system to prompt the user to provide the policy. 23. The apparatus of claim 13, wherein sanitizing the traffic between the USB device and the computer system further comprises sending untrusted packets from the USB device through the computer system and toward a sandbox on a network, and receiving sanitized packets through the computer system and from the sandbox. 24. The apparatus of claim 13, wherein sanitizing the traffic between the USB device and the computer system further comprises sending one or more untrusted packets from the USB device through the computer system and toward a sandbox on a network, receiving an abstract representation of the USB device through the computer system and from the sandbox, and implementing the abstract representation of the USB device to sanitize the one or more untrusted packets that were sent and to sanitize any additional packets from the USB device toward the computer system. 25. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a device to cause the device to perform operations comprising: intercepting universal serial bus (USB) traffic between a USB device and a computer system; determining whether the USB device has previously had a policy associated with it as to whether USB traffic from the device should be blocked, allowed, or sanitized; in response to not having a previous policy for the USB device, requesting that a user be prompted to provide a policy of one of block, allow, or sanitize for the USB device; in response to a user-provided policy, performing one of blocking the traffic, allowing the traffic, or sanitizing the traffic between the USB device and the computer system.
2,400
9,232
9,232
16,199,409
2,426
A video-on-demand server, having a plurality of audiovisual assets stored in association therewith, and an application server module, are interconnected with a first group of consumer premises equipment (CPE) associated with a first group of subscribers and a second group of CPE associated with a second (different) group of subscribers, via a video content network. The application server module, the first group of CPE, and the second group of CPE are cooperatively configured to prepare a first video-on-demand catalog comprising a first group of the audiovisual assets and a second video-on-demand catalog comprising a second (different) group of the audiovisual assets. The application server module, the first group of CPE, and the second group of CPE are further cooperatively configured to make the first video-on-demand catalog available to the first group of subscribers and to make the second video-on-demand catalog available to the second group of subscribers.
1. A method comprising: storing a plurality of audiovisual assets in association with a video on demand server; preparing a first video-on-demand catalog facilitating a selection of one or more audiovisual assets from a first group of said audiovisual assets residing on said video on demand server; associating said first video-on-demand catalog with a first entitlement of said first group to view assets from said first group of said audiovisual assets; preparing a second video-on-demand catalog facilitating a selection of one or more audiovisual assets from a second group of said audiovisual assets residing on said video on demand server, said second group of said audiovisual assets being different than said first group of said audiovisual assets; associating said second video-on-demand catalog with a second entitlement of said second group to view assets from said second group of said audiovisual assets; making said first video-on-demand catalog available to a first group of subscribers having said first entitlement; and making said second video-on-demand catalog available to a second group of subscribers, different than said first group of subscribers, and having said second entitlement, wherein said first video-on-demand catalog is not made available to said second group of subscribers. 2. The method of claim 1, further comprising facilitating segmenting said second group of subscribers from said first group of subscribers. 3. An apparatus comprising: a memory; and at least one processor, coupled to said memory, and operative to: store a plurality of audiovisual assets in association with a video on demand server; prepare a first video-on-demand catalog facilitating a selection of one or more audiovisual assets from a first group of said audiovisual assets residing on said video on demand server; associate said first video-on-demand catalog with a first entitlement of said first group to view assets from said first group of said audiovisual assets; prepare a second video-on-demand catalog facilitating a selection of one or more audiovisual assets from a second group of said audiovisual assets residing on said video on demand server, said second group of said audiovisual assets being different than said first group of said audiovisual assets; associate said second video-on-demand catalog with a second entitlement of said second group to view assets from said second group of said audiovisual assets; make said first video-on-demand catalog available to a first group of subscribers having said first entitlement; and make said second video-on-demand catalog available to a second group of subscribers, different than said first group of subscribers, and having said second entitlement, wherein said first video-on-demand catalog is not made available to said second group of subscribers. 4. The apparatus of claim 3, wherein said at least one processor is further operative to facilitate segmenting said second group of subscribers from said first group of subscribers.
A video-on-demand server, having a plurality of audiovisual assets stored in association therewith, and an application server module, are interconnected with a first group of consumer premises equipment (CPE) associated with a first group of subscribers and a second group of CPE associated with a second (different) group of subscribers, via a video content network. The application server module, the first group of CPE, and the second group of CPE are cooperatively configured to prepare a first video-on-demand catalog comprising a first group of the audiovisual assets and a second video-on-demand catalog comprising a second (different) group of the audiovisual assets. The application server module, the first group of CPE, and the second group of CPE are further cooperatively configured to make the first video-on-demand catalog available to the first group of subscribers and to make the second video-on-demand catalog available to the second group of subscribers.1. A method comprising: storing a plurality of audiovisual assets in association with a video on demand server; preparing a first video-on-demand catalog facilitating a selection of one or more audiovisual assets from a first group of said audiovisual assets residing on said video on demand server; associating said first video-on-demand catalog with a first entitlement of said first group to view assets from said first group of said audiovisual assets; preparing a second video-on-demand catalog facilitating a selection of one or more audiovisual assets from a second group of said audiovisual assets residing on said video on demand server, said second group of said audiovisual assets being different than said first group of said audiovisual assets; associating said second video-on-demand catalog with a second entitlement of said second group to view assets from said second group of said audiovisual assets; making said first video-on-demand catalog available to a first group of subscribers having said first entitlement; and making said second video-on-demand catalog available to a second group of subscribers, different than said first group of subscribers, and having said second entitlement, wherein said first video-on-demand catalog is not made available to said second group of subscribers. 2. The method of claim 1, further comprising facilitating segmenting said second group of subscribers from said first group of subscribers. 3. An apparatus comprising: a memory; and at least one processor, coupled to said memory, and operative to: store a plurality of audiovisual assets in association with a video on demand server; prepare a first video-on-demand catalog facilitating a selection of one or more audiovisual assets from a first group of said audiovisual assets residing on said video on demand server; associate said first video-on-demand catalog with a first entitlement of said first group to view assets from said first group of said audiovisual assets; prepare a second video-on-demand catalog facilitating a selection of one or more audiovisual assets from a second group of said audiovisual assets residing on said video on demand server, said second group of said audiovisual assets being different than said first group of said audiovisual assets; associate said second video-on-demand catalog with a second entitlement of said second group to view assets from said second group of said audiovisual assets; make said first video-on-demand catalog available to a first group of subscribers having said first entitlement; and make said second video-on-demand catalog available to a second group of subscribers, different than said first group of subscribers, and having said second entitlement, wherein said first video-on-demand catalog is not made available to said second group of subscribers. 4. The apparatus of claim 3, wherein said at least one processor is further operative to facilitate segmenting said second group of subscribers from said first group of subscribers.
2,400
9,233
9,233
15,513,731
2,495
A set of raw data relating to activity of one or more users in accordance with a communication network is obtained. The communication network is managed by a network operator. The obtained set of raw data is processed in accordance with at least one data isolation policy maintained by the network operator to generate a first set of data comprising at least a portion of the set of raw data with sensitive data associated with the one or more users removed; a second set of data comprising the sensitive data removed from the set of raw data; and a third set of data comprising a mapping between portions of the set of raw data and the first set of data. The first set of data is exposed to a third party, while the second set of data and the third set of data are isolated from the third party.
1. A method comprising: obtaining a set of raw data relating to activity of one or more users in accordance with a communication network, wherein the communication network is managed by a network operator; processing the obtained set of raw data in accordance with at least one data isolation policy maintained by the network operator to generate a first set of data comprising at least a portion of the set of raw data with sensitive data associated with the one or more users removed; a second set of data comprising the sensitive data removed from the set of raw data; and a third set of data comprising a mapping between portions of the set of raw data and the first set of data; exposing the first set of data to a third party; and isolating the second set of data and the third set of data from the third party; wherein one or more parts of the method are performed by a processing device. 2. The method of claim 1, wherein the processing further comprises generating the first set of data by deleting sensitive data associated with the one or more users from the set of raw data wherein the sensitive data comprises personal information attributable to the one or more users. 3. The method of claim 1, wherein the processing further comprises generating the first set of data by replacing actual user identifiers of the one or more users with assigned anonymous identifiers of the one or more users so as to mask the actual identities of the one or more users. 4. The method of claim 3, wherein, for a given user, multiple anonymous identifiers are respectively assigned to replace the actual user identifier for multiple activities attributable to the given user. 5. The method of claim 3, wherein the third set of data comprises a mapping between the actual user identifiers and the corresponding assigned anonymous identifiers. 6. The method of claim 1, wherein the processing the obtained set of raw data further comprises generating a fourth set of data comprising statistical data computed from at least a portion of the set of raw data based on a request by the third party. 7. The method of claim 6, wherein the processing the obtained set of raw data further comprises generating a fifth set of data comprising anonymous data derived from the fourth set of data. 8. The method of claim 7, wherein the exposing further comprises exposing the fourth set of data and the fifth set of data to the third party. 9. The method of claim 8, further comprising authenticating the third party before generating the fourth and fifth data sets and before exposing the first, fourth and fifth data sets to the third party. 10.-13. (canceled) 14. An article of manufacture comprising a processor-readable storage medium having embodied therein executable program code that when executed by the processing device causes the processing device to perform: obtain a set of raw data relating to activity of one or more users in accordance with a communication network, wherein the communication network is managed by a network operator; process the obtained set of raw data in accordance with at least one data isolation policy maintained by the network operator to generate a first set of data comprising at least a portion of the set of raw data with sensitive data associated with the one or more users removed; a second set of data comprising the sensitive data removed from the set of raw data; and a third set of data comprising a mapping between portions of the set of raw data and the first set of data; expose the first set of data to a third party; and isolate the second set of data and the third set of data from the third party. 15. An apparatus comprising: a memory; and a processor operatively coupled to the memory to form a data sharing platform, the data sharing platform being configured to: obtain a set of raw data relating to activity of one or more users in accordance with a communication network, wherein the communication network is managed by a network operator; process the obtained set of raw data in accordance with at least one data isolation policy maintained by the network operator to generate a first set of data comprising at least a portion of the set of raw data with sensitive data associated with the one or more users removed; a second set of data comprising the sensitive data removed from the set of raw data; and a third set of data comprising a mapping between portions of the set of raw data and the first set of data; expose the first set of data to a third party; and isolate the second set of data and the third set of data from the third party. 16. The apparatus of claim 15, wherein processing the obtained set of raw data further comprises generating the first set of data by deleting sensitive data associated with the one or more users from the set of raw data wherein the sensitive data comprises personal information attributable to the one or more users. 17. The apparatus of claim 15, wherein processing the obtained set of raw data further comprises generating the first set of data by replacing actual user identifiers of the one or more users with assigned anonymous identifiers of the one or more users so as to mask the actual identities of the one or more users. 18. The apparatus of claim 17, wherein, for a given user, multiple anonymous identifiers are respectively assigned to replace the actual user identifier for multiple activities attributable to the given user. 19. The apparatus of claim 17, wherein the third set of data comprises a mapping between the actual user identifiers and the corresponding assigned anonymous identifiers. 20. The apparatus of claim 15, wherein processing the obtained set of raw data further comprises generating a fourth set of data comprising statistical data computed from at least a portion of the set of raw data based on a request by the third party. 21. The apparatus of claim 20, wherein processing the obtained set of raw data further comprises generating a fifth set of data comprising anonymous data derived from the fourth set of data. 22. The apparatus of claim 21, wherein exposing the first set of data to a third party further comprises exposing the fourth set of data and the fifth set of data to the third party. 23. The apparatus of claim 22, further configured to authenticate the third party before generating the fourth and fifth data sets and before exposing the first, fourth and fifth data sets to the third party. 24. The apparatus of claim 23, further configured to, after authentication and before generating the fourth and fifth data sets, determine whether the third party has one or more rights to access one or more of the first, fourth and fifth data sets. 25.-27. (canceled)
A set of raw data relating to activity of one or more users in accordance with a communication network is obtained. The communication network is managed by a network operator. The obtained set of raw data is processed in accordance with at least one data isolation policy maintained by the network operator to generate a first set of data comprising at least a portion of the set of raw data with sensitive data associated with the one or more users removed; a second set of data comprising the sensitive data removed from the set of raw data; and a third set of data comprising a mapping between portions of the set of raw data and the first set of data. The first set of data is exposed to a third party, while the second set of data and the third set of data are isolated from the third party.1. A method comprising: obtaining a set of raw data relating to activity of one or more users in accordance with a communication network, wherein the communication network is managed by a network operator; processing the obtained set of raw data in accordance with at least one data isolation policy maintained by the network operator to generate a first set of data comprising at least a portion of the set of raw data with sensitive data associated with the one or more users removed; a second set of data comprising the sensitive data removed from the set of raw data; and a third set of data comprising a mapping between portions of the set of raw data and the first set of data; exposing the first set of data to a third party; and isolating the second set of data and the third set of data from the third party; wherein one or more parts of the method are performed by a processing device. 2. The method of claim 1, wherein the processing further comprises generating the first set of data by deleting sensitive data associated with the one or more users from the set of raw data wherein the sensitive data comprises personal information attributable to the one or more users. 3. The method of claim 1, wherein the processing further comprises generating the first set of data by replacing actual user identifiers of the one or more users with assigned anonymous identifiers of the one or more users so as to mask the actual identities of the one or more users. 4. The method of claim 3, wherein, for a given user, multiple anonymous identifiers are respectively assigned to replace the actual user identifier for multiple activities attributable to the given user. 5. The method of claim 3, wherein the third set of data comprises a mapping between the actual user identifiers and the corresponding assigned anonymous identifiers. 6. The method of claim 1, wherein the processing the obtained set of raw data further comprises generating a fourth set of data comprising statistical data computed from at least a portion of the set of raw data based on a request by the third party. 7. The method of claim 6, wherein the processing the obtained set of raw data further comprises generating a fifth set of data comprising anonymous data derived from the fourth set of data. 8. The method of claim 7, wherein the exposing further comprises exposing the fourth set of data and the fifth set of data to the third party. 9. The method of claim 8, further comprising authenticating the third party before generating the fourth and fifth data sets and before exposing the first, fourth and fifth data sets to the third party. 10.-13. (canceled) 14. An article of manufacture comprising a processor-readable storage medium having embodied therein executable program code that when executed by the processing device causes the processing device to perform: obtain a set of raw data relating to activity of one or more users in accordance with a communication network, wherein the communication network is managed by a network operator; process the obtained set of raw data in accordance with at least one data isolation policy maintained by the network operator to generate a first set of data comprising at least a portion of the set of raw data with sensitive data associated with the one or more users removed; a second set of data comprising the sensitive data removed from the set of raw data; and a third set of data comprising a mapping between portions of the set of raw data and the first set of data; expose the first set of data to a third party; and isolate the second set of data and the third set of data from the third party. 15. An apparatus comprising: a memory; and a processor operatively coupled to the memory to form a data sharing platform, the data sharing platform being configured to: obtain a set of raw data relating to activity of one or more users in accordance with a communication network, wherein the communication network is managed by a network operator; process the obtained set of raw data in accordance with at least one data isolation policy maintained by the network operator to generate a first set of data comprising at least a portion of the set of raw data with sensitive data associated with the one or more users removed; a second set of data comprising the sensitive data removed from the set of raw data; and a third set of data comprising a mapping between portions of the set of raw data and the first set of data; expose the first set of data to a third party; and isolate the second set of data and the third set of data from the third party. 16. The apparatus of claim 15, wherein processing the obtained set of raw data further comprises generating the first set of data by deleting sensitive data associated with the one or more users from the set of raw data wherein the sensitive data comprises personal information attributable to the one or more users. 17. The apparatus of claim 15, wherein processing the obtained set of raw data further comprises generating the first set of data by replacing actual user identifiers of the one or more users with assigned anonymous identifiers of the one or more users so as to mask the actual identities of the one or more users. 18. The apparatus of claim 17, wherein, for a given user, multiple anonymous identifiers are respectively assigned to replace the actual user identifier for multiple activities attributable to the given user. 19. The apparatus of claim 17, wherein the third set of data comprises a mapping between the actual user identifiers and the corresponding assigned anonymous identifiers. 20. The apparatus of claim 15, wherein processing the obtained set of raw data further comprises generating a fourth set of data comprising statistical data computed from at least a portion of the set of raw data based on a request by the third party. 21. The apparatus of claim 20, wherein processing the obtained set of raw data further comprises generating a fifth set of data comprising anonymous data derived from the fourth set of data. 22. The apparatus of claim 21, wherein exposing the first set of data to a third party further comprises exposing the fourth set of data and the fifth set of data to the third party. 23. The apparatus of claim 22, further configured to authenticate the third party before generating the fourth and fifth data sets and before exposing the first, fourth and fifth data sets to the third party. 24. The apparatus of claim 23, further configured to, after authentication and before generating the fourth and fifth data sets, determine whether the third party has one or more rights to access one or more of the first, fourth and fifth data sets. 25.-27. (canceled)
2,400
9,234
9,234
15,661,789
2,443
An example device for retrieving media data includes one or more processors implemented in circuitry and configured to receive a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL), determine an identifier for one of the chunks using the data indicating the number of chunks available for the segment, and send a request specifying the identifier for the one of the chunks to a server device.
1. A method of retrieving media data, the method comprising: receiving a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); determining an identifier for one of the chunks using the data indicating the number of chunks available for the segment; and sending a request specifying the identifier for the one of the chunks to a server device. 2. The method of claim 1, wherein the data indicating the number of segment chunks comprises an @k attribute included in an S element of a SegmentTimeline element of a media presentation description (MPD). 3. The method of claim 1, wherein determining the identifier for the one of the chunks comprises determining the identifier according to a $Number$ template for the segment chunks. 4. The method of claim 1, wherein determining the identifier for the one of the chunks comprises determining the identifier according to a hierarchical addressing scheme. 5. The method of claim 4, wherein the hierarchical addressing scheme specifies a first part and a second part for the identifier. 6. The method of claim 5, wherein the first part specifies a numeric identifier for the segment. 7. The method of claim 5, wherein the first part specifies timing information for the segment. 8. The method of claim 7, wherein the timing information indicates a playback time at which the segment is to begin being played. 9. The method of claim 5, wherein the second part specifies an ordinal identifier of the one of the chunks. 10. The method of claim 1, wherein sending the request comprises sending one of an HTTP GET request or an HTTP partial GET request. 11. The method of claim 1, wherein the segment chunks are offered as a segment sequence comprising multiple segments having respective URLs, the method further comprising determining the URLs according to a URL template. 12. The method of claim 1, wherein the manifest file does not express exact segment durations for the segment chunks. 13. The method of claim 1, wherein determining the identifier comprises determining the identifier without determining durations for the segment chunks. 14. The method of claim 1, further comprising determining segment availability start times for the segment chunks using data of the manifest file indicating a start time for the segment, a duration of the segment, and the number of segment chunks. 15. The method of claim 1, further comprising: determining a duration value for the segment from the manifest file; and dividing the duration value by the number of segment chunks to determine duration values for the segment chunks. 16. A device for retrieving media data, the device comprising one or more processors implemented in circuitry and configured to: receive a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); determine an identifier for one of the chunks using the data indicating the number of chunks available for the segment; and send a request specifying the identifier for the one of the chunks to a server device. 17. The device of claim 16, wherein the data indicating the number of segment chunks comprises an @k attribute included in an S element of a SegmentTimeline element of a media presentation description (MPD). 18. The device of claim 16, wherein the one or more processors are configured to determining the identifier according to a $Number$ template for the segment chunks. 19. The device of claim 16, wherein the one or more processors are configured to determine the identifier according to a hierarchical addressing scheme. 20. The device of claim 19, wherein the hierarchical addressing scheme specifies a first part and a second part for the identifier. 21. The device of claim 20, wherein the first part specifies a numeric identifier for the segment. 22. The device of claim 20, wherein the first part specifies timing information for the segment. 23. The device of claim 22, wherein the timing information indicates a playback time at which the segment is to begin being played. 24. The device of claim 20, wherein the second part specifies an ordinal identifier of the one of the chunks. 25. The device of claim 16, wherein to send the request, the one or more processors are configured to send one of an HTTP GET request or an HTTP partial GET request. 26. The device of claim 16, wherein the segment chunks are offered as a segment sequence comprising multiple segments having respective URLs, and wherein the one or more processors are further configured to determine the URLs according to a URL template. 27. The device of claim 16, wherein the manifest file does not express exact segment durations for the segment chunks. 28. The device of claim 16, wherein the one or more processors are configured to determine the identifier without determining durations for the segment chunks. 29. The device of claim 16, wherein the one or more processors are further configured to determine segment availability start times for the segment chunks using data of the manifest file indicating a start time for the segment, a duration of the segment, and the number of segment chunks. 30. The device of claim 16, wherein the one or more processors are further configured to: determine a duration value for the segment from the manifest file; and divide the duration value by the number of segment chunks to determine duration values for the segment chunks. 31. A device for retrieving media data, the device comprising: means for receiving a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); means for determining an identifier for one of the chunks using the data indicating the number of chunks available for the segment; and means for sending a request specifying the identifier for the one of the chunks to a server device. 32. A computer-readable storage medium having stored thereon instructions that, when executed, cause a processor to: receive a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); determine an identifier for one of the chunks using the data indicating the number of chunks available for the segment; and send a request specifying the identifier for the one of the chunks to a server device. 33. The computer-readable storage medium of claim 32, wherein the data indicating the number of segment chunks comprises an @k attribute included in an S element of a SegmentTimeline element of a media presentation description (MPD). 34. The computer-readable storage medium of claim 32, wherein the instructions that cause the processor to determine the identifier for the one of the chunks comprise instructions that cause the processor to determine the identifier according to a $Number$ template for the segment chunks. 35. The computer-readable storage medium of claim 32, wherein the instructions that cause the processor to determine the identifier for the one of the chunks comprise instructions that cause the processor to determine the identifier according to a hierarchical addressing scheme. 36. The computer-readable storage medium of claim 35, wherein the hierarchical addressing scheme specifies a first part and a second part for the identifier. 37. The computer-readable storage medium of claim 36, wherein the first part specifies a numeric identifier for the segment. 38. The computer-readable storage medium of claim 36, wherein the first part specifies timing information for the segment. 39. The computer-readable storage medium of claim 38, wherein the timing information indicates a playback time at which the segment is to begin being played. 40. The computer-readable storage medium of claim 36, wherein the second part specifies an ordinal identifier of the one of the chunks. 41. The computer-readable storage medium of claim 32, wherein the instructions that cause the processor to send the request comprise instructions that cause the processor to send one of an HTTP GET request or an HTTP partial GET request. 42. The computer-readable storage medium of claim 32, wherein the segment chunks are offered as a segment sequence comprising multiple segments having respective URLs, further comprising instructions that cause the processor to determine the URLs according to a URL template. 43. The computer-readable storage medium of claim 32, wherein the manifest file does not express exact segment durations for the segment chunks. 44. The computer-readable storage medium of claim 32, wherein the instructions that cause the processor to determine the identifier comprise instructions that cause the processor to determine the identifier without determining durations for the segment chunks. 45. The computer-readable storage medium of claim 32, further comprising instructions that cause the processor to determine segment availability start times for the segment chunks using data of the manifest file indicating a start time for the segment, a duration of the segment, and the number of segment chunks. 46. The computer-readable storage medium of claim 32, further comprising instructions that cause the processor to: determine a duration value for the segment from the manifest file; and divide the duration value by the number of segment chunks to determine duration values for the segment chunks. 47. A method of sending media data, the method comprising: generating a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); sending the manifest file to a client device; receiving a request specifying an identifier for one of the chunks from the client device; and sending the requested one of the chunks indicated by the identifier to the client device in response to the request. 48. The method of claim 47, wherein the data indicating the number of segment chunks comprises an @k attribute included in an S element of a SegmentTimeline element of a media presentation description (MPD). 49. The method of claim 47, further comprising sending data defining a $Number$ template for the segment chunks to the client device to cause the client device to use the $Number$ template to determine the identifier for the one of the chunks. 50. The method of claim 47, further comprising sending data defining a hierarchical addressing scheme to the client device to cause the client device to determine the identifier for the one of the chunks according to the hierarchical addressing scheme. 51. The method of claim 50, wherein the hierarchical addressing scheme specifies a first part and a second part for the identifier. 52. The method of claim 51, wherein the first part specifies a numeric identifier for the segment. 53. The method of claim 51, wherein the first part specifies timing information for the segment, wherein the timing information indicates a playback time at which the segment is to begin being played. 54. The method of claim 51, wherein the second part specifies an ordinal identifier of the one of the chunks. 55. A server device for sending media data, the server device comprising: a memory configured to store a manifest file and the media data; and one or more processors implemented in circuitry and configured to: generate the manifest file to include data indicating a number of segment chunks available for a segment of a representation of the media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); send the manifest file to a client device; receive a request specifying an identifier for one of the chunks from the client device; and send the requested one of the chunks indicated by the identifier to the client device in response to the request. 56. The device of claim 55, wherein the data indicating the number of segment chunks comprises an @k attribute included in an S element of a SegmentTimeline element of a media presentation description (MPD). 57. The device of claim 55, wherein the one or more processors are configured to send data defining a $Number$ template for the segment chunks to the client device to cause the client device to use the $Number$ template to determine the identifier for the one of the chunks. 58. The device of claim 55, wherein the one or more processors are configured to send data defining a hierarchical addressing scheme to the client device to cause the client device to determine the identifier for the one of the chunks according to the hierarchical addressing scheme. 59. The device of claim 58, wherein the hierarchical addressing scheme specifies a first part and a second part for the identifier. 60. The device of claim 59, wherein the first part specifies a numeric identifier for the segment. 61. The device of claim 59, wherein the first part specifies timing information for the segment, wherein the timing information indicates a playback time at which the segment is to begin being played. 62. The device of claim 59, wherein the second part specifies an ordinal identifier of the one of the chunks.
An example device for retrieving media data includes one or more processors implemented in circuitry and configured to receive a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL), determine an identifier for one of the chunks using the data indicating the number of chunks available for the segment, and send a request specifying the identifier for the one of the chunks to a server device.1. A method of retrieving media data, the method comprising: receiving a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); determining an identifier for one of the chunks using the data indicating the number of chunks available for the segment; and sending a request specifying the identifier for the one of the chunks to a server device. 2. The method of claim 1, wherein the data indicating the number of segment chunks comprises an @k attribute included in an S element of a SegmentTimeline element of a media presentation description (MPD). 3. The method of claim 1, wherein determining the identifier for the one of the chunks comprises determining the identifier according to a $Number$ template for the segment chunks. 4. The method of claim 1, wherein determining the identifier for the one of the chunks comprises determining the identifier according to a hierarchical addressing scheme. 5. The method of claim 4, wherein the hierarchical addressing scheme specifies a first part and a second part for the identifier. 6. The method of claim 5, wherein the first part specifies a numeric identifier for the segment. 7. The method of claim 5, wherein the first part specifies timing information for the segment. 8. The method of claim 7, wherein the timing information indicates a playback time at which the segment is to begin being played. 9. The method of claim 5, wherein the second part specifies an ordinal identifier of the one of the chunks. 10. The method of claim 1, wherein sending the request comprises sending one of an HTTP GET request or an HTTP partial GET request. 11. The method of claim 1, wherein the segment chunks are offered as a segment sequence comprising multiple segments having respective URLs, the method further comprising determining the URLs according to a URL template. 12. The method of claim 1, wherein the manifest file does not express exact segment durations for the segment chunks. 13. The method of claim 1, wherein determining the identifier comprises determining the identifier without determining durations for the segment chunks. 14. The method of claim 1, further comprising determining segment availability start times for the segment chunks using data of the manifest file indicating a start time for the segment, a duration of the segment, and the number of segment chunks. 15. The method of claim 1, further comprising: determining a duration value for the segment from the manifest file; and dividing the duration value by the number of segment chunks to determine duration values for the segment chunks. 16. A device for retrieving media data, the device comprising one or more processors implemented in circuitry and configured to: receive a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); determine an identifier for one of the chunks using the data indicating the number of chunks available for the segment; and send a request specifying the identifier for the one of the chunks to a server device. 17. The device of claim 16, wherein the data indicating the number of segment chunks comprises an @k attribute included in an S element of a SegmentTimeline element of a media presentation description (MPD). 18. The device of claim 16, wherein the one or more processors are configured to determining the identifier according to a $Number$ template for the segment chunks. 19. The device of claim 16, wherein the one or more processors are configured to determine the identifier according to a hierarchical addressing scheme. 20. The device of claim 19, wherein the hierarchical addressing scheme specifies a first part and a second part for the identifier. 21. The device of claim 20, wherein the first part specifies a numeric identifier for the segment. 22. The device of claim 20, wherein the first part specifies timing information for the segment. 23. The device of claim 22, wherein the timing information indicates a playback time at which the segment is to begin being played. 24. The device of claim 20, wherein the second part specifies an ordinal identifier of the one of the chunks. 25. The device of claim 16, wherein to send the request, the one or more processors are configured to send one of an HTTP GET request or an HTTP partial GET request. 26. The device of claim 16, wherein the segment chunks are offered as a segment sequence comprising multiple segments having respective URLs, and wherein the one or more processors are further configured to determine the URLs according to a URL template. 27. The device of claim 16, wherein the manifest file does not express exact segment durations for the segment chunks. 28. The device of claim 16, wherein the one or more processors are configured to determine the identifier without determining durations for the segment chunks. 29. The device of claim 16, wherein the one or more processors are further configured to determine segment availability start times for the segment chunks using data of the manifest file indicating a start time for the segment, a duration of the segment, and the number of segment chunks. 30. The device of claim 16, wherein the one or more processors are further configured to: determine a duration value for the segment from the manifest file; and divide the duration value by the number of segment chunks to determine duration values for the segment chunks. 31. A device for retrieving media data, the device comprising: means for receiving a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); means for determining an identifier for one of the chunks using the data indicating the number of chunks available for the segment; and means for sending a request specifying the identifier for the one of the chunks to a server device. 32. A computer-readable storage medium having stored thereon instructions that, when executed, cause a processor to: receive a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); determine an identifier for one of the chunks using the data indicating the number of chunks available for the segment; and send a request specifying the identifier for the one of the chunks to a server device. 33. The computer-readable storage medium of claim 32, wherein the data indicating the number of segment chunks comprises an @k attribute included in an S element of a SegmentTimeline element of a media presentation description (MPD). 34. The computer-readable storage medium of claim 32, wherein the instructions that cause the processor to determine the identifier for the one of the chunks comprise instructions that cause the processor to determine the identifier according to a $Number$ template for the segment chunks. 35. The computer-readable storage medium of claim 32, wherein the instructions that cause the processor to determine the identifier for the one of the chunks comprise instructions that cause the processor to determine the identifier according to a hierarchical addressing scheme. 36. The computer-readable storage medium of claim 35, wherein the hierarchical addressing scheme specifies a first part and a second part for the identifier. 37. The computer-readable storage medium of claim 36, wherein the first part specifies a numeric identifier for the segment. 38. The computer-readable storage medium of claim 36, wherein the first part specifies timing information for the segment. 39. The computer-readable storage medium of claim 38, wherein the timing information indicates a playback time at which the segment is to begin being played. 40. The computer-readable storage medium of claim 36, wherein the second part specifies an ordinal identifier of the one of the chunks. 41. The computer-readable storage medium of claim 32, wherein the instructions that cause the processor to send the request comprise instructions that cause the processor to send one of an HTTP GET request or an HTTP partial GET request. 42. The computer-readable storage medium of claim 32, wherein the segment chunks are offered as a segment sequence comprising multiple segments having respective URLs, further comprising instructions that cause the processor to determine the URLs according to a URL template. 43. The computer-readable storage medium of claim 32, wherein the manifest file does not express exact segment durations for the segment chunks. 44. The computer-readable storage medium of claim 32, wherein the instructions that cause the processor to determine the identifier comprise instructions that cause the processor to determine the identifier without determining durations for the segment chunks. 45. The computer-readable storage medium of claim 32, further comprising instructions that cause the processor to determine segment availability start times for the segment chunks using data of the manifest file indicating a start time for the segment, a duration of the segment, and the number of segment chunks. 46. The computer-readable storage medium of claim 32, further comprising instructions that cause the processor to: determine a duration value for the segment from the manifest file; and divide the duration value by the number of segment chunks to determine duration values for the segment chunks. 47. A method of sending media data, the method comprising: generating a manifest file including data indicating a number of segment chunks available for a segment of a representation of media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); sending the manifest file to a client device; receiving a request specifying an identifier for one of the chunks from the client device; and sending the requested one of the chunks indicated by the identifier to the client device in response to the request. 48. The method of claim 47, wherein the data indicating the number of segment chunks comprises an @k attribute included in an S element of a SegmentTimeline element of a media presentation description (MPD). 49. The method of claim 47, further comprising sending data defining a $Number$ template for the segment chunks to the client device to cause the client device to use the $Number$ template to determine the identifier for the one of the chunks. 50. The method of claim 47, further comprising sending data defining a hierarchical addressing scheme to the client device to cause the client device to determine the identifier for the one of the chunks according to the hierarchical addressing scheme. 51. The method of claim 50, wherein the hierarchical addressing scheme specifies a first part and a second part for the identifier. 52. The method of claim 51, wherein the first part specifies a numeric identifier for the segment. 53. The method of claim 51, wherein the first part specifies timing information for the segment, wherein the timing information indicates a playback time at which the segment is to begin being played. 54. The method of claim 51, wherein the second part specifies an ordinal identifier of the one of the chunks. 55. A server device for sending media data, the server device comprising: a memory configured to store a manifest file and the media data; and one or more processors implemented in circuitry and configured to: generate the manifest file to include data indicating a number of segment chunks available for a segment of a representation of the media data, the segment comprising an independently retrievable media file having a unique uniform resource locator (URL); send the manifest file to a client device; receive a request specifying an identifier for one of the chunks from the client device; and send the requested one of the chunks indicated by the identifier to the client device in response to the request. 56. The device of claim 55, wherein the data indicating the number of segment chunks comprises an @k attribute included in an S element of a SegmentTimeline element of a media presentation description (MPD). 57. The device of claim 55, wherein the one or more processors are configured to send data defining a $Number$ template for the segment chunks to the client device to cause the client device to use the $Number$ template to determine the identifier for the one of the chunks. 58. The device of claim 55, wherein the one or more processors are configured to send data defining a hierarchical addressing scheme to the client device to cause the client device to determine the identifier for the one of the chunks according to the hierarchical addressing scheme. 59. The device of claim 58, wherein the hierarchical addressing scheme specifies a first part and a second part for the identifier. 60. The device of claim 59, wherein the first part specifies a numeric identifier for the segment. 61. The device of claim 59, wherein the first part specifies timing information for the segment, wherein the timing information indicates a playback time at which the segment is to begin being played. 62. The device of claim 59, wherein the second part specifies an ordinal identifier of the one of the chunks.
2,400
9,235
9,235
15,894,654
2,493
A device may receive client cipher information, associated with initiating a secure session, identifying at least one key exchange cipher supported by a client device associated with the secure session. The device may determine, based on the client cipher information, that a Diffie-Hellman key exchange is to be used to establish the secure session. The device may determine whether a server device, associated with the secure session, supports use of the Diffie-Hellman key exchange. The device may manage establishment of the secure session using a first decryption technique based on determining that the server device does not support the use of the Diffie-Hellman key exchange, or manage establishment of the secure session using a second decryption technique based on determining that the server device supports the use of the Diffie-Hellman key exchange or being unable to determine whether the server device supports the use of the Diffie-Hellman key exchange.
1. A method, comprising: receiving, by a device, client cipher information associated with initiating a secure session, the client cipher information identifying one or more key exchange ciphers supported by a client device associated with the secure session; determining, by the device and based on the client cipher information, that the client device prefers use of a Diffie-Hellman key exchange to establish the secure session; determining, by the device, whether a server device, associated with the secure session, supports the use of the Diffie-Hellman key exchange to establish the secure session; and selectively establishing, by the device, the secure session using a first decryption technique or a second decryption technique based on determining whether the server device supports the use of the Diffie-Hellman key exchange, the first decryption technique being different from the second decryption technique. 2. The method of claim 1, comprising: receiving a message associated with initiating the secure session, the message including the client cipher information; and where receiving the client cipher information comprises: receiving the client cipher information based on receiving the message associated with initiating the secure session. 3. The method of claim 1, where determining whether the server device supports the use of the Diffie-Hellman key exchange comprises: receiving server cipher preference information associated with the server device, the server cipher preference information including information indicating whether the server device supports the use of the Diffie-Hellman key exchange; and determining whether the server device supports the use of the Diffie-Hellman key exchange based on the received server cipher preference information. 4. The method of claim 1, further comprising: determining that traffic, associated with the secure session, is to be managed using the first decryption technique; and determining, based on determining that the server device does not support the use of the Diffie-Hellman key exchange, that the traffic is to be managed using the second decryption technique rather than the first decryption technique. 5. The method of claim 1, where the first decryption technique is a secure sockets layer (SSL) forward proxy technique and the second decryption technique is a SSL inbound inspection technique. 6. The method of claim 1, where determining whether the server device supports the use of the Diffie-Hellman key exchange comprises: determining, based on a message associated with initiating the secure session, a server indicator associated with the server device; performing a lookup based on the server indicator; and determining whether the server device supports the use of the Diffie-Hellman key exchange based on a result of the lookup. 7. The method of claim 1, where the secure session is a secure sockets layer (SSL) session or a transport layer security (TLS) session. 8. A device, comprising: one or more processors to: receive client cipher information associated with initiating a secure session, the client cipher information identifying at least one key exchange cipher supported by a client device associated with the secure session; determine, based on the client cipher information, that a Diffie-Hellman key exchange is to be used to establish the secure session; determine whether a server device, associated with the secure session, supports use of the Diffie-Hellman key exchange to establish the secure session; and manage establishment of the secure session using a first decryption technique based on determining that the server device does not support the use of the Diffie-Hellman key exchange; manage establishment of the secure session using a second decryption technique based on determining that the server device supports the use of the Diffie-Hellman key exchange; or manage establishment of the secure session using the second decryption technique based on being unable to determine whether the server device supports the use of the Diffie-Hellman key exchange. 9. The device of claim 8, where the one or more processors, when determining that the Diffie-Hellman key exchange is to be used to establish the secure session, are to: determine, based on the client cipher information, priority information associated with the at least on key exchange cipher supported by the client device; and determine that the Diffie-Hellman key exchange is to be used based on the priority information. 10. The device of claim 8, where the one or more processors are to: receive a message associated with initiating the secure session, the message including the client cipher information; and where the one or more processors, when receiving the client cipher information, are to: receive the client cipher information based on receiving the message associated with initiating the secure session. 11. The device of claim 8, where the one or more processors, when determining whether the server device supports the use of the Diffie-Hellman key exchange, are to: store server cipher preference information associated with the server device, the server cipher preference information including information indicating whether the server device supports the use of the Diffie-Hellman key exchange; and determine whether the server device supports the use of the Diffie-Hellman key exchange based on the stored server cipher preference information. 12. The device of claim 8, where the one or more processors are to: determine that traffic, associated with the secure session, is to be managed using the first decryption technique; and determine, based on determining that the server device does not support the use of the Diffie-Hellman key exchange, that the traffic is to be managed using the second decryption technique rather than the first decryption technique. 13. The device of claim 8, where the Diffie-Hellman key exchange is an elliptic curve Diffie-Hellman key exchange. 14. The device of claim 8, where the one or more processors, when determining whether the server device supports the use of the Diffie-Hellman key exchange, are to: determine a server indicator associated with the server device; perform a lookup based on the server indicator; and determine whether the server device supports the use of the Diffie-Hellman key exchange based on a result of the lookup. 15. A computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors, cause the one or more processors to: receive client cipher information associated with initiating a secure sockets layer session or a transport layer security session (SSL/TLS session), the client cipher information identifying a set of key exchange ciphers supported by a client device associated with the SSL/TLS session; determine, based on the client cipher information, that a Diffie-Hellman key exchange is to be used to establish of the SSL/TLS session; determine whether a server device, associated with the SSL/TLS session, supports use of the Diffie-Hellman key exchange to establish of the SSL/TLS session; and establish the SSL/TLS session using a SSL forward proxy technique based on determining that the server device supports the use of the Diffie-Hellman key exchange or based on being unable to determine whether the server device supports the use of the Diffie-Hellman key exchange; or establish the SSL/TLS session using a SSL inbound inspection technique based on determining that the server device does not support the use of the Diffie-Hellman key exchange. 16. The computer-readable medium of claim 15, where the one or more instructions, that cause the one or more processors to determine that the Diffie-Hellman key exchange is to be used to establish of the SSL/TLS session, cause the one or more processors to: determine, based on the client cipher information, priority information associated with the set of key exchange ciphers supported by the client device; and determine, based on the priority information, that the Diffie-Hellman key exchange is to be used to establish of the SSL/TLS session. 17. The computer-readable medium of claim 15, where the one or more instructions, after causing the one or more processors to determine that the SSL inbound inspection technique is to be used to establish of the SSL/TLS session based on determining that the server device does not support the use of the Diffie-Hellman key exchange, further cause the one or more processors to: receive a server hello message associated with initiating the SSL/TLS session, the server hello message indicating that the server device supports the use of the Diffie-Hellman key exchange; and establish the SSL/TLS session, using the SSL forward proxy technique, based on the server hello message indicating that the server device supports the use of the Diffie-Hellman key exchange. 18. The computer-readable medium of claim 15, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: receive a client hello message associated with initiating the SSL/TLS session, the client hello message including the client cipher information; and where the one or more instructions, that cause the one or more processors to receive the client cipher information, cause the one or more processors to: receive the client cipher information based on receiving the client hello message associated with initiating the SSL/TLS session. 19. The computer-readable medium of claim 15, where the one or more instructions, that cause the one or more processors to determine whether the server device supports the use of the Diffie-Hellman key exchange, cause the one or more processors to: store server cipher preference information associated with the server device, the server cipher preference information including information indicating whether the server device supports the use of the Diffie-Hellman key exchange; and determine whether the server device supports the use of the Diffie-Hellman key exchange based on the stored server cipher preference information. 20. The computer-readable medium of claim 15, where the one or more instructions, that cause the one or more processors to determine whether the server device supports the use of the Diffie-Hellman key exchange, cause the one or more processors to: determine a server indicator associated with the server device; perform a lookup based on the server indicator; and determine whether the server device supports the use of the Diffie-Hellman key exchange based on a result of the lookup.
A device may receive client cipher information, associated with initiating a secure session, identifying at least one key exchange cipher supported by a client device associated with the secure session. The device may determine, based on the client cipher information, that a Diffie-Hellman key exchange is to be used to establish the secure session. The device may determine whether a server device, associated with the secure session, supports use of the Diffie-Hellman key exchange. The device may manage establishment of the secure session using a first decryption technique based on determining that the server device does not support the use of the Diffie-Hellman key exchange, or manage establishment of the secure session using a second decryption technique based on determining that the server device supports the use of the Diffie-Hellman key exchange or being unable to determine whether the server device supports the use of the Diffie-Hellman key exchange.1. A method, comprising: receiving, by a device, client cipher information associated with initiating a secure session, the client cipher information identifying one or more key exchange ciphers supported by a client device associated with the secure session; determining, by the device and based on the client cipher information, that the client device prefers use of a Diffie-Hellman key exchange to establish the secure session; determining, by the device, whether a server device, associated with the secure session, supports the use of the Diffie-Hellman key exchange to establish the secure session; and selectively establishing, by the device, the secure session using a first decryption technique or a second decryption technique based on determining whether the server device supports the use of the Diffie-Hellman key exchange, the first decryption technique being different from the second decryption technique. 2. The method of claim 1, comprising: receiving a message associated with initiating the secure session, the message including the client cipher information; and where receiving the client cipher information comprises: receiving the client cipher information based on receiving the message associated with initiating the secure session. 3. The method of claim 1, where determining whether the server device supports the use of the Diffie-Hellman key exchange comprises: receiving server cipher preference information associated with the server device, the server cipher preference information including information indicating whether the server device supports the use of the Diffie-Hellman key exchange; and determining whether the server device supports the use of the Diffie-Hellman key exchange based on the received server cipher preference information. 4. The method of claim 1, further comprising: determining that traffic, associated with the secure session, is to be managed using the first decryption technique; and determining, based on determining that the server device does not support the use of the Diffie-Hellman key exchange, that the traffic is to be managed using the second decryption technique rather than the first decryption technique. 5. The method of claim 1, where the first decryption technique is a secure sockets layer (SSL) forward proxy technique and the second decryption technique is a SSL inbound inspection technique. 6. The method of claim 1, where determining whether the server device supports the use of the Diffie-Hellman key exchange comprises: determining, based on a message associated with initiating the secure session, a server indicator associated with the server device; performing a lookup based on the server indicator; and determining whether the server device supports the use of the Diffie-Hellman key exchange based on a result of the lookup. 7. The method of claim 1, where the secure session is a secure sockets layer (SSL) session or a transport layer security (TLS) session. 8. A device, comprising: one or more processors to: receive client cipher information associated with initiating a secure session, the client cipher information identifying at least one key exchange cipher supported by a client device associated with the secure session; determine, based on the client cipher information, that a Diffie-Hellman key exchange is to be used to establish the secure session; determine whether a server device, associated with the secure session, supports use of the Diffie-Hellman key exchange to establish the secure session; and manage establishment of the secure session using a first decryption technique based on determining that the server device does not support the use of the Diffie-Hellman key exchange; manage establishment of the secure session using a second decryption technique based on determining that the server device supports the use of the Diffie-Hellman key exchange; or manage establishment of the secure session using the second decryption technique based on being unable to determine whether the server device supports the use of the Diffie-Hellman key exchange. 9. The device of claim 8, where the one or more processors, when determining that the Diffie-Hellman key exchange is to be used to establish the secure session, are to: determine, based on the client cipher information, priority information associated with the at least on key exchange cipher supported by the client device; and determine that the Diffie-Hellman key exchange is to be used based on the priority information. 10. The device of claim 8, where the one or more processors are to: receive a message associated with initiating the secure session, the message including the client cipher information; and where the one or more processors, when receiving the client cipher information, are to: receive the client cipher information based on receiving the message associated with initiating the secure session. 11. The device of claim 8, where the one or more processors, when determining whether the server device supports the use of the Diffie-Hellman key exchange, are to: store server cipher preference information associated with the server device, the server cipher preference information including information indicating whether the server device supports the use of the Diffie-Hellman key exchange; and determine whether the server device supports the use of the Diffie-Hellman key exchange based on the stored server cipher preference information. 12. The device of claim 8, where the one or more processors are to: determine that traffic, associated with the secure session, is to be managed using the first decryption technique; and determine, based on determining that the server device does not support the use of the Diffie-Hellman key exchange, that the traffic is to be managed using the second decryption technique rather than the first decryption technique. 13. The device of claim 8, where the Diffie-Hellman key exchange is an elliptic curve Diffie-Hellman key exchange. 14. The device of claim 8, where the one or more processors, when determining whether the server device supports the use of the Diffie-Hellman key exchange, are to: determine a server indicator associated with the server device; perform a lookup based on the server indicator; and determine whether the server device supports the use of the Diffie-Hellman key exchange based on a result of the lookup. 15. A computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors, cause the one or more processors to: receive client cipher information associated with initiating a secure sockets layer session or a transport layer security session (SSL/TLS session), the client cipher information identifying a set of key exchange ciphers supported by a client device associated with the SSL/TLS session; determine, based on the client cipher information, that a Diffie-Hellman key exchange is to be used to establish of the SSL/TLS session; determine whether a server device, associated with the SSL/TLS session, supports use of the Diffie-Hellman key exchange to establish of the SSL/TLS session; and establish the SSL/TLS session using a SSL forward proxy technique based on determining that the server device supports the use of the Diffie-Hellman key exchange or based on being unable to determine whether the server device supports the use of the Diffie-Hellman key exchange; or establish the SSL/TLS session using a SSL inbound inspection technique based on determining that the server device does not support the use of the Diffie-Hellman key exchange. 16. The computer-readable medium of claim 15, where the one or more instructions, that cause the one or more processors to determine that the Diffie-Hellman key exchange is to be used to establish of the SSL/TLS session, cause the one or more processors to: determine, based on the client cipher information, priority information associated with the set of key exchange ciphers supported by the client device; and determine, based on the priority information, that the Diffie-Hellman key exchange is to be used to establish of the SSL/TLS session. 17. The computer-readable medium of claim 15, where the one or more instructions, after causing the one or more processors to determine that the SSL inbound inspection technique is to be used to establish of the SSL/TLS session based on determining that the server device does not support the use of the Diffie-Hellman key exchange, further cause the one or more processors to: receive a server hello message associated with initiating the SSL/TLS session, the server hello message indicating that the server device supports the use of the Diffie-Hellman key exchange; and establish the SSL/TLS session, using the SSL forward proxy technique, based on the server hello message indicating that the server device supports the use of the Diffie-Hellman key exchange. 18. The computer-readable medium of claim 15, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: receive a client hello message associated with initiating the SSL/TLS session, the client hello message including the client cipher information; and where the one or more instructions, that cause the one or more processors to receive the client cipher information, cause the one or more processors to: receive the client cipher information based on receiving the client hello message associated with initiating the SSL/TLS session. 19. The computer-readable medium of claim 15, where the one or more instructions, that cause the one or more processors to determine whether the server device supports the use of the Diffie-Hellman key exchange, cause the one or more processors to: store server cipher preference information associated with the server device, the server cipher preference information including information indicating whether the server device supports the use of the Diffie-Hellman key exchange; and determine whether the server device supports the use of the Diffie-Hellman key exchange based on the stored server cipher preference information. 20. The computer-readable medium of claim 15, where the one or more instructions, that cause the one or more processors to determine whether the server device supports the use of the Diffie-Hellman key exchange, cause the one or more processors to: determine a server indicator associated with the server device; perform a lookup based on the server indicator; and determine whether the server device supports the use of the Diffie-Hellman key exchange based on a result of the lookup.
2,400
9,236
9,236
15,557,940
2,459
Examples disclosed herein relate to hardware bus redirection. Some examples disclosed herein may include storing, in a data storage, a connection type associated with a resource locator and obtaining an indication that a web browser connection comprising the resource locator has been initiated at the computing device. In response to the indication, some examples disclosed herein may include determining whether the connection type associated with the resource locator corresponds to a remote connection. In response to determining that the connection type corresponds to the remote connection, some examples disclosed herein may include enabling hardware bus redirection for the remote connection.
1. A method for execution by a computing device for hardware bus redirection, the method comprising: storing, in a data storage, a connection type associated with a resource locator; obtaining an indication that a web browser connection comprising the resource locator has been initiated at the computing device; in response to the indication, determining whether the connection type associated with the resource locator corresponds to a remote connection; and in response to determining that the connection type corresponds to the remote connection, enabling hardware bus redirection for the remote connection. 2. The method of claim 1, wherein the connection type comprises a remote protocol, and wherein the remote connection is established via the remote protocol that is used by the computing device for communication with a server computing device. 3. The method of claim 2, wherein the hardware bus redirection allows the server computing device to communicate with a hardware bus device that is locally connected to the computing device. 4. The method of claim 1, wherein storing, in the data storage, the connection type associated with the resource locator comprises: analyzing the resource locator to determine the connection type; and generating a recommendation that recommends the connection type for the resource locator. 5. The method of claim 2, wherein enabling the hardware bus redirection for the remote connection comprises: determining whether the hardware bus redirection is supported by the remote protocol; and in response to determining that the hardware bus redirection is supported by the remote protocol, enabling, the hardware bus redirection for the remote connection. 6. The method of claim 5, further comprising: in response to determining that the hardware bus redirection is not supported by the remote protocol, allowing a local operating system of the computing device to access a hardware bus device that is locally connected to the computing device. 7. The method of claim 1, wherein the remote connection is a remote desktop connection or a remote application connection. 8. A machine-readable storage medium comprising instructions executable by a processor of a computing device for hardware bus redirection, the machine-readable storage medium comprising: instructions to analyze a plurality of resource locators to determine a connection type for each of the plurality of resource locators, the plurality of resource locators comprising a particular resource locator; instructions to obtain an indication that a web browser connection comprising the particular resource locator has been initiated at the computing device; in response to the indication, instructions to determine whether the web browser connection corresponds to a remote connection based on the connection type associated with the particular resource locator; and in response to determining that the web browser connection corresponds to the remote connection, instructions to enable hardware bus redirection for the remote connection. 9. The machine-readable storage medium of claim 8, wherein the instructions to analyze the plurality of resource locators to determine the connection type for each of the plurality of resource locators further comprise: instructions to generate a recommendation as to the connection type for the particular resource locator based on the analysis; instructions to provide the recommendation to a user of the computing device; and instructions to obtain an indication that the recommendation is accepted by the user. 10. The machine-readable storage medium of claim 8, wherein the connection type comprises a particular remote desktop protocol, and wherein the remote connection, that is established via the particular remote desktop protocol, allows a user of the computing device to interact with a remote desktop processed by a server computing device in the same manner as a local desktop processed by the computing device. 11. The machine-readable storage medium of claim 10, further comprises: instructions to determine whether the particular remote desktop protocol supports the hardware bus redirection prior to enabling the hardware bus redirection for the remote connection. 12. A system for hardware bus redirection comprising: a computing device comprising: a connection type engine to: provide a first recommendation that recommends a first connection type for a first resource locator to a user of the computing device, and obtain an indication that the first recommendation is accepted by the user; and a hardware bus redirection engine to: in response to a first web browser connection comprising the first resource locator has been initiated at the computing device, enable hardware bus redirection for a remote connection of the first connection type, wherein the hardware bus redirection, when enabled, allows a server computing device to access a hardware bus device that locally connected to the computing device. 13. The system of claim 12, wherein the first connection type comprises a first remote protocol, the hardware bus redirection engine to: determine whether the hardware bus redirection is supported by the first remote protocol; and in response to determining that the hardware bus redirection is supported by the first remote protocol, enable the hardware bus redirection for the remote connection to be established using the first remote protocol. 14. The system of claim 12, wherein the first connection type comprises a second remote protocol, the hardware bus redirection engine to: determine whether the hardware bus redirection is supported by the second remote protocol; and in response to determining that he hardware bus redirection is supported by the second remote protocol, enable the hardware bus redirection for the remote connection to be established using the second remote protocol. 15. The system of claim 12, the connection type engine to: provide a second recommendation that recommends a second connection type for a second resource locator to the user of the computing device, the second connection type indicating that the second resource locator is not the remote connection, and obtain an indication that the second recommendation is accepted by the user; and the hardware bus redirection engine to: in response to a second web browser connection comprising the second resource locator has been initiated at the computing device, allow a local operating system of the computing device to access the hardware bus device that is locally connected to the computing device.
Examples disclosed herein relate to hardware bus redirection. Some examples disclosed herein may include storing, in a data storage, a connection type associated with a resource locator and obtaining an indication that a web browser connection comprising the resource locator has been initiated at the computing device. In response to the indication, some examples disclosed herein may include determining whether the connection type associated with the resource locator corresponds to a remote connection. In response to determining that the connection type corresponds to the remote connection, some examples disclosed herein may include enabling hardware bus redirection for the remote connection.1. A method for execution by a computing device for hardware bus redirection, the method comprising: storing, in a data storage, a connection type associated with a resource locator; obtaining an indication that a web browser connection comprising the resource locator has been initiated at the computing device; in response to the indication, determining whether the connection type associated with the resource locator corresponds to a remote connection; and in response to determining that the connection type corresponds to the remote connection, enabling hardware bus redirection for the remote connection. 2. The method of claim 1, wherein the connection type comprises a remote protocol, and wherein the remote connection is established via the remote protocol that is used by the computing device for communication with a server computing device. 3. The method of claim 2, wherein the hardware bus redirection allows the server computing device to communicate with a hardware bus device that is locally connected to the computing device. 4. The method of claim 1, wherein storing, in the data storage, the connection type associated with the resource locator comprises: analyzing the resource locator to determine the connection type; and generating a recommendation that recommends the connection type for the resource locator. 5. The method of claim 2, wherein enabling the hardware bus redirection for the remote connection comprises: determining whether the hardware bus redirection is supported by the remote protocol; and in response to determining that the hardware bus redirection is supported by the remote protocol, enabling, the hardware bus redirection for the remote connection. 6. The method of claim 5, further comprising: in response to determining that the hardware bus redirection is not supported by the remote protocol, allowing a local operating system of the computing device to access a hardware bus device that is locally connected to the computing device. 7. The method of claim 1, wherein the remote connection is a remote desktop connection or a remote application connection. 8. A machine-readable storage medium comprising instructions executable by a processor of a computing device for hardware bus redirection, the machine-readable storage medium comprising: instructions to analyze a plurality of resource locators to determine a connection type for each of the plurality of resource locators, the plurality of resource locators comprising a particular resource locator; instructions to obtain an indication that a web browser connection comprising the particular resource locator has been initiated at the computing device; in response to the indication, instructions to determine whether the web browser connection corresponds to a remote connection based on the connection type associated with the particular resource locator; and in response to determining that the web browser connection corresponds to the remote connection, instructions to enable hardware bus redirection for the remote connection. 9. The machine-readable storage medium of claim 8, wherein the instructions to analyze the plurality of resource locators to determine the connection type for each of the plurality of resource locators further comprise: instructions to generate a recommendation as to the connection type for the particular resource locator based on the analysis; instructions to provide the recommendation to a user of the computing device; and instructions to obtain an indication that the recommendation is accepted by the user. 10. The machine-readable storage medium of claim 8, wherein the connection type comprises a particular remote desktop protocol, and wherein the remote connection, that is established via the particular remote desktop protocol, allows a user of the computing device to interact with a remote desktop processed by a server computing device in the same manner as a local desktop processed by the computing device. 11. The machine-readable storage medium of claim 10, further comprises: instructions to determine whether the particular remote desktop protocol supports the hardware bus redirection prior to enabling the hardware bus redirection for the remote connection. 12. A system for hardware bus redirection comprising: a computing device comprising: a connection type engine to: provide a first recommendation that recommends a first connection type for a first resource locator to a user of the computing device, and obtain an indication that the first recommendation is accepted by the user; and a hardware bus redirection engine to: in response to a first web browser connection comprising the first resource locator has been initiated at the computing device, enable hardware bus redirection for a remote connection of the first connection type, wherein the hardware bus redirection, when enabled, allows a server computing device to access a hardware bus device that locally connected to the computing device. 13. The system of claim 12, wherein the first connection type comprises a first remote protocol, the hardware bus redirection engine to: determine whether the hardware bus redirection is supported by the first remote protocol; and in response to determining that the hardware bus redirection is supported by the first remote protocol, enable the hardware bus redirection for the remote connection to be established using the first remote protocol. 14. The system of claim 12, wherein the first connection type comprises a second remote protocol, the hardware bus redirection engine to: determine whether the hardware bus redirection is supported by the second remote protocol; and in response to determining that he hardware bus redirection is supported by the second remote protocol, enable the hardware bus redirection for the remote connection to be established using the second remote protocol. 15. The system of claim 12, the connection type engine to: provide a second recommendation that recommends a second connection type for a second resource locator to the user of the computing device, the second connection type indicating that the second resource locator is not the remote connection, and obtain an indication that the second recommendation is accepted by the user; and the hardware bus redirection engine to: in response to a second web browser connection comprising the second resource locator has been initiated at the computing device, allow a local operating system of the computing device to access the hardware bus device that is locally connected to the computing device.
2,400
9,237
9,237
15,978,365
2,483
Systems and methods for using peripheral vision in virtual, augmented, and mixed reality (collectively referred to as “xR”) applications are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: render an object in a peripheral field-of-view of a user; detect at least one of: the user's eye movement, or the user's head rotation; and determine whether to re-render the object based upon the detection.
1. A Head-Mounted Device (HMD) wearable by a user, the HMD, comprising: a processor; a display coupled to the processor, the display having a main portion, a left peripheral portion, and a right peripheral portion; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the HMD to: display an object on one of: the right peripheral portion or the left peripheral portion; detect an amount of at least one of: the user's eye movement, or the user's head rotation; and determine whether to display or conceal the object based upon whether amount is greater than a threshold value. 2. (canceled) 3. The HMD of claim 1, wherein the main portion comprises a Digital Light Processing (DLP) device, and wherein each of the left and right peripheral portions comprises a curved organic light-emitting diode (OLED) device. 4. The HMD of claim 1, wherein the object is part of a Graphical User Interface (GUI) presented to the user during execution of a virtual, augmented, or mixed reality (xR) application. 5. The HMD of claim 1, wherein in response to detection of eye movement from a forward position to a peripheral position, the program instructions, upon execution, further cause the HMD to display the object at a different position of the one of the right peripheral portion or the left peripheral portion, shifted in the direction of the eye movement. 6. The HMD of claim 1, wherein to detect the amount, the program instructions, upon execution, further cause the HMD to determine a speed of the head rotation, and wherein to determine whether to display or conceal the object, the program instructions, upon execution, further cause the HMD to display the object on the one of the right peripheral portion or the left peripheral portion in response to the speed being below the threshold value. 7. The HMD of claim 1, wherein to detect the amount, the program instructions, upon execution, further cause the HMD to determine a speed of the head rotation, and wherein to determine whether to display or conceal the object, the program instructions, upon execution, further cause the HMD to display the object in the one of the right peripheral portion or the left peripheral portion shifted in a direction opposite the head rotation in response to the speed being above the threshold value. 8. The HMD of claim 1, wherein to detect the amount, the program instructions, upon execution, further cause the HMD to determine a speed of the head rotation, and wherein to determine whether to display or conceal the object, the program instructions, upon execution, further cause the HMD to conceal the object during at least a portion of the head rotation in response to the speed being above the threshold value. 9. The HMD of claim 1, wherein the program instructions, upon execution, cause the HMD to identify the peripheral field-of-view, for the user, prior the rendering the object. 10. The HMD of claim 9, wherein to identify the peripheral field-of-view, the program instructions, upon execution, further cause the HMD to: render an initial object; enable the user to displace the initial object in a given direction until the object at least partially disappears from the user's peripheral field-of-view; and record an extent of the peripheral field-of-view in the given direction based upon the displacement. 11. A method, comprising: displaying a first object on a first peripheral region of a display, wherein the display is part of a user's headset; displaying a second object on a second peripheral region of the display, wherein the first and second peripheral regions are at opposing sides of a main display portion of the display; monitoring the user's eye movement and head rotation; and displaying the first and second objects on a single peripheral region of the display in response to the monitoring. 12. The method of claim 11, wherein the second peripheral region is to the right of the main portion, wherein the first peripheral region is to the left of the main portion, and wherein displaying the first and second objects on the single peripheral region comprises displaying the first and second objects on the second peripheral region in response to the eye movement being in a right direction. 13. The method of claim 11, wherein the second peripheral region is to the left of the main portion, wherein the first peripheral region is to the right of the main portion, and wherein displaying the first and second objects on the single peripheral region comprises displaying the first and second objects on the second peripheral region in response to the eye movement being in a left direction. 14. The method of claim 11, wherein the single peripheral region is on a same side of the display as a direction of the head rotation in response to the monitoring determining that the head rotation has a speed below a threshold value. 15. The method of claim 11, wherein the single peripheral region is on an opposite side of the display as a direction of the head rotation in response to the monitoring determining that the head rotation has a speed above a threshold value. 16. The method of claim 11, further comprising waiting to display the object until completion of a head rotation. 17. A hardware memory device coupled to a headset, wherein the headset comprises a display having a main portion, a left peripheral portion, and a right peripheral portion, the hardware memory device having program instructions stored thereon that, upon execution by a hardware processor coupled to the headset, cause the hardware processor to: display an object on a selected one of the left or right peripheral portions; detect a speed of a user's head rotation; and determine, in response to the detection, whether to display the object on the selected peripheral portion. 18. The hardware memory device of claim 17, wherein the program instructions further cause the hardware processor to display the object on the selected peripheral portion, at least in part, in response to the speed being below a threshold value. 19. The hardware memory device of claim 17, wherein the program instructions further cause the hardware processor to display the object on a different peripheral portion than the selected peripheral portion, at least in part, in response to the speed being above a threshold value. 20. The hardware memory device of claim 17, wherein the program instructions further cause the hardware processor to omit the object from both the first and second peripheral portions in response to the speed being above a threshold value.
Systems and methods for using peripheral vision in virtual, augmented, and mixed reality (collectively referred to as “xR”) applications are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: render an object in a peripheral field-of-view of a user; detect at least one of: the user's eye movement, or the user's head rotation; and determine whether to re-render the object based upon the detection.1. A Head-Mounted Device (HMD) wearable by a user, the HMD, comprising: a processor; a display coupled to the processor, the display having a main portion, a left peripheral portion, and a right peripheral portion; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the HMD to: display an object on one of: the right peripheral portion or the left peripheral portion; detect an amount of at least one of: the user's eye movement, or the user's head rotation; and determine whether to display or conceal the object based upon whether amount is greater than a threshold value. 2. (canceled) 3. The HMD of claim 1, wherein the main portion comprises a Digital Light Processing (DLP) device, and wherein each of the left and right peripheral portions comprises a curved organic light-emitting diode (OLED) device. 4. The HMD of claim 1, wherein the object is part of a Graphical User Interface (GUI) presented to the user during execution of a virtual, augmented, or mixed reality (xR) application. 5. The HMD of claim 1, wherein in response to detection of eye movement from a forward position to a peripheral position, the program instructions, upon execution, further cause the HMD to display the object at a different position of the one of the right peripheral portion or the left peripheral portion, shifted in the direction of the eye movement. 6. The HMD of claim 1, wherein to detect the amount, the program instructions, upon execution, further cause the HMD to determine a speed of the head rotation, and wherein to determine whether to display or conceal the object, the program instructions, upon execution, further cause the HMD to display the object on the one of the right peripheral portion or the left peripheral portion in response to the speed being below the threshold value. 7. The HMD of claim 1, wherein to detect the amount, the program instructions, upon execution, further cause the HMD to determine a speed of the head rotation, and wherein to determine whether to display or conceal the object, the program instructions, upon execution, further cause the HMD to display the object in the one of the right peripheral portion or the left peripheral portion shifted in a direction opposite the head rotation in response to the speed being above the threshold value. 8. The HMD of claim 1, wherein to detect the amount, the program instructions, upon execution, further cause the HMD to determine a speed of the head rotation, and wherein to determine whether to display or conceal the object, the program instructions, upon execution, further cause the HMD to conceal the object during at least a portion of the head rotation in response to the speed being above the threshold value. 9. The HMD of claim 1, wherein the program instructions, upon execution, cause the HMD to identify the peripheral field-of-view, for the user, prior the rendering the object. 10. The HMD of claim 9, wherein to identify the peripheral field-of-view, the program instructions, upon execution, further cause the HMD to: render an initial object; enable the user to displace the initial object in a given direction until the object at least partially disappears from the user's peripheral field-of-view; and record an extent of the peripheral field-of-view in the given direction based upon the displacement. 11. A method, comprising: displaying a first object on a first peripheral region of a display, wherein the display is part of a user's headset; displaying a second object on a second peripheral region of the display, wherein the first and second peripheral regions are at opposing sides of a main display portion of the display; monitoring the user's eye movement and head rotation; and displaying the first and second objects on a single peripheral region of the display in response to the monitoring. 12. The method of claim 11, wherein the second peripheral region is to the right of the main portion, wherein the first peripheral region is to the left of the main portion, and wherein displaying the first and second objects on the single peripheral region comprises displaying the first and second objects on the second peripheral region in response to the eye movement being in a right direction. 13. The method of claim 11, wherein the second peripheral region is to the left of the main portion, wherein the first peripheral region is to the right of the main portion, and wherein displaying the first and second objects on the single peripheral region comprises displaying the first and second objects on the second peripheral region in response to the eye movement being in a left direction. 14. The method of claim 11, wherein the single peripheral region is on a same side of the display as a direction of the head rotation in response to the monitoring determining that the head rotation has a speed below a threshold value. 15. The method of claim 11, wherein the single peripheral region is on an opposite side of the display as a direction of the head rotation in response to the monitoring determining that the head rotation has a speed above a threshold value. 16. The method of claim 11, further comprising waiting to display the object until completion of a head rotation. 17. A hardware memory device coupled to a headset, wherein the headset comprises a display having a main portion, a left peripheral portion, and a right peripheral portion, the hardware memory device having program instructions stored thereon that, upon execution by a hardware processor coupled to the headset, cause the hardware processor to: display an object on a selected one of the left or right peripheral portions; detect a speed of a user's head rotation; and determine, in response to the detection, whether to display the object on the selected peripheral portion. 18. The hardware memory device of claim 17, wherein the program instructions further cause the hardware processor to display the object on the selected peripheral portion, at least in part, in response to the speed being below a threshold value. 19. The hardware memory device of claim 17, wherein the program instructions further cause the hardware processor to display the object on a different peripheral portion than the selected peripheral portion, at least in part, in response to the speed being above a threshold value. 20. The hardware memory device of claim 17, wherein the program instructions further cause the hardware processor to omit the object from both the first and second peripheral portions in response to the speed being above a threshold value.
2,400
9,238
9,238
15,821,142
2,443
A building management system includes a remote rules server and a local rules server. The local rules server is located at a customer site, and includes a standard rules database and a custom rules database. The standard rules database stores standard rules and the custom rules database stores user-created rules. The local rules server is configured to allow a customer to create a new user-created rule and send the new user-created rule to the remote rules server. The remote rules server is configured to receive the new user-created rule and provide the new user-created rule to one or more other local rules servers located at one or more other customer sites.
1. A building management system comprising: a remote rules server; a local rules server located at a customer site, the local rules server comprising a standard rules database and a custom rules database, the standard rules database configured to store standard rules and the custom rules database configured to store user-created rules, the local rules server configured to: allow a customer to create a new user-created rule; and send the new user-created rule to the remote rules server; wherein the remote rules server is configured to: receive the new user-created rule; and provide the new user-created rule to one or more other local rules servers located at one or more other customer sites. 2. The building management system of claim 1, the remote rules server further configured to: notify a reviewer that the new user-created rule was created; allow the reviewer to validate the new user-created rule and signal an approval; and authorize activation of the validated new user-created rule in response to the approval. 3. The building management system of claim 1, further comprising a user preferences module configured to: receive a customer sharing preference indicating a preference of the customer to share or not share user-created rules and, if the customer has indicated a preference to not share user-created rules: prevent the remote rules server from sending the user-created rule to the one or more other local rules servers; and prevent the local rules server from receiving custom rules created by other customers. 4. The building management system of claim 1, further comprising a fault detection and diagnostics module configured to apply the standard rules and the custom rules to a building equipment dataset; wherein the local rules server further comprises an interface generator configured to generate a user interface that allows a user to select which rules from the standard rules database and the custom rules database are applied by the fault detection and diagnostics module. 5. The building management system of claim 4, wherein the rules comprise fault rules and diagnostic rules, and wherein the user interface is further configured to allow the user to map the diagnostic rules to the fault rules. 6. The building management system of claim 4, wherein each rule comprises a rule description and a rule equation; and wherein the user interface is configured to display the rule description for each rule and hide the rule equation for user-created rules created by a different customer. 7. The building management system of claim 1, wherein the local rules server is further configured to allow a user to edit a user-created rule and send the edited user-created rule to the remote rules server; wherein the remote rules server is further configured to receive the edited user-created rule; notify a reviewer that the edited user-created rule was edited; allow the reviewer to validate the edited user-created rule; and send the edited user-created rule to the one or more other local rules servers. 8. A method for managing a building comprising: storing standard rules in a standard rules database and user-created rules in a custom rules database, the standard rules database and the custom rules database located in a local rules server; allowing a customer to create a new user-created rule; and sending the new user-created rule to a remote rules server; receiving the new user-created rule at the remote rules server; and providing the new user-created rule from the remote rules server to one or more other local rules servers located at one or more other customer sites. 9. The method of claim 8, further comprising: notifying a reviewer that the new user-created rule was created; allowing the reviewer to validate the new user-created rule and provide an approval to the remote rules server; and activating the new user-created rule in response to the approval. 10. The method of claim 9, further comprising: receiving a customer sharing preference indicating preference of the customer to share or not share user-created rules; and, if the customer has indicated a preference to not share user-created rules: preventing the remote rules server from sending the user-created rule to the one or more other local rules servers; and preventing the local rules server from receiving custom rules created by other customers. 11. The method of claim 9, editing user-created rules at the local rules server and sending the edited user-created rule to the remote rules server; receiving the edited user-created rule at the remote rules server; notifying a reviewer that the edited user-created rule was edited; allowing the reviewer to validate the edited user-created rule; and sending the edited user-created rule from the remote rules server to the one or more additional local rules servers. 12. The method of claim 9, further comprising generating a user interface that allows a user to select which rules from the standard rules database and the custom rules database are applied by a fault detection and diagnostics module. 13. The method of claim 12, wherein the rules comprise fault rules and diagnostic rules, and wherein the user interface allows the user to map the diagnostic rules to the fault rules. 14. The method of claim 12, wherein each rule comprises a rule description and a rule equation; and wherein the user interface displays the rule description for each rule and hide the rule equation for user-created rules created by a different customer. 15. A building management system comprising: a global rules database; a plurality of local rules servers in communication with the global rules database, each local rules server configured to: allow a user to create a user-created rule; send the user-created rule to a reviewer for validation; receive confirmation of rule validation; and upload the validated user-created rule to the global rules database. 16. The building management system of claim 15, wherein the global rules database comprises a standard rules database storing standard rules and a custom rules library storing user-created rules; wherein each local rules server is further configured to: access the standard rules database and the custom rules database to provide a list of standard rules and a list of user-created rules on a user interface, wherein the user interface is configured to allow a user to select rules from the list of standard rules and the list of user-created rules to be applied to a building equipment dataset. 17. The building management system of claim 15, further comprising a user preferences module configured to: provide the terms of conditions of the building management system; and provide an option to opt-in or opt-out of sharing user-created rules. 18. The building management system of claim 16, wherein each rule comprises a rule description and a rule equation; and wherein the user interface is configured to display the rule description for each rule and hide the rule equation for user-created rules created by a different customer. 19. The building management system of claim 18, wherein the rules comprise fault rules and diagnostic rules, and wherein the user interface is further configured to allow the user to map the diagnostic rules to the fault rules. 20. The building management system of claim 15, wherein each local rules server is further configured to: allow a user to edit a user-created rule created using the local rules server; send the edited user-created rule to a reviewer for validation; receive a confirmation of rule validation; and send the edited user-created rule to the global rules database; wherein the global rule library is further configured to replace the user-created rule with the edited user-created rule in the custom rules database.
A building management system includes a remote rules server and a local rules server. The local rules server is located at a customer site, and includes a standard rules database and a custom rules database. The standard rules database stores standard rules and the custom rules database stores user-created rules. The local rules server is configured to allow a customer to create a new user-created rule and send the new user-created rule to the remote rules server. The remote rules server is configured to receive the new user-created rule and provide the new user-created rule to one or more other local rules servers located at one or more other customer sites.1. A building management system comprising: a remote rules server; a local rules server located at a customer site, the local rules server comprising a standard rules database and a custom rules database, the standard rules database configured to store standard rules and the custom rules database configured to store user-created rules, the local rules server configured to: allow a customer to create a new user-created rule; and send the new user-created rule to the remote rules server; wherein the remote rules server is configured to: receive the new user-created rule; and provide the new user-created rule to one or more other local rules servers located at one or more other customer sites. 2. The building management system of claim 1, the remote rules server further configured to: notify a reviewer that the new user-created rule was created; allow the reviewer to validate the new user-created rule and signal an approval; and authorize activation of the validated new user-created rule in response to the approval. 3. The building management system of claim 1, further comprising a user preferences module configured to: receive a customer sharing preference indicating a preference of the customer to share or not share user-created rules and, if the customer has indicated a preference to not share user-created rules: prevent the remote rules server from sending the user-created rule to the one or more other local rules servers; and prevent the local rules server from receiving custom rules created by other customers. 4. The building management system of claim 1, further comprising a fault detection and diagnostics module configured to apply the standard rules and the custom rules to a building equipment dataset; wherein the local rules server further comprises an interface generator configured to generate a user interface that allows a user to select which rules from the standard rules database and the custom rules database are applied by the fault detection and diagnostics module. 5. The building management system of claim 4, wherein the rules comprise fault rules and diagnostic rules, and wherein the user interface is further configured to allow the user to map the diagnostic rules to the fault rules. 6. The building management system of claim 4, wherein each rule comprises a rule description and a rule equation; and wherein the user interface is configured to display the rule description for each rule and hide the rule equation for user-created rules created by a different customer. 7. The building management system of claim 1, wherein the local rules server is further configured to allow a user to edit a user-created rule and send the edited user-created rule to the remote rules server; wherein the remote rules server is further configured to receive the edited user-created rule; notify a reviewer that the edited user-created rule was edited; allow the reviewer to validate the edited user-created rule; and send the edited user-created rule to the one or more other local rules servers. 8. A method for managing a building comprising: storing standard rules in a standard rules database and user-created rules in a custom rules database, the standard rules database and the custom rules database located in a local rules server; allowing a customer to create a new user-created rule; and sending the new user-created rule to a remote rules server; receiving the new user-created rule at the remote rules server; and providing the new user-created rule from the remote rules server to one or more other local rules servers located at one or more other customer sites. 9. The method of claim 8, further comprising: notifying a reviewer that the new user-created rule was created; allowing the reviewer to validate the new user-created rule and provide an approval to the remote rules server; and activating the new user-created rule in response to the approval. 10. The method of claim 9, further comprising: receiving a customer sharing preference indicating preference of the customer to share or not share user-created rules; and, if the customer has indicated a preference to not share user-created rules: preventing the remote rules server from sending the user-created rule to the one or more other local rules servers; and preventing the local rules server from receiving custom rules created by other customers. 11. The method of claim 9, editing user-created rules at the local rules server and sending the edited user-created rule to the remote rules server; receiving the edited user-created rule at the remote rules server; notifying a reviewer that the edited user-created rule was edited; allowing the reviewer to validate the edited user-created rule; and sending the edited user-created rule from the remote rules server to the one or more additional local rules servers. 12. The method of claim 9, further comprising generating a user interface that allows a user to select which rules from the standard rules database and the custom rules database are applied by a fault detection and diagnostics module. 13. The method of claim 12, wherein the rules comprise fault rules and diagnostic rules, and wherein the user interface allows the user to map the diagnostic rules to the fault rules. 14. The method of claim 12, wherein each rule comprises a rule description and a rule equation; and wherein the user interface displays the rule description for each rule and hide the rule equation for user-created rules created by a different customer. 15. A building management system comprising: a global rules database; a plurality of local rules servers in communication with the global rules database, each local rules server configured to: allow a user to create a user-created rule; send the user-created rule to a reviewer for validation; receive confirmation of rule validation; and upload the validated user-created rule to the global rules database. 16. The building management system of claim 15, wherein the global rules database comprises a standard rules database storing standard rules and a custom rules library storing user-created rules; wherein each local rules server is further configured to: access the standard rules database and the custom rules database to provide a list of standard rules and a list of user-created rules on a user interface, wherein the user interface is configured to allow a user to select rules from the list of standard rules and the list of user-created rules to be applied to a building equipment dataset. 17. The building management system of claim 15, further comprising a user preferences module configured to: provide the terms of conditions of the building management system; and provide an option to opt-in or opt-out of sharing user-created rules. 18. The building management system of claim 16, wherein each rule comprises a rule description and a rule equation; and wherein the user interface is configured to display the rule description for each rule and hide the rule equation for user-created rules created by a different customer. 19. The building management system of claim 18, wherein the rules comprise fault rules and diagnostic rules, and wherein the user interface is further configured to allow the user to map the diagnostic rules to the fault rules. 20. The building management system of claim 15, wherein each local rules server is further configured to: allow a user to edit a user-created rule created using the local rules server; send the edited user-created rule to a reviewer for validation; receive a confirmation of rule validation; and send the edited user-created rule to the global rules database; wherein the global rule library is further configured to replace the user-created rule with the edited user-created rule in the custom rules database.
2,400
9,239
9,239
15,776,974
2,484
During operation a first personal-area network will activate a first camera. The first camera may be manually activated, or triggered by an audio signal. The event that causes the first camera to activate will also cause the personal-area network to send an acoustic signature to other personal-area networks. Personal-area networks that receive the acoustic signature will modify audio triggers so that the acoustic signature can be better distinguished from other noises.
1. A method comprising the steps of: detecting, at a sensor, a triggering event; activating a camera based on the detection of the triggering event; recording audio; and forwarding, via an over-the-air transmitter, an acoustic signature of the ambient audio, wherein the acoustic signature is utilized by a radio to activate a second camera. 2. The method of claim 1 wherein the acoustic signature comprises mel-cepstral coefficients, spectral flatness and/or other measureable audio features. 3. The method of claim 1 wherein the acoustic signature is utilized by the radio to modify or add to existing acoustic signatures used to activate the second camera. 4. The method of claim 1 wherein the sensor comprises a gunshot detector and the triggering event is a detection of a gunshot. 5. The method of claim 1 wherein the sensor comprises a gun-draw sensor, and the triggering event is a gun-drawn event. 6. A method comprising the steps of: receiving, at an over-the-air receiver, an acoustic signature; storing the acoustic signature; receiving audio from a microphone; determining that a triggering event has occurred by comparing received audio to the acoustic signature; and activating a camera based on the triggering event occurring. 7. The method of claim 6 wherein the acoustic signature comprises mel-cepstral coefficients, spectral flatness and/or other measureable audio features. 8. The method of claim 6 further comprising the step of: modifying an existing acoustic signature based on the received acoustic signature. 9. An apparatus comprising: a sensor detecting, a triggering event; a camera; logic circuitry activating the camera based on the detection of the triggering event; a microphone recording ambient audio; and a transmitter forwarding an acoustic signature of the ambient audio, wherein the acoustic signature is utilized by a radio to activate a second camera. 10. The apparatus of claim 9 wherein the acoustic signature comprises mel-cepstral coefficients, spectral flatness and/or other measureable audio features. 11. The apparatus of claim 9 wherein the acoustic signature is utilized by the radio to modify or add to existing acoustic signatures used to activate the second camera. 12. The apparatus of claim 9 wherein the sensor comprises a gunshot detector and the triggering event is a detection of a gunshot. 13. The apparatus of claim 9 wherein the sensor comprises a gun-draw sensor, and the triggering event is a gun-drawn event.
During operation a first personal-area network will activate a first camera. The first camera may be manually activated, or triggered by an audio signal. The event that causes the first camera to activate will also cause the personal-area network to send an acoustic signature to other personal-area networks. Personal-area networks that receive the acoustic signature will modify audio triggers so that the acoustic signature can be better distinguished from other noises.1. A method comprising the steps of: detecting, at a sensor, a triggering event; activating a camera based on the detection of the triggering event; recording audio; and forwarding, via an over-the-air transmitter, an acoustic signature of the ambient audio, wherein the acoustic signature is utilized by a radio to activate a second camera. 2. The method of claim 1 wherein the acoustic signature comprises mel-cepstral coefficients, spectral flatness and/or other measureable audio features. 3. The method of claim 1 wherein the acoustic signature is utilized by the radio to modify or add to existing acoustic signatures used to activate the second camera. 4. The method of claim 1 wherein the sensor comprises a gunshot detector and the triggering event is a detection of a gunshot. 5. The method of claim 1 wherein the sensor comprises a gun-draw sensor, and the triggering event is a gun-drawn event. 6. A method comprising the steps of: receiving, at an over-the-air receiver, an acoustic signature; storing the acoustic signature; receiving audio from a microphone; determining that a triggering event has occurred by comparing received audio to the acoustic signature; and activating a camera based on the triggering event occurring. 7. The method of claim 6 wherein the acoustic signature comprises mel-cepstral coefficients, spectral flatness and/or other measureable audio features. 8. The method of claim 6 further comprising the step of: modifying an existing acoustic signature based on the received acoustic signature. 9. An apparatus comprising: a sensor detecting, a triggering event; a camera; logic circuitry activating the camera based on the detection of the triggering event; a microphone recording ambient audio; and a transmitter forwarding an acoustic signature of the ambient audio, wherein the acoustic signature is utilized by a radio to activate a second camera. 10. The apparatus of claim 9 wherein the acoustic signature comprises mel-cepstral coefficients, spectral flatness and/or other measureable audio features. 11. The apparatus of claim 9 wherein the acoustic signature is utilized by the radio to modify or add to existing acoustic signatures used to activate the second camera. 12. The apparatus of claim 9 wherein the sensor comprises a gunshot detector and the triggering event is a detection of a gunshot. 13. The apparatus of claim 9 wherein the sensor comprises a gun-draw sensor, and the triggering event is a gun-drawn event.
2,400
9,240
9,240
15,127,445
2,441
A software defined networking policy may be generated corresponding to an operation of a network device. A match field may be obtained and provided to the network device. A rule corresponding to the operation may be received from the network device. The rule may be used to generate the software defined networking policy.
1. A method, comprising: obtaining a match field; providing the match field to a network device; receiving a rule from the network device, the rule corresponding to an operation of the network device related to the match field; using the rule to generate a software defined networking (SDN) policy corresponding to the operation. 2. The method of claim 1, further comprising: providing the match field to a plurality of network devices, the network device being one of the plurality; receiving a plurality of rules from a subset of the plurality of network devices, each rule corresponding to a corresponding operation of a corresponding network device of the subset that is related to the match field; and using the plurality of rules to generate the SDN policy. 3. The method of claim 1, further comprising: generating a plurality of flow rules to implement the SDN policy; and transmitting the plurality of flow rules to a plurality of network devices in a network, the network including the plurality of network devices. 4. The method of claim 1, further comprising: receiving a statistic related to the operation; and using the statistic to determine whether to transmit a flow rule to implement the SDN policy. 5. A non-transitory computer readable medium storing instructions executable by a processor to: receive a match field from a network controller; query a legacy application to obtain a legacy network operation related to the match field; and transmit a rule for the legacy network operation to the network controller. 6. The non-transitory computer readable medium of claim 5, storing further instructions executable by the processor to: receive an identification of the legacy application from the network controller. 7. The non-transitory computer readable medium of claim 5, wherein the rule is a software defined networking rule and the legacy network operation is obtained as a legacy rule, and storing further instructions executable by the processor to: convert the legacy rule into the software defined networking rule. 8. The non-transitory computer readable medium of claim 5, storing further instructions executable by the processor to: query the legacy application to obtain a statistic related to the legacy network operation; and transmit the statistic to the network controller. 9. A controller, comprising: a rule collector to collect a rule for a legacy network operation corresponding to a match field from a network device; a policy analyzer to use the rule to determine a policy for packets matching the match field; and a flow programmer to transmit a flow rule to implement the policy. 10. The controller of claim 9, wherein the rule collector is to collect a plurality of legacy rules corresponding to the match field from a corresponding plurality of network devices, the network device being one of the plurality. 11. The controller of claim 10, wherein the policy analyzer is to obtain an overriding requirement and to determine the policy to meet the overriding requirement and to implement a network behavior resulting from the legacy rules. 12. The controller of claim 9, wherein: the rule collector is to collect a hit count for the legacy rule from the network device. 13. The controller of claim 12, wherein: the flow programmer is to transmit the flow rule to the network device if the hit count meets a threshold condition. 14. The controller of claim 9, wherein: the rule collector is to transmit a set of match fields corresponding to a network slice to a plurality of network devices, the first network device being one of the plurality and the match field being one of the set of match fields; the rule collector is to collect a set of rules from the plurality of network devices; and the policy analyzer is to determine the policy from a subset of the rules meeting a rule priority requirement. 15. The controller of claim 9, wherein: the legacy network operation is an access control operation, a quality of service operation, a forwarding operation, a filtering operation, or a multicast operation.
A software defined networking policy may be generated corresponding to an operation of a network device. A match field may be obtained and provided to the network device. A rule corresponding to the operation may be received from the network device. The rule may be used to generate the software defined networking policy.1. A method, comprising: obtaining a match field; providing the match field to a network device; receiving a rule from the network device, the rule corresponding to an operation of the network device related to the match field; using the rule to generate a software defined networking (SDN) policy corresponding to the operation. 2. The method of claim 1, further comprising: providing the match field to a plurality of network devices, the network device being one of the plurality; receiving a plurality of rules from a subset of the plurality of network devices, each rule corresponding to a corresponding operation of a corresponding network device of the subset that is related to the match field; and using the plurality of rules to generate the SDN policy. 3. The method of claim 1, further comprising: generating a plurality of flow rules to implement the SDN policy; and transmitting the plurality of flow rules to a plurality of network devices in a network, the network including the plurality of network devices. 4. The method of claim 1, further comprising: receiving a statistic related to the operation; and using the statistic to determine whether to transmit a flow rule to implement the SDN policy. 5. A non-transitory computer readable medium storing instructions executable by a processor to: receive a match field from a network controller; query a legacy application to obtain a legacy network operation related to the match field; and transmit a rule for the legacy network operation to the network controller. 6. The non-transitory computer readable medium of claim 5, storing further instructions executable by the processor to: receive an identification of the legacy application from the network controller. 7. The non-transitory computer readable medium of claim 5, wherein the rule is a software defined networking rule and the legacy network operation is obtained as a legacy rule, and storing further instructions executable by the processor to: convert the legacy rule into the software defined networking rule. 8. The non-transitory computer readable medium of claim 5, storing further instructions executable by the processor to: query the legacy application to obtain a statistic related to the legacy network operation; and transmit the statistic to the network controller. 9. A controller, comprising: a rule collector to collect a rule for a legacy network operation corresponding to a match field from a network device; a policy analyzer to use the rule to determine a policy for packets matching the match field; and a flow programmer to transmit a flow rule to implement the policy. 10. The controller of claim 9, wherein the rule collector is to collect a plurality of legacy rules corresponding to the match field from a corresponding plurality of network devices, the network device being one of the plurality. 11. The controller of claim 10, wherein the policy analyzer is to obtain an overriding requirement and to determine the policy to meet the overriding requirement and to implement a network behavior resulting from the legacy rules. 12. The controller of claim 9, wherein: the rule collector is to collect a hit count for the legacy rule from the network device. 13. The controller of claim 12, wherein: the flow programmer is to transmit the flow rule to the network device if the hit count meets a threshold condition. 14. The controller of claim 9, wherein: the rule collector is to transmit a set of match fields corresponding to a network slice to a plurality of network devices, the first network device being one of the plurality and the match field being one of the set of match fields; the rule collector is to collect a set of rules from the plurality of network devices; and the policy analyzer is to determine the policy from a subset of the rules meeting a rule priority requirement. 15. The controller of claim 9, wherein: the legacy network operation is an access control operation, a quality of service operation, a forwarding operation, a filtering operation, or a multicast operation.
2,400
9,241
9,241
16,151,751
2,471
A multi antenna system ( 100 ), comprising a plurality of transceivers ( 1, . . . 64 ) for an antenna array ( 102 ) operable for communication with wireless terminals ( 301, . . . , 307 ), wherein the multi antenna system ( 100 ) comprises a radio controller ( 104 ), adapted to operate a first transceiver for radio communication within a first bandwidth, wherein the first transceiver is limited by hardware to radio communication within the first bandwidth, a second transceiver adapted for radio communication within a second bandwidth selectable from a plurality of bandwidths, a radio controller ( 104 ) adapted to operate, depending on a data rate demand, either the first transceiver or the second transceiver or both for radio communication.
1. A method of operating a multi antenna system, wherein the multi antenna system comprises a plurality of transceivers arranged with an antenna array for communication with a plurality of wireless terminals, the multi antenna system comprising a first transceiver for radio communication within a single first bandwidth, wherein the first transceiver is limited by hardware to radio communication within the single first bandwidth, a second transceiver for radio communication within a second bandwidth selectable from a plurality of bandwidths, the method comprising operating, depending on a data rate demand, either the first transceiver or the second transceiver or both for radio communication. 2. The method according to claim 1, wherein information about the data rate demand is determined or analysed for a wireless terminal, and either the first transceiver or the second transceiver is or both are selected for radio communication with the wireless terminal depending on information about the data rate demand. 3. The method according to claim 1, wherein the first bandwidth is equal to or less than one of the group of 20 MHz, 50 MHz, 60 MHz, and the second bandwidth is equal to or less than one of the group of 10 MHz, 20 MHz, 50 MHz, 60 MHz, 100 MHz, 150 MHz, 200 MHz. 4. The method according to claim 1, wherein at least two transceivers of the plurality of transceivers operate to control a beamforming radio communication. 5. The method according to claim 4, wherein the beamforming radio communication is controlled within the second bandwidth with a wireless terminal or a relay, if the information about the data rate demand for this wireless terminal or a group of wireless terminals meets a requirement condition. 6. The method according to claim 1, wherein at least one transceiver of the plurality of transceivers selectively operates for radio communication within the first bandwidth with a first adjustable supply voltage for a power amplifier of the at least one transceiver, or for radio communication within the second bandwidth with a second adjustable supply voltage for the power amplifier. 7. The method according to claim 1, wherein the at least one transceiver of the plurality of transceivers is selected for operation within the second bandwidth depending on a connectivity parameter. 8. The method according to claim 1, wherein at least one second transceiver operates temporarily for radio communication within the first bandwidth. 9. The method according to claim 1, wherein the antenna array, the plurality of transceivers and a controller for the plurality of transceivers operate as a massive multiple input multiple output system within a common bandwidth. 10. A multi antenna system, comprising a plurality of transceivers for an antenna array operable for communication with wireless terminals, wherein the multi antenna system comprises a radio controller, and a first transceiver for radio communication within a single first bandwidth, wherein the first transceiver is limited by hardware to radio communication within the single first bandwidth, a second transceiver adapted for radio communication within a second bandwidth selectable from a plurality of bandwidths, and wherein the radio controller is adapted to operate, depending on a data rate demand, either the first transceiver or the second transceiver or both for radio communication. 11. The multi antenna system of claim 10, wherein the radio controller is adapted to determine or analyse information about the data rate demand for a wireless terminal, and to select either the first transceiver or the second transceiver or both for radio communication with the wireless terminal depending on information about the data rate demand. 12. The multi antenna system of claim 10, wherein the radio controller is adapted to operate with the first bandwidth being equal to or less than one of the group of 20 MHz, 50 MHz, 60 MHz and with the second bandwidth being equal to or more than one of the group of 20 MHz, 50 MHz, 60 MHz, 100 MHz, 150 MHz, 200 MHz. 13. The multi antenna system of claim 10, wherein the radio controller (104) is adapted to operate at least two transceivers of the plurality of transceivers to control a beamforming radio communication. 14. The multi antenna system of claim 13, wherein the radio controller is adapted to control the beamforming radio communication within the second bandwidth with a wireless terminal of the plurality of wireless terminals or a relay, if the information about the data rate demand for this wireless terminal or a group of wireless terminals meets a requirement condition. 15. The multi antenna system of claim 10, operable to adapt a supply voltage to power amplifier of the different transceivers depending on a currently transmitted carrier bandwidth. 16. The multi antenna system of claim 10, wherein the radio controller is adapted to select at least one transceiver of the plurality of transceivers for operation within the second bandwidth depending on a connectivity parameter. 17. The multi antenna system of claim 10, wherein at least one second transceiver is adapted to operate temporarily for radio communication within the first bandwidth. 18. The multi antenna system of claim 10, wherein the antenna array, the plurality of transceivers and the radio controller are arranged as a massive multiple input multiple output system within a common bandwidth.
A multi antenna system ( 100 ), comprising a plurality of transceivers ( 1, . . . 64 ) for an antenna array ( 102 ) operable for communication with wireless terminals ( 301, . . . , 307 ), wherein the multi antenna system ( 100 ) comprises a radio controller ( 104 ), adapted to operate a first transceiver for radio communication within a first bandwidth, wherein the first transceiver is limited by hardware to radio communication within the first bandwidth, a second transceiver adapted for radio communication within a second bandwidth selectable from a plurality of bandwidths, a radio controller ( 104 ) adapted to operate, depending on a data rate demand, either the first transceiver or the second transceiver or both for radio communication.1. A method of operating a multi antenna system, wherein the multi antenna system comprises a plurality of transceivers arranged with an antenna array for communication with a plurality of wireless terminals, the multi antenna system comprising a first transceiver for radio communication within a single first bandwidth, wherein the first transceiver is limited by hardware to radio communication within the single first bandwidth, a second transceiver for radio communication within a second bandwidth selectable from a plurality of bandwidths, the method comprising operating, depending on a data rate demand, either the first transceiver or the second transceiver or both for radio communication. 2. The method according to claim 1, wherein information about the data rate demand is determined or analysed for a wireless terminal, and either the first transceiver or the second transceiver is or both are selected for radio communication with the wireless terminal depending on information about the data rate demand. 3. The method according to claim 1, wherein the first bandwidth is equal to or less than one of the group of 20 MHz, 50 MHz, 60 MHz, and the second bandwidth is equal to or less than one of the group of 10 MHz, 20 MHz, 50 MHz, 60 MHz, 100 MHz, 150 MHz, 200 MHz. 4. The method according to claim 1, wherein at least two transceivers of the plurality of transceivers operate to control a beamforming radio communication. 5. The method according to claim 4, wherein the beamforming radio communication is controlled within the second bandwidth with a wireless terminal or a relay, if the information about the data rate demand for this wireless terminal or a group of wireless terminals meets a requirement condition. 6. The method according to claim 1, wherein at least one transceiver of the plurality of transceivers selectively operates for radio communication within the first bandwidth with a first adjustable supply voltage for a power amplifier of the at least one transceiver, or for radio communication within the second bandwidth with a second adjustable supply voltage for the power amplifier. 7. The method according to claim 1, wherein the at least one transceiver of the plurality of transceivers is selected for operation within the second bandwidth depending on a connectivity parameter. 8. The method according to claim 1, wherein at least one second transceiver operates temporarily for radio communication within the first bandwidth. 9. The method according to claim 1, wherein the antenna array, the plurality of transceivers and a controller for the plurality of transceivers operate as a massive multiple input multiple output system within a common bandwidth. 10. A multi antenna system, comprising a plurality of transceivers for an antenna array operable for communication with wireless terminals, wherein the multi antenna system comprises a radio controller, and a first transceiver for radio communication within a single first bandwidth, wherein the first transceiver is limited by hardware to radio communication within the single first bandwidth, a second transceiver adapted for radio communication within a second bandwidth selectable from a plurality of bandwidths, and wherein the radio controller is adapted to operate, depending on a data rate demand, either the first transceiver or the second transceiver or both for radio communication. 11. The multi antenna system of claim 10, wherein the radio controller is adapted to determine or analyse information about the data rate demand for a wireless terminal, and to select either the first transceiver or the second transceiver or both for radio communication with the wireless terminal depending on information about the data rate demand. 12. The multi antenna system of claim 10, wherein the radio controller is adapted to operate with the first bandwidth being equal to or less than one of the group of 20 MHz, 50 MHz, 60 MHz and with the second bandwidth being equal to or more than one of the group of 20 MHz, 50 MHz, 60 MHz, 100 MHz, 150 MHz, 200 MHz. 13. The multi antenna system of claim 10, wherein the radio controller (104) is adapted to operate at least two transceivers of the plurality of transceivers to control a beamforming radio communication. 14. The multi antenna system of claim 13, wherein the radio controller is adapted to control the beamforming radio communication within the second bandwidth with a wireless terminal of the plurality of wireless terminals or a relay, if the information about the data rate demand for this wireless terminal or a group of wireless terminals meets a requirement condition. 15. The multi antenna system of claim 10, operable to adapt a supply voltage to power amplifier of the different transceivers depending on a currently transmitted carrier bandwidth. 16. The multi antenna system of claim 10, wherein the radio controller is adapted to select at least one transceiver of the plurality of transceivers for operation within the second bandwidth depending on a connectivity parameter. 17. The multi antenna system of claim 10, wherein at least one second transceiver is adapted to operate temporarily for radio communication within the first bandwidth. 18. The multi antenna system of claim 10, wherein the antenna array, the plurality of transceivers and the radio controller are arranged as a massive multiple input multiple output system within a common bandwidth.
2,400
9,242
9,242
15,617,136
2,436
Described herein are systems, methods, and software to enhance firewall implementation for virtual machines. In one implementation, a method of managing firewall rules for a virtual machine includes identifying, in the virtual machine, an attach process for one or more applications to the virtual machine. The method further includes, identifying one or more firewall rules that correspond to the one or more applications and providing the one or more firewall rules to networking manager for the virtual machine.
1. A method of managing firewall rules for a virtual machine in a computing environment, the method comprising: identifying, in the virtual machine, an attach process for one or more applications to the virtual machine; in response to identifying the attach process, identifying one or more firewall rules corresponding to the one or more applications; and providing the one or more firewall rules to a networking manager that is configured to apply the one or more firewall rules for the virtual machine. 2. The method of claim 1, wherein the attach process comprises mounting one or more storage volumes to the virtual machine and overlaying elements of the one or more storage volumes in the virtual machine to make the one or more applications executable on the virtual machine from the one or more storage volumes. 3. The method of claim 2, wherein identifying the one or more firewall rules comprises identifying the one or more firewall rules in the one or more storage volumes. 4. The method of claim 2, wherein the one or more storage volumes comprise one or more virtual disks. 5. The method of claim 1 further comprising: identifying a detach process for the one or more applications; in response to identifying the detach process, identifying the one or more firewall rules associated with the one or more applications; and providing a notification to the networking manager for the virtual machine to revoke the one or more firewall rules for the virtual machine. 6. The method of claim 1, wherein each of the one or more firewall rules comprise a network address, a service, and an associated action. 7. The method of claim 6, wherein the action comprises one of a permit or block action. 8. The method of claim 1, wherein the networking manager executes as part of a hypervisor for the virtual machine. 9. A computing apparatus comprising: one or more non-transitory computer readable storage media; a processing system operatively coupled to the one or more non-transitory computer readable storage media; and program instructions stored on the one or more non-transitory computer readable storage media to manage firewall rules for a virtual machine in a computing environment that, when read and executed by the processing system, direct the processing system to at least: identify, in the virtual machine, an attach process for one or more applications to the virtual machine; in response to identifying the attach process, identify one or more firewall rules corresponding to the one or more applications; and provide the one or more firewall rules to a networking manager that is configured to apply the one or more firewall rules for the virtual machine. 10. The computing apparatus of claim 9, wherein the attach process comprises mounting one or more storage volumes to the virtual machine and overlaying elements of the one or more storage volumes in the virtual machine to make the one or more applications executable on the virtual machine from the one or more storage volumes. 11. The computing apparatus of claim 10, wherein the program instructions to identify the one or more firewall rules direct the processing system to identify the one or more firewall rules in the one or more storage volumes. 12. The computing apparatus of claim 10, wherein the one or more storage volumes comprise one or more virtual disks. 13. The computing apparatus of claim 9, wherein the program instructions further direct the processing system to: identify, in the virtual machine, a detach process for the one or more applications; in response to identifying the detach process, identify the one or more firewall rules associated with the one or more applications; and provide a notification to the networking manager for the virtual machine to revoke the one or more firewall rules for the virtual machine. 14. The computing apparatus of claim 9, wherein each of the firewall rules comprise a network address, a service, and an associated action. 15. The computing apparatus of claim 9, wherein the action comprises one of a permit or block action. 16. The computing apparatus of claim 9, wherein the networking manager executes as part of a hypervisor for the virtual machine. 17. A method of managing firewall rules for use with attachable applications, the method comprising: identifying a request to generate an application group with one or more applications capable of attachment to one or more virtual machines in a computing environment; in response to identifying the request, executing the one or more applications to identify communication requirements for the one or more applications; generating one or more firewall rules based on the communication requirements; and storing the one or more firewall rules with components for the one or more applications in at least one storage volume available for attachment to the one or more virtual machines. 18. The method of claim 17, wherein each of the one or more firewall rules comprise a network address, a service, and an associated action. 19. The method of claim 17, wherein the components comprise files, directories, and registry objects. 20. The method of claim 17, wherein the at least one storage volume comprises at least one virtual disk.
Described herein are systems, methods, and software to enhance firewall implementation for virtual machines. In one implementation, a method of managing firewall rules for a virtual machine includes identifying, in the virtual machine, an attach process for one or more applications to the virtual machine. The method further includes, identifying one or more firewall rules that correspond to the one or more applications and providing the one or more firewall rules to networking manager for the virtual machine.1. A method of managing firewall rules for a virtual machine in a computing environment, the method comprising: identifying, in the virtual machine, an attach process for one or more applications to the virtual machine; in response to identifying the attach process, identifying one or more firewall rules corresponding to the one or more applications; and providing the one or more firewall rules to a networking manager that is configured to apply the one or more firewall rules for the virtual machine. 2. The method of claim 1, wherein the attach process comprises mounting one or more storage volumes to the virtual machine and overlaying elements of the one or more storage volumes in the virtual machine to make the one or more applications executable on the virtual machine from the one or more storage volumes. 3. The method of claim 2, wherein identifying the one or more firewall rules comprises identifying the one or more firewall rules in the one or more storage volumes. 4. The method of claim 2, wherein the one or more storage volumes comprise one or more virtual disks. 5. The method of claim 1 further comprising: identifying a detach process for the one or more applications; in response to identifying the detach process, identifying the one or more firewall rules associated with the one or more applications; and providing a notification to the networking manager for the virtual machine to revoke the one or more firewall rules for the virtual machine. 6. The method of claim 1, wherein each of the one or more firewall rules comprise a network address, a service, and an associated action. 7. The method of claim 6, wherein the action comprises one of a permit or block action. 8. The method of claim 1, wherein the networking manager executes as part of a hypervisor for the virtual machine. 9. A computing apparatus comprising: one or more non-transitory computer readable storage media; a processing system operatively coupled to the one or more non-transitory computer readable storage media; and program instructions stored on the one or more non-transitory computer readable storage media to manage firewall rules for a virtual machine in a computing environment that, when read and executed by the processing system, direct the processing system to at least: identify, in the virtual machine, an attach process for one or more applications to the virtual machine; in response to identifying the attach process, identify one or more firewall rules corresponding to the one or more applications; and provide the one or more firewall rules to a networking manager that is configured to apply the one or more firewall rules for the virtual machine. 10. The computing apparatus of claim 9, wherein the attach process comprises mounting one or more storage volumes to the virtual machine and overlaying elements of the one or more storage volumes in the virtual machine to make the one or more applications executable on the virtual machine from the one or more storage volumes. 11. The computing apparatus of claim 10, wherein the program instructions to identify the one or more firewall rules direct the processing system to identify the one or more firewall rules in the one or more storage volumes. 12. The computing apparatus of claim 10, wherein the one or more storage volumes comprise one or more virtual disks. 13. The computing apparatus of claim 9, wherein the program instructions further direct the processing system to: identify, in the virtual machine, a detach process for the one or more applications; in response to identifying the detach process, identify the one or more firewall rules associated with the one or more applications; and provide a notification to the networking manager for the virtual machine to revoke the one or more firewall rules for the virtual machine. 14. The computing apparatus of claim 9, wherein each of the firewall rules comprise a network address, a service, and an associated action. 15. The computing apparatus of claim 9, wherein the action comprises one of a permit or block action. 16. The computing apparatus of claim 9, wherein the networking manager executes as part of a hypervisor for the virtual machine. 17. A method of managing firewall rules for use with attachable applications, the method comprising: identifying a request to generate an application group with one or more applications capable of attachment to one or more virtual machines in a computing environment; in response to identifying the request, executing the one or more applications to identify communication requirements for the one or more applications; generating one or more firewall rules based on the communication requirements; and storing the one or more firewall rules with components for the one or more applications in at least one storage volume available for attachment to the one or more virtual machines. 18. The method of claim 17, wherein each of the one or more firewall rules comprise a network address, a service, and an associated action. 19. The method of claim 17, wherein the components comprise files, directories, and registry objects. 20. The method of claim 17, wherein the at least one storage volume comprises at least one virtual disk.
2,400
9,243
9,243
15,972,232
2,446
Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file.
1-20. (canceled) 21. A method for detecting an elephant flow by inspecting the operations of a machine that operates on a physical host computer, the method comprising: at a detector operating on the physical host computer, receiving information from an agent executing on the machine regarding a file transfer initiated by an application executing on the machine, the information comprising a size of the file to be transferred and a data flow associated with the file transfer: when the file size exceeds a threshold, specifying the data flow associated with the file transfer as an elephant flow; and reporting that the data flow is an elephant flow, wherein a managed forwarding element processes the data associated with the detected elephant flow differently from other flows not detected as elephant flows. 22. The method of claim 21, wherein the machine is a first virtual machine (VM) and the detector executes within a second VM operating on the physical host computer. 23. The method of claim 21, wherein the machine is a VM and the detector executes within virtualization software of the physical host computer. 24. The method of claim 21, wherein the agent executing on the machine detects an application programming interface (API) call regarding the file transfer. 25. The method of claim 24, wherein the API call is associated with a particular data transfer protocol for transferring files between machines. 26. The method of claim 21, wherein the information received from the agent comprises at least one of (i) the application that initiated the file transfer, (ii) user data, and (iii) whether the file transfer is inbound or outbound. 27. The method of claim 21, wherein reporting that the data flow is an elephant flow comprises reporting the data flow to a network controller. 28. The method of claim 21, wherein the network controller configures the managed forwarding element to process the data associated with the elephant flow differently. 29. The method of claim 21, wherein the detector receives the information from the agent via a multiplexer module. 30. The method of claim 29, wherein the detector registers with the multiplexer module to receive a notification each time the agent provides information regarding initiation of a file transfer on the machine. 31. A non-transitory machine-readable medium storing a detector program that when executed by at least one processing unit of a physical host computer detects an elephant flow by inspecting the operations of a machine that operates on the physical host computer, the method comprising: receiving information from an agent executing on the machine regarding a file transfer initiated by an application executing on the machine, the information comprising a size of the file to be transferred and a data flow associated with the file transfer: when the file size exceeds a threshold, specifying the data flow associated with the file transfer as an elephant flow; and reporting that the data flow is an elephant flow, wherein a managed forwarding element processes the data associated with the detected elephant flow differently from other flows not detected as elephant flows. 32. The non-transitory machine-readable medium of claim 31, wherein the machine is a first virtual machine (VM) and the detector program executes within a second VM operating on the physical host computer. 33. The non-transitory machine-readable medium of claim 31, wherein the machine is a VM and the detector program executes within virtualization software of the physical host computer. 34. The non-transitory machine-readable medium of claim 31, wherein the agent executing on the machine detects an application programming interface (API) call regarding the file transfer. 35. The non-transitory machine-readable medium of claim 34, wherein the API call is associated with a particular data transfer protocol for transferring files between machines. 36. The non-transitory machine-readable medium of claim 31, wherein the information received from the agent comprises at least one of (i) the application that initiated the file transfer, (ii) user data, and (iii) whether the file transfer is inbound or outbound. 37. The non-transitory machine-readable medium of claim 31, wherein the set of instructions for reporting that the data flow is an elephant flow comprises a set of instructions for reporting the data flow to a network controller. 38. The non-transitory machine-readable medium of claim 31, wherein the network controller configures the managed forwarding element to process the data associated with the elephant flow differently. 39. The non-transitory machine-readable medium of claim 31, wherein the detector receives the information from the agent via a multiplexer module. 40. The non-transitory machine-readable medium of claim 39, wherein the detector registers with the multiplexer module to receive a notification each time the agent provides information regarding initiation of a file transfer on the machine.
Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file.1-20. (canceled) 21. A method for detecting an elephant flow by inspecting the operations of a machine that operates on a physical host computer, the method comprising: at a detector operating on the physical host computer, receiving information from an agent executing on the machine regarding a file transfer initiated by an application executing on the machine, the information comprising a size of the file to be transferred and a data flow associated with the file transfer: when the file size exceeds a threshold, specifying the data flow associated with the file transfer as an elephant flow; and reporting that the data flow is an elephant flow, wherein a managed forwarding element processes the data associated with the detected elephant flow differently from other flows not detected as elephant flows. 22. The method of claim 21, wherein the machine is a first virtual machine (VM) and the detector executes within a second VM operating on the physical host computer. 23. The method of claim 21, wherein the machine is a VM and the detector executes within virtualization software of the physical host computer. 24. The method of claim 21, wherein the agent executing on the machine detects an application programming interface (API) call regarding the file transfer. 25. The method of claim 24, wherein the API call is associated with a particular data transfer protocol for transferring files between machines. 26. The method of claim 21, wherein the information received from the agent comprises at least one of (i) the application that initiated the file transfer, (ii) user data, and (iii) whether the file transfer is inbound or outbound. 27. The method of claim 21, wherein reporting that the data flow is an elephant flow comprises reporting the data flow to a network controller. 28. The method of claim 21, wherein the network controller configures the managed forwarding element to process the data associated with the elephant flow differently. 29. The method of claim 21, wherein the detector receives the information from the agent via a multiplexer module. 30. The method of claim 29, wherein the detector registers with the multiplexer module to receive a notification each time the agent provides information regarding initiation of a file transfer on the machine. 31. A non-transitory machine-readable medium storing a detector program that when executed by at least one processing unit of a physical host computer detects an elephant flow by inspecting the operations of a machine that operates on the physical host computer, the method comprising: receiving information from an agent executing on the machine regarding a file transfer initiated by an application executing on the machine, the information comprising a size of the file to be transferred and a data flow associated with the file transfer: when the file size exceeds a threshold, specifying the data flow associated with the file transfer as an elephant flow; and reporting that the data flow is an elephant flow, wherein a managed forwarding element processes the data associated with the detected elephant flow differently from other flows not detected as elephant flows. 32. The non-transitory machine-readable medium of claim 31, wherein the machine is a first virtual machine (VM) and the detector program executes within a second VM operating on the physical host computer. 33. The non-transitory machine-readable medium of claim 31, wherein the machine is a VM and the detector program executes within virtualization software of the physical host computer. 34. The non-transitory machine-readable medium of claim 31, wherein the agent executing on the machine detects an application programming interface (API) call regarding the file transfer. 35. The non-transitory machine-readable medium of claim 34, wherein the API call is associated with a particular data transfer protocol for transferring files between machines. 36. The non-transitory machine-readable medium of claim 31, wherein the information received from the agent comprises at least one of (i) the application that initiated the file transfer, (ii) user data, and (iii) whether the file transfer is inbound or outbound. 37. The non-transitory machine-readable medium of claim 31, wherein the set of instructions for reporting that the data flow is an elephant flow comprises a set of instructions for reporting the data flow to a network controller. 38. The non-transitory machine-readable medium of claim 31, wherein the network controller configures the managed forwarding element to process the data associated with the elephant flow differently. 39. The non-transitory machine-readable medium of claim 31, wherein the detector receives the information from the agent via a multiplexer module. 40. The non-transitory machine-readable medium of claim 39, wherein the detector registers with the multiplexer module to receive a notification each time the agent provides information regarding initiation of a file transfer on the machine.
2,400
9,244
9,244
16,252,871
2,485
A method for processing image data for a vehicular vision system includes providing a plurality of cameras at a vehicle so as to have respective fields of view exterior the vehicle and providing a video display screen in the vehicle. A control has a data processor for processing image data captured by the plurality of cameras. Image data captured by at least one camera of the plurality of cameras is processed at the control utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the at least one camera. Responsive to the processing of captured image data, video images derived at least in part from the processed image data are displayed.
1. A method for processing image data for a vehicular vision system, said method comprising: providing a plurality of cameras at a vehicle so as to have respective fields of view exterior the vehicle; wherein each camera of the plurality of cameras comprises a two dimensional array of photosensing pixels; wherein providing the plurality of cameras comprises (i) mounting a rear camera at a rear portion of the vehicle so as to have a field of view at least rearward of the vehicle, (ii) mounting a left-side camera at a left side portion of the vehicle so as to have a field of view at least sideward of the vehicle, (iii) mounting a right-side camera at a right side portion of the vehicle so as to have a field of view at least sideward of the vehicle and (iv) mounting a front camera at a front portion of the vehicle so as to have a field of view at least forward of the vehicle; wherein, with the plurality of cameras mounted at the vehicle, the field of view of the left-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera, and the field of view of the right-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera; providing a video display screen in the vehicle, wherein the video display screen comprises a two dimensional grid of display pixels; providing a control having a data processor for processing image data captured by the plurality of cameras; processing, at the control, image data captured by at least one camera of the plurality of cameras utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the at least one camera of the plurality of cameras; and responsive to the processing at the control of the image data captured by the at least one camera of the plurality of cameras, displaying, at the video display screen, video images derived at least in part from the processed image data. 2. The method of claim 1, wherein each camera of the plurality of cameras comprises at least one million photosensing pixels. 3. The method of claim 2, wherein processing image data captured by the at least one camera of the plurality of cameras comprises utilizing ray tracing from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the at least one camera of the plurality of cameras. 4. The method of claim 1, wherein processing image data captured by the at least one camera of the plurality of cameras comprises restricting processing of photosensing pixels of the at least one camera of the plurality of cameras to processing of only those photosensing pixels of the at least one camera of the plurality of cameras that are used for the displayed video images. 5. The method of claim 1, wherein processing image data captured by the at least one camera of the plurality of cameras comprises processing image data captured by all of the plurality of cameras utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of each respective camera of the plurality of cameras. 6. The method of claim 5, wherein displaying video images comprises displaying video images derived from the processed image data captured by all of the plurality of cameras to provide a surround view display. 7. The method of claim 1, wherein processing image data captured by the at least one camera of the plurality of cameras comprises utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the one camera of the plurality of cameras. 8. The method of claim 7, wherein displaying video images comprises displaying video images derived from the processed image data captured by the one camera of the plurality of cameras. 9. The method of claim 1, comprising buffering data from only those photosensing pixels of the at least one camera of the plurality of cameras that are used in the backward projection. 10. The method of claim 1, wherein processing image data captured by the at least one camera of the plurality of cameras comprises utilizing unwarping. 11. A method for processing image data for a vehicular vision system, said method comprising: providing a plurality of cameras at a vehicle so as to have respective fields of view exterior the vehicle; wherein each camera of the plurality of cameras comprises a two dimensional array of photosensing pixels; wherein providing the plurality of cameras comprises (i) mounting a rear camera at a rear portion of the vehicle so as to have a field of view at least rearward of the vehicle, (ii) mounting a left-side camera at a left side portion of the vehicle so as to have a field of view at least sideward of the vehicle, (iii) mounting a right-side camera at a right side portion of the vehicle so as to have a field of view at least sideward of the vehicle and (iv) mounting a front camera at a front portion of the vehicle so as to have a field of view at least forward of the vehicle; wherein, with the plurality of cameras mounted at the vehicle, the field of view of the left-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera, and the field of view of the right-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera; providing a video display screen in the vehicle, wherein the video display screen comprises a two dimensional grid of display pixels; providing a control having a data processor for processing image data captured by the plurality of cameras; processing, at the control, image data captured by the plurality of cameras utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of each respective camera of the plurality of cameras; responsive to the processing at the control of image data captured by each camera of the plurality of cameras, displaying, at the video display screen, video images derived at least in part from the processed image data to provide a surround view display; and wherein processing image data captured by each camera of the plurality of cameras comprises restricting processing of photosensing pixels of each camera of the plurality of cameras to processing of only those photosensing pixels of each camera of the plurality of cameras that are used for the displayed video images. 12. The method of claim 11, wherein each camera of the plurality of cameras comprises at least one million photosensing pixels. 13. The method of claim 12, wherein processing image data captured by each camera of the plurality of cameras comprises utilizing ray tracing from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of each respective camera of the plurality of cameras. 14. The method of claim 11, comprising buffering data from only those photosensing pixels of each camera of the plurality of cameras that are used in the backward projection. 15. The method of claim 11, wherein processing image data captured by each camera of the plurality of cameras comprises utilizing unwarping. 16. A method for processing image data for a vehicular vision system, said method comprising: providing a plurality of cameras at a vehicle so as to have respective fields of view exterior the vehicle; wherein each camera of the plurality of cameras comprises a two dimensional array of photosensing pixels; wherein providing the plurality of cameras comprises (i) mounting a rear camera at a rear portion of the vehicle so as to have a field of view at least rearward of the vehicle, (ii) mounting a left-side camera at a left side portion of the vehicle so as to have a field of view at least sideward of the vehicle, (iii) mounting a right-side camera at a right side portion of the vehicle so as to have a field of view at least sideward of the vehicle and (iv) mounting a front camera at a front portion of the vehicle so as to have a field of view at least forward of the vehicle; wherein, with the plurality of cameras mounted at the vehicle, the field of view of the left-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera, and the field of view of the right-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera; providing a video display screen in the vehicle, wherein the video display screen comprises a two dimensional grid of display pixels; providing a control having a data processor for processing image data captured by the plurality of cameras; processing, at the control, image data captured by one camera of the plurality of cameras utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the one camera of the plurality of cameras; responsive to the processing at the control of the image data captured by the one camera of the plurality of cameras, displaying, at the video display screen, video images derived at least in part from the processed image data; and wherein processing image data captured by the one camera of the plurality of cameras comprises restricting processing of photosensing pixels of the one camera of the plurality of cameras to processing of only those photosensing pixels of the one camera of the plurality of cameras that are used for the displayed video images. 17. The method of claim 16, wherein each camera of the plurality of cameras comprises at least one million photosensing pixels. 18. The method of claim 17, wherein processing image data captured by the one camera of the plurality of cameras comprises utilizing ray tracing from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the one camera of the plurality of cameras. 19. The method of claim 16, comprising buffering data from only those photosensing pixels of the one camera of the plurality of cameras that are used in the backward projection. 20. The method of claim 16, wherein processing image data captured by the one camera of the plurality of cameras comprises utilizing unwarping.
A method for processing image data for a vehicular vision system includes providing a plurality of cameras at a vehicle so as to have respective fields of view exterior the vehicle and providing a video display screen in the vehicle. A control has a data processor for processing image data captured by the plurality of cameras. Image data captured by at least one camera of the plurality of cameras is processed at the control utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the at least one camera. Responsive to the processing of captured image data, video images derived at least in part from the processed image data are displayed.1. A method for processing image data for a vehicular vision system, said method comprising: providing a plurality of cameras at a vehicle so as to have respective fields of view exterior the vehicle; wherein each camera of the plurality of cameras comprises a two dimensional array of photosensing pixels; wherein providing the plurality of cameras comprises (i) mounting a rear camera at a rear portion of the vehicle so as to have a field of view at least rearward of the vehicle, (ii) mounting a left-side camera at a left side portion of the vehicle so as to have a field of view at least sideward of the vehicle, (iii) mounting a right-side camera at a right side portion of the vehicle so as to have a field of view at least sideward of the vehicle and (iv) mounting a front camera at a front portion of the vehicle so as to have a field of view at least forward of the vehicle; wherein, with the plurality of cameras mounted at the vehicle, the field of view of the left-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera, and the field of view of the right-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera; providing a video display screen in the vehicle, wherein the video display screen comprises a two dimensional grid of display pixels; providing a control having a data processor for processing image data captured by the plurality of cameras; processing, at the control, image data captured by at least one camera of the plurality of cameras utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the at least one camera of the plurality of cameras; and responsive to the processing at the control of the image data captured by the at least one camera of the plurality of cameras, displaying, at the video display screen, video images derived at least in part from the processed image data. 2. The method of claim 1, wherein each camera of the plurality of cameras comprises at least one million photosensing pixels. 3. The method of claim 2, wherein processing image data captured by the at least one camera of the plurality of cameras comprises utilizing ray tracing from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the at least one camera of the plurality of cameras. 4. The method of claim 1, wherein processing image data captured by the at least one camera of the plurality of cameras comprises restricting processing of photosensing pixels of the at least one camera of the plurality of cameras to processing of only those photosensing pixels of the at least one camera of the plurality of cameras that are used for the displayed video images. 5. The method of claim 1, wherein processing image data captured by the at least one camera of the plurality of cameras comprises processing image data captured by all of the plurality of cameras utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of each respective camera of the plurality of cameras. 6. The method of claim 5, wherein displaying video images comprises displaying video images derived from the processed image data captured by all of the plurality of cameras to provide a surround view display. 7. The method of claim 1, wherein processing image data captured by the at least one camera of the plurality of cameras comprises utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the one camera of the plurality of cameras. 8. The method of claim 7, wherein displaying video images comprises displaying video images derived from the processed image data captured by the one camera of the plurality of cameras. 9. The method of claim 1, comprising buffering data from only those photosensing pixels of the at least one camera of the plurality of cameras that are used in the backward projection. 10. The method of claim 1, wherein processing image data captured by the at least one camera of the plurality of cameras comprises utilizing unwarping. 11. A method for processing image data for a vehicular vision system, said method comprising: providing a plurality of cameras at a vehicle so as to have respective fields of view exterior the vehicle; wherein each camera of the plurality of cameras comprises a two dimensional array of photosensing pixels; wherein providing the plurality of cameras comprises (i) mounting a rear camera at a rear portion of the vehicle so as to have a field of view at least rearward of the vehicle, (ii) mounting a left-side camera at a left side portion of the vehicle so as to have a field of view at least sideward of the vehicle, (iii) mounting a right-side camera at a right side portion of the vehicle so as to have a field of view at least sideward of the vehicle and (iv) mounting a front camera at a front portion of the vehicle so as to have a field of view at least forward of the vehicle; wherein, with the plurality of cameras mounted at the vehicle, the field of view of the left-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera, and the field of view of the right-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera; providing a video display screen in the vehicle, wherein the video display screen comprises a two dimensional grid of display pixels; providing a control having a data processor for processing image data captured by the plurality of cameras; processing, at the control, image data captured by the plurality of cameras utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of each respective camera of the plurality of cameras; responsive to the processing at the control of image data captured by each camera of the plurality of cameras, displaying, at the video display screen, video images derived at least in part from the processed image data to provide a surround view display; and wherein processing image data captured by each camera of the plurality of cameras comprises restricting processing of photosensing pixels of each camera of the plurality of cameras to processing of only those photosensing pixels of each camera of the plurality of cameras that are used for the displayed video images. 12. The method of claim 11, wherein each camera of the plurality of cameras comprises at least one million photosensing pixels. 13. The method of claim 12, wherein processing image data captured by each camera of the plurality of cameras comprises utilizing ray tracing from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of each respective camera of the plurality of cameras. 14. The method of claim 11, comprising buffering data from only those photosensing pixels of each camera of the plurality of cameras that are used in the backward projection. 15. The method of claim 11, wherein processing image data captured by each camera of the plurality of cameras comprises utilizing unwarping. 16. A method for processing image data for a vehicular vision system, said method comprising: providing a plurality of cameras at a vehicle so as to have respective fields of view exterior the vehicle; wherein each camera of the plurality of cameras comprises a two dimensional array of photosensing pixels; wherein providing the plurality of cameras comprises (i) mounting a rear camera at a rear portion of the vehicle so as to have a field of view at least rearward of the vehicle, (ii) mounting a left-side camera at a left side portion of the vehicle so as to have a field of view at least sideward of the vehicle, (iii) mounting a right-side camera at a right side portion of the vehicle so as to have a field of view at least sideward of the vehicle and (iv) mounting a front camera at a front portion of the vehicle so as to have a field of view at least forward of the vehicle; wherein, with the plurality of cameras mounted at the vehicle, the field of view of the left-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera, and the field of view of the right-side camera partially overlaps the field of view of the front camera and partially overlaps the field of view of the rear camera; providing a video display screen in the vehicle, wherein the video display screen comprises a two dimensional grid of display pixels; providing a control having a data processor for processing image data captured by the plurality of cameras; processing, at the control, image data captured by one camera of the plurality of cameras utilizing backward projection from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the one camera of the plurality of cameras; responsive to the processing at the control of the image data captured by the one camera of the plurality of cameras, displaying, at the video display screen, video images derived at least in part from the processed image data; and wherein processing image data captured by the one camera of the plurality of cameras comprises restricting processing of photosensing pixels of the one camera of the plurality of cameras to processing of only those photosensing pixels of the one camera of the plurality of cameras that are used for the displayed video images. 17. The method of claim 16, wherein each camera of the plurality of cameras comprises at least one million photosensing pixels. 18. The method of claim 17, wherein processing image data captured by the one camera of the plurality of cameras comprises utilizing ray tracing from individual display pixels of the two dimensional grid of display pixels of the video display screen to respective photosensing pixels of the two dimensional array of photosensing pixels of the one camera of the plurality of cameras. 19. The method of claim 16, comprising buffering data from only those photosensing pixels of the one camera of the plurality of cameras that are used in the backward projection. 20. The method of claim 16, wherein processing image data captured by the one camera of the plurality of cameras comprises utilizing unwarping.
2,400
9,245
9,245
16,057,906
2,413
A user equipment (UE) and base station may implement improved communication methods which enable a UE that is peak current limited to perform UL transmissions which are consistent with the UL timeline. A UE that is peak current limited may utilize a new form of distributed TTI (transmit time interval) bundling for improved uplink communication performance. In performing “distributed” TTI bundling, the UE may transmit a plurality of redundancy versions of first information to the base station, wherein the plurality of redundancy versions are transmitted in non-consecutive sub-frames with a periodicity of X ms. After the plurality of redundancy versions of first information are transmitted to the base station, the base station may provide a single acknowledge/negative acknowledge (ACK/NACK) to the UE. A method for dynamically generating and using a bundle size for TTI bundling is also disclosed.
1. A user equipment device (UE), comprising: at least one antenna; at least one radio, wherein the at least one radio is configured to perform cellular communication using at least one radio access technology (RAT); one or more processors coupled to the at least one radio, wherein the one or more processors and the at least one radio are configured to perform voice and/or data communications; wherein the one or more processors and the at least one radio are configured to: indicate, via a radio resource control (RRC) message, that the UE has a transmission limitation, wherein the transmission limitation causes the UE to not transmit continuously in uplink (UL); receive an UL grant on a physical downlink control channel (PDCCH) for transmission on assigned physical uplink shared channel (PUSCH) resources; transmit data according to the UL grant on a first time portion of the assigned PUSCH resources; and do not transmit during a specified time portion of the assigned PUSCH resources in accordance with the indicated transmission limitation. 2. The UE of claim 1, wherein the UL grant received from the base station comprises information specifying periodic UL grants. 3. The UE of claim 2, wherein a periodicity of the UL grants is based, at least in part, on a bundle size specifying a number of a plurality of redundancy versions of the data to be transmitted to the base station. 4. The UE of claim 1, wherein the specified time portion corresponds to a duty cycle of the UE, wherein the duty cycle is based on a number of UL transmissions the UE will remain in a low power state and a round trip time of a hybrid automatic repeat request (HARQ). 5. The UE of claim 4, wherein the low power state is a discontinuous transmission (DTX) cycle. 6. The UE of claim 1, wherein the data is transmitted in accordance with a sub-frame (TTI) bundle size. 7. The UE of claim 6, wherein the sub-frame bundle size is dynamically determined at least once during the voice and/or data communications. 8. The UE of claim 7, wherein the bundle size specifies a number of the plurality of redundancy versions of first information transmitted to the base station. 9. The UE of claim 1, wherein the one or more processors and the at least one radio are further configured to: receive, in accordance with a hybrid automatic repeat request (HARQ) timeline, an acknowledgement/negative acknowledgement (ACK/NACK) of the transmission of data, wherein the ACK/NACK is a first NACK received X sub-frames after transmission of the data, and wherein the data comprises a first redundancy version of the data receive, 3X sub-frames after transmission of the data, a second NACK of the transmission of data; and transmit, X sub-frames after receipt of the second NACK, a second redundancy version of the data. 10. The UE of claim 1, wherein the one or more processors and the at least one radio are further configured to: receive a first negative acknowledge (NACK) from the base station after transmission of the data, wherein the UE does not perform a retransmission of the data in response to receiving the first NACK. 11. An apparatus, comprising: a memory; and a processing element in communication with the memory, wherein the processing element is configured to: generate instructions to indicate to a base station and via a radio resource control (RRC) message, that the apparatus has a transmission limitation, wherein the transmission limitation causes the apparatus to not transmit continuously in uplink (UL); receive, from the base station, an UL grant on a physical downlink control channel (PDCCH) for transmission on assigned physical uplink shared channel (PUSCH) resources; generate instructions to transmit data according to the UL grant on a time portion of the assigned PUSCH resources; and generate instructions to not transmit during a specified time portion of the assigned PUSCH resources in accordance with the indicated transmission limitation. 12. The apparatus of claim 11, wherein the UL grant received from the base station comprises information specifying periodic UL grants; and wherein a periodicity of the UL grants is based, at least in part, on a bundle size specifying a number of a plurality of redundancy versions of the data to be transmitted to the base station. 13. The apparatus of claim 11, wherein the specified time portion corresponds to a transmission duty cycle of the apparatus, wherein the duty cycle is based on a number of UL transmissions the apparatus will remain in a low power state and a round trip time of a hybrid automatic repeat request (HARQ), and wherein the low power state is a discontinuous transmission (DTX) cycle. 14. The apparatus of claim 11, wherein the data is transmitted in accordance with a sub-frame bundle size, wherein the sub-frame bundle size is dynamically determined at least once during the voice and/or data communications. 15. The apparatus of claim 14, wherein the bundle size specifies a number of the plurality of redundancy versions of first information transmitted to the base station. 16. The apparatus of claim 11, wherein the processing element is further configured to: receive, in accordance with a hybrid automatic repeat request (HARQ) timeline, an acknowledgement/negative acknowledgement (ACK/NACK) of the transmission of data, wherein the ACK/NACK is a first NACK received X sub-frames after transmission of the data, and wherein the data comprises a first redundancy version of the data; receive, 3X sub-frames after transmission of the data, a second NACK of the transmission of data; and generate instructions to transmit, X sub-frames after receipt of the second NACK, a second redundancy version of the data. 17. A non-transitory computer readable memory medium storing program instructions executable by a processor of a user equipment (UE) to: indicate, to a base station and via a radio resource control (RRC) message, that the UE has a transmission limitation, wherein the transmission limitation causes the UE to not transmit continuously in uplink (UL); receive, from the base station, an UL grant on a physical downlink control channel (PDCCH) for transmission on assigned physical uplink shared channel (PUSCH) resources; generate instructions to transmit, to the base station, data according to the UL grant on a time portion of the assigned PUSCH resources; and generate instructions to not transmit during a specified time portion of the assigned PUSCH resources in accordance with the indicated transmission limitation. 18. The non-transitory memory medium of claim 17, wherein the specified time portion corresponds to a duty cycle of the UE, wherein the duty cycle is based on a number of UL transmissions the UE will remain in a low power state and a round trip time of a hybrid automatic repeat request (HARD), and wherein the low power state is a discontinuous transmission (DTX) cycle. 19. The non-transitory memory medium of claim 17, wherein the data is transmitted in accordance with a sub-frame bundle size, wherein the sub-frame bundle size is dynamically determined at least once during the voice and/or data communications, and wherein the bundle size specifies a number of the plurality of redundancy versions of first information transmitted to the base station. 20. The non-transitory memory medium of claim 17, wherein the program instructions are further executable to receive, from the base station, a first negative acknowledge (NACK) after transmission of the data, wherein the UE does not perform a retransmission of the data in response to receiving the first NACK.
A user equipment (UE) and base station may implement improved communication methods which enable a UE that is peak current limited to perform UL transmissions which are consistent with the UL timeline. A UE that is peak current limited may utilize a new form of distributed TTI (transmit time interval) bundling for improved uplink communication performance. In performing “distributed” TTI bundling, the UE may transmit a plurality of redundancy versions of first information to the base station, wherein the plurality of redundancy versions are transmitted in non-consecutive sub-frames with a periodicity of X ms. After the plurality of redundancy versions of first information are transmitted to the base station, the base station may provide a single acknowledge/negative acknowledge (ACK/NACK) to the UE. A method for dynamically generating and using a bundle size for TTI bundling is also disclosed.1. A user equipment device (UE), comprising: at least one antenna; at least one radio, wherein the at least one radio is configured to perform cellular communication using at least one radio access technology (RAT); one or more processors coupled to the at least one radio, wherein the one or more processors and the at least one radio are configured to perform voice and/or data communications; wherein the one or more processors and the at least one radio are configured to: indicate, via a radio resource control (RRC) message, that the UE has a transmission limitation, wherein the transmission limitation causes the UE to not transmit continuously in uplink (UL); receive an UL grant on a physical downlink control channel (PDCCH) for transmission on assigned physical uplink shared channel (PUSCH) resources; transmit data according to the UL grant on a first time portion of the assigned PUSCH resources; and do not transmit during a specified time portion of the assigned PUSCH resources in accordance with the indicated transmission limitation. 2. The UE of claim 1, wherein the UL grant received from the base station comprises information specifying periodic UL grants. 3. The UE of claim 2, wherein a periodicity of the UL grants is based, at least in part, on a bundle size specifying a number of a plurality of redundancy versions of the data to be transmitted to the base station. 4. The UE of claim 1, wherein the specified time portion corresponds to a duty cycle of the UE, wherein the duty cycle is based on a number of UL transmissions the UE will remain in a low power state and a round trip time of a hybrid automatic repeat request (HARQ). 5. The UE of claim 4, wherein the low power state is a discontinuous transmission (DTX) cycle. 6. The UE of claim 1, wherein the data is transmitted in accordance with a sub-frame (TTI) bundle size. 7. The UE of claim 6, wherein the sub-frame bundle size is dynamically determined at least once during the voice and/or data communications. 8. The UE of claim 7, wherein the bundle size specifies a number of the plurality of redundancy versions of first information transmitted to the base station. 9. The UE of claim 1, wherein the one or more processors and the at least one radio are further configured to: receive, in accordance with a hybrid automatic repeat request (HARQ) timeline, an acknowledgement/negative acknowledgement (ACK/NACK) of the transmission of data, wherein the ACK/NACK is a first NACK received X sub-frames after transmission of the data, and wherein the data comprises a first redundancy version of the data receive, 3X sub-frames after transmission of the data, a second NACK of the transmission of data; and transmit, X sub-frames after receipt of the second NACK, a second redundancy version of the data. 10. The UE of claim 1, wherein the one or more processors and the at least one radio are further configured to: receive a first negative acknowledge (NACK) from the base station after transmission of the data, wherein the UE does not perform a retransmission of the data in response to receiving the first NACK. 11. An apparatus, comprising: a memory; and a processing element in communication with the memory, wherein the processing element is configured to: generate instructions to indicate to a base station and via a radio resource control (RRC) message, that the apparatus has a transmission limitation, wherein the transmission limitation causes the apparatus to not transmit continuously in uplink (UL); receive, from the base station, an UL grant on a physical downlink control channel (PDCCH) for transmission on assigned physical uplink shared channel (PUSCH) resources; generate instructions to transmit data according to the UL grant on a time portion of the assigned PUSCH resources; and generate instructions to not transmit during a specified time portion of the assigned PUSCH resources in accordance with the indicated transmission limitation. 12. The apparatus of claim 11, wherein the UL grant received from the base station comprises information specifying periodic UL grants; and wherein a periodicity of the UL grants is based, at least in part, on a bundle size specifying a number of a plurality of redundancy versions of the data to be transmitted to the base station. 13. The apparatus of claim 11, wherein the specified time portion corresponds to a transmission duty cycle of the apparatus, wherein the duty cycle is based on a number of UL transmissions the apparatus will remain in a low power state and a round trip time of a hybrid automatic repeat request (HARQ), and wherein the low power state is a discontinuous transmission (DTX) cycle. 14. The apparatus of claim 11, wherein the data is transmitted in accordance with a sub-frame bundle size, wherein the sub-frame bundle size is dynamically determined at least once during the voice and/or data communications. 15. The apparatus of claim 14, wherein the bundle size specifies a number of the plurality of redundancy versions of first information transmitted to the base station. 16. The apparatus of claim 11, wherein the processing element is further configured to: receive, in accordance with a hybrid automatic repeat request (HARQ) timeline, an acknowledgement/negative acknowledgement (ACK/NACK) of the transmission of data, wherein the ACK/NACK is a first NACK received X sub-frames after transmission of the data, and wherein the data comprises a first redundancy version of the data; receive, 3X sub-frames after transmission of the data, a second NACK of the transmission of data; and generate instructions to transmit, X sub-frames after receipt of the second NACK, a second redundancy version of the data. 17. A non-transitory computer readable memory medium storing program instructions executable by a processor of a user equipment (UE) to: indicate, to a base station and via a radio resource control (RRC) message, that the UE has a transmission limitation, wherein the transmission limitation causes the UE to not transmit continuously in uplink (UL); receive, from the base station, an UL grant on a physical downlink control channel (PDCCH) for transmission on assigned physical uplink shared channel (PUSCH) resources; generate instructions to transmit, to the base station, data according to the UL grant on a time portion of the assigned PUSCH resources; and generate instructions to not transmit during a specified time portion of the assigned PUSCH resources in accordance with the indicated transmission limitation. 18. The non-transitory memory medium of claim 17, wherein the specified time portion corresponds to a duty cycle of the UE, wherein the duty cycle is based on a number of UL transmissions the UE will remain in a low power state and a round trip time of a hybrid automatic repeat request (HARD), and wherein the low power state is a discontinuous transmission (DTX) cycle. 19. The non-transitory memory medium of claim 17, wherein the data is transmitted in accordance with a sub-frame bundle size, wherein the sub-frame bundle size is dynamically determined at least once during the voice and/or data communications, and wherein the bundle size specifies a number of the plurality of redundancy versions of first information transmitted to the base station. 20. The non-transitory memory medium of claim 17, wherein the program instructions are further executable to receive, from the base station, a first negative acknowledge (NACK) after transmission of the data, wherein the UE does not perform a retransmission of the data in response to receiving the first NACK.
2,400
9,246
9,246
15,302,294
2,477
Various communication systems may benefit from inter-operator device-to-device operation. For example, communication systems of the third generation partnership project ( 3 GPP) long term evolution (LTE) advanced (LTE-A) release12/13 (Rel-12/13) or future releases may use such operation with respect to D2D communications. A method can include preparing, at a network element operated by an operator, radio resource information related to one or more operators other than the operator. The method can also include broadcasting, by the network element, the radio resource information. The radio resource information can be configured to permit a user equipment served by the network element to perform device-to-device discovery and/or communication with another user equipment served by at least one of the one or more operators.
1-29. (canceled) 30. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to prepare, at a network element operated by an operator, radio resource information related to one or more operators other than the operator; and broadcast, by the network element, the radio resource information, wherein at least part of the radio resource information is configured to permit a user equipment served by the network element to perform device-to-device discovery and/or communication with another user equipment served by at least one of the one or more operators. 31. The apparatus of claim 29, wherein the at least part of the radio resource information comprises a public land mobile network identifier of the one or more operators and at least one operating frequency band/carrier of the one or more operators. 32. The apparatus of claim 29, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to set user-equipment-specific resource constraints for operation including inter-operator device-to-device related operation. 33. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to prepare, at a user equipment, a discovery information message; and broadcast, by the user equipment, the discovery information message, wherein the discovery information message comprises discovery information related to intra-operator device-to-device operation and discovery information related to inter-operator device-to-device operation. 34. The apparatus of claim 33, wherein the discovery information message comprises user equipment capability and resource constraint information. 35. The apparatus of claim 33, wherein the discovery information message is transmitted in an allocated radio resource, wherein the allocated radio resource is selected depending on whether it includes information for the inter-operator device-to-device operation. 36. The apparatus of claim 33, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to report own resource constraints to another user equipment while beginning device to device communication link establishment with the another user equipment. 37. The apparatus of claim 33, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to schedule device-to-device communication for another user equipment while conducting the device-to-device communication with the another user equipment. 38. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to monitor, by a user equipment, for a discovery information message regarding device-to-device communication; and initiate the device-to-device communication based on the discovery information message, wherein the monitoring is limited to exclude discovery messages for inter-operator device-to-device communication or wherein the monitoring comprises monitoring for discovery messages for both inter-operator device-to-device operation and intra-operator device-to-device operation or wherein the monitoring comprises monitoring for discovery messages for inter-operator device-to-device communication. 39. The apparatus of claim 38, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to search an allocated radio resource depending on whether intra-operator device-to-device communication information is desired by the user equipment. 40. The apparatus of claim 38, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to maintain a cellular link with a serving operator of the user equipment while switching to another operator's band/carrier for the inter-operator device-to-device communication. 41. The apparatus of claim 38, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to report own resource constraints to another user equipment while beginning device to device communication link establishment with the another user equipment. 42. A method, comprising: preparing, at a network element operated by an operator, radio resource information related to one or more operators other than the operator; and broadcasting, by the network element, the radio resource information, wherein at least part of the radio resource information is configured to permit a user equipment served by the network element to perform device-to-device discovery and/or communication with another user equipment served by at least one of the one or more operators. 43. The method of claim 42, wherein the at least part of the radio resource information comprises a public land mobile network identifier of the one or more operators and at least one operating frequency band/carrier of the one or more operators. 44. The method of claim 42, further comprising: setting user-equipment-specific resource constraints for inter-operator operation including device-to-device related operation.
Various communication systems may benefit from inter-operator device-to-device operation. For example, communication systems of the third generation partnership project ( 3 GPP) long term evolution (LTE) advanced (LTE-A) release12/13 (Rel-12/13) or future releases may use such operation with respect to D2D communications. A method can include preparing, at a network element operated by an operator, radio resource information related to one or more operators other than the operator. The method can also include broadcasting, by the network element, the radio resource information. The radio resource information can be configured to permit a user equipment served by the network element to perform device-to-device discovery and/or communication with another user equipment served by at least one of the one or more operators.1-29. (canceled) 30. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to prepare, at a network element operated by an operator, radio resource information related to one or more operators other than the operator; and broadcast, by the network element, the radio resource information, wherein at least part of the radio resource information is configured to permit a user equipment served by the network element to perform device-to-device discovery and/or communication with another user equipment served by at least one of the one or more operators. 31. The apparatus of claim 29, wherein the at least part of the radio resource information comprises a public land mobile network identifier of the one or more operators and at least one operating frequency band/carrier of the one or more operators. 32. The apparatus of claim 29, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to set user-equipment-specific resource constraints for operation including inter-operator device-to-device related operation. 33. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to prepare, at a user equipment, a discovery information message; and broadcast, by the user equipment, the discovery information message, wherein the discovery information message comprises discovery information related to intra-operator device-to-device operation and discovery information related to inter-operator device-to-device operation. 34. The apparatus of claim 33, wherein the discovery information message comprises user equipment capability and resource constraint information. 35. The apparatus of claim 33, wherein the discovery information message is transmitted in an allocated radio resource, wherein the allocated radio resource is selected depending on whether it includes information for the inter-operator device-to-device operation. 36. The apparatus of claim 33, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to report own resource constraints to another user equipment while beginning device to device communication link establishment with the another user equipment. 37. The apparatus of claim 33, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to schedule device-to-device communication for another user equipment while conducting the device-to-device communication with the another user equipment. 38. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to monitor, by a user equipment, for a discovery information message regarding device-to-device communication; and initiate the device-to-device communication based on the discovery information message, wherein the monitoring is limited to exclude discovery messages for inter-operator device-to-device communication or wherein the monitoring comprises monitoring for discovery messages for both inter-operator device-to-device operation and intra-operator device-to-device operation or wherein the monitoring comprises monitoring for discovery messages for inter-operator device-to-device communication. 39. The apparatus of claim 38, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to search an allocated radio resource depending on whether intra-operator device-to-device communication information is desired by the user equipment. 40. The apparatus of claim 38, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to maintain a cellular link with a serving operator of the user equipment while switching to another operator's band/carrier for the inter-operator device-to-device communication. 41. The apparatus of claim 38, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to report own resource constraints to another user equipment while beginning device to device communication link establishment with the another user equipment. 42. A method, comprising: preparing, at a network element operated by an operator, radio resource information related to one or more operators other than the operator; and broadcasting, by the network element, the radio resource information, wherein at least part of the radio resource information is configured to permit a user equipment served by the network element to perform device-to-device discovery and/or communication with another user equipment served by at least one of the one or more operators. 43. The method of claim 42, wherein the at least part of the radio resource information comprises a public land mobile network identifier of the one or more operators and at least one operating frequency band/carrier of the one or more operators. 44. The method of claim 42, further comprising: setting user-equipment-specific resource constraints for inter-operator operation including device-to-device related operation.
2,400
9,247
9,247
15,982,747
2,434
A method includes receiving electronic data, extracting a first identifier from the electronic data, extracting first attributes from the electronic data, and searching a database for identifiers that match the first identifier to determine a number of matching identifiers. The method also includes determining that the number of matching identifiers exceeds a first threshold and searching the database for attributes associated with each of the matching identifiers to determine a subset of matching attributes. The method further includes calculating a specificity for the subset of matching attributes, determining that the specificity of the subset of matching attributes is less than or equal to a second threshold, and creating a filter based at least in part on the determination that the specificity of the subset of matching attributes is less than or equal to the second threshold.
1. A filtering system, comprising: an interface operable to receive electronic data; one or more extraction generators operable to: extract a first identifier from the electronic data; and extract first attributes from the electronic data; one or more specificity generators operable to: search a database for identifiers that match the first identifier to determine a number of matching identifiers; determine that the number of matching identifiers exceeds a first threshold; search the database for attributes associated with each of the matching identifiers to determine a subset of matching attributes, wherein the first attributes and the attributes associated with each of the matching identifiers each comprise the subset of matching attributes; and calculate a specificity for the subset of matching attributes; and a filter generator operable to: determine that the specificity of the subset of matching attributes is less than or equal to a second threshold; and create a filter based at least in part on the determination that the specificity of the subset of matching attributes is less than or equal to the second threshold. 2. The system of claim 1, wherein: the electronic data is an email message; the first identifier is associated with one of the following: an HTML pattern; a link; a domain; and a phone number; and the first attributes include one of the following: a number of links in the email message; a country where the email message originated; and a number of attachments attached to the email message. 3. The system of claim 1, further comprising: a threat detector operable to: apply the filter to the electronic data; detect a threat in the electronic data based at least in part on the applied filter; reject delivery of the electronic data to the electronic data's specified destination based at least in part on the applied filter; and automatically update the database to include the filter, wherein the filter is associated with the first identifier and the subset of matching attributes. 4. The system of claim 1, further comprising: one or more normalization generators operable to: normalize the first identifier; and normalize each of the first attributes; and one or more anonymization generators operable to: anonymize the first identifier; and anonymize each of the first attributes; wherein the one or more specificity generators are further operable to: calculate a specificity for the first attributes; and calculate a specificity for the first identifier. 5. The system of claim 1, further comprising a probability generator operable to calculate a threat probability for the first attributes, wherein creating the filter is further based on the threat probability. 6. The system of claim 1, wherein calculating the specificity for the subset of matching attributes is based at least in part on the following: a number of total electronic data associated with an accepted count of each matching attribute; and a number of the total electronic data associated with a rejected count of each matching attribute. 7. The system of claim 1, wherein: the interface is further operable to receive a plurality of electronic data; the first threshold is a predetermined number of matching identifiers received within a predetermined time period; and the second threshold is an average attribute specificity calculated by averaging the attribute specificities associated with each of the plurality of electronic data, wherein each attribute specificity is calculated using all of the attributes associated with the corresponding electronic data. 8. A method, comprising: receiving electronic data; extracting a first identifier from the electronic data; extracting first attributes from the electronic data; searching a database for identifiers that match the first identifier to determine a number of matching identifiers; determining that the number of matching identifiers exceeds a first threshold; searching the database for attributes associated with each of the matching identifiers to determine a subset of matching attributes, wherein the first attributes and the attributes associated with each of the matching identifiers each comprise the subset of matching attributes; calculating a specificity for the subset of matching attributes; determining that the specificity of the subset of matching attributes is less than or equal to a second threshold; and creating a filter based at least in part on the determination that the specificity of the subset of matching attributes is less than or equal to the second threshold. 9. The method of claim 8, wherein: the electronic data is an email message; the first identifier is associated with one of the following: an HTML pattern; a link; a domain; and a phone number; and the first attributes include one of the following: a number of links in the email message; a country where the email message originated; and a number of attachments attached to the email message. 10. The method of claim 8, further comprising: applying the filter to the electronic data; detecting a threat in the electronic data based at least in part on the applied filter; rejecting delivery of the electronic data to the electronic data's specified destination based at least in part on the applied filter; and automatically updating the database to include the filter, wherein the filter is associated with the first identifier and the subset of matching attributes. 11. The method of claim 8, further comprising: normalizing the first identifier; anonymizing the first identifier; calculating a specificity for the first identifier; normalizing each of the first attributes; anonymizing each of the first attributes; and calculating a specificity for the first attributes. 12. The method of claim 8, further comprising calculating a threat probability for the first attributes, wherein creating the filter is further based on the threat probability. 13. The method of claim 8, wherein calculating the specificity for the subset of matching attributes is based at least in part on the following: a number of total electronic data associated with an accepted count of each matching attribute; and a number of the total electronic data associated with a rejected count of each matching attribute. 14. The method of claim 8, further comprising receiving a plurality of electronic data, wherein: the first threshold is a predetermined number of matching identifiers received within a predetermined time period; and the second threshold is an average attribute specificity calculated by averaging the attribute specificities associated with each of the plurality of electronic data, wherein each attribute specificity is calculated using all of the attributes associated with the corresponding electronic data. 15. A non-transitory computer readable medium comprising instructions for causing processing circuitry to: receive electronic data; extract a first identifier from the electronic data; and extract first attributes from the electronic data; search a database for identifiers that match the first identifier to determine a number of matching identifiers; determine that the number of matching identifiers exceeds a first threshold; search the database for attributes associated with each of the matching identifiers to determine a subset of matching attributes, wherein the first attributes and the attributes associated with each of the matching identifiers each comprise the subset of matching attributes; calculate a specificity for the subset of matching attributes; determine that the specificity of the subset of matching attributes is less than or equal to a second threshold; and create a filter based at least in part on the determination that the specificity of the subset of matching attributes is less than or equal to the second threshold. 16. The computer readable medium of claim 15, wherein the instructions further cause the processing circuitry to: dynamically update a list of the identifiers in the database based on one or more pre-determined criteria; and dynamically update a list of the attributes in the database based on one or more pre-determined criteria. 17. The computer readable medium of claim 15, wherein the instructions further cause the processing circuitry to: apply the filter to the electronic data; detect a threat in the electronic data based at least in part on the applied filter; reject delivery of the electronic data to the electronic data's specified destination based at least in part on the applied filter; and automatically update the database to include the filter, wherein the filter is associated with the first identifier and the subset of matching attributes. 18. The computer readable medium of claim 15, wherein the instructions further cause the processing circuitry to: normalize the first identifier; anonymize the first identifier; calculate a specificity for the first identifier; normalize each of the first attributes; anonymize each of the first attributes; and calculate a specificity for the first attributes. 19. The computer readable medium of claim 15, wherein the instructions further cause the processing circuitry to calculate a threat probability for the first attributes, wherein creating the filter is further based on the threat probability. 20. The computer readable medium of claim 15, wherein calculating the specificity for the subset of matching attributes is based at least in part on the following: a number of total electronic data associated with an accepted count of each matching attribute; and a number of the total electronic data associated with a rejected count of each matching attribute.
A method includes receiving electronic data, extracting a first identifier from the electronic data, extracting first attributes from the electronic data, and searching a database for identifiers that match the first identifier to determine a number of matching identifiers. The method also includes determining that the number of matching identifiers exceeds a first threshold and searching the database for attributes associated with each of the matching identifiers to determine a subset of matching attributes. The method further includes calculating a specificity for the subset of matching attributes, determining that the specificity of the subset of matching attributes is less than or equal to a second threshold, and creating a filter based at least in part on the determination that the specificity of the subset of matching attributes is less than or equal to the second threshold.1. A filtering system, comprising: an interface operable to receive electronic data; one or more extraction generators operable to: extract a first identifier from the electronic data; and extract first attributes from the electronic data; one or more specificity generators operable to: search a database for identifiers that match the first identifier to determine a number of matching identifiers; determine that the number of matching identifiers exceeds a first threshold; search the database for attributes associated with each of the matching identifiers to determine a subset of matching attributes, wherein the first attributes and the attributes associated with each of the matching identifiers each comprise the subset of matching attributes; and calculate a specificity for the subset of matching attributes; and a filter generator operable to: determine that the specificity of the subset of matching attributes is less than or equal to a second threshold; and create a filter based at least in part on the determination that the specificity of the subset of matching attributes is less than or equal to the second threshold. 2. The system of claim 1, wherein: the electronic data is an email message; the first identifier is associated with one of the following: an HTML pattern; a link; a domain; and a phone number; and the first attributes include one of the following: a number of links in the email message; a country where the email message originated; and a number of attachments attached to the email message. 3. The system of claim 1, further comprising: a threat detector operable to: apply the filter to the electronic data; detect a threat in the electronic data based at least in part on the applied filter; reject delivery of the electronic data to the electronic data's specified destination based at least in part on the applied filter; and automatically update the database to include the filter, wherein the filter is associated with the first identifier and the subset of matching attributes. 4. The system of claim 1, further comprising: one or more normalization generators operable to: normalize the first identifier; and normalize each of the first attributes; and one or more anonymization generators operable to: anonymize the first identifier; and anonymize each of the first attributes; wherein the one or more specificity generators are further operable to: calculate a specificity for the first attributes; and calculate a specificity for the first identifier. 5. The system of claim 1, further comprising a probability generator operable to calculate a threat probability for the first attributes, wherein creating the filter is further based on the threat probability. 6. The system of claim 1, wherein calculating the specificity for the subset of matching attributes is based at least in part on the following: a number of total electronic data associated with an accepted count of each matching attribute; and a number of the total electronic data associated with a rejected count of each matching attribute. 7. The system of claim 1, wherein: the interface is further operable to receive a plurality of electronic data; the first threshold is a predetermined number of matching identifiers received within a predetermined time period; and the second threshold is an average attribute specificity calculated by averaging the attribute specificities associated with each of the plurality of electronic data, wherein each attribute specificity is calculated using all of the attributes associated with the corresponding electronic data. 8. A method, comprising: receiving electronic data; extracting a first identifier from the electronic data; extracting first attributes from the electronic data; searching a database for identifiers that match the first identifier to determine a number of matching identifiers; determining that the number of matching identifiers exceeds a first threshold; searching the database for attributes associated with each of the matching identifiers to determine a subset of matching attributes, wherein the first attributes and the attributes associated with each of the matching identifiers each comprise the subset of matching attributes; calculating a specificity for the subset of matching attributes; determining that the specificity of the subset of matching attributes is less than or equal to a second threshold; and creating a filter based at least in part on the determination that the specificity of the subset of matching attributes is less than or equal to the second threshold. 9. The method of claim 8, wherein: the electronic data is an email message; the first identifier is associated with one of the following: an HTML pattern; a link; a domain; and a phone number; and the first attributes include one of the following: a number of links in the email message; a country where the email message originated; and a number of attachments attached to the email message. 10. The method of claim 8, further comprising: applying the filter to the electronic data; detecting a threat in the electronic data based at least in part on the applied filter; rejecting delivery of the electronic data to the electronic data's specified destination based at least in part on the applied filter; and automatically updating the database to include the filter, wherein the filter is associated with the first identifier and the subset of matching attributes. 11. The method of claim 8, further comprising: normalizing the first identifier; anonymizing the first identifier; calculating a specificity for the first identifier; normalizing each of the first attributes; anonymizing each of the first attributes; and calculating a specificity for the first attributes. 12. The method of claim 8, further comprising calculating a threat probability for the first attributes, wherein creating the filter is further based on the threat probability. 13. The method of claim 8, wherein calculating the specificity for the subset of matching attributes is based at least in part on the following: a number of total electronic data associated with an accepted count of each matching attribute; and a number of the total electronic data associated with a rejected count of each matching attribute. 14. The method of claim 8, further comprising receiving a plurality of electronic data, wherein: the first threshold is a predetermined number of matching identifiers received within a predetermined time period; and the second threshold is an average attribute specificity calculated by averaging the attribute specificities associated with each of the plurality of electronic data, wherein each attribute specificity is calculated using all of the attributes associated with the corresponding electronic data. 15. A non-transitory computer readable medium comprising instructions for causing processing circuitry to: receive electronic data; extract a first identifier from the electronic data; and extract first attributes from the electronic data; search a database for identifiers that match the first identifier to determine a number of matching identifiers; determine that the number of matching identifiers exceeds a first threshold; search the database for attributes associated with each of the matching identifiers to determine a subset of matching attributes, wherein the first attributes and the attributes associated with each of the matching identifiers each comprise the subset of matching attributes; calculate a specificity for the subset of matching attributes; determine that the specificity of the subset of matching attributes is less than or equal to a second threshold; and create a filter based at least in part on the determination that the specificity of the subset of matching attributes is less than or equal to the second threshold. 16. The computer readable medium of claim 15, wherein the instructions further cause the processing circuitry to: dynamically update a list of the identifiers in the database based on one or more pre-determined criteria; and dynamically update a list of the attributes in the database based on one or more pre-determined criteria. 17. The computer readable medium of claim 15, wherein the instructions further cause the processing circuitry to: apply the filter to the electronic data; detect a threat in the electronic data based at least in part on the applied filter; reject delivery of the electronic data to the electronic data's specified destination based at least in part on the applied filter; and automatically update the database to include the filter, wherein the filter is associated with the first identifier and the subset of matching attributes. 18. The computer readable medium of claim 15, wherein the instructions further cause the processing circuitry to: normalize the first identifier; anonymize the first identifier; calculate a specificity for the first identifier; normalize each of the first attributes; anonymize each of the first attributes; and calculate a specificity for the first attributes. 19. The computer readable medium of claim 15, wherein the instructions further cause the processing circuitry to calculate a threat probability for the first attributes, wherein creating the filter is further based on the threat probability. 20. The computer readable medium of claim 15, wherein calculating the specificity for the subset of matching attributes is based at least in part on the following: a number of total electronic data associated with an accepted count of each matching attribute; and a number of the total electronic data associated with a rejected count of each matching attribute.
2,400
9,248
9,248
14,333,296
2,447
Provided are methods and systems related to communications between a social media service or provider (e.g., Twitter®, Facebook®) or other resource (e.g., web page) and one or more content providers. In an aspect, provided are methods, comprising receiving user information and a user agnostic identifier, providing an access element configured to provide access to content from a content provider based on the user information and the user agnostic identifier, receiving, from the content provider, a notification indicative of a user interaction with the content based on a user accessing the content, and tracking user behavior based on at least one of the user information, the user agnostic identifier, the access element, and the notification.
1. A method, comprising: receiving user information and a user agnostic identifier; providing an access element configured to provide access to content from a content provider based on the user information and the user agnostic identifier; receiving, from the content provider, a notification indicative of a user interaction with the content based on a user accessing the content; and tracking user behavior based on at least one of the user information, the user agnostic identifier, the access element, and the notification. 2. The method of claim 1, wherein the user agnostic identifier is associated with a marketing campaign. 3. The method of claim 1, wherein receiving the user information and the user agnostic identifier is based on at least one of a user interaction with an interface element, a user login, and user tracking data. 4. The method of claim 1, wherein the user interaction comprises at least one of an interaction with a playback control associated with the content, sharing the content, favoriting the content, bookmarking the content, commenting on the content, reviewing the content, ranking the content, and an interaction ending access to the content. 5. The method of claim 1, wherein tracking user behavior comprises generating an event history associated with the user information and the user agnostic identifier. 6. The method of claim 1, further comprising determining timing information indicative of at least one of the user interaction and a request for content resulting in the receiving of the user information and the user agnostic identifier, wherein at least one of, the access element is provided based on the timing information and the notification comprises the timing information. 7. A method, comprising: receiving user information and a user agnostic identifier; providing an access element for content based on the user information and the user agnostic identifier; receiving an interaction with the content; and providing a notification of the interaction. 8. The method of claim 7, wherein the user agnostic identifier is associated with a marketing campaign. 9. The method of claim 8, further comprising accessing information indicative of the marketing campaign, wherein the information indicative of the marketing campaign is based on the notification. 10. The method of claim 7, wherein receiving the user information and the user agnostic identifier is based on at least one of a user interaction with an interface element, a user login, and user tracking data. 11. The method of claim 10, wherein the interface element is provided on a social media feed. 12. The method of claim 7, wherein the interaction with the content comprises at least one of an interaction with a playback control associated with the content, sharing the content, favoriting the content, bookmarking the content, commenting on the content, reviewing the content, ranking the content, and an interaction ending access to the content. 13. The method of claim 7, wherein the interaction with the content is an interaction with an advertisement provided with the content. 14. The method of claim 7, further comprising determining timing information indicative of at least one of the interaction and a request for content resulting in the receiving of the user information and the user agnostic identifier, and wherein at least one of, the content is selected based on the timing information and the notification comprises the timing information. 15. A method, comprising: receiving a plurality of requests for content from a plurality of users based on an interface element configured to provide a user agnostic identifier and user information; providing a first access element to a first portion of the plurality of users to access the content from a first content provider, providing a second access element to a second portion of the plurality of users to access the content from a second content provider; and receiving a plurality of notifications indicative of user interactions with the content from at least one of the first content provider and the second content provider. 16. The method of claim 15, wherein the user agnostic identifier is associated with a marketing campaign. 17. The method of claim 16, further comprising providing access to information indicative of the marketing campaign, wherein the information is based on at least a portion of the plurality of notifications. 18. The method of claim 15, wherein the user interactions comprise at least one of an interaction with a playback control associated with the content, sharing the content, favoriting the content, bookmarking the content, commenting on the content, reviewing the content, ranking the content, and an interaction ending access to the content. 19. The method of claim 15, further comprising tracking user behavior based on the plurality of notifications. 20. The method of claim 15, further comprising determining timing information indicative of at least one of a user interaction and a request for content, and wherein at least one of, the first access element is provided based on the timing information and a notification comprises the timing information.
Provided are methods and systems related to communications between a social media service or provider (e.g., Twitter®, Facebook®) or other resource (e.g., web page) and one or more content providers. In an aspect, provided are methods, comprising receiving user information and a user agnostic identifier, providing an access element configured to provide access to content from a content provider based on the user information and the user agnostic identifier, receiving, from the content provider, a notification indicative of a user interaction with the content based on a user accessing the content, and tracking user behavior based on at least one of the user information, the user agnostic identifier, the access element, and the notification.1. A method, comprising: receiving user information and a user agnostic identifier; providing an access element configured to provide access to content from a content provider based on the user information and the user agnostic identifier; receiving, from the content provider, a notification indicative of a user interaction with the content based on a user accessing the content; and tracking user behavior based on at least one of the user information, the user agnostic identifier, the access element, and the notification. 2. The method of claim 1, wherein the user agnostic identifier is associated with a marketing campaign. 3. The method of claim 1, wherein receiving the user information and the user agnostic identifier is based on at least one of a user interaction with an interface element, a user login, and user tracking data. 4. The method of claim 1, wherein the user interaction comprises at least one of an interaction with a playback control associated with the content, sharing the content, favoriting the content, bookmarking the content, commenting on the content, reviewing the content, ranking the content, and an interaction ending access to the content. 5. The method of claim 1, wherein tracking user behavior comprises generating an event history associated with the user information and the user agnostic identifier. 6. The method of claim 1, further comprising determining timing information indicative of at least one of the user interaction and a request for content resulting in the receiving of the user information and the user agnostic identifier, wherein at least one of, the access element is provided based on the timing information and the notification comprises the timing information. 7. A method, comprising: receiving user information and a user agnostic identifier; providing an access element for content based on the user information and the user agnostic identifier; receiving an interaction with the content; and providing a notification of the interaction. 8. The method of claim 7, wherein the user agnostic identifier is associated with a marketing campaign. 9. The method of claim 8, further comprising accessing information indicative of the marketing campaign, wherein the information indicative of the marketing campaign is based on the notification. 10. The method of claim 7, wherein receiving the user information and the user agnostic identifier is based on at least one of a user interaction with an interface element, a user login, and user tracking data. 11. The method of claim 10, wherein the interface element is provided on a social media feed. 12. The method of claim 7, wherein the interaction with the content comprises at least one of an interaction with a playback control associated with the content, sharing the content, favoriting the content, bookmarking the content, commenting on the content, reviewing the content, ranking the content, and an interaction ending access to the content. 13. The method of claim 7, wherein the interaction with the content is an interaction with an advertisement provided with the content. 14. The method of claim 7, further comprising determining timing information indicative of at least one of the interaction and a request for content resulting in the receiving of the user information and the user agnostic identifier, and wherein at least one of, the content is selected based on the timing information and the notification comprises the timing information. 15. A method, comprising: receiving a plurality of requests for content from a plurality of users based on an interface element configured to provide a user agnostic identifier and user information; providing a first access element to a first portion of the plurality of users to access the content from a first content provider, providing a second access element to a second portion of the plurality of users to access the content from a second content provider; and receiving a plurality of notifications indicative of user interactions with the content from at least one of the first content provider and the second content provider. 16. The method of claim 15, wherein the user agnostic identifier is associated with a marketing campaign. 17. The method of claim 16, further comprising providing access to information indicative of the marketing campaign, wherein the information is based on at least a portion of the plurality of notifications. 18. The method of claim 15, wherein the user interactions comprise at least one of an interaction with a playback control associated with the content, sharing the content, favoriting the content, bookmarking the content, commenting on the content, reviewing the content, ranking the content, and an interaction ending access to the content. 19. The method of claim 15, further comprising tracking user behavior based on the plurality of notifications. 20. The method of claim 15, further comprising determining timing information indicative of at least one of a user interaction and a request for content, and wherein at least one of, the first access element is provided based on the timing information and a notification comprises the timing information.
2,400
9,249
9,249
16,123,677
2,463
Certain aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment may provide information identifying a first time offset between a first time associated with a measurement performed by the user equipment and a second time associated with a measurement gap or a time value of a serving cell of the user equipment, receive information identifying a second time offset between the second time and a third time, wherein the second time offset is based at least in part on the first time offset, and/or transmit a random access message at the third time based at least in part on the second time offset. A scheduling entity may coordinate a random access procedure associated with the random access message based at least in part on the second time offset. Numerous other aspects are provided.
1. A method of wireless communication performed by a user equipment, comprising: providing information identifying a first time offset between a first time associated with a measurement performed by the user equipment and a second time associated with a measurement gap or a time value of a serving cell of the user equipment; receiving information identifying a second time offset between the second time and a third time, wherein the second time offset is based at least in part on the first time offset; and transmitting a random access message at the third time based at least in part on the second time offset. 2. The method of claim 1, wherein the time value is based at least in part on at least one of a frame timing, slot timing, or symbol timing of the serving cell. 3. The method of claim 1, wherein the first time offset is based at least in part on a sub-symbol timing difference between the first time and the second time. 4. The method of claim 1, wherein the measurement is performed with regard to a beam, and wherein the random access message is transmitted using the beam. 5. The method of claim 1, wherein the information identifying the second time offset is received in a handover command. 6. The method of claim 1, wherein the information identifying the second time offset identifies at least one of a periodicity for the random access message or a format for the random access message. 7. The method of claim 1, further comprising: receiving information identifying a third time offset between the second time and a fourth time at which a reference signal is to be received; and scanning for the reference signal at the fourth time based at least in part on the third time offset. 8. A method of wireless communication performed by a scheduling entity, comprising: receiving information identifying a first time offset between a first time associated with a measurement regarding a beam received by a user equipment and a second time associated with a measurement gap or a time value of a serving cell of the user equipment; configuring a random access procedure for a base station that provides the beam based at least in part on the first time offset, wherein the random access procedure is configured to cause the random access procedure to be performed after a second time offset that is based at least in part on the first time offset; and providing information identifying the second time offset to the user equipment for performance of the random access procedure. 9. The method of claim 8, wherein the second time offset is between the second time and a time at which the random access procedure is performed. 10. The method of claim 8, wherein configuring the random access procedure comprises configuring the base station to scan for a random access message at a particular time relative to the measurement gap or the time value. 11. The method of claim 10, wherein the base station is configured to scan for the random access message at two or more times. 12. The method of claim 8, wherein configuring the random access procedure comprises configuring the user equipment to transmit a random access message at two or more times. 13. The method of claim 8, wherein the information identifying the first time offset is first information identifying one first time offset for a first beam and wherein the information identifying the second time offset is first information identifying one second time offset for the first beam, and wherein the random access procedure is a first random access procedure, and wherein the method further comprises: receiving second information identifying another first time offset for a second beam; configuring a second random access procedure with regard to the second beam based at least in part on another second time offset; and providing information identifying the second time offset for performance of the second random access procedure. 14. The method of claim 13, wherein the second random access procedure is configured between the base station and the user equipment. 15. The method of claim 13, wherein the base station is a first base station, and wherein the second random access procedure is configured between the user equipment and a second base station. 16. The method of claim 8, wherein the base station is a target base station for a handover of the user equipment. 17. The method of claim 8, wherein the information identifying the second time offset is provided in a handover message. 18. The method of claim 8, wherein the scheduling entity is the base station. 19. The method of claim 8, further comprising: determining a third time offset between the second time and a fourth time at which a reference signal is to be transmitted by the base station; and providing information identifying the third time offset to the base station and the user equipment. 20. A user equipment for wireless communication, comprising: a memory; and one or more processors operatively coupled to the memory, the memory and the one or more processors configured to: provide information identifying a first time offset between a first time associated with a measurement performed by the user equipment and a second time associated with a measurement gap or a time value of a serving cell of the user equipment; receive information identifying a second time offset between the second time and a third time, wherein the second time offset is based at least in part on the first time offset; and transmit a random access message at the third time based at least in part on the second time offset. 21. The user equipment of claim 20, wherein the time value is based at least in part on at least one of a frame timing, slot timing, or symbol timing of the serving cell. 22. The user equipment of claim 20, wherein the first time offset is based at least in part on a sub-symbol timing difference between the first time and the second time. 23. The user equipment of claim 20, wherein the information identifying the second time offset is received in a handover command. 24. The user equipment of claim 20, wherein the information identifying the second time offset identifies at least one of a periodicity for the random access message or a format for the random access message. 25. The user equipment of claim 20, wherein the one or more processors are further configured to: receive information identifying a third time offset between the second time and a fourth time at which a reference signal is to be received; and scan for the reference signal at the fourth time based at least in part on the third time offset. 26. A scheduling entity for wireless communication, comprising: a memory; and one or more processors operatively coupled to the memory, the memory and the one or more processors configured to: receive information identifying a first time offset between a first time associated with a measurement regarding a beam received by a user equipment and a second time associated with a measurement gap or a time value of a serving cell of the user equipment; configure a random access procedure for a base station that provides the beam based at least in part on the first time offset, wherein the random access procedure is configured to cause the random access procedure to be performed after a second time offset that is based at least in part on the first time offset; and provide information identifying the second time offset to the user equipment for performance of the random access procedure. 27. The scheduling entity of claim 26, wherein the one or more processors, when configuring the random access procedure, are further to: configure the base station to scan for a random access message at a particular time relative to the measurement gap or the time value. 28. The scheduling entity of claim 26, wherein the information identifying the first time offset is first information identifying one first time offset for a first beam and wherein the information identifying the second time offset is first information identifying one second time offset for the first beam, and wherein the random access procedure is a first random access procedure, and wherein the one or more processors are further to: receive second information identifying another first time offset for a second beam; configure a second random access procedure with regard to the second beam based at least in part on another second time offset; and provide information identifying the second time offset for performance of the second random access procedure. 29. The scheduling entity of claim 28, wherein the second random access procedure is configured between the base station and the user equipment. 30. The scheduling entity of claim 28, wherein the base station is a first base station, and wherein the second random access procedure is configured between the user equipment and a second base station.
Certain aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment may provide information identifying a first time offset between a first time associated with a measurement performed by the user equipment and a second time associated with a measurement gap or a time value of a serving cell of the user equipment, receive information identifying a second time offset between the second time and a third time, wherein the second time offset is based at least in part on the first time offset, and/or transmit a random access message at the third time based at least in part on the second time offset. A scheduling entity may coordinate a random access procedure associated with the random access message based at least in part on the second time offset. Numerous other aspects are provided.1. A method of wireless communication performed by a user equipment, comprising: providing information identifying a first time offset between a first time associated with a measurement performed by the user equipment and a second time associated with a measurement gap or a time value of a serving cell of the user equipment; receiving information identifying a second time offset between the second time and a third time, wherein the second time offset is based at least in part on the first time offset; and transmitting a random access message at the third time based at least in part on the second time offset. 2. The method of claim 1, wherein the time value is based at least in part on at least one of a frame timing, slot timing, or symbol timing of the serving cell. 3. The method of claim 1, wherein the first time offset is based at least in part on a sub-symbol timing difference between the first time and the second time. 4. The method of claim 1, wherein the measurement is performed with regard to a beam, and wherein the random access message is transmitted using the beam. 5. The method of claim 1, wherein the information identifying the second time offset is received in a handover command. 6. The method of claim 1, wherein the information identifying the second time offset identifies at least one of a periodicity for the random access message or a format for the random access message. 7. The method of claim 1, further comprising: receiving information identifying a third time offset between the second time and a fourth time at which a reference signal is to be received; and scanning for the reference signal at the fourth time based at least in part on the third time offset. 8. A method of wireless communication performed by a scheduling entity, comprising: receiving information identifying a first time offset between a first time associated with a measurement regarding a beam received by a user equipment and a second time associated with a measurement gap or a time value of a serving cell of the user equipment; configuring a random access procedure for a base station that provides the beam based at least in part on the first time offset, wherein the random access procedure is configured to cause the random access procedure to be performed after a second time offset that is based at least in part on the first time offset; and providing information identifying the second time offset to the user equipment for performance of the random access procedure. 9. The method of claim 8, wherein the second time offset is between the second time and a time at which the random access procedure is performed. 10. The method of claim 8, wherein configuring the random access procedure comprises configuring the base station to scan for a random access message at a particular time relative to the measurement gap or the time value. 11. The method of claim 10, wherein the base station is configured to scan for the random access message at two or more times. 12. The method of claim 8, wherein configuring the random access procedure comprises configuring the user equipment to transmit a random access message at two or more times. 13. The method of claim 8, wherein the information identifying the first time offset is first information identifying one first time offset for a first beam and wherein the information identifying the second time offset is first information identifying one second time offset for the first beam, and wherein the random access procedure is a first random access procedure, and wherein the method further comprises: receiving second information identifying another first time offset for a second beam; configuring a second random access procedure with regard to the second beam based at least in part on another second time offset; and providing information identifying the second time offset for performance of the second random access procedure. 14. The method of claim 13, wherein the second random access procedure is configured between the base station and the user equipment. 15. The method of claim 13, wherein the base station is a first base station, and wherein the second random access procedure is configured between the user equipment and a second base station. 16. The method of claim 8, wherein the base station is a target base station for a handover of the user equipment. 17. The method of claim 8, wherein the information identifying the second time offset is provided in a handover message. 18. The method of claim 8, wherein the scheduling entity is the base station. 19. The method of claim 8, further comprising: determining a third time offset between the second time and a fourth time at which a reference signal is to be transmitted by the base station; and providing information identifying the third time offset to the base station and the user equipment. 20. A user equipment for wireless communication, comprising: a memory; and one or more processors operatively coupled to the memory, the memory and the one or more processors configured to: provide information identifying a first time offset between a first time associated with a measurement performed by the user equipment and a second time associated with a measurement gap or a time value of a serving cell of the user equipment; receive information identifying a second time offset between the second time and a third time, wherein the second time offset is based at least in part on the first time offset; and transmit a random access message at the third time based at least in part on the second time offset. 21. The user equipment of claim 20, wherein the time value is based at least in part on at least one of a frame timing, slot timing, or symbol timing of the serving cell. 22. The user equipment of claim 20, wherein the first time offset is based at least in part on a sub-symbol timing difference between the first time and the second time. 23. The user equipment of claim 20, wherein the information identifying the second time offset is received in a handover command. 24. The user equipment of claim 20, wherein the information identifying the second time offset identifies at least one of a periodicity for the random access message or a format for the random access message. 25. The user equipment of claim 20, wherein the one or more processors are further configured to: receive information identifying a third time offset between the second time and a fourth time at which a reference signal is to be received; and scan for the reference signal at the fourth time based at least in part on the third time offset. 26. A scheduling entity for wireless communication, comprising: a memory; and one or more processors operatively coupled to the memory, the memory and the one or more processors configured to: receive information identifying a first time offset between a first time associated with a measurement regarding a beam received by a user equipment and a second time associated with a measurement gap or a time value of a serving cell of the user equipment; configure a random access procedure for a base station that provides the beam based at least in part on the first time offset, wherein the random access procedure is configured to cause the random access procedure to be performed after a second time offset that is based at least in part on the first time offset; and provide information identifying the second time offset to the user equipment for performance of the random access procedure. 27. The scheduling entity of claim 26, wherein the one or more processors, when configuring the random access procedure, are further to: configure the base station to scan for a random access message at a particular time relative to the measurement gap or the time value. 28. The scheduling entity of claim 26, wherein the information identifying the first time offset is first information identifying one first time offset for a first beam and wherein the information identifying the second time offset is first information identifying one second time offset for the first beam, and wherein the random access procedure is a first random access procedure, and wherein the one or more processors are further to: receive second information identifying another first time offset for a second beam; configure a second random access procedure with regard to the second beam based at least in part on another second time offset; and provide information identifying the second time offset for performance of the second random access procedure. 29. The scheduling entity of claim 28, wherein the second random access procedure is configured between the base station and the user equipment. 30. The scheduling entity of claim 28, wherein the base station is a first base station, and wherein the second random access procedure is configured between the user equipment and a second base station.
2,400
9,250
9,250
15,199,594
2,447
In some implementations, a method includes extracting message attributes of an email associated with a user from the email. User interaction data is identified that is generated by the user in association with display of the email based on sensor data from one or more sensors. It is determined that the user interaction data corresponds to a routine of the user based on a routine-related aspect generated from a user routine model representing the routine. A time to present a notification of the email is determined based on the routine. The notification is provided to the user on a user device based on the determined time to present the notification.
1. A computerized system comprising: one or more processors; and one or more computer storage media storing computer-useable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising: extracting an message attributes of an email associated with a user from the email; identifying user interaction data generated by the user in association with display of the email based on sensor data from one or more sensors; determining the user interaction data corresponds to a routine of the user based on a routine-related aspect generated from a user routine model representing the routine; determining a time to present a notification of the email based on the routine and the message attributes; and providing the notification to the user on a user device based on the determined time to present the notification. 2. The computerized system of claim 1, wherein the determining the user interaction data corresponds to the routine of the user comprises determining the user is engaged in the routine. 3. The computerized system of claim 1, wherein the determining the user interaction data corresponds to the routine of the user comprises determining the user will be engaged in the routine during the time to present the notification. 4. The computerized system of claim 1, wherein the operations further comprise: analyzing additional user interactions by the user with the email after the determining the time to present the notification; and updating the time to present the notification based on the detecting of the user interactions. 5. The computerized system of claim 1, wherein the operations further comprise determining the user interaction represents the user opening the email. 6. The computerized system of claim 1, wherein the operations further comprise determining the user opened the email based on the email being marked as opened by the user interactions, and the email is no longer marked as opened during the determining the notification time and the providing the notification to the user. 7. The computerized system of claim 1, wherein the notification comprises a first reminder of the email, and a second reminder of an additional email based on an additional message attributes extracted from the additional email. 8. The computerized system of claim 1, wherein the determining the user interaction data corresponds to the routine of the user is based on determining an amount of time the user viewed the email. 9. The computerized system of claim 1, wherein the determining the user interaction data corresponds to the routine of the user comprises comparing the routine-related aspect to at least one message attribute extracted from the email. 10. The computerized system of claim 1, wherein the routine corresponds to the user reading emails. 11. The computerized system of claim 1, wherein the determining a time to present the notification comprises: determining that the notification should be presented to the user based on the message attributes; extracting a location from the routine as a routine-related aspect; and determining that the location corresponds to a current location of the user. 12. A computerized method comprising: extracting message attributes from an email associated with a user; determine the user has opened the email; determining user context of the user opening the email based on routine-related aspects generated from one or more user routine models associated with the user; determining a notification time of a notification of the opened email based on the user context and the message attributes; and providing the notification to the user based on the determining of the notification time. 13. The computerized method of claim 12, wherein the opening of the email by the user marks the email as opened and the email remains marked as opened from the opening during the determining the notification time and the providing the notification to the user. 14. The computerized method of claim 12, wherein the determining the user context comprises analyzing interaction data generated by the user in association with display of the email based on sensor data from one or more sensors. 15. The computerized method of claim 12, further comprising: detecting user interactions by the user with the opened email after the determining the time to present the notification; determining user context of the user interactions based on routine-related aspects generated from one or more user routine models associated with the user; and updating the notification time based on the detecting of the user interactions. 16. The computerized method of claim 12, wherein the determining the user context of the user opening the email comprises determining the user is engaged in a routine represented by one of the one or more user routine models. 17. The computerized method of claim 12, wherein the determining the user context of the user opening the email comprises determining the user will be engaged in routine represented by one of the one or more user routine models during a time the notification is presented. 18. One or more computer storage devices storing computer-useable instructions that, when executed by the one or more computing devices, cause the one or more computing devices to perform a method comprising: extracting message attributes from an email associated with a user; determining user context of the user opening the email based on routine-related aspects generated from one or more user routine models associated with the user; determining a notification time of a notification of the opened email based on the user context and the message attributes; providing the notification to the user based on the determining of the notification time. 19. The one or more computer storage devices of claim 18, wherein the determining the user context of the user opening the email comprises determining the user is engaged in a routine represented by one of the one or more user routine models. 20. The one or more computer storage devices of claim 18, wherein the determining the user context of the user opening the email comprises determining the user will be engaged in routine represented by one of the one or more user routine models during a time the notification is presented.
In some implementations, a method includes extracting message attributes of an email associated with a user from the email. User interaction data is identified that is generated by the user in association with display of the email based on sensor data from one or more sensors. It is determined that the user interaction data corresponds to a routine of the user based on a routine-related aspect generated from a user routine model representing the routine. A time to present a notification of the email is determined based on the routine. The notification is provided to the user on a user device based on the determined time to present the notification.1. A computerized system comprising: one or more processors; and one or more computer storage media storing computer-useable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising: extracting an message attributes of an email associated with a user from the email; identifying user interaction data generated by the user in association with display of the email based on sensor data from one or more sensors; determining the user interaction data corresponds to a routine of the user based on a routine-related aspect generated from a user routine model representing the routine; determining a time to present a notification of the email based on the routine and the message attributes; and providing the notification to the user on a user device based on the determined time to present the notification. 2. The computerized system of claim 1, wherein the determining the user interaction data corresponds to the routine of the user comprises determining the user is engaged in the routine. 3. The computerized system of claim 1, wherein the determining the user interaction data corresponds to the routine of the user comprises determining the user will be engaged in the routine during the time to present the notification. 4. The computerized system of claim 1, wherein the operations further comprise: analyzing additional user interactions by the user with the email after the determining the time to present the notification; and updating the time to present the notification based on the detecting of the user interactions. 5. The computerized system of claim 1, wherein the operations further comprise determining the user interaction represents the user opening the email. 6. The computerized system of claim 1, wherein the operations further comprise determining the user opened the email based on the email being marked as opened by the user interactions, and the email is no longer marked as opened during the determining the notification time and the providing the notification to the user. 7. The computerized system of claim 1, wherein the notification comprises a first reminder of the email, and a second reminder of an additional email based on an additional message attributes extracted from the additional email. 8. The computerized system of claim 1, wherein the determining the user interaction data corresponds to the routine of the user is based on determining an amount of time the user viewed the email. 9. The computerized system of claim 1, wherein the determining the user interaction data corresponds to the routine of the user comprises comparing the routine-related aspect to at least one message attribute extracted from the email. 10. The computerized system of claim 1, wherein the routine corresponds to the user reading emails. 11. The computerized system of claim 1, wherein the determining a time to present the notification comprises: determining that the notification should be presented to the user based on the message attributes; extracting a location from the routine as a routine-related aspect; and determining that the location corresponds to a current location of the user. 12. A computerized method comprising: extracting message attributes from an email associated with a user; determine the user has opened the email; determining user context of the user opening the email based on routine-related aspects generated from one or more user routine models associated with the user; determining a notification time of a notification of the opened email based on the user context and the message attributes; and providing the notification to the user based on the determining of the notification time. 13. The computerized method of claim 12, wherein the opening of the email by the user marks the email as opened and the email remains marked as opened from the opening during the determining the notification time and the providing the notification to the user. 14. The computerized method of claim 12, wherein the determining the user context comprises analyzing interaction data generated by the user in association with display of the email based on sensor data from one or more sensors. 15. The computerized method of claim 12, further comprising: detecting user interactions by the user with the opened email after the determining the time to present the notification; determining user context of the user interactions based on routine-related aspects generated from one or more user routine models associated with the user; and updating the notification time based on the detecting of the user interactions. 16. The computerized method of claim 12, wherein the determining the user context of the user opening the email comprises determining the user is engaged in a routine represented by one of the one or more user routine models. 17. The computerized method of claim 12, wherein the determining the user context of the user opening the email comprises determining the user will be engaged in routine represented by one of the one or more user routine models during a time the notification is presented. 18. One or more computer storage devices storing computer-useable instructions that, when executed by the one or more computing devices, cause the one or more computing devices to perform a method comprising: extracting message attributes from an email associated with a user; determining user context of the user opening the email based on routine-related aspects generated from one or more user routine models associated with the user; determining a notification time of a notification of the opened email based on the user context and the message attributes; providing the notification to the user based on the determining of the notification time. 19. The one or more computer storage devices of claim 18, wherein the determining the user context of the user opening the email comprises determining the user is engaged in a routine represented by one of the one or more user routine models. 20. The one or more computer storage devices of claim 18, wherein the determining the user context of the user opening the email comprises determining the user will be engaged in routine represented by one of the one or more user routine models during a time the notification is presented.
2,400
9,251
9,251
16,205,643
2,486
Generating signatures within a network that includes a plurality of computing devices of varying processing capabilities is disclosed. Chips may be transmitted, from a network video recorder and over the network, to an analytics appliance having a GPU processing power that is higher than a GPU processing power possessed by the network video recorder. The GPU processing power possessed by the analytics appliance may be employed to process the chips therein and generate respective signatures.
1. A surveillance system comprising: a camera that captures video frames; a VMS server stored on a computer readable medium in a first computing device housed in a first enclosure, the first computing device communicatively coupled to the camera; a second computing device housed in a second enclosure different than the first enclosure, the second computing device including a plurality of Graphics Processing Unit (GPU) cards and the second computing device being communicatively coupled to the first computing device, and wherein the second computing device is configured to employ the plurality of GPU cards to generate signatures corresponding to objects of interest in the video frames and return the generated signatures to the first computing device for storage and use therein. 2. The surveillance system as claimed in claim 1 wherein the plurality of GPU cards provide a GPU processing power for the second computing device that is at least double the GPU processing power possessed by the first computing device. 3. The surveillance system as claimed in claim 1 wherein the first computing device is a network video recorder. 4. The surveillance system as claimed in claim 1 wherein the second computing device is an analytics appliance. 5. The surveillance system as claimed in claim 1 wherein the generated signatures are generated at least in part by a learning machine that spans at least two GPU cards of the plurality of GPU cards. 6. The surveillance system as claimed in claim 1 wherein the learning machine comprises a convolution neural network. 7. A method comprising: generating a plurality of chips from video frames captured by a camera that is communicatively coupled to a first computing device within a surveillance system; transmitting the chips, from the first computing device and over a Local Area Network (LAN), to a second computing device having a Graphics Processing Unit (GPU) processing power that is higher than a GPU processing power possessed by the first computing device; employing the GPU processing power possessed by the second computing device to process the chips therein and generate respective signatures; and transmitting the generated signatures, from the second computing device and over the LAN, to the first computing device for storage and use therein. 8. The method as claimed in claim 7 wherein the GPU processing power possessed by the second computing device is at least double the GPU processing power possessed the first computing device. 9. The method as claim in claim 7 wherein the generating the plurality of chips is carried out within the camera. 10. The method as claim in claim 7 wherein the generating the plurality of chips is carried out within the first computing device. 11. The method as claim in claim 7 wherein the first computing device is a network video recorder. 12. The method as claim in claim 7 wherein the second computing device is an analytics appliance. 13. The method as claim in claim 7 wherein the generated signatures are generated at least in part by a learning machine that spans a plurality of GPUs of the second computing device. 14. The method as claim in claim 13 wherein the learning machine comprises a convolution neural network. 15. A method comprising: generating a plurality of chips from video frames captured by a camera that is communicatively coupled to a network video recorder within a surveillance system; transmitting the chips, from the network video recorder and over a network, to an analytics appliance having a Graphics Processing Unit (GPU) processing power that is higher than a GPU processing power possessed by the network video recorder; employing the GPU processing power possessed by the analytics appliance to process the chips therein and generate respective signatures; and transmitting the generated signatures, from the analytics appliance and over the network, to the network video recorder for storage and use therein.
Generating signatures within a network that includes a plurality of computing devices of varying processing capabilities is disclosed. Chips may be transmitted, from a network video recorder and over the network, to an analytics appliance having a GPU processing power that is higher than a GPU processing power possessed by the network video recorder. The GPU processing power possessed by the analytics appliance may be employed to process the chips therein and generate respective signatures.1. A surveillance system comprising: a camera that captures video frames; a VMS server stored on a computer readable medium in a first computing device housed in a first enclosure, the first computing device communicatively coupled to the camera; a second computing device housed in a second enclosure different than the first enclosure, the second computing device including a plurality of Graphics Processing Unit (GPU) cards and the second computing device being communicatively coupled to the first computing device, and wherein the second computing device is configured to employ the plurality of GPU cards to generate signatures corresponding to objects of interest in the video frames and return the generated signatures to the first computing device for storage and use therein. 2. The surveillance system as claimed in claim 1 wherein the plurality of GPU cards provide a GPU processing power for the second computing device that is at least double the GPU processing power possessed by the first computing device. 3. The surveillance system as claimed in claim 1 wherein the first computing device is a network video recorder. 4. The surveillance system as claimed in claim 1 wherein the second computing device is an analytics appliance. 5. The surveillance system as claimed in claim 1 wherein the generated signatures are generated at least in part by a learning machine that spans at least two GPU cards of the plurality of GPU cards. 6. The surveillance system as claimed in claim 1 wherein the learning machine comprises a convolution neural network. 7. A method comprising: generating a plurality of chips from video frames captured by a camera that is communicatively coupled to a first computing device within a surveillance system; transmitting the chips, from the first computing device and over a Local Area Network (LAN), to a second computing device having a Graphics Processing Unit (GPU) processing power that is higher than a GPU processing power possessed by the first computing device; employing the GPU processing power possessed by the second computing device to process the chips therein and generate respective signatures; and transmitting the generated signatures, from the second computing device and over the LAN, to the first computing device for storage and use therein. 8. The method as claimed in claim 7 wherein the GPU processing power possessed by the second computing device is at least double the GPU processing power possessed the first computing device. 9. The method as claim in claim 7 wherein the generating the plurality of chips is carried out within the camera. 10. The method as claim in claim 7 wherein the generating the plurality of chips is carried out within the first computing device. 11. The method as claim in claim 7 wherein the first computing device is a network video recorder. 12. The method as claim in claim 7 wherein the second computing device is an analytics appliance. 13. The method as claim in claim 7 wherein the generated signatures are generated at least in part by a learning machine that spans a plurality of GPUs of the second computing device. 14. The method as claim in claim 13 wherein the learning machine comprises a convolution neural network. 15. A method comprising: generating a plurality of chips from video frames captured by a camera that is communicatively coupled to a network video recorder within a surveillance system; transmitting the chips, from the network video recorder and over a network, to an analytics appliance having a Graphics Processing Unit (GPU) processing power that is higher than a GPU processing power possessed by the network video recorder; employing the GPU processing power possessed by the analytics appliance to process the chips therein and generate respective signatures; and transmitting the generated signatures, from the analytics appliance and over the network, to the network video recorder for storage and use therein.
2,400
9,252
9,252
15,671,234
2,452
A request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network can be received. A security policy for the second user can be accessed and, based on the security policy, whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request can be determined. Responsive to determining that the first user is authorized to add the second user as the contact of the first user in the social network without prompting the second user to approve the request, the second user can be added as the contact of the first user in the social network without prompting the second user to approve the request.
1-20. (canceled) 21. A method comprising: receiving a request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network; accessing a security policy for the second user and, based on the security policy for the second user, determining, using a processor, whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request; and responsive to determining that the first user is authorized to add the second user as the contact of the first user in the social network without prompting the second user to approve the request, adding the second user as the contact of the first user in the social network without prompting the second user to approve the request. 22. The method of claim 21, wherein the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request comprises preventing the second user from denying the adding the second user as the contact of the first user in the social network. 23. The method of claim 21, wherein the determining whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request further is based on a security policy for the first user. 24. The method of claim 21, further comprising: responsive to the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request, preventing the second user from removing the second user as the contact of the first user. 25. The method of claim 21, further comprising: configuring a user profile of the first user to send to the second user posts published in the social network by the first user that is not user profile data; and configuring the user profile of the first user to block from being presented to the first user posts published in the social network by the second user that is not user profile data. 26. The method of claim 21, further comprising: configuring a user profile of the first user to send to the second user posts published in the social network by the first user that is not user profile data; prompting the first user to choose whether to be presented posts published in the social network by the second user that is not user profile data; and responsive to the first user choosing to not be presented the posts published in the social network by the second user that is not user profile data, configuring the user profile of the first user to block from being presented to the first user posts posted in the social network by the second user that is not user profile data. 27. The method of claim 21, further comprising: responsive to the adding the second user as the contact of the first user, sharing with the first user a limited access profile of the second user, wherein the limited access profile contains only information related to the second user's participation in a team or the second user's participation in an organization. 28. A system comprising: a processor programmed to initiate executable operations comprising: receiving a request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network; accessing a security policy for the second user and, based on the security policy for the second user, determining whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request; and responsive to determining that the first user is authorized to add the second user as the contact of the first user in the social network without prompting the second user to approve the request, adding the second user as the contact of the first user in the social network without prompting the second user to approve the request. 29. The system of claim 28, wherein the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request comprises preventing the second user from denying the adding the second user as the contact of the first user in the social network. 30. The system of claim 28, wherein the determining whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request further is based on a security policy for the first user. 31. The system of claim 28, the executable operations further comprising: responsive to the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request, preventing the second user from removing the second user as the contact of the first user. 32. The system of claim 28, the executable operations further comprising: configuring a user profile of the first user to send to the at least second user posts published in the social network by the first user that is not user profile data; and configuring the user profile of the first user to block from being presented to the first user posts published in the social network by the at least second user that is not user profile data. 33. The system of claim 28, the executable operations further comprising: configuring a user profile of the first user to send to the second user posts published in the social network by the first user that is not user profile data; prompting the first user to choose whether to be presented posts published in the social network by the second user that is not user profile data; and responsive to the first user choosing to not be presented the posts published in the social network by the second user that is not user profile data, configuring the user profile of the first user to block from being presented to the first user posts posted in the social network by the second user that is not user profile data. 34. The system of claim 28, the executable operations further comprising: responsive to the adding the second user as the contact of the first user, sharing with the first user a limited access profile of the second user, wherein the limited access profile contains only information related to the second user's participation in a team or the second user's participation in an organization. 35. A computer program product comprising a computer readable storage device, wherein the computer readable storage device is not a transitory, propagating signal per se, having program code stored thereon, the program code executable by a processor to perform a method comprising: receiving, by the processor, a request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network; accessing, by the processor, a security policy for the second user and, based on the security policy for the second user, determining, by the processor, whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request; and responsive to determining that the first user is authorized to add the second user as the contact of the first user in the social network without prompting the second user to approve the request, adding, by the processor, the second user as the contact of the first user in the social network without prompting the second user to approve the request. 36. The computer program product of claim 35, wherein the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request comprises preventing the second user from denying the adding the second user as the contact of the first user in the social network. 37. The computer program product of claim 35, wherein the determining whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request further is based on a security policy for the first user. 38. The computer program product of claim 35, the method further comprising: responsive to the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request, preventing the second user from removing the second user as the contact of the first user. 39. The computer program product of claim 35, the method further comprising: configuring a user profile of the first user to send to the second user posts published in the social network by the first user that is not user profile data; and configuring the user profile of the first user to block from being presented to the first user posts published in the social network by the second user that is not user profile data. 40. The computer program product of claim 35, the method further comprising: configuring a user profile of the first user to send to the second user posts published in the social network by the first user that is not user profile data; prompting the first user to choose whether to be presented posts published in the social network by the second user that is not user profile data; and responsive to the first user choosing to not be presented the posts published in the social network by the second user that is not user profile data, configuring the user profile of the first user to block from being presented to the first user posts posted in the social network by the second user that is not user profile data.
A request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network can be received. A security policy for the second user can be accessed and, based on the security policy, whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request can be determined. Responsive to determining that the first user is authorized to add the second user as the contact of the first user in the social network without prompting the second user to approve the request, the second user can be added as the contact of the first user in the social network without prompting the second user to approve the request.1-20. (canceled) 21. A method comprising: receiving a request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network; accessing a security policy for the second user and, based on the security policy for the second user, determining, using a processor, whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request; and responsive to determining that the first user is authorized to add the second user as the contact of the first user in the social network without prompting the second user to approve the request, adding the second user as the contact of the first user in the social network without prompting the second user to approve the request. 22. The method of claim 21, wherein the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request comprises preventing the second user from denying the adding the second user as the contact of the first user in the social network. 23. The method of claim 21, wherein the determining whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request further is based on a security policy for the first user. 24. The method of claim 21, further comprising: responsive to the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request, preventing the second user from removing the second user as the contact of the first user. 25. The method of claim 21, further comprising: configuring a user profile of the first user to send to the second user posts published in the social network by the first user that is not user profile data; and configuring the user profile of the first user to block from being presented to the first user posts published in the social network by the second user that is not user profile data. 26. The method of claim 21, further comprising: configuring a user profile of the first user to send to the second user posts published in the social network by the first user that is not user profile data; prompting the first user to choose whether to be presented posts published in the social network by the second user that is not user profile data; and responsive to the first user choosing to not be presented the posts published in the social network by the second user that is not user profile data, configuring the user profile of the first user to block from being presented to the first user posts posted in the social network by the second user that is not user profile data. 27. The method of claim 21, further comprising: responsive to the adding the second user as the contact of the first user, sharing with the first user a limited access profile of the second user, wherein the limited access profile contains only information related to the second user's participation in a team or the second user's participation in an organization. 28. A system comprising: a processor programmed to initiate executable operations comprising: receiving a request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network; accessing a security policy for the second user and, based on the security policy for the second user, determining whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request; and responsive to determining that the first user is authorized to add the second user as the contact of the first user in the social network without prompting the second user to approve the request, adding the second user as the contact of the first user in the social network without prompting the second user to approve the request. 29. The system of claim 28, wherein the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request comprises preventing the second user from denying the adding the second user as the contact of the first user in the social network. 30. The system of claim 28, wherein the determining whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request further is based on a security policy for the first user. 31. The system of claim 28, the executable operations further comprising: responsive to the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request, preventing the second user from removing the second user as the contact of the first user. 32. The system of claim 28, the executable operations further comprising: configuring a user profile of the first user to send to the at least second user posts published in the social network by the first user that is not user profile data; and configuring the user profile of the first user to block from being presented to the first user posts published in the social network by the at least second user that is not user profile data. 33. The system of claim 28, the executable operations further comprising: configuring a user profile of the first user to send to the second user posts published in the social network by the first user that is not user profile data; prompting the first user to choose whether to be presented posts published in the social network by the second user that is not user profile data; and responsive to the first user choosing to not be presented the posts published in the social network by the second user that is not user profile data, configuring the user profile of the first user to block from being presented to the first user posts posted in the social network by the second user that is not user profile data. 34. The system of claim 28, the executable operations further comprising: responsive to the adding the second user as the contact of the first user, sharing with the first user a limited access profile of the second user, wherein the limited access profile contains only information related to the second user's participation in a team or the second user's participation in an organization. 35. A computer program product comprising a computer readable storage device, wherein the computer readable storage device is not a transitory, propagating signal per se, having program code stored thereon, the program code executable by a processor to perform a method comprising: receiving, by the processor, a request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network; accessing, by the processor, a security policy for the second user and, based on the security policy for the second user, determining, by the processor, whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request; and responsive to determining that the first user is authorized to add the second user as the contact of the first user in the social network without prompting the second user to approve the request, adding, by the processor, the second user as the contact of the first user in the social network without prompting the second user to approve the request. 36. The computer program product of claim 35, wherein the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request comprises preventing the second user from denying the adding the second user as the contact of the first user in the social network. 37. The computer program product of claim 35, wherein the determining whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request further is based on a security policy for the first user. 38. The computer program product of claim 35, the method further comprising: responsive to the adding the second user as the contact of the first user in the social network without prompting the second user to approve the request, preventing the second user from removing the second user as the contact of the first user. 39. The computer program product of claim 35, the method further comprising: configuring a user profile of the first user to send to the second user posts published in the social network by the first user that is not user profile data; and configuring the user profile of the first user to block from being presented to the first user posts published in the social network by the second user that is not user profile data. 40. The computer program product of claim 35, the method further comprising: configuring a user profile of the first user to send to the second user posts published in the social network by the first user that is not user profile data; prompting the first user to choose whether to be presented posts published in the social network by the second user that is not user profile data; and responsive to the first user choosing to not be presented the posts published in the social network by the second user that is not user profile data, configuring the user profile of the first user to block from being presented to the first user posts posted in the social network by the second user that is not user profile data.
2,400
9,253
9,253
16,284,875
2,465
A method for WTRU autonomous resource selection may comprise receiving a TX resource pool for D2D communication from a base station. The WTRU may sense one or more resources of the TX resource pool and determine resources for transmission of control information and D2D data, based on the sensing. The WTRU may then transmit, to another WTRU, the control information and the D2D data on the determined resources.
1. A method for wireless transmit/receive unit (WTRU) autonomous resource selection, the method comprising: receiving a transmission (TX) resource pool for device to device (D2D) communication, from a base station; sensing one or more resources of the TX resource pool; determining resources for transmission of control information and D2D data, based on the sensing; and transmitting, to another WTRU, the control information and the D2D data on the determined resources. 2. The method of claim 1, wherein the TX resource pool is received from the base station in a system information block (SIB). 3. The method of claim 1, wherein the TX resource pool is received from the base station via radio resource control (RRC) configuration signaling. 4. The method of claim 1, wherein the control information and the D2D data are transmitted simultaneously. 5. The method of claim 1, further comprising: transmitting a request, to the base station, for the TX resource pool. 6. The method of claim 1, further comprising: receiving an indication of a modulation and coding scheme (MCS), from the base station, in RRC signaling; wherein the MCS is included in the control information; wherein the D2D data is modulated and coded in accordance with the MCS. 7. The method of claim 4, wherein the simultaneous transmission of the control information and the D2D data is on contiguous resources blocks. 8. The method of claim 4, wherein the simultaneous transmission of the control information and the D2D data is not on contiguous resources blocks. 9. The method of claim 1, wherein the pool is associated with a quality of service (QoS) class. 10. The method of claim 1, wherein the WTRU is out of coverage of the base station when the D2D data is transmitted to the another WTRU. 11. The method of claim 3, wherein the RRC configuration signaling is received by the WTRU upon occurrence of a mobility event. 12. The method of claim 1, further comprising: receiving a reception (RX) resource pool for D2D communication, from the base station; and receiving, from the another WTRU, second control information and second D2D data on a subset of RX resource pool. 13. The method of claim 12, wherein the RX resource pool is received on resources of a cell of a plurality of cells of the base station. 14. A method performed by a wireless transmit/receive unit (WTRU), the method comprising: receiving a reception (RX) resource pool for device to device (D2D) communication, from a base station; and receiving, from another WTRU, control information and D2D data on the RX resource pool; wherein the control information and D2D data are received simultaneously. 15. The method of claim 14, wherein the control information and the D2D data are received on different resource blocks. 16. The method of claim 14, further comprising: determining, based on the control information, whether a retransmission of the D2D data will be transmitted by the another WTRU. 17. The method of claim 14, further comprising: receiving a retransmission of the D2D data in accordance with a timing offset and a frequency resource location; wherein the control information includes an indication of the timing offset and an indication of the frequency resource location. 18. The method of claim 14, wherein the WTRU is configured with a fixed number of hybrid automatic repeat request (HARQ) processes. 19. The method of claim 14, wherein the HARQ feedback is not configured by the WTRU. 20. A wireless transmit/receive unit (WTRU) configured for autonomous resource selection, the WTRU comprising: a receiver configured to receive a transmission (TX) resource pool for device to device (D2D) communication, from a base station; circuitry configured to sense one or more resources of the TX resource pool; circuitry configured to determine resources for transmission of control information and D2D data, based on the sensing; and a transmitter configured to transmit, to another WTRU, the control information and the D2D data on the determined resources.
A method for WTRU autonomous resource selection may comprise receiving a TX resource pool for D2D communication from a base station. The WTRU may sense one or more resources of the TX resource pool and determine resources for transmission of control information and D2D data, based on the sensing. The WTRU may then transmit, to another WTRU, the control information and the D2D data on the determined resources.1. A method for wireless transmit/receive unit (WTRU) autonomous resource selection, the method comprising: receiving a transmission (TX) resource pool for device to device (D2D) communication, from a base station; sensing one or more resources of the TX resource pool; determining resources for transmission of control information and D2D data, based on the sensing; and transmitting, to another WTRU, the control information and the D2D data on the determined resources. 2. The method of claim 1, wherein the TX resource pool is received from the base station in a system information block (SIB). 3. The method of claim 1, wherein the TX resource pool is received from the base station via radio resource control (RRC) configuration signaling. 4. The method of claim 1, wherein the control information and the D2D data are transmitted simultaneously. 5. The method of claim 1, further comprising: transmitting a request, to the base station, for the TX resource pool. 6. The method of claim 1, further comprising: receiving an indication of a modulation and coding scheme (MCS), from the base station, in RRC signaling; wherein the MCS is included in the control information; wherein the D2D data is modulated and coded in accordance with the MCS. 7. The method of claim 4, wherein the simultaneous transmission of the control information and the D2D data is on contiguous resources blocks. 8. The method of claim 4, wherein the simultaneous transmission of the control information and the D2D data is not on contiguous resources blocks. 9. The method of claim 1, wherein the pool is associated with a quality of service (QoS) class. 10. The method of claim 1, wherein the WTRU is out of coverage of the base station when the D2D data is transmitted to the another WTRU. 11. The method of claim 3, wherein the RRC configuration signaling is received by the WTRU upon occurrence of a mobility event. 12. The method of claim 1, further comprising: receiving a reception (RX) resource pool for D2D communication, from the base station; and receiving, from the another WTRU, second control information and second D2D data on a subset of RX resource pool. 13. The method of claim 12, wherein the RX resource pool is received on resources of a cell of a plurality of cells of the base station. 14. A method performed by a wireless transmit/receive unit (WTRU), the method comprising: receiving a reception (RX) resource pool for device to device (D2D) communication, from a base station; and receiving, from another WTRU, control information and D2D data on the RX resource pool; wherein the control information and D2D data are received simultaneously. 15. The method of claim 14, wherein the control information and the D2D data are received on different resource blocks. 16. The method of claim 14, further comprising: determining, based on the control information, whether a retransmission of the D2D data will be transmitted by the another WTRU. 17. The method of claim 14, further comprising: receiving a retransmission of the D2D data in accordance with a timing offset and a frequency resource location; wherein the control information includes an indication of the timing offset and an indication of the frequency resource location. 18. The method of claim 14, wherein the WTRU is configured with a fixed number of hybrid automatic repeat request (HARQ) processes. 19. The method of claim 14, wherein the HARQ feedback is not configured by the WTRU. 20. A wireless transmit/receive unit (WTRU) configured for autonomous resource selection, the WTRU comprising: a receiver configured to receive a transmission (TX) resource pool for device to device (D2D) communication, from a base station; circuitry configured to sense one or more resources of the TX resource pool; circuitry configured to determine resources for transmission of control information and D2D data, based on the sensing; and a transmitter configured to transmit, to another WTRU, the control information and the D2D data on the determined resources.
2,400
9,254
9,254
16,348,881
2,444
A flexible approach to segmenting a resource (e.g., a media resource, such as a media segment, or other resource, such as a resource normally fetched or pushed using general file transfer protocols like HTTP) into a plurality of fragments. By employing such an approach, the delay until the resource can be utilized at the client side is reduced. Certain embodiments are provided which apply the flexible segmentation approach to ISOBMFF media segments for video streaming, such as would be used with Live DASH streaming.
1. A method comprising: a server generating a segmentation map for a media segment comprising an ordered set of fragments including a first fragment and a second fragment; and the server providing the segmentation map to a client, wherein the segmentation map comprises: first fragment metadata associated with the first fragment; second fragment metadata associated with the second fragment; and ordering information identifying the ordering of fragments within the set, including information indicating that the first fragment is ordered before the second fragment, and the first fragment metadata comprises: 1) a first fragment identifier for use in accessing the first fragment and 2) one or more of: 2a) first dependency information for the first fragment, the first dependency information indicating that the availability of the first fragment to be delivered from the server is dependent on one or more other fragments of the set; 2b) first position information including one or more of: a length of the first fragment, a start position of the first fragment in the media segment, and an end position of the first fragment in the media segment; and 2c) first fragment-level security information for use in verifying the integrity of the first fragment, and the second fragment metadata comprises a second fragment identifier for use in accessing the second fragment. 2. The method of claim 1, wherein the first fragment metadata comprises the first dependency information, the first position information, and the first fragment-level security information. 3. The method of claim 1, wherein the first fragment metadata comprises the first fragment-level security information, and the fragment-level security information comprises hash information that is used by the server to generate a hash of at least one of: the first fragment and a part of the first fragment. 4. The method of claim 1, wherein the second fragment metadata further comprises one or more of: second dependency information for the second fragment, the second dependency information indicating that the availability of the second fragment to be delivered from the server is dependent on one or more other fragments of the set; second position information including one or more of: a length of the second fragment, a start position of the second fragment in the media segment, and an end position of the second fragment in the media segment; and second fragment-level security information for use in verifying the integrity of the second fragment. 5. The method of claim 1, wherein the first fragment metadata further comprises at least one of a priority value corresponding to the first fragment and an encoding identifier. 6. (canceled) 7. The method of claim 1, wherein the first fragment identifier comprises a Uniform Resource Identifier, URI, identifying the first fragment. 8. The method of claim 1, wherein the first fragment metadata further comprises an application-level hint associated with a type of the media segment, and the application-level hint enables a client to utilize the first fragment prior to receiving each of the other plurality of fragments. 9. The method of claim 1, wherein the first dependency information comprises size dependency information, and the size dependency information indicates zero or more other fragments that must be generated before a size of the first fragment may be determined. 10. The method of claim 1, wherein the first dependency information comprises content dependency information, and the content dependency information indicates zero or more other fragments that must be generated before a content of the first fragment may be generated. 11. The method of claim 1, wherein the ordering information comprises a sequence identifier associated with each fragment metadata. 12. The method of claim 1, wherein the ordering information is implicit in a data structure storing the plurality of fragment metadata. 13. The method of claim 1, wherein the segment map further comprises media segment metadata that comprises one or more of: a media type of the media segment; a resource-level integrity information; a Uniform Resource Locator, URL, for the media segment; and an update hint indicating when it is recommended for the client to update the segmentation map, the update hint comprising one or more of an expiration time and a content dependency attribute. 14. The method of claim 1, further comprising: receiving, from the client, a request for the media segment; and sending, to the client, the segmentation map in response to the request for the media segment. 15. The method of claim 14, further comprising: receiving, from the client, a request for the first fragment; and sending the first fragment to the client in response to receiving the request for the first fragment. 16. The method of claim 1, further comprising: updating the segmentation map based on new information, wherein the new information includes one or more of: a length of one of the plurality of fragments, a start position of one of the plurality of fragments, and an end position of one of the plurality of fragments; and sending to the client the updated segmentation map. 17. (canceled) 18. A server for generating a segmentation map for a media segment comprising an ordered set of fragments including a first fragment and a second fragment, the server comprising: a data storage system comprising a memory; and a data processing system comprising a processor, wherein the server is configured to: provide the segmentation map to a client, wherein the segmentation map comprises: first fragment metadata associated with the first fragment; second fragment metadata associated with the second fragment; and ordering information identifying the ordering of fragments within the set, including information indicating that the first fragment is ordered before the second fragment, and the first fragment metadata comprises: 1) a first fragment identifier for use in accessing the first fragment and 2) one or more of: 2a) first dependency information for the first fragment, the first dependency information indicating that the availability of the first fragment to be delivered from the server is dependent on one or more other fragments of the set; 2b) first position information including one or more of: a length of the first fragment, a start position of the first fragment in the media segment, and an end position of the first fragment in the media segment; and 2c) first fragment-level security information for use in verifying the integrity of the first fragment, and the second fragment metadata comprises a second fragment identifier for use in accessing the second fragment. 19. A method comprising: a client receiving a segmentation map transmitted by a server, wherein the segmentation map is for a first media segment of a media stream comprising a plurality of media segments, the plurality of media segments comprising the first media segment and a second media segment, the first media segment comprising an ordered set of fragments, the ordered set of fragments including a first fragment and a second fragment; and the client processing the segmentation map, wherein the segmentation map comprises: first fragment metadata associated with the first fragment; second fragment metadata associated with the second fragment; and ordering information identifying the ordering of fragments within the set, including information indicating that the first fragment is ordered before the second fragment, and the first fragment metadata comprises: 1) a first fragment identifier for use in accessing the first fragment and 2) one or more of: 2a) first dependency information for the first fragment, the first dependency information indicating that the availability of the first fragment to be delivered from the server is dependent on one or more other fragments of the set; 2b) first position information including one or more of: a length of the first fragment, a start position of the first fragment in the first media segment, and an end position of the first fragment in the first media segment; and 2c) first fragment-level security information for use in verifying the integrity of the first fragment, and the second fragment metadata comprises a second fragment identifier for use in accessing the second fragment. 20. The method of claim 19, further comprising: prior to receiving the segmentation map transmitted by the server, the client transmitting to the server a request for the first media segment. 21. The method of claim 20, further comprising: prior to receiving the segmentation map transmitted by the server, receiving a manifest file, wherein the manifest file comprises information for enabling the client to send the request for the first media segment; and processing the received manifest file, wherein the client transmits to the server the request for the first media segment after processing the manifest file. 22. The method of claim 20, wherein the request for the first media segment comprises an indicator indicating that the client supports a segmented mode. 23. The method of claim 19, further comprising: receiving the first fragment; and playing the first fragment. 24. The method of claim 23, wherein the step of playing the first fragment occurs prior to the client receiving all of the fragments included in the ordered set of fragments. 25. The method of claim 23, further comprising: verifying the integrity of the first fragment. 26. The method of claim 19, wherein based on fragment dependency information indicating that the first fragment depends on the second fragment, the client transmits a request for the second fragment prior to transmitting a request for the first fragment. 27. (canceled) 28. A client, the client comprising: a data storage system comprising a memory; and a data processing system comprising a processor, wherein the client is configured to: receive a segmentation map transmitted by a server, wherein the segmentation map is for a first media segment of a media stream comprising a plurality of media segments, the plurality of media segments comprising the first media segment and a second media segment, the first media segment comprising an ordered set of fragments, the ordered set of fragments including a first fragment and a second fragment; and process the segmentation map, wherein the segmentation map comprises: first fragment metadata associated with the first fragment; second fragment metadata associated with the second fragment; and ordering information identifying the ordering of fragments within the set, including information indicating that the first fragment is ordered before the second fragment, and the first fragment metadata comprises: 1) a first fragment identifier for use in accessing the first fragment and 2) one or more of: 2a) first dependency information for the first fragment, the first dependency information indicating that the availability of the first fragment to be delivered from the server is dependent on one or more other fragments of the set; 2b) first position information including one or more of: a length of the first fragment, a start position of the first fragment in the first media segment, and an end position of the first fragment in the first media segment; and 2c) first fragment-level security information for use in verifying the integrity of the first fragment, and the second fragment metadata comprises a second fragment identifier for use in accessing the second fragment. 29. (canceled) 30. A computer program product comprising a non-transitory computer readable medium storing a computer program comprising instructions which, when executed on at least one processor, cause the at least one processor to carry out the method according to claim 1.
A flexible approach to segmenting a resource (e.g., a media resource, such as a media segment, or other resource, such as a resource normally fetched or pushed using general file transfer protocols like HTTP) into a plurality of fragments. By employing such an approach, the delay until the resource can be utilized at the client side is reduced. Certain embodiments are provided which apply the flexible segmentation approach to ISOBMFF media segments for video streaming, such as would be used with Live DASH streaming.1. A method comprising: a server generating a segmentation map for a media segment comprising an ordered set of fragments including a first fragment and a second fragment; and the server providing the segmentation map to a client, wherein the segmentation map comprises: first fragment metadata associated with the first fragment; second fragment metadata associated with the second fragment; and ordering information identifying the ordering of fragments within the set, including information indicating that the first fragment is ordered before the second fragment, and the first fragment metadata comprises: 1) a first fragment identifier for use in accessing the first fragment and 2) one or more of: 2a) first dependency information for the first fragment, the first dependency information indicating that the availability of the first fragment to be delivered from the server is dependent on one or more other fragments of the set; 2b) first position information including one or more of: a length of the first fragment, a start position of the first fragment in the media segment, and an end position of the first fragment in the media segment; and 2c) first fragment-level security information for use in verifying the integrity of the first fragment, and the second fragment metadata comprises a second fragment identifier for use in accessing the second fragment. 2. The method of claim 1, wherein the first fragment metadata comprises the first dependency information, the first position information, and the first fragment-level security information. 3. The method of claim 1, wherein the first fragment metadata comprises the first fragment-level security information, and the fragment-level security information comprises hash information that is used by the server to generate a hash of at least one of: the first fragment and a part of the first fragment. 4. The method of claim 1, wherein the second fragment metadata further comprises one or more of: second dependency information for the second fragment, the second dependency information indicating that the availability of the second fragment to be delivered from the server is dependent on one or more other fragments of the set; second position information including one or more of: a length of the second fragment, a start position of the second fragment in the media segment, and an end position of the second fragment in the media segment; and second fragment-level security information for use in verifying the integrity of the second fragment. 5. The method of claim 1, wherein the first fragment metadata further comprises at least one of a priority value corresponding to the first fragment and an encoding identifier. 6. (canceled) 7. The method of claim 1, wherein the first fragment identifier comprises a Uniform Resource Identifier, URI, identifying the first fragment. 8. The method of claim 1, wherein the first fragment metadata further comprises an application-level hint associated with a type of the media segment, and the application-level hint enables a client to utilize the first fragment prior to receiving each of the other plurality of fragments. 9. The method of claim 1, wherein the first dependency information comprises size dependency information, and the size dependency information indicates zero or more other fragments that must be generated before a size of the first fragment may be determined. 10. The method of claim 1, wherein the first dependency information comprises content dependency information, and the content dependency information indicates zero or more other fragments that must be generated before a content of the first fragment may be generated. 11. The method of claim 1, wherein the ordering information comprises a sequence identifier associated with each fragment metadata. 12. The method of claim 1, wherein the ordering information is implicit in a data structure storing the plurality of fragment metadata. 13. The method of claim 1, wherein the segment map further comprises media segment metadata that comprises one or more of: a media type of the media segment; a resource-level integrity information; a Uniform Resource Locator, URL, for the media segment; and an update hint indicating when it is recommended for the client to update the segmentation map, the update hint comprising one or more of an expiration time and a content dependency attribute. 14. The method of claim 1, further comprising: receiving, from the client, a request for the media segment; and sending, to the client, the segmentation map in response to the request for the media segment. 15. The method of claim 14, further comprising: receiving, from the client, a request for the first fragment; and sending the first fragment to the client in response to receiving the request for the first fragment. 16. The method of claim 1, further comprising: updating the segmentation map based on new information, wherein the new information includes one or more of: a length of one of the plurality of fragments, a start position of one of the plurality of fragments, and an end position of one of the plurality of fragments; and sending to the client the updated segmentation map. 17. (canceled) 18. A server for generating a segmentation map for a media segment comprising an ordered set of fragments including a first fragment and a second fragment, the server comprising: a data storage system comprising a memory; and a data processing system comprising a processor, wherein the server is configured to: provide the segmentation map to a client, wherein the segmentation map comprises: first fragment metadata associated with the first fragment; second fragment metadata associated with the second fragment; and ordering information identifying the ordering of fragments within the set, including information indicating that the first fragment is ordered before the second fragment, and the first fragment metadata comprises: 1) a first fragment identifier for use in accessing the first fragment and 2) one or more of: 2a) first dependency information for the first fragment, the first dependency information indicating that the availability of the first fragment to be delivered from the server is dependent on one or more other fragments of the set; 2b) first position information including one or more of: a length of the first fragment, a start position of the first fragment in the media segment, and an end position of the first fragment in the media segment; and 2c) first fragment-level security information for use in verifying the integrity of the first fragment, and the second fragment metadata comprises a second fragment identifier for use in accessing the second fragment. 19. A method comprising: a client receiving a segmentation map transmitted by a server, wherein the segmentation map is for a first media segment of a media stream comprising a plurality of media segments, the plurality of media segments comprising the first media segment and a second media segment, the first media segment comprising an ordered set of fragments, the ordered set of fragments including a first fragment and a second fragment; and the client processing the segmentation map, wherein the segmentation map comprises: first fragment metadata associated with the first fragment; second fragment metadata associated with the second fragment; and ordering information identifying the ordering of fragments within the set, including information indicating that the first fragment is ordered before the second fragment, and the first fragment metadata comprises: 1) a first fragment identifier for use in accessing the first fragment and 2) one or more of: 2a) first dependency information for the first fragment, the first dependency information indicating that the availability of the first fragment to be delivered from the server is dependent on one or more other fragments of the set; 2b) first position information including one or more of: a length of the first fragment, a start position of the first fragment in the first media segment, and an end position of the first fragment in the first media segment; and 2c) first fragment-level security information for use in verifying the integrity of the first fragment, and the second fragment metadata comprises a second fragment identifier for use in accessing the second fragment. 20. The method of claim 19, further comprising: prior to receiving the segmentation map transmitted by the server, the client transmitting to the server a request for the first media segment. 21. The method of claim 20, further comprising: prior to receiving the segmentation map transmitted by the server, receiving a manifest file, wherein the manifest file comprises information for enabling the client to send the request for the first media segment; and processing the received manifest file, wherein the client transmits to the server the request for the first media segment after processing the manifest file. 22. The method of claim 20, wherein the request for the first media segment comprises an indicator indicating that the client supports a segmented mode. 23. The method of claim 19, further comprising: receiving the first fragment; and playing the first fragment. 24. The method of claim 23, wherein the step of playing the first fragment occurs prior to the client receiving all of the fragments included in the ordered set of fragments. 25. The method of claim 23, further comprising: verifying the integrity of the first fragment. 26. The method of claim 19, wherein based on fragment dependency information indicating that the first fragment depends on the second fragment, the client transmits a request for the second fragment prior to transmitting a request for the first fragment. 27. (canceled) 28. A client, the client comprising: a data storage system comprising a memory; and a data processing system comprising a processor, wherein the client is configured to: receive a segmentation map transmitted by a server, wherein the segmentation map is for a first media segment of a media stream comprising a plurality of media segments, the plurality of media segments comprising the first media segment and a second media segment, the first media segment comprising an ordered set of fragments, the ordered set of fragments including a first fragment and a second fragment; and process the segmentation map, wherein the segmentation map comprises: first fragment metadata associated with the first fragment; second fragment metadata associated with the second fragment; and ordering information identifying the ordering of fragments within the set, including information indicating that the first fragment is ordered before the second fragment, and the first fragment metadata comprises: 1) a first fragment identifier for use in accessing the first fragment and 2) one or more of: 2a) first dependency information for the first fragment, the first dependency information indicating that the availability of the first fragment to be delivered from the server is dependent on one or more other fragments of the set; 2b) first position information including one or more of: a length of the first fragment, a start position of the first fragment in the first media segment, and an end position of the first fragment in the first media segment; and 2c) first fragment-level security information for use in verifying the integrity of the first fragment, and the second fragment metadata comprises a second fragment identifier for use in accessing the second fragment. 29. (canceled) 30. A computer program product comprising a non-transitory computer readable medium storing a computer program comprising instructions which, when executed on at least one processor, cause the at least one processor to carry out the method according to claim 1.
2,400
9,255
9,255
16,432,382
2,437
An electronic device for aggregating electronic medical records, in which electronic medical records are aggregated from multiple electronic repositories and displayed as a single set of records. The multiple electronic repositories may store records for a particular patient using varying identifying/access information to facilitate anonymous access to the electronic medical records. Emergency medical services providers may be able to access medical records for a patient using the electronic device after being authenticated as a valid/licensed medical services provider.
1. (canceled) 2. A method comprising: identifying, at a wireless device, a request to transmit electronic medical records associated with a user of the wireless device to a remote storage device; receiving, at the wireless device, input from the user to transmit at least a subset of electronic medical records from a collection of electronic medical records stored on the wireless device; authenticating an identity of the user; accessing, at the wireless device, the at least subset of electronic medical records from the collection of electronic medical records stored on the wireless device; and based on the input and based on authenticating the identity of the user, wirelessly transmitting the at least the subset of the electronic medical records to the remote storage device. 3. The method of claim 2, wherein identifying a request comprises generating the request in response to receiving the input from the user. 4. The method of claim 2, wherein identifying a request comprises receiving, at the wireless device, the request from the remote storage device. 5. The method of claim 2, wherein: receiving input comprises receiving input specifying a type of electronic medical records; accessing the at least subset of electronic medical records comprises accessing a subset of electronic medical records within the collection of electronic medical records associated with the specified type; and wirelessly transmitting the at least the subset of the electronic medical records comprises wirelessly transmitting a subset of electronic medical records within the collection of electronic medical records associated with the specified type. 6. The method of claim 5, further comprising presenting the user with a list of types of medical records, wherein receiving input specifying a type of electronic medical records comprises receiving a selection of at least one of the following: general medical, cardiovascular, respiratory, neurological, orthopedic, muscular, dermatological, surgical, allergies, immunizations, pharmaceutical, psychiatric, dental, vision, or insurance. 7. The method of claim 2, wherein: identifying a request comprises determining a level of access associated with the request; accessing the at least subset of electronic medical records comprises accessing a subset of electronic medical records within the collection of electronic medical records associated with the determined level of access; and wirelessly transmitting the at least the subset of the electronic medical records comprises wirelessly transmitting a subset of electronic medical records within the collection of electronic medical records associated with the determined level of access. 8. The method of claim 2, wherein: receiving input comprises receiving input that specifies a time; accessing the at least subset of electronic medical records comprises accessing a subset of electronic medical records within the collection of electronic medical records dated not older than the time; and wirelessly transmitting the at least the subset of the electronic medical records comprises wirelessly transmitting a subset of electronic medical records within the collection of electronic medical records dated not older than the time. 9. The method of claim 8, wherein: receiving input comprises receiving input that specifies a first time and a second time, wherein the first time and the second time form a time period; accessing the at least subset of electronic medical records comprises accessing a subset of electronic medical records within the collection of electronic medical records dated within the time period; and wirelessly transmitting the at least the subset of the electronic medical records comprises wirelessly transmitting a subset of electronic medical records within the collection of electronic medical records dated within the time period. 10. The method of claim 2, wherein: receiving input comprises receiving input that specifies at least one medical provider; accessing the at least subset of electronic medical records comprises accessing a subset of electronic medical records within the collection of electronic medical records associated with the at least one medical provider; and wirelessly transmitting the at least the subset of the electronic medical records comprises wirelessly transmitting a subset of electronic medical records within the collection of electronic medical records associated with the at least one medical provider. 11. The method of claim 2, further comprising: receiving, from the remote storage device and at the wireless device, an electronic medical record associated with the user; and updating the collection of electronic medical records using the electronic medical record. 12. The method of claim 11, further comprising forming a secure connection between the remote storage device and the wireless device, wherein receiving the electronic medical record comprises receiving the electronic medical record through the secure connection. 13. The method of claim 11, wherein receiving the electronic medical record comprises receiving the electronic medical record through email. 14. The method of claim 2, further comprising storing the collection of electronic medical records locally on the wireless device. 15. The method of claim 2, wherein: receiving input comprises receiving biometric input associated with the user; and authenticating the identity of the user is based on the biometric input. 16. The method of claim 15, wherein receiving biometric input comprises receiving at least one of the following: a fingerprint scan, or a retinal scan. 17. The method of claim 2, wherein: receiving input comprises receiving authentication information associated with the user; and authenticating the identity of the user is based on the authentication information. 18. The method of claim 2, further comprising forming a secure connection between the wireless device and the remote storage device, wherein wirelessly transmitting the at least subset of electronic medical records comprises transmitting the at least subset of electronic medical records over the secure connection. 19. The method of claim 18, wherein forming the secure connection comprises encrypting each of the electronic medical records within the at least subset of electronic medical records. 20. A system comprising a means for: identifying, at a wireless device, a request to transmit electronic medical records associated with a user of the wireless device to a remote storage device; receiving, at the wireless device, input from the user to transmit at least a subset of electronic medical records from a collection of electronic medical records stored on the wireless device; authenticating an identity of the user; accessing, at the wireless device, the at least subset of electronic medical records from the collection of electronic medical records stored on the wireless device; and based on the input and based on authenticating the identity of the user, wirelessly transmitting the at least the subset of the electronic medical records to the remote storage device. 21. A non-transitory computer storage device encoded with a computer program, the program comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising: identifying a request to transmit electronic medical records associated with a user of a wireless device to a remote storage device; receiving input from the user to transmit at least a subset of electronic medical records from a collection of electronic medical records stored on the wireless device; authenticating an identity of the user; accessing the at least subset of electronic medical records from the collection of electronic medical records stored on the wireless device; and based on the input and based on authenticating the identity of the user, wirelessly transmitting the at least the subset of the electronic medical records to the remote storage device.
An electronic device for aggregating electronic medical records, in which electronic medical records are aggregated from multiple electronic repositories and displayed as a single set of records. The multiple electronic repositories may store records for a particular patient using varying identifying/access information to facilitate anonymous access to the electronic medical records. Emergency medical services providers may be able to access medical records for a patient using the electronic device after being authenticated as a valid/licensed medical services provider.1. (canceled) 2. A method comprising: identifying, at a wireless device, a request to transmit electronic medical records associated with a user of the wireless device to a remote storage device; receiving, at the wireless device, input from the user to transmit at least a subset of electronic medical records from a collection of electronic medical records stored on the wireless device; authenticating an identity of the user; accessing, at the wireless device, the at least subset of electronic medical records from the collection of electronic medical records stored on the wireless device; and based on the input and based on authenticating the identity of the user, wirelessly transmitting the at least the subset of the electronic medical records to the remote storage device. 3. The method of claim 2, wherein identifying a request comprises generating the request in response to receiving the input from the user. 4. The method of claim 2, wherein identifying a request comprises receiving, at the wireless device, the request from the remote storage device. 5. The method of claim 2, wherein: receiving input comprises receiving input specifying a type of electronic medical records; accessing the at least subset of electronic medical records comprises accessing a subset of electronic medical records within the collection of electronic medical records associated with the specified type; and wirelessly transmitting the at least the subset of the electronic medical records comprises wirelessly transmitting a subset of electronic medical records within the collection of electronic medical records associated with the specified type. 6. The method of claim 5, further comprising presenting the user with a list of types of medical records, wherein receiving input specifying a type of electronic medical records comprises receiving a selection of at least one of the following: general medical, cardiovascular, respiratory, neurological, orthopedic, muscular, dermatological, surgical, allergies, immunizations, pharmaceutical, psychiatric, dental, vision, or insurance. 7. The method of claim 2, wherein: identifying a request comprises determining a level of access associated with the request; accessing the at least subset of electronic medical records comprises accessing a subset of electronic medical records within the collection of electronic medical records associated with the determined level of access; and wirelessly transmitting the at least the subset of the electronic medical records comprises wirelessly transmitting a subset of electronic medical records within the collection of electronic medical records associated with the determined level of access. 8. The method of claim 2, wherein: receiving input comprises receiving input that specifies a time; accessing the at least subset of electronic medical records comprises accessing a subset of electronic medical records within the collection of electronic medical records dated not older than the time; and wirelessly transmitting the at least the subset of the electronic medical records comprises wirelessly transmitting a subset of electronic medical records within the collection of electronic medical records dated not older than the time. 9. The method of claim 8, wherein: receiving input comprises receiving input that specifies a first time and a second time, wherein the first time and the second time form a time period; accessing the at least subset of electronic medical records comprises accessing a subset of electronic medical records within the collection of electronic medical records dated within the time period; and wirelessly transmitting the at least the subset of the electronic medical records comprises wirelessly transmitting a subset of electronic medical records within the collection of electronic medical records dated within the time period. 10. The method of claim 2, wherein: receiving input comprises receiving input that specifies at least one medical provider; accessing the at least subset of electronic medical records comprises accessing a subset of electronic medical records within the collection of electronic medical records associated with the at least one medical provider; and wirelessly transmitting the at least the subset of the electronic medical records comprises wirelessly transmitting a subset of electronic medical records within the collection of electronic medical records associated with the at least one medical provider. 11. The method of claim 2, further comprising: receiving, from the remote storage device and at the wireless device, an electronic medical record associated with the user; and updating the collection of electronic medical records using the electronic medical record. 12. The method of claim 11, further comprising forming a secure connection between the remote storage device and the wireless device, wherein receiving the electronic medical record comprises receiving the electronic medical record through the secure connection. 13. The method of claim 11, wherein receiving the electronic medical record comprises receiving the electronic medical record through email. 14. The method of claim 2, further comprising storing the collection of electronic medical records locally on the wireless device. 15. The method of claim 2, wherein: receiving input comprises receiving biometric input associated with the user; and authenticating the identity of the user is based on the biometric input. 16. The method of claim 15, wherein receiving biometric input comprises receiving at least one of the following: a fingerprint scan, or a retinal scan. 17. The method of claim 2, wherein: receiving input comprises receiving authentication information associated with the user; and authenticating the identity of the user is based on the authentication information. 18. The method of claim 2, further comprising forming a secure connection between the wireless device and the remote storage device, wherein wirelessly transmitting the at least subset of electronic medical records comprises transmitting the at least subset of electronic medical records over the secure connection. 19. The method of claim 18, wherein forming the secure connection comprises encrypting each of the electronic medical records within the at least subset of electronic medical records. 20. A system comprising a means for: identifying, at a wireless device, a request to transmit electronic medical records associated with a user of the wireless device to a remote storage device; receiving, at the wireless device, input from the user to transmit at least a subset of electronic medical records from a collection of electronic medical records stored on the wireless device; authenticating an identity of the user; accessing, at the wireless device, the at least subset of electronic medical records from the collection of electronic medical records stored on the wireless device; and based on the input and based on authenticating the identity of the user, wirelessly transmitting the at least the subset of the electronic medical records to the remote storage device. 21. A non-transitory computer storage device encoded with a computer program, the program comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising: identifying a request to transmit electronic medical records associated with a user of a wireless device to a remote storage device; receiving input from the user to transmit at least a subset of electronic medical records from a collection of electronic medical records stored on the wireless device; authenticating an identity of the user; accessing the at least subset of electronic medical records from the collection of electronic medical records stored on the wireless device; and based on the input and based on authenticating the identity of the user, wirelessly transmitting the at least the subset of the electronic medical records to the remote storage device.
2,400
9,256
9,256
16,195,222
2,422
A controllable device, such as a set top box, responds to a transmission received from a one of a plurality of controlling devices of differing capabilities by entering into a one of a plurality of operating modes wherein the one of the plurality of operating modes entered into corresponds to the capabilities of the controlling device from which the transmission originated.
1. A method performed by a switching device comprising a plurality of audio/video (AV) ports and a switch circuit that is operable to selectively connect any one of a plurality of source devices, each of which is connected to a corresponding one of the plurality of AV ports, to a sink device that is connected to another one of the plurality of AV ports, the method comprising: detecting, by a control signal detector of the switching device, which is operable to receive wireless control signals that have been sent from different remote control devices to different source devices, that a wireless control signal has been sent from a remote control device to a source device of the plurality of source devices so that the remote control device can wirelessly control the source device; determining an identifier that identifies the source device to which the control signal was sent; identifying a first AV port from among the plurality of AV ports to which the identified source device is connected based on the determined identifier; and automatically connecting the first AV port to the AV port to which the sink device is connected so that content can be provided from the identified source device to the sink device. 2. The method of claim 1, wherein said determining is based on an indicator included in the wireless control signal that uniquely identifies the source device. 3. The method of claim 1, further comprising: determining that a second remote control device is being utilized; identifying a second source device that is associated with the second remote control device from among the plurality of source devices; and identifying a second AV port from among the plurality of AV ports to which the identified second source device is connected; and automatically connecting the second AV port to the AV port to which the sink device is connected to that content can be provided by the identified second source device to the sink device. 4. The method of claim 1, wherein the wireless control signal is received via universal infrared receiver of the switching device.
A controllable device, such as a set top box, responds to a transmission received from a one of a plurality of controlling devices of differing capabilities by entering into a one of a plurality of operating modes wherein the one of the plurality of operating modes entered into corresponds to the capabilities of the controlling device from which the transmission originated.1. A method performed by a switching device comprising a plurality of audio/video (AV) ports and a switch circuit that is operable to selectively connect any one of a plurality of source devices, each of which is connected to a corresponding one of the plurality of AV ports, to a sink device that is connected to another one of the plurality of AV ports, the method comprising: detecting, by a control signal detector of the switching device, which is operable to receive wireless control signals that have been sent from different remote control devices to different source devices, that a wireless control signal has been sent from a remote control device to a source device of the plurality of source devices so that the remote control device can wirelessly control the source device; determining an identifier that identifies the source device to which the control signal was sent; identifying a first AV port from among the plurality of AV ports to which the identified source device is connected based on the determined identifier; and automatically connecting the first AV port to the AV port to which the sink device is connected so that content can be provided from the identified source device to the sink device. 2. The method of claim 1, wherein said determining is based on an indicator included in the wireless control signal that uniquely identifies the source device. 3. The method of claim 1, further comprising: determining that a second remote control device is being utilized; identifying a second source device that is associated with the second remote control device from among the plurality of source devices; and identifying a second AV port from among the plurality of AV ports to which the identified second source device is connected; and automatically connecting the second AV port to the AV port to which the sink device is connected to that content can be provided by the identified second source device to the sink device. 4. The method of claim 1, wherein the wireless control signal is received via universal infrared receiver of the switching device.
2,400
9,257
9,257
15,753,720
2,438
A method in a network includes: at a client having a memory and a processor, sending a first request to a proxy, the proxy including a memory and a processor; at the client, receiving a first response from the proxy; at the client, sending a second request to the proxy; from the proxy, sending an encrypted computed function to the client in response to the second request; and decrypting the computed function at the client.
1. A method in a network comprising: at a client having a memory and a processor, sending a first request to a proxy, the proxy including a memory and a processor; at the client, receiving a first response from the proxy; at the client, sending a second request to the proxy; from the proxy, sending an encrypted computed function to the client in response to the second request; and decrypting the computed function at the client. 2. The method of claim 1 wherein the first request includes requesting an indexing of a database in communication with the proxy. 3. The method of claim 2 wherein the indexing of a database is performed at a cryptographic bloom filter in the proxy. 4. The method of claim 3 wherein the first request further includes: at the proxy, generating an optimal cryptographic bloom filter based on a dataset in the database; and at the proxy, updating data elements in the cryptographic bloom filter based on dataset changes in the database, wherein updating the cryptographic bloom filter includes one of deleting data elements in the bloom filter and inserting data elements in the bloom filter. 5. The method of claim 3 wherein the first request further includes: at the database, generating an optimal cryptographic bloom filter based on a dataset in the database; at the database, computing cryptographic bloom filter data elements based on dataset changes in the database; and sending the computed cryptographic bloom filter data elements to the proxy. 6. The method of claim 1 wherein the second request includes requesting a computing of a function by the proxy. 7. The method of claim 6 wherein the computing of a function is performed by the proxy using homomorphic encryption. 8. The method of claim 1 further including, prior to the sending an encrypted computed function to the client: at the client, sending an encrypted client value to the proxy; at the proxy, retrieving a component value from a database in communication with the proxy, the component value being based on a component in the network; and at the proxy, determining the computed function based on the encrypted client value and the retrieved component value. 9. The method of claim 8 wherein the component value retrieved from the database is one of a distance, a time, a location, and a string of textual data. 10. A system comprising: a network component, the network component including a memory and a processor; a client in communication with the network component, the client including a memory and a processor; a proxy in communication with the client; and a database in communication with the proxy; wherein the system is configured to: at the client, send a first request to the proxy; at the client, receive a first response from the proxy; at the client, send a second request to the proxy; from the proxy, send an encrypted computed function to the client; and decrypt the computed function at the client. 11. The system of claim 10 wherein the network component is a base station. 12. The system of claim 10 wherein the client communicates solely with the proxy. 13. The system of claim 10 wherein the proxy communicates with both the proxy and the database. 14. A method comprising: at a client having a memory and a processor, sending a first request to a proxy, the proxy including a memory and a processor; at the client, receiving a first response from the proxy; at the client, sending an encrypted client value to the proxy; at the proxy, retrieving a component value from a database in communication with the proxy, the component value being based on a component in the network; at the proxy, determining the computed function based on the encrypted client value and the retrieved component value; at the client, sending a second request to the proxy; from the proxy, sending an encrypted computed function to the client in response to the second request; and decrypting the computed function at the client. 15. The method of claim 14 wherein the sending an encrypted client value to the proxy includes sending a client location value to the proxy. 16. The method of claim 15 wherein the retrieving a component value from a database includes retrieving a proximity value based on the network component, wherein the proximity value includes a proximity of the network component relative to the client. 17. The method of claim 16 wherein the network component is a base station. 18. The method of claim 16 wherein determining the computed function includes determining a distance between the client and the network component. 19. The method of claim 14 wherein the first request includes requesting an indexing of a database in communication with the proxy, wherein the indexing of a database is performed at a cryptographic bloom filter in the proxy. 20. The method of claim 14 wherein the second request includes requesting a computing of a function by the proxy, wherein the computing of a function is performed by the proxy using homomorphic encryption.
A method in a network includes: at a client having a memory and a processor, sending a first request to a proxy, the proxy including a memory and a processor; at the client, receiving a first response from the proxy; at the client, sending a second request to the proxy; from the proxy, sending an encrypted computed function to the client in response to the second request; and decrypting the computed function at the client.1. A method in a network comprising: at a client having a memory and a processor, sending a first request to a proxy, the proxy including a memory and a processor; at the client, receiving a first response from the proxy; at the client, sending a second request to the proxy; from the proxy, sending an encrypted computed function to the client in response to the second request; and decrypting the computed function at the client. 2. The method of claim 1 wherein the first request includes requesting an indexing of a database in communication with the proxy. 3. The method of claim 2 wherein the indexing of a database is performed at a cryptographic bloom filter in the proxy. 4. The method of claim 3 wherein the first request further includes: at the proxy, generating an optimal cryptographic bloom filter based on a dataset in the database; and at the proxy, updating data elements in the cryptographic bloom filter based on dataset changes in the database, wherein updating the cryptographic bloom filter includes one of deleting data elements in the bloom filter and inserting data elements in the bloom filter. 5. The method of claim 3 wherein the first request further includes: at the database, generating an optimal cryptographic bloom filter based on a dataset in the database; at the database, computing cryptographic bloom filter data elements based on dataset changes in the database; and sending the computed cryptographic bloom filter data elements to the proxy. 6. The method of claim 1 wherein the second request includes requesting a computing of a function by the proxy. 7. The method of claim 6 wherein the computing of a function is performed by the proxy using homomorphic encryption. 8. The method of claim 1 further including, prior to the sending an encrypted computed function to the client: at the client, sending an encrypted client value to the proxy; at the proxy, retrieving a component value from a database in communication with the proxy, the component value being based on a component in the network; and at the proxy, determining the computed function based on the encrypted client value and the retrieved component value. 9. The method of claim 8 wherein the component value retrieved from the database is one of a distance, a time, a location, and a string of textual data. 10. A system comprising: a network component, the network component including a memory and a processor; a client in communication with the network component, the client including a memory and a processor; a proxy in communication with the client; and a database in communication with the proxy; wherein the system is configured to: at the client, send a first request to the proxy; at the client, receive a first response from the proxy; at the client, send a second request to the proxy; from the proxy, send an encrypted computed function to the client; and decrypt the computed function at the client. 11. The system of claim 10 wherein the network component is a base station. 12. The system of claim 10 wherein the client communicates solely with the proxy. 13. The system of claim 10 wherein the proxy communicates with both the proxy and the database. 14. A method comprising: at a client having a memory and a processor, sending a first request to a proxy, the proxy including a memory and a processor; at the client, receiving a first response from the proxy; at the client, sending an encrypted client value to the proxy; at the proxy, retrieving a component value from a database in communication with the proxy, the component value being based on a component in the network; at the proxy, determining the computed function based on the encrypted client value and the retrieved component value; at the client, sending a second request to the proxy; from the proxy, sending an encrypted computed function to the client in response to the second request; and decrypting the computed function at the client. 15. The method of claim 14 wherein the sending an encrypted client value to the proxy includes sending a client location value to the proxy. 16. The method of claim 15 wherein the retrieving a component value from a database includes retrieving a proximity value based on the network component, wherein the proximity value includes a proximity of the network component relative to the client. 17. The method of claim 16 wherein the network component is a base station. 18. The method of claim 16 wherein determining the computed function includes determining a distance between the client and the network component. 19. The method of claim 14 wherein the first request includes requesting an indexing of a database in communication with the proxy, wherein the indexing of a database is performed at a cryptographic bloom filter in the proxy. 20. The method of claim 14 wherein the second request includes requesting a computing of a function by the proxy, wherein the computing of a function is performed by the proxy using homomorphic encryption.
2,400
9,258
9,258
16,198,804
2,454
A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or a gateway communicating with a device associated with the sensor and a device associated with the actuator over in-building or in-vehicle networks, and an external Internet-connected control server associated with the control logic implementing a PID closed linear control loop and communicating with the router over external network for controlling the in-building or in-vehicle phenomenon. The sensor may be a microphone or a camera, and the system may include voice or image processing as part of the control logic. A redundancy is used by using multiple sensors or actuators, or by using multiple data paths over the building or vehicle internal or external communication. The networks may be wired or wireless, and may be BAN, PAN, LAN, WAN, or home networks.
1. A device for communicating with a server over the Internet via a wireless network, the device comprising: a sensor for producing an output signal that responds to a first physical phenomenon; an actuator for affecting a second physical phenomenon in response to a command; an antenna for communication over the wireless network; a wireless transceiver coupled to the antenna for transmitting digital data to, and for receiving digital data from, the wireless network; software and a processor for executing the software, the processor is coupled to the sensor for receiving the output signal therefrom and to the actuator for sending the command thereto; a battery for powering the device; and an enclosure that is wearable on a human body for housing the sensor, the antenna, the wireless transceiver, the processor, the battery, and the actuator, wherein the device is operative to send a first message responsive to the output signal to the server over the Internet via the wireless network, to receive a second message from the server over the Internet via the wireless network in response to the sent first message, and to send a command for activating or controlling the actuator in response to the received second message. 2. The device according to claim 1, wherein the sensor comprises a physiological sensor for responding to physiological parameters associated with a human body. 3. The device according to claim 2, wherein the sensor is external to, and attached to, the sensed body. 4. The device according to claim 2, wherein the sensor is implanted in, or is inside, the sensed body. 5. The device according to claim 2, wherein the physiological sensor is responding to body electrical signals and is an EEG Electroencephalography (EEG) or an Electrocardiography (ECG) sensor. 6. The device according to claim 2, wherein the physiological sensor is responding to oxygen saturation, gas saturation, or a blood pressure in the sensed human body. 7. The device according to claim 1, wherein the wireless network is a Wireless Personal Area Network (WPAN), the antenna is a WPAN antenna, and the wireless transceiver is a WPAN modem. 8. The device according to claim 7, wherein the WPAN is according to, based on, or compatible with, Bluetooth™ or Institute of Electrical and Electronics Engineers (IEEE) 802.15.1-2005 standards. 9. The device according to claim 7, wherein the WPAN is according to, based on, or compatible with, Zigbee™, IEEE 802.15.4-2003, or Z-Wave™ standards. 10. The device according to claim 1, wherein the wireless network is a Wireless Local Area Network (WLAN), the antenna is a WLAN antenna, and the wireless transceiver is a WLAN modem. 11. The device according to claim 10, wherein the WLAN is according to, based on, or compatible with, IEEE 802.11-2012, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, or IEEE 802.11ac. 12. The device according to claim 1, wherein the wireless network is a wireless broadband network. 13. The device according to claim 1, wherein the wireless network uses a licensed or unlicensed radio frequency band. 14. The device according to claim 13, wherein the unlicensed radio frequency band is an Industrial, Scientific and Medical (ISM) radio band. 15. The device according to claim 1, wherein the wireless network is a satellite network, the antenna is a satellite antenna, and the wireless transceiver is a satellite modem. 16. The device according to claim 1, wherein the wireless network is a WiMAX network, wherein the antenna is a WiMAX antenna and the wireless transceiver is a WiMAX modem, and wherein the WiMAX network is according to, or based on, or compatible with, IEEE 802.16-2009. 17. The device according to claim 1, wherein the wireless network is a cellular telephone network, the antenna is a cellular antenna, and the wireless transceiver is a cellular modem. 18. The device according to claim 17, wherein the cellular telephone network is Third Generation (3G) network that uses Universal Mobile Telecommunications System (UMTS), Wideband Code Division Multiple Access (W-CDMA) UMTS, High Speed Packet Access (HSPA), UMTS Time-Division Duplexing (TDD), CDMA2000 1×RTT, Evolution-Data Optimized (EV-DO), or Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE) EDGE-Evolution, or wherein the cellular telephone network is a Fourth Generation (4G) network that uses Evolved High Speed Packet Access (HSPA+), Mobile Worldwide Interoperability for Microwave Access (WiMAX), Long-Term Evolution (LTE), LTE-Advanced, Mobile Broadband Wireless Access (MBWA), or is based on IEEE 802.20-2008. 19. The device according to claim 1, wherein the wireless network is a Wireless BAN (WBAN), the antenna is a WBAN antenna, the wireless transceiver is a WBAN modem. 20. The device according to claim 19, wherein the WBAN is according to, or based on, IEEE 802.15.6 standard. 21. The device according to claim 1, further being addressable in the wireless network using a digital addresses stored in a volatile or non-volatile memory in the enclosure, which uniquely identifying The device in the wireless network or in the Internet. 22. The device according to claim 21, wherein the digital address is a Medium Access Control (MAC) layer address that is MAC-48, Extended Unique Identifier (EUI) EUI-48, or EUI-64 address type. 23. The device according to claim 21, wherein the digital address is a layer 3 address and is static or dynamic Internet Protocol (IP) address that is IPv4 or IPv6 type address. 24. The device according to claim 1, wherein the second phenomenon is different from the first phenomenon. 25. The device according to claim 1, wherein the second phenomenon is the same as the first phenomenon, and the device is further operative for affecting a closed control loop for controlling the phenomenon. 26. The device according to claim 25, wherein the control loop is a closed linear control loop where the sensor output serves as a feedback to command the actuator based of a loop deviation from a setpoint or a reference value. 27. The device according to claim 26, wherein the setpoint is fixed, set by a user, or is time dependent. 28. The device according to claim 25, wherein the closed control loop is a proportional-based, an integral-based, a derivative-based, or a Proportional, Integral, and Derivative (PID) based control loop, wherein the control loop uses feed-forward, Bistable, Bang-Bang, Hysteretic, or fuzzy logic based control. 29. The device according to claim 25, wherein the control loop involves randomness based on random numbers. 30. The device according to claim 1 further for affecting randomness, further comprising a random number generator for generating random numbers, wherein the command is responsive to the generated random numbers. 31. The device according to claim 1, wherein the random number generator is hardware-based using thermal noise, shot noise, nuclear decaying radiation, photoelectric effect, or quantum phenomena. 32. The device according to claim 1, wherein the random number generator is software-based and the processor executes an algorithm for generating pseudo-random numbers. 33. The device according to claim 1, wherein the sensor is a piezoelectric sensor that includes single crystal material or a piezoelectric ceramics and uses a transverse, longitudinal, or shear effect mode of a piezoelectric effect. 34. The device according to claim 1, further comprising multiple sensors arranged as a directional sensor array operative to estimate the number, magnitude, frequency, Direction-Of-Arrival (DOA), distance, or speed of the physical phenomenon impinging the sensor array. 35. The device according to claim 1, wherein the sensor is a thermoelectric sensor that responds to a temperature or to a temperature gradient of an object using conduction, convection, or radiation, and wherein the thermoelectric sensor consists of, or comprises, a Positive Temperature Coefficient (PTC) thermistor, a Negative Temperature Coefficient (NTC) thermistor, a thermocouple, a quartz crystal, or a Resistance Temperature Detector (RTD). 36. The device according to claim 1, wherein the sensor consists of, or comprises, a nanosensor, a crystal, or a semiconductor. 37. The device according to claim 1, wherein the sensor consists of, or comprises, an eddy-current sensor. 38. The device according to claim 1, wherein the sensor consists of, or comprises, an atmospheric or an environmental sensor. 39. The device according to claim 1, wherein the sensor consists of, or comprises, a bulk or surface acoustic sensor. 40. The device according to claim 1, wherein the sensor consists of, or comprises, a radiation sensor that responds to radioactivity, nuclear radiation, alpha particles, beta particles, or gamma rays, and is based on gas ionization. 41. The device according to claim 1, wherein the sensor consists of, or comprises, a photoelectric sensor that responds to a visible or an invisible light, and wherein the invisible light is infrared, ultraviolet, X-rays, or gamma rays. 42. The device according to claim 41, wherein the photoelectric sensor is based on the photoelectric or photovoltaic effect, and consists of, or comprises, a semiconductor component that consists of, or comprises, a photodiode, a phototransistor, or a solar cell. 43. The device according to claim 41, wherein the photoelectric sensor is based on Charge-Coupled Appliance (CCD) or a Complementary Metal-Oxide Semiconductor (CMOS) element. 44. The device according to claim 1, wherein the sensor consists of, or comprises, a photosensitive image sensor array comprising multiple photoelectric sensors, for capturing an image and producing electronic image information representing the image, and the device further comprising one or more optical lens for focusing the received light and to guide the image, and wherein the image sensor is disposed approximately at an image focal point plane of the one or more optical lens for properly capturing the image. 45. The device according to claim 1, wherein the sensor is an electrochemical sensor that responds to an object chemical structure, properties, composition, or reactions. 46. The device according to claim 45, wherein the electrochemical sensor is a pH meter or a gas sensor responding to a presence of radon, hydrogen, oxygen, or Carbon-Monoxide (CO), or wherein the electrochemical sensor is based on optical detection or on ionization and is a smoke, a flame, or a fire detector, or is responsive to combustible, flammable, or toxic gas. 47. The device according to claim 1, wherein the sensor is an electroacoustic sensor that responds to an audible or inaudible sound. 48. The device according to claim 47, wherein the electroacoustic sensor is an omnidirectional, unidirectional, or bidirectional microphone that is based on the sensing the incident sound based motion of a diaphragm or a ribbon, and the microphone consists of, or comprising, a condenser, an electret, a dynamic, a ribbon, a carbon, or a piezoelectric microphone. 49. The device according to claim 1, wherein the sensor is an electric current sensor that comprises an ampermeter, galvanometer, or a hot-wire ampermeter. 50. The device according to claim 49, wherein the current sensor comprises a current clamp, a current probe, a current transformer, or uses a ‘Hall effect’. 51. The device according to claim 49, wherein the current sensor is a non-contact or a non-conductive current meter. 52. The device according to claim 1, wherein the actuator is a light source that emits visible or non-visible light for illumination or indication, the non-visible light is infrared, ultraviolet, X-rays, or gamma rays. 53. The device according to claim 52, wherein the light source consists of, or comprises, a lamp, an incandescent lamp, a gas discharge lamp, a fluorescent lamp, a Solid-State Lighting (SSL), a Light Emitting Diode (LED), an Organic LED (OLED), a polymer LED (PLED), or a laser diode. 54. The device according to claim 1, wherein the actuator is a motion actuator that causes linear or rotary motion. 55. The device according to claim 54, wherein the motion actuator is an electrical motor. 56. The device according to claim 55, wherein the electrical motor is a brushed, a brushless, or an uncommutated DC motor, or wherein the DC motor is a stepper motor that is a Permanent Magnet (PM) motor, a Variable reluctance (VR) motor, or a hybrid synchronous stepper. 57. The device according to claim 54, wherein the motion actuator is based on a piezoelectric motor, a Surface Acoustic Wave (SAW) motor, a Squiggle motor, an ultrasonic motor, or a micro- or nanometer comb-drive capacitive actuator, a Dielectric or Ionic based Electroactive Polymers (EAPs) actuator, a solenoid, a thermal bimorph, or a piezoelectric unimorph actuator. 58. The device according to claim 1, wherein the actuator is a sounder for converting an electrical energy to omnidirectional, unidirectional, or bidirectional pattern emitted, audible or inaudible, sound waves. 59. The device according to claim 1, wherein the actuator is an electric thermoelectric actuator and is a heater or a cooler, operative for affecting the temperature of a solid, a liquid, or a gas object, and is coupled to the object by conduction, convection, force convention, thermal radiation, or by the transfer of energy by phase changes. 60. The device according to claim 59, wherein the thermoelectric actuator is a cooler based on a heat pump driving a refrigeration cycle using a compressor-based electric motor, or wherein the thermoelectric actuator is an electric heater that is a resistance heater or a dielectric heater. 61. The device according to claim 1, wherein the battery is a rechargeable battery, and wherein the device further comprising a power source for charging the battery. 62. The device according to claim 61, wherein the power source is an electrical power generator for generating an electric power from the phenomenon or from a distinct another phenomenon. 63. The device according to claim 62, wherein a single component serves as the sensor and as the electrical power generator. 64. The device according to claim 62, wherein the electrical power generator is an electromechanical generator for harvesting kinetic energy. 65. The device according to claim 62, wherein the electrical power generator is a solar cell or a Peltier effect based thermoelectric device. 66. The device according to claim 1, wherein the sensor comprises a microphone for capturing human voice data, the microphone is coupled to the wireless transceiver for sending the captured human voice data to the server. 67. The device according to claim 1 in combination with the server, wherein the server is operative to receive over the Internet the captured human voice data from the device, to process the captured human voice data using a voice processing, and to send the actuator command in response to the processing.
A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or a gateway communicating with a device associated with the sensor and a device associated with the actuator over in-building or in-vehicle networks, and an external Internet-connected control server associated with the control logic implementing a PID closed linear control loop and communicating with the router over external network for controlling the in-building or in-vehicle phenomenon. The sensor may be a microphone or a camera, and the system may include voice or image processing as part of the control logic. A redundancy is used by using multiple sensors or actuators, or by using multiple data paths over the building or vehicle internal or external communication. The networks may be wired or wireless, and may be BAN, PAN, LAN, WAN, or home networks.1. A device for communicating with a server over the Internet via a wireless network, the device comprising: a sensor for producing an output signal that responds to a first physical phenomenon; an actuator for affecting a second physical phenomenon in response to a command; an antenna for communication over the wireless network; a wireless transceiver coupled to the antenna for transmitting digital data to, and for receiving digital data from, the wireless network; software and a processor for executing the software, the processor is coupled to the sensor for receiving the output signal therefrom and to the actuator for sending the command thereto; a battery for powering the device; and an enclosure that is wearable on a human body for housing the sensor, the antenna, the wireless transceiver, the processor, the battery, and the actuator, wherein the device is operative to send a first message responsive to the output signal to the server over the Internet via the wireless network, to receive a second message from the server over the Internet via the wireless network in response to the sent first message, and to send a command for activating or controlling the actuator in response to the received second message. 2. The device according to claim 1, wherein the sensor comprises a physiological sensor for responding to physiological parameters associated with a human body. 3. The device according to claim 2, wherein the sensor is external to, and attached to, the sensed body. 4. The device according to claim 2, wherein the sensor is implanted in, or is inside, the sensed body. 5. The device according to claim 2, wherein the physiological sensor is responding to body electrical signals and is an EEG Electroencephalography (EEG) or an Electrocardiography (ECG) sensor. 6. The device according to claim 2, wherein the physiological sensor is responding to oxygen saturation, gas saturation, or a blood pressure in the sensed human body. 7. The device according to claim 1, wherein the wireless network is a Wireless Personal Area Network (WPAN), the antenna is a WPAN antenna, and the wireless transceiver is a WPAN modem. 8. The device according to claim 7, wherein the WPAN is according to, based on, or compatible with, Bluetooth™ or Institute of Electrical and Electronics Engineers (IEEE) 802.15.1-2005 standards. 9. The device according to claim 7, wherein the WPAN is according to, based on, or compatible with, Zigbee™, IEEE 802.15.4-2003, or Z-Wave™ standards. 10. The device according to claim 1, wherein the wireless network is a Wireless Local Area Network (WLAN), the antenna is a WLAN antenna, and the wireless transceiver is a WLAN modem. 11. The device according to claim 10, wherein the WLAN is according to, based on, or compatible with, IEEE 802.11-2012, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, or IEEE 802.11ac. 12. The device according to claim 1, wherein the wireless network is a wireless broadband network. 13. The device according to claim 1, wherein the wireless network uses a licensed or unlicensed radio frequency band. 14. The device according to claim 13, wherein the unlicensed radio frequency band is an Industrial, Scientific and Medical (ISM) radio band. 15. The device according to claim 1, wherein the wireless network is a satellite network, the antenna is a satellite antenna, and the wireless transceiver is a satellite modem. 16. The device according to claim 1, wherein the wireless network is a WiMAX network, wherein the antenna is a WiMAX antenna and the wireless transceiver is a WiMAX modem, and wherein the WiMAX network is according to, or based on, or compatible with, IEEE 802.16-2009. 17. The device according to claim 1, wherein the wireless network is a cellular telephone network, the antenna is a cellular antenna, and the wireless transceiver is a cellular modem. 18. The device according to claim 17, wherein the cellular telephone network is Third Generation (3G) network that uses Universal Mobile Telecommunications System (UMTS), Wideband Code Division Multiple Access (W-CDMA) UMTS, High Speed Packet Access (HSPA), UMTS Time-Division Duplexing (TDD), CDMA2000 1×RTT, Evolution-Data Optimized (EV-DO), or Global System for Mobile communications (GSM), Enhanced Data rates for GSM Evolution (EDGE) EDGE-Evolution, or wherein the cellular telephone network is a Fourth Generation (4G) network that uses Evolved High Speed Packet Access (HSPA+), Mobile Worldwide Interoperability for Microwave Access (WiMAX), Long-Term Evolution (LTE), LTE-Advanced, Mobile Broadband Wireless Access (MBWA), or is based on IEEE 802.20-2008. 19. The device according to claim 1, wherein the wireless network is a Wireless BAN (WBAN), the antenna is a WBAN antenna, the wireless transceiver is a WBAN modem. 20. The device according to claim 19, wherein the WBAN is according to, or based on, IEEE 802.15.6 standard. 21. The device according to claim 1, further being addressable in the wireless network using a digital addresses stored in a volatile or non-volatile memory in the enclosure, which uniquely identifying The device in the wireless network or in the Internet. 22. The device according to claim 21, wherein the digital address is a Medium Access Control (MAC) layer address that is MAC-48, Extended Unique Identifier (EUI) EUI-48, or EUI-64 address type. 23. The device according to claim 21, wherein the digital address is a layer 3 address and is static or dynamic Internet Protocol (IP) address that is IPv4 or IPv6 type address. 24. The device according to claim 1, wherein the second phenomenon is different from the first phenomenon. 25. The device according to claim 1, wherein the second phenomenon is the same as the first phenomenon, and the device is further operative for affecting a closed control loop for controlling the phenomenon. 26. The device according to claim 25, wherein the control loop is a closed linear control loop where the sensor output serves as a feedback to command the actuator based of a loop deviation from a setpoint or a reference value. 27. The device according to claim 26, wherein the setpoint is fixed, set by a user, or is time dependent. 28. The device according to claim 25, wherein the closed control loop is a proportional-based, an integral-based, a derivative-based, or a Proportional, Integral, and Derivative (PID) based control loop, wherein the control loop uses feed-forward, Bistable, Bang-Bang, Hysteretic, or fuzzy logic based control. 29. The device according to claim 25, wherein the control loop involves randomness based on random numbers. 30. The device according to claim 1 further for affecting randomness, further comprising a random number generator for generating random numbers, wherein the command is responsive to the generated random numbers. 31. The device according to claim 1, wherein the random number generator is hardware-based using thermal noise, shot noise, nuclear decaying radiation, photoelectric effect, or quantum phenomena. 32. The device according to claim 1, wherein the random number generator is software-based and the processor executes an algorithm for generating pseudo-random numbers. 33. The device according to claim 1, wherein the sensor is a piezoelectric sensor that includes single crystal material or a piezoelectric ceramics and uses a transverse, longitudinal, or shear effect mode of a piezoelectric effect. 34. The device according to claim 1, further comprising multiple sensors arranged as a directional sensor array operative to estimate the number, magnitude, frequency, Direction-Of-Arrival (DOA), distance, or speed of the physical phenomenon impinging the sensor array. 35. The device according to claim 1, wherein the sensor is a thermoelectric sensor that responds to a temperature or to a temperature gradient of an object using conduction, convection, or radiation, and wherein the thermoelectric sensor consists of, or comprises, a Positive Temperature Coefficient (PTC) thermistor, a Negative Temperature Coefficient (NTC) thermistor, a thermocouple, a quartz crystal, or a Resistance Temperature Detector (RTD). 36. The device according to claim 1, wherein the sensor consists of, or comprises, a nanosensor, a crystal, or a semiconductor. 37. The device according to claim 1, wherein the sensor consists of, or comprises, an eddy-current sensor. 38. The device according to claim 1, wherein the sensor consists of, or comprises, an atmospheric or an environmental sensor. 39. The device according to claim 1, wherein the sensor consists of, or comprises, a bulk or surface acoustic sensor. 40. The device according to claim 1, wherein the sensor consists of, or comprises, a radiation sensor that responds to radioactivity, nuclear radiation, alpha particles, beta particles, or gamma rays, and is based on gas ionization. 41. The device according to claim 1, wherein the sensor consists of, or comprises, a photoelectric sensor that responds to a visible or an invisible light, and wherein the invisible light is infrared, ultraviolet, X-rays, or gamma rays. 42. The device according to claim 41, wherein the photoelectric sensor is based on the photoelectric or photovoltaic effect, and consists of, or comprises, a semiconductor component that consists of, or comprises, a photodiode, a phototransistor, or a solar cell. 43. The device according to claim 41, wherein the photoelectric sensor is based on Charge-Coupled Appliance (CCD) or a Complementary Metal-Oxide Semiconductor (CMOS) element. 44. The device according to claim 1, wherein the sensor consists of, or comprises, a photosensitive image sensor array comprising multiple photoelectric sensors, for capturing an image and producing electronic image information representing the image, and the device further comprising one or more optical lens for focusing the received light and to guide the image, and wherein the image sensor is disposed approximately at an image focal point plane of the one or more optical lens for properly capturing the image. 45. The device according to claim 1, wherein the sensor is an electrochemical sensor that responds to an object chemical structure, properties, composition, or reactions. 46. The device according to claim 45, wherein the electrochemical sensor is a pH meter or a gas sensor responding to a presence of radon, hydrogen, oxygen, or Carbon-Monoxide (CO), or wherein the electrochemical sensor is based on optical detection or on ionization and is a smoke, a flame, or a fire detector, or is responsive to combustible, flammable, or toxic gas. 47. The device according to claim 1, wherein the sensor is an electroacoustic sensor that responds to an audible or inaudible sound. 48. The device according to claim 47, wherein the electroacoustic sensor is an omnidirectional, unidirectional, or bidirectional microphone that is based on the sensing the incident sound based motion of a diaphragm or a ribbon, and the microphone consists of, or comprising, a condenser, an electret, a dynamic, a ribbon, a carbon, or a piezoelectric microphone. 49. The device according to claim 1, wherein the sensor is an electric current sensor that comprises an ampermeter, galvanometer, or a hot-wire ampermeter. 50. The device according to claim 49, wherein the current sensor comprises a current clamp, a current probe, a current transformer, or uses a ‘Hall effect’. 51. The device according to claim 49, wherein the current sensor is a non-contact or a non-conductive current meter. 52. The device according to claim 1, wherein the actuator is a light source that emits visible or non-visible light for illumination or indication, the non-visible light is infrared, ultraviolet, X-rays, or gamma rays. 53. The device according to claim 52, wherein the light source consists of, or comprises, a lamp, an incandescent lamp, a gas discharge lamp, a fluorescent lamp, a Solid-State Lighting (SSL), a Light Emitting Diode (LED), an Organic LED (OLED), a polymer LED (PLED), or a laser diode. 54. The device according to claim 1, wherein the actuator is a motion actuator that causes linear or rotary motion. 55. The device according to claim 54, wherein the motion actuator is an electrical motor. 56. The device according to claim 55, wherein the electrical motor is a brushed, a brushless, or an uncommutated DC motor, or wherein the DC motor is a stepper motor that is a Permanent Magnet (PM) motor, a Variable reluctance (VR) motor, or a hybrid synchronous stepper. 57. The device according to claim 54, wherein the motion actuator is based on a piezoelectric motor, a Surface Acoustic Wave (SAW) motor, a Squiggle motor, an ultrasonic motor, or a micro- or nanometer comb-drive capacitive actuator, a Dielectric or Ionic based Electroactive Polymers (EAPs) actuator, a solenoid, a thermal bimorph, or a piezoelectric unimorph actuator. 58. The device according to claim 1, wherein the actuator is a sounder for converting an electrical energy to omnidirectional, unidirectional, or bidirectional pattern emitted, audible or inaudible, sound waves. 59. The device according to claim 1, wherein the actuator is an electric thermoelectric actuator and is a heater or a cooler, operative for affecting the temperature of a solid, a liquid, or a gas object, and is coupled to the object by conduction, convection, force convention, thermal radiation, or by the transfer of energy by phase changes. 60. The device according to claim 59, wherein the thermoelectric actuator is a cooler based on a heat pump driving a refrigeration cycle using a compressor-based electric motor, or wherein the thermoelectric actuator is an electric heater that is a resistance heater or a dielectric heater. 61. The device according to claim 1, wherein the battery is a rechargeable battery, and wherein the device further comprising a power source for charging the battery. 62. The device according to claim 61, wherein the power source is an electrical power generator for generating an electric power from the phenomenon or from a distinct another phenomenon. 63. The device according to claim 62, wherein a single component serves as the sensor and as the electrical power generator. 64. The device according to claim 62, wherein the electrical power generator is an electromechanical generator for harvesting kinetic energy. 65. The device according to claim 62, wherein the electrical power generator is a solar cell or a Peltier effect based thermoelectric device. 66. The device according to claim 1, wherein the sensor comprises a microphone for capturing human voice data, the microphone is coupled to the wireless transceiver for sending the captured human voice data to the server. 67. The device according to claim 1 in combination with the server, wherein the server is operative to receive over the Internet the captured human voice data from the device, to process the captured human voice data using a voice processing, and to send the actuator command in response to the processing.
2,400
9,259
9,259
14,925,413
2,419
Some embodiments provide a system that executes a web application. During operation, the system loads the web application in a web browser and loads a native code module associated with the web application into a secure runtime environment. Next, the system provides input data associated with the web application to the native code module and processes the input data using the native code module to obtain output data. Finally, the system provides the output data to the web application for use by the web application.
1. (canceled) 2. A method comprising: receiving, by a computing system, a native code module for an application; loading the application on software on the computing system; validating, by the computing system, the native code module prior to loading the native code module into a secure runtime environment of the computing system; loading the native code module associated with the application into the secure runtime environment of the computing system; executing the native code module in the secure runtime environment; providing input data associated with the application to the native code module; processing the input data to obtain output data; and providing the output data to the application for use by the application. 3. The method of claim 2, wherein executing the native code module in the secure runtime environment comprises executing a native code module that is platform independent with respect to an operating system of the computing system. 4. The method of claim 2, wherein loading the application on software on the computing system comprises loading a web application in a web browser on the computing system. 5. The method of claim 2, wherein providing the output data to the application for use by the application comprises: providing, to a trusted plugin associated with a second application, the output data for use by the trusted plugin; and processing, by the trusted plugin, the output data to render graphics for the application. 6. The method of claim 2, wherein loading the native code module associated with the application into the secure runtime environment comprises loading the native code module into a secure runtime environment provided by a plugin associated with a second application, the method comprising enforcing, by the secure runtime environment, code integrity, control-flow integrity, and data integrity for the native code module while executing the native code module in the secure runtime environment. 7. The method of claim 2, wherein: providing the input data associated with the application to the native code module comprises retrieving, by the secure runtime environment on behalf of the native code module, the input data from a first inter-module communication (IMC) buffer; and providing the output data to the application for use by the application comprises placing the output data in a second IMC buffer. 8. The method of claim 2, wherein: validating the native code module comprises validating a native code module that comprises binary code that runs directly on hardware in the computing system; and executing the native code module in the secure runtime environment comprises executing the binary code in the secure runtime environment. 9. The method of claim 8, wherein executing the binary code in the secure runtime environment comprises utilizing, by the binary code in the native code module, low-level libraries and application programming interfaces (API) available for use by native code modules in the computing system. 10. The method of claim 2, wherein validating the native code module comprises validating a native code module that is executable in a plurality of instruction set architectures. 11. The method of claim 2, wherein validating the native code module comprises validating a native code module that comprises corresponding mechanisms for executing the native code module in each of a plurality of instruction set architectures. 12. The method of claim 11, wherein validating the native code module that comprises corresponding mechanisms for executing the native code module in each of the plurality of instruction set architectures comprises validating a native code module that comprises at least one of fat binaries or binary translators. 13. The method of claim 2, comprising: moderating, by the secure runtime environment, which system resources of the computing system can be accessed by the native code module and how the system resources are accessed. 14. The method of claim 13, wherein moderating which system resources of the computing system can be accessed by the native code module and how the system resources are accessed comprises: initiating, by the secure runtime environment on behalf of the native code module, a communication between the native code module and the application running on the computing system; and mediating, by the secure runtime environment, the communication, including placing the output data in a shared memory buffer that is readable by the application on the computing system for use by the application, the moderating comprising one or more of the following: performing, by the secure runtime environment, a read of a file system state on behalf of the native code module; performing, by the secure runtime environment, a change of the file system state on behalf of the native code module; initiating, by the secure runtime environment, a network communication on behalf of the native code module; initiating, by the secure runtime environment, an inter-module communication on behalf of the native code module; or initiating, by the secure runtime environment, an inter-process communication on behalf of the native code module. 15. A system comprising: a native code module associated with an application and received by a computing system; a secure runtime environment of the computing system configured to: load the native code module associated with the application; and execute the native code module; a validator of the computing system configured to validate the native code module before the secure runtime environment loads and executes the native code module, wherein the native code module is configured to: obtain input data associated with the application; process the input data to obtain output data; and provide the output data to the application for use by the application. 16. The system of claim 15, wherein: the native code module is platform independent with respect to an operating system of the computing system; and the secure runtime environment is configured to execute the native code module that is platform independent with respect to the operating system of the computing system. 17. The system of claim 15, comprising: a web browser, installed on the computing system, configured to load an application before the secure runtime environment loads and executes the native code module. 18. The system of claim 15, comprising a trusted plugin associated with a second application configured to: receive the output data; and process the output data to render graphics for the application. 19. The system of claim 15, comprising a plugin associated with a second application that implements the validator. 20. The system of claim 15, comprising a plugin associated with a second application that is configured to provide the secure runtime environment. 21. The system of claim 15, comprising: a first inter-module communication (IMC) buffer configured to store the input data; and a second IMC buffer configured to store the output data. 22. The system of claim 15, wherein the native code module comprises binary code that runs directly on hardware in the computing system. 23. The system of claim 22, wherein the binary code in the native code module uses low-level libraries and application programming interfaces (API) that are available for use by native code modules in the computing system. 24. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method comprising: receiving, by a computing system, a native code module for an application; loading the application on software on the computing system; validating, by the computing system, a native code module prior to loading the native code module into a secure runtime environment of the computing system; loading the native code module associated with the application into the secure runtime environment of the computing system; executing the native code module in the secure runtime environment; providing input data associated with the application to the native code module; processing the input data to obtain output data; and providing the output data to the application for use by the application.
Some embodiments provide a system that executes a web application. During operation, the system loads the web application in a web browser and loads a native code module associated with the web application into a secure runtime environment. Next, the system provides input data associated with the web application to the native code module and processes the input data using the native code module to obtain output data. Finally, the system provides the output data to the web application for use by the web application.1. (canceled) 2. A method comprising: receiving, by a computing system, a native code module for an application; loading the application on software on the computing system; validating, by the computing system, the native code module prior to loading the native code module into a secure runtime environment of the computing system; loading the native code module associated with the application into the secure runtime environment of the computing system; executing the native code module in the secure runtime environment; providing input data associated with the application to the native code module; processing the input data to obtain output data; and providing the output data to the application for use by the application. 3. The method of claim 2, wherein executing the native code module in the secure runtime environment comprises executing a native code module that is platform independent with respect to an operating system of the computing system. 4. The method of claim 2, wherein loading the application on software on the computing system comprises loading a web application in a web browser on the computing system. 5. The method of claim 2, wherein providing the output data to the application for use by the application comprises: providing, to a trusted plugin associated with a second application, the output data for use by the trusted plugin; and processing, by the trusted plugin, the output data to render graphics for the application. 6. The method of claim 2, wherein loading the native code module associated with the application into the secure runtime environment comprises loading the native code module into a secure runtime environment provided by a plugin associated with a second application, the method comprising enforcing, by the secure runtime environment, code integrity, control-flow integrity, and data integrity for the native code module while executing the native code module in the secure runtime environment. 7. The method of claim 2, wherein: providing the input data associated with the application to the native code module comprises retrieving, by the secure runtime environment on behalf of the native code module, the input data from a first inter-module communication (IMC) buffer; and providing the output data to the application for use by the application comprises placing the output data in a second IMC buffer. 8. The method of claim 2, wherein: validating the native code module comprises validating a native code module that comprises binary code that runs directly on hardware in the computing system; and executing the native code module in the secure runtime environment comprises executing the binary code in the secure runtime environment. 9. The method of claim 8, wherein executing the binary code in the secure runtime environment comprises utilizing, by the binary code in the native code module, low-level libraries and application programming interfaces (API) available for use by native code modules in the computing system. 10. The method of claim 2, wherein validating the native code module comprises validating a native code module that is executable in a plurality of instruction set architectures. 11. The method of claim 2, wherein validating the native code module comprises validating a native code module that comprises corresponding mechanisms for executing the native code module in each of a plurality of instruction set architectures. 12. The method of claim 11, wherein validating the native code module that comprises corresponding mechanisms for executing the native code module in each of the plurality of instruction set architectures comprises validating a native code module that comprises at least one of fat binaries or binary translators. 13. The method of claim 2, comprising: moderating, by the secure runtime environment, which system resources of the computing system can be accessed by the native code module and how the system resources are accessed. 14. The method of claim 13, wherein moderating which system resources of the computing system can be accessed by the native code module and how the system resources are accessed comprises: initiating, by the secure runtime environment on behalf of the native code module, a communication between the native code module and the application running on the computing system; and mediating, by the secure runtime environment, the communication, including placing the output data in a shared memory buffer that is readable by the application on the computing system for use by the application, the moderating comprising one or more of the following: performing, by the secure runtime environment, a read of a file system state on behalf of the native code module; performing, by the secure runtime environment, a change of the file system state on behalf of the native code module; initiating, by the secure runtime environment, a network communication on behalf of the native code module; initiating, by the secure runtime environment, an inter-module communication on behalf of the native code module; or initiating, by the secure runtime environment, an inter-process communication on behalf of the native code module. 15. A system comprising: a native code module associated with an application and received by a computing system; a secure runtime environment of the computing system configured to: load the native code module associated with the application; and execute the native code module; a validator of the computing system configured to validate the native code module before the secure runtime environment loads and executes the native code module, wherein the native code module is configured to: obtain input data associated with the application; process the input data to obtain output data; and provide the output data to the application for use by the application. 16. The system of claim 15, wherein: the native code module is platform independent with respect to an operating system of the computing system; and the secure runtime environment is configured to execute the native code module that is platform independent with respect to the operating system of the computing system. 17. The system of claim 15, comprising: a web browser, installed on the computing system, configured to load an application before the secure runtime environment loads and executes the native code module. 18. The system of claim 15, comprising a trusted plugin associated with a second application configured to: receive the output data; and process the output data to render graphics for the application. 19. The system of claim 15, comprising a plugin associated with a second application that implements the validator. 20. The system of claim 15, comprising a plugin associated with a second application that is configured to provide the secure runtime environment. 21. The system of claim 15, comprising: a first inter-module communication (IMC) buffer configured to store the input data; and a second IMC buffer configured to store the output data. 22. The system of claim 15, wherein the native code module comprises binary code that runs directly on hardware in the computing system. 23. The system of claim 22, wherein the binary code in the native code module uses low-level libraries and application programming interfaces (API) that are available for use by native code modules in the computing system. 24. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method comprising: receiving, by a computing system, a native code module for an application; loading the application on software on the computing system; validating, by the computing system, a native code module prior to loading the native code module into a secure runtime environment of the computing system; loading the native code module associated with the application into the secure runtime environment of the computing system; executing the native code module in the secure runtime environment; providing input data associated with the application to the native code module; processing the input data to obtain output data; and providing the output data to the application for use by the application.
2,400
9,260
9,260
14,482,429
2,445
Human interaction with a webpage may be determined by processing an event stream generated by the client device during the webpage interaction. A classification server receives the event stream and compares components of the event stream, including components of an event header message, with prerecorded datasets. The datasets include prerecorded event streams having a known interaction type. Training clients may be provided for generating the prerecorded datasets.
1. A method, comprising: recording an event generator type indicating a type of web page interaction between a client and a web page server; generating an event stream message based on the web page interaction; determining, from the event stream message, that the event generator type has changed; and recording a new event generator type to reflect the changes. 2. The method of claim 1, wherein the event generator type is included in an event header message of an event stream message, the event generator type comprising at least one of a human interaction, a computer assisted human interaction, a computer-based interaction, a robot interaction, a natural action interaction, a simulated input device interaction, and a fluctuating input device interaction. 3. The method of claim 1, further comprising: recording client data from an event header message of the event stream message comprising at least one of an operating system, browser type, client device type, and screen size. 4. The method of claim 1, further comprising: recording event information based on a plurality of interactions from a plurality of different clients, the event information comprising at least one of: operating system type, browser type, and event generator type including human and computer initiated event generation. 5. The method of claim 1, further comprising: initiating a learning phase to record events observed during the web page interaction or plurality of web page interactions; recording and labeling the observed events; and utilizing the recorded events to determine whether subsequent web page interactions are human-based or computer-based interactions. 6. The method of claim 5, further comprising: retrieving an event stream message including at least one newly created event; and comparing the at least one newly created event to the recorded events to determine whether a match is made. 7. The method of claim 6, wherein determining whether a match is made comprises determining whether the comparing operation provides a degree of confidence above a predefined threshold. 8. An apparatus, comprising: a memory configured to record an event generator type indicating a type of web page interaction between a client and a web page server; and a processor configured to: generate an event stream message based on the web page interaction; determine from the event stream message that the event generator type has changed since a previous interaction; and record a new event generator type to reflect the changes. 9. The apparatus of claim 8, wherein the event generator type is included in an event header message of an event stream message, the event generator type comprising at least one of a human interaction, a computer assisted human interaction, a computer-based interaction, a robot interaction, a natural action interaction, a simulated input device interaction, and a fluctuating input device interaction. 10. The apparatus of claim 8, wherein the memory is further configured to record client data from an event header message of the event stream message comprising at least one of an operating system, browser type, client device type, and screen size. 11. The apparatus of claim 8, wherein the memory is further configured to record event information based on a plurality of interactions from a plurality of different clients, the event information comprising at least one of: operating system type, browser type, and event generator type including human and computer initiated event generation. 12. The apparatus of claim 8, wherein the processor is further configured to initiate a learning phase to record events observed during the web page interaction or plurality of web page interactions; record and labeling the observed events; and utilize the recorded events to determine whether subsequent web page interactions are human-based or computer-based interactions. 13. The apparatus of claim 12, wherein the processor is further configured to retrieve an event stream message including at least one newly created event; and compare the at least one newly created event to the recorded events to determine whether a match is made. 14. The apparatus of claim 13, wherein the processor is further configured to determine whether a match is made by determining whether the comparing operation provides a degree of confidence above a predefined threshold. 15. A non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform: recording an event generator type indicating a type of web page interaction between a client and a web page server; generating an event stream message based on the web page interaction; determining from the event stream message that the event generator type has changed since a previous interaction; and recording a new event generator type to reflect the changes. 16. The non-transitory computer readable storage medium of claim 15, wherein the event generator type is included in an event header message of an event stream message, the event generator type comprising at least one of a human interaction, a computer assisted human interaction, a computer-based interaction, a robot interaction, a natural action interaction, a simulated input device interaction, and a fluctuating input device interaction. 17. The non-transitory computer readable storage medium of claim 15, wherein the processor is further configured to perform: recording client data from an event header message of the event stream message comprising at least one of an operating system, browser type, client device type, and screen size. 18. The non-transitory computer readable storage medium of claim 15, wherein the processor is further configured to perform: recording event information based on a plurality of interactions from a plurality of different clients, the event information comprising at least one of: operating system type, browser type, and event generator type including human and computer initiated event generation. 19. The non-transitory computer readable storage medium of claim 15, wherein the processor is further configured to perform: initiating a learning phase to record events observed during the web page interaction or plurality of web page interactions; recording and labeling the observed events; and utilizing the recorded events to determine whether subsequent web page interactions are human-based or computer-based interactions. 20. The non-transitory computer readable storage medium of claim 19, wherein the processor is further configured to perform: retrieving an event stream message including at least one newly created event; and comparing the at least one newly created event to the recorded events to determine whether a match is made.
Human interaction with a webpage may be determined by processing an event stream generated by the client device during the webpage interaction. A classification server receives the event stream and compares components of the event stream, including components of an event header message, with prerecorded datasets. The datasets include prerecorded event streams having a known interaction type. Training clients may be provided for generating the prerecorded datasets.1. A method, comprising: recording an event generator type indicating a type of web page interaction between a client and a web page server; generating an event stream message based on the web page interaction; determining, from the event stream message, that the event generator type has changed; and recording a new event generator type to reflect the changes. 2. The method of claim 1, wherein the event generator type is included in an event header message of an event stream message, the event generator type comprising at least one of a human interaction, a computer assisted human interaction, a computer-based interaction, a robot interaction, a natural action interaction, a simulated input device interaction, and a fluctuating input device interaction. 3. The method of claim 1, further comprising: recording client data from an event header message of the event stream message comprising at least one of an operating system, browser type, client device type, and screen size. 4. The method of claim 1, further comprising: recording event information based on a plurality of interactions from a plurality of different clients, the event information comprising at least one of: operating system type, browser type, and event generator type including human and computer initiated event generation. 5. The method of claim 1, further comprising: initiating a learning phase to record events observed during the web page interaction or plurality of web page interactions; recording and labeling the observed events; and utilizing the recorded events to determine whether subsequent web page interactions are human-based or computer-based interactions. 6. The method of claim 5, further comprising: retrieving an event stream message including at least one newly created event; and comparing the at least one newly created event to the recorded events to determine whether a match is made. 7. The method of claim 6, wherein determining whether a match is made comprises determining whether the comparing operation provides a degree of confidence above a predefined threshold. 8. An apparatus, comprising: a memory configured to record an event generator type indicating a type of web page interaction between a client and a web page server; and a processor configured to: generate an event stream message based on the web page interaction; determine from the event stream message that the event generator type has changed since a previous interaction; and record a new event generator type to reflect the changes. 9. The apparatus of claim 8, wherein the event generator type is included in an event header message of an event stream message, the event generator type comprising at least one of a human interaction, a computer assisted human interaction, a computer-based interaction, a robot interaction, a natural action interaction, a simulated input device interaction, and a fluctuating input device interaction. 10. The apparatus of claim 8, wherein the memory is further configured to record client data from an event header message of the event stream message comprising at least one of an operating system, browser type, client device type, and screen size. 11. The apparatus of claim 8, wherein the memory is further configured to record event information based on a plurality of interactions from a plurality of different clients, the event information comprising at least one of: operating system type, browser type, and event generator type including human and computer initiated event generation. 12. The apparatus of claim 8, wherein the processor is further configured to initiate a learning phase to record events observed during the web page interaction or plurality of web page interactions; record and labeling the observed events; and utilize the recorded events to determine whether subsequent web page interactions are human-based or computer-based interactions. 13. The apparatus of claim 12, wherein the processor is further configured to retrieve an event stream message including at least one newly created event; and compare the at least one newly created event to the recorded events to determine whether a match is made. 14. The apparatus of claim 13, wherein the processor is further configured to determine whether a match is made by determining whether the comparing operation provides a degree of confidence above a predefined threshold. 15. A non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform: recording an event generator type indicating a type of web page interaction between a client and a web page server; generating an event stream message based on the web page interaction; determining from the event stream message that the event generator type has changed since a previous interaction; and recording a new event generator type to reflect the changes. 16. The non-transitory computer readable storage medium of claim 15, wherein the event generator type is included in an event header message of an event stream message, the event generator type comprising at least one of a human interaction, a computer assisted human interaction, a computer-based interaction, a robot interaction, a natural action interaction, a simulated input device interaction, and a fluctuating input device interaction. 17. The non-transitory computer readable storage medium of claim 15, wherein the processor is further configured to perform: recording client data from an event header message of the event stream message comprising at least one of an operating system, browser type, client device type, and screen size. 18. The non-transitory computer readable storage medium of claim 15, wherein the processor is further configured to perform: recording event information based on a plurality of interactions from a plurality of different clients, the event information comprising at least one of: operating system type, browser type, and event generator type including human and computer initiated event generation. 19. The non-transitory computer readable storage medium of claim 15, wherein the processor is further configured to perform: initiating a learning phase to record events observed during the web page interaction or plurality of web page interactions; recording and labeling the observed events; and utilizing the recorded events to determine whether subsequent web page interactions are human-based or computer-based interactions. 20. The non-transitory computer readable storage medium of claim 19, wherein the processor is further configured to perform: retrieving an event stream message including at least one newly created event; and comparing the at least one newly created event to the recorded events to determine whether a match is made.
2,400
9,261
9,261
15,740,835
2,461
Modifying quality of service treatment for data flows A method of transmitting a data flow via a network is disclosed where the network supports transmission of data in accordance with a plurality of Quality of Service, QoS, models. Prior to transmission of the data flow, a client system configures a first class of service for the data flow based on a first QoS model, and a first portion of the data flow is transmitted through the network in accordance with the first class of service. In response to detecting a renegotiation condition, the network communicates with the client system to configure a second class of service for the data flow based on a second QoS model, and a subsequent portion of the data flow is transmitted through the network using the second class of service.
1. A method of transmitting a data flow via a network, the network supporting transmission of data in accordance with a plurality of Quality of Service, QoS, models, the method comprising: prior to transmission of the data flow, communicating with a client system associated with the data flow to configure a first class of service for the data flow based on a first QoS model; transmitting a first portion of the data flow through the network in accordance with the first class of service; detecting a renegotiation condition; and in response to detecting the renegotiation condition: communicating with the client system to configure a second class of service for the data flow based on a second QoS model; and transmitting a subsequent portion of the data flow through the network in accordance with the second class of service. 2. A method according to claim 1, wherein communicating to configure a second class of service comprises: transmitting a renegotiation notification to the client; receiving a response from the client, the response indicating the second QoS model for the data flow. 3. A method according to claim 1, comprising transmitting information specifying one or more alternative QoS models for the data flow, the second QoS model preferably selected from, or based on at least one of, the alternative QoS models. 4. A method according to claim 3, wherein information specifying one or more alternative QoS models is included in the renegotiation notification or sent in response to a query from the client system. 5. A method according to claim 1, comprising determining one or more performance characteristics of the data flow, wherein the renegotiation condition is detected in dependence on the performance characteristics. 6. A method according to claim 5, wherein determining performance characteristics of the data flow comprises one or both of: measuring one or more past performance characteristics of the data flow; and forecasting one or more future performance characteristics for the data flow. 7. A method according to claim 8, comprising selecting one or more reference data flows; and wherein determining reference performance characteristics comprises determining characteristics representative of performance of the reference data flows. 8. A method according to claim 1, wherein the renegotiation condition relates to a change in an available set of QoS models supported by the network, the change preferably having occurred after configuration of the first class of service. 9. A method according to claim 8, comprising: determining a requested QoS vector, wherein the requested QoS vector comprises a set of QoS metrics based on QoS requirements specified by the client system when configuring the first class of service; determining a delivered QoS vector, wherein the delivered QoS vector comprises a set of QoS metrics based on the first QoS model and/or a based on a measured or forecast performance of the data flow; determining a plurality of available QoS vectors for a set of available QoS models; computing a first difference measure between the requested QoS vector and the delivered QoS vector; computing respective second difference measures between the requested QoS vector and each of the available QoS vectors; identifying one or more available QoS models in the set of available QoS models having QoS vectors closer to the requested QoS vector than the delivered QoS vector in accordance with the computed difference measures; and in response to identifying one or more available QoS models, detecting the renegotiation condition and/or offering one or more of the identified available QoS models to the client for the data flow. 10. A method of configuring a class of service applied to a data flow transmitted from a client system via a network, the network supporting transmission of data in accordance with a plurality of Quality of Service, QoS, models, the method comprising, at the client system: prior to transmission of the data flow, communicating with a QoS negotiation module associated with the network to configure a first class of service for the data flow based on a first QoS model; initiating transmission of the data flow to the network based on the first class of service; detecting a renegotiation condition; and in response to detecting the renegotiation condition: communicating with the QoS negotiation module to configure a second class of service for the data flow based on a second QoS model; and continuing transmission of the data flow to the network based on the second class of service. 11. A method according to claim 10, wherein detecting the renegotiation condition comprises: determining one or more current performance requirements for the data flow; determining one or more performance characteristics of the data flow; and detecting the renegotiation condition if the determined performance characteristics differ from the current performance requirements, preferably by more than a threshold difference. 12. A method according to claim 10, wherein performance is compared or assessed: with respect to at least one and preferably each of a set of performance features; and/or by numerical comparison of one or more QoS metrics or distance computation between respective QoS feature vectors. 13. A method according to claim 1, comprising tagging traffic of the data flow with a class of service identifier corresponding to the first and/or second configured class of service. 14. A computer readable medium comprising software code adapted, when executed on a data processing apparatus, to perform a method as set out in claim 1. 15. A system or apparatus having means, preferably in the form of at least one processor and associated memory, for performing a method as set out in claim 1.
Modifying quality of service treatment for data flows A method of transmitting a data flow via a network is disclosed where the network supports transmission of data in accordance with a plurality of Quality of Service, QoS, models. Prior to transmission of the data flow, a client system configures a first class of service for the data flow based on a first QoS model, and a first portion of the data flow is transmitted through the network in accordance with the first class of service. In response to detecting a renegotiation condition, the network communicates with the client system to configure a second class of service for the data flow based on a second QoS model, and a subsequent portion of the data flow is transmitted through the network using the second class of service.1. A method of transmitting a data flow via a network, the network supporting transmission of data in accordance with a plurality of Quality of Service, QoS, models, the method comprising: prior to transmission of the data flow, communicating with a client system associated with the data flow to configure a first class of service for the data flow based on a first QoS model; transmitting a first portion of the data flow through the network in accordance with the first class of service; detecting a renegotiation condition; and in response to detecting the renegotiation condition: communicating with the client system to configure a second class of service for the data flow based on a second QoS model; and transmitting a subsequent portion of the data flow through the network in accordance with the second class of service. 2. A method according to claim 1, wherein communicating to configure a second class of service comprises: transmitting a renegotiation notification to the client; receiving a response from the client, the response indicating the second QoS model for the data flow. 3. A method according to claim 1, comprising transmitting information specifying one or more alternative QoS models for the data flow, the second QoS model preferably selected from, or based on at least one of, the alternative QoS models. 4. A method according to claim 3, wherein information specifying one or more alternative QoS models is included in the renegotiation notification or sent in response to a query from the client system. 5. A method according to claim 1, comprising determining one or more performance characteristics of the data flow, wherein the renegotiation condition is detected in dependence on the performance characteristics. 6. A method according to claim 5, wherein determining performance characteristics of the data flow comprises one or both of: measuring one or more past performance characteristics of the data flow; and forecasting one or more future performance characteristics for the data flow. 7. A method according to claim 8, comprising selecting one or more reference data flows; and wherein determining reference performance characteristics comprises determining characteristics representative of performance of the reference data flows. 8. A method according to claim 1, wherein the renegotiation condition relates to a change in an available set of QoS models supported by the network, the change preferably having occurred after configuration of the first class of service. 9. A method according to claim 8, comprising: determining a requested QoS vector, wherein the requested QoS vector comprises a set of QoS metrics based on QoS requirements specified by the client system when configuring the first class of service; determining a delivered QoS vector, wherein the delivered QoS vector comprises a set of QoS metrics based on the first QoS model and/or a based on a measured or forecast performance of the data flow; determining a plurality of available QoS vectors for a set of available QoS models; computing a first difference measure between the requested QoS vector and the delivered QoS vector; computing respective second difference measures between the requested QoS vector and each of the available QoS vectors; identifying one or more available QoS models in the set of available QoS models having QoS vectors closer to the requested QoS vector than the delivered QoS vector in accordance with the computed difference measures; and in response to identifying one or more available QoS models, detecting the renegotiation condition and/or offering one or more of the identified available QoS models to the client for the data flow. 10. A method of configuring a class of service applied to a data flow transmitted from a client system via a network, the network supporting transmission of data in accordance with a plurality of Quality of Service, QoS, models, the method comprising, at the client system: prior to transmission of the data flow, communicating with a QoS negotiation module associated with the network to configure a first class of service for the data flow based on a first QoS model; initiating transmission of the data flow to the network based on the first class of service; detecting a renegotiation condition; and in response to detecting the renegotiation condition: communicating with the QoS negotiation module to configure a second class of service for the data flow based on a second QoS model; and continuing transmission of the data flow to the network based on the second class of service. 11. A method according to claim 10, wherein detecting the renegotiation condition comprises: determining one or more current performance requirements for the data flow; determining one or more performance characteristics of the data flow; and detecting the renegotiation condition if the determined performance characteristics differ from the current performance requirements, preferably by more than a threshold difference. 12. A method according to claim 10, wherein performance is compared or assessed: with respect to at least one and preferably each of a set of performance features; and/or by numerical comparison of one or more QoS metrics or distance computation between respective QoS feature vectors. 13. A method according to claim 1, comprising tagging traffic of the data flow with a class of service identifier corresponding to the first and/or second configured class of service. 14. A computer readable medium comprising software code adapted, when executed on a data processing apparatus, to perform a method as set out in claim 1. 15. A system or apparatus having means, preferably in the form of at least one processor and associated memory, for performing a method as set out in claim 1.
2,400
9,262
9,262
15,506,272
2,421
Provided is an automated system and process for producing a live video stream from a plurality live video feeds of an event from different views utilizing a transponder that measures a variable property of a person or animal participating in the event or a device that moves in the event, or the computer determines the measurement of the variable property utilizing pixels from the live video feeds. The computer 150 automatically selects a live video stream to broadcast from the plurality of live video stream to a user interface 120 based on the measurement.
1. A process for providing automated live video stream production of an event comprising: connecting a plurality of video devices to a cloud-based server via a network, the video devices comprising a camera and transmitter for transmitting video to the server, the video devices being aimed to record different views of the event; connecting at least one transponder to a person or animal participating in the event or device being used in the event for live measuring of at least one variable property of the person, animal or device that changes during the event; transmitting by the video devices a plurality of live video feeds of different views of the event to the server; transmitting by the at least one transponder a measurement feed of measurements of the at least one variable property during the event to the server; selecting by the server one of the live video feeds based on the measurement of the at least one variable property at a first time; connecting by a user a user interface device to the server, the user interface having a display constructed to display video; broadcasting by the server a first selected live video feed to the user interface device, the first selected live video feed being selected by the server based on the measurement at the first time; the user interface device displaying the first selected live video feed; broadcasting by the server a second selected live video feed to the user interface device and stopping broadcasting of the first live video feed, the second selected live video feed being selected by the server based on the measurement at a second time later than the first time, the second selected live feed having a different view of the event than the first selected live feed; and the user interface device displaying the second selected live feed. 2. A process for providing automated live video stream production of an event comprising: connecting a plurality of video devices to a cloud-based server via a network, the video devices comprising a camera and transmitter for transmitting video to the server, the video devices being aimed to record different views of the event; transmitting by the video devices a plurality of live video feeds of different views of the event to the server; analyzing pixels of the live feeds by the server to generate measurements of at least one variable property of a person, animal or device that changes during the event; selecting by the server one of the live video feeds based on a measurement of the at least one variable property at a first time; connecting by a user a user interface device to the server, the user interface having a display constructed to display video; broadcasting by the server a first selected live video feed to the user interface device, the first selected live video feed being selected by the server based on the measurement at the first time; the user interface device displaying the first selected live video feed; broadcasting by the server a second selected live video feed to the user interface device and stopping broadcasting of the first live video feed, the second selected live video feed being selected by the server based on the measurement at a second time later than the first time, the second selected live feed having a different view of the event than the first selected live feed; and the user interface device displaying the second selected live feed. 3. The process according to claim 1, wherein the server transmits the measurements to the user interface. 4. The process according to claim 1, wherein the at least one variable property to be measured is selected by the user on the user interface device and transmitted to the server. 5. The process according to claim 1, wherein the server randomly selects the at least one variable property to be measured. 6. The process according to claim 1, wherein the event is a sporting event, baseball, soccer, football, tennis, race, bicycling, race cars, motorcycle race, motocross, surfing, skydiving, skiing, waterskiing, boating, golfing, or any other sport, military engagement, concert, show, or reality show. 7. The process according to claim 1, wherein the at least one transponder measures at least one of location, elevation, speed, change of position, acceleration, vital signs, heart rate, blood pressure, oxygen blood level, blood sugar level, temperature, or lactic acid concentration. 8. The process according to claim 1, wherein the at least one transponder comprises at least one of fitness monitors, personal activity trackers, smart cloths that measure vital signs, global positioning (GPS) tracking devices, radio frequency identification (RFID) chip tracking devices, accelerometers, temperature measuring devices, or heart rate monitors. 9. The process according to claim 1, wherein the server analyzes pixel rates as a factor in determining which live video feed to broadcast. 10. The process according to claim 1, wherein at least one of the plurality of video devices is a first user interface device and a live video stream from the first user interface device is broadcast by the server to a second user interface device as the first selected live video fee. 11. The process according to claim 1, wherein plurality of video devices comprises at least one of internet connected televisions and projectors, tablets, iPads, Mac OS computers, Windows computers, e-readers, and smartphones. 12. The process according to claim 1, wherein the user selects a video device to be displayed. 13. A computer readable medium storing instructions executable by a computing system in non-volatile memory, wherein execution of the instructions implements a process according to claim 1. 14. A system for automatically producing a live video stream according to the process of claim 1 comprising: the cloud-based server connected to the internet; the plurality of the video devices connected to a cloud-based server via a network; the plurality of the user interface devices connected to the server; the at least one transponder connected to the person, animal or device; and a video stream selection software module constructed to select the live video stream to be broadcast based on the measurement. 15. The process according to claim 2, wherein the server transmits the measurements to the user interface. 16. The process according to claim 2, wherein the at least one variable property to be measured is selected by the user on the user interface device and transmitted to the server. 17. The process according to claim 2, wherein the server randomly selects the at least one variable property to be measured. 18. The process according to claim 2, wherein the event is a sporting event, baseball, soccer, football, tennis, race, bicycling, race cars, motorcycle race, motocross, surfing, skydiving, skiing, waterskiing, boating, golfing, or any other sport, military engagement, concert, show, or reality show. 19. The process according to claim 2, wherein the at least one transponder measures at least one of location, elevation, speed, change of position, acceleration, vital signs, heart rate, blood pressure, oxygen blood level, blood sugar level, temperature, or lactic acid concentration. 20. The process according to claim 2, wherein the at least one transponder comprises at least one of fitness monitors, personal activity trackers, smart cloths that measure vital signs, global positioning (GPS) tracking devices, radio frequency identification (RFID) chip tracking devices, accelerometers, temperature measuring devices, or heart rate monitors.
Provided is an automated system and process for producing a live video stream from a plurality live video feeds of an event from different views utilizing a transponder that measures a variable property of a person or animal participating in the event or a device that moves in the event, or the computer determines the measurement of the variable property utilizing pixels from the live video feeds. The computer 150 automatically selects a live video stream to broadcast from the plurality of live video stream to a user interface 120 based on the measurement.1. A process for providing automated live video stream production of an event comprising: connecting a plurality of video devices to a cloud-based server via a network, the video devices comprising a camera and transmitter for transmitting video to the server, the video devices being aimed to record different views of the event; connecting at least one transponder to a person or animal participating in the event or device being used in the event for live measuring of at least one variable property of the person, animal or device that changes during the event; transmitting by the video devices a plurality of live video feeds of different views of the event to the server; transmitting by the at least one transponder a measurement feed of measurements of the at least one variable property during the event to the server; selecting by the server one of the live video feeds based on the measurement of the at least one variable property at a first time; connecting by a user a user interface device to the server, the user interface having a display constructed to display video; broadcasting by the server a first selected live video feed to the user interface device, the first selected live video feed being selected by the server based on the measurement at the first time; the user interface device displaying the first selected live video feed; broadcasting by the server a second selected live video feed to the user interface device and stopping broadcasting of the first live video feed, the second selected live video feed being selected by the server based on the measurement at a second time later than the first time, the second selected live feed having a different view of the event than the first selected live feed; and the user interface device displaying the second selected live feed. 2. A process for providing automated live video stream production of an event comprising: connecting a plurality of video devices to a cloud-based server via a network, the video devices comprising a camera and transmitter for transmitting video to the server, the video devices being aimed to record different views of the event; transmitting by the video devices a plurality of live video feeds of different views of the event to the server; analyzing pixels of the live feeds by the server to generate measurements of at least one variable property of a person, animal or device that changes during the event; selecting by the server one of the live video feeds based on a measurement of the at least one variable property at a first time; connecting by a user a user interface device to the server, the user interface having a display constructed to display video; broadcasting by the server a first selected live video feed to the user interface device, the first selected live video feed being selected by the server based on the measurement at the first time; the user interface device displaying the first selected live video feed; broadcasting by the server a second selected live video feed to the user interface device and stopping broadcasting of the first live video feed, the second selected live video feed being selected by the server based on the measurement at a second time later than the first time, the second selected live feed having a different view of the event than the first selected live feed; and the user interface device displaying the second selected live feed. 3. The process according to claim 1, wherein the server transmits the measurements to the user interface. 4. The process according to claim 1, wherein the at least one variable property to be measured is selected by the user on the user interface device and transmitted to the server. 5. The process according to claim 1, wherein the server randomly selects the at least one variable property to be measured. 6. The process according to claim 1, wherein the event is a sporting event, baseball, soccer, football, tennis, race, bicycling, race cars, motorcycle race, motocross, surfing, skydiving, skiing, waterskiing, boating, golfing, or any other sport, military engagement, concert, show, or reality show. 7. The process according to claim 1, wherein the at least one transponder measures at least one of location, elevation, speed, change of position, acceleration, vital signs, heart rate, blood pressure, oxygen blood level, blood sugar level, temperature, or lactic acid concentration. 8. The process according to claim 1, wherein the at least one transponder comprises at least one of fitness monitors, personal activity trackers, smart cloths that measure vital signs, global positioning (GPS) tracking devices, radio frequency identification (RFID) chip tracking devices, accelerometers, temperature measuring devices, or heart rate monitors. 9. The process according to claim 1, wherein the server analyzes pixel rates as a factor in determining which live video feed to broadcast. 10. The process according to claim 1, wherein at least one of the plurality of video devices is a first user interface device and a live video stream from the first user interface device is broadcast by the server to a second user interface device as the first selected live video fee. 11. The process according to claim 1, wherein plurality of video devices comprises at least one of internet connected televisions and projectors, tablets, iPads, Mac OS computers, Windows computers, e-readers, and smartphones. 12. The process according to claim 1, wherein the user selects a video device to be displayed. 13. A computer readable medium storing instructions executable by a computing system in non-volatile memory, wherein execution of the instructions implements a process according to claim 1. 14. A system for automatically producing a live video stream according to the process of claim 1 comprising: the cloud-based server connected to the internet; the plurality of the video devices connected to a cloud-based server via a network; the plurality of the user interface devices connected to the server; the at least one transponder connected to the person, animal or device; and a video stream selection software module constructed to select the live video stream to be broadcast based on the measurement. 15. The process according to claim 2, wherein the server transmits the measurements to the user interface. 16. The process according to claim 2, wherein the at least one variable property to be measured is selected by the user on the user interface device and transmitted to the server. 17. The process according to claim 2, wherein the server randomly selects the at least one variable property to be measured. 18. The process according to claim 2, wherein the event is a sporting event, baseball, soccer, football, tennis, race, bicycling, race cars, motorcycle race, motocross, surfing, skydiving, skiing, waterskiing, boating, golfing, or any other sport, military engagement, concert, show, or reality show. 19. The process according to claim 2, wherein the at least one transponder measures at least one of location, elevation, speed, change of position, acceleration, vital signs, heart rate, blood pressure, oxygen blood level, blood sugar level, temperature, or lactic acid concentration. 20. The process according to claim 2, wherein the at least one transponder comprises at least one of fitness monitors, personal activity trackers, smart cloths that measure vital signs, global positioning (GPS) tracking devices, radio frequency identification (RFID) chip tracking devices, accelerometers, temperature measuring devices, or heart rate monitors.
2,400
9,263
9,263
16,053,836
2,454
A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or a gateway communicating with a device associated with the sensor and a device associated with the actuator over in-building or in-vehicle networks, and an external Internet-connected control server associated with the control logic implementing a PID closed linear control loop and communicating with the router over external network for controlling the in-building or in-vehicle phenomenon. The sensor may be a microphone or a camera, and the system may include voice or image processing as part of the control logic. A redundancy is used by using multiple sensors or actuators, or by using multiple data paths over the building or vehicle internal or external communication. The networks may be wired or wireless, and may be BAN, PAN, LAN, WAN, or home networks.
1. A device for use with a first wireless network in a building and for use with a server external to the building, the device comprising: an antenna for communication over the first wireless network; a wireless transceiver coupled to the antenna for transmitting digital data to, and for receiving digital data from, the first wireless network; a video camera for providing video data; a motion detector for sensing a person motion; a sounder for emitting sound waves; a software and a processor for executing the software, the processor is coupled to control the wireless transceiver, the video camera, the sounder, and the motion detector; a battery for powering the device; and a single enclosure housing the antenna, the wireless transceiver, the video camera, the motion detector, and the battery, wherein the device is operative to transmit a first message to the server over the Internet via the first wireless network in response to sensing the person motion by the motion detector, wherein the device is operative to transmit the video data to the server over the Internet via the first wireless network, wherein the device is operative to receive voice data from the server over the Internet via the first wireless network, and to emit the received voice data by the sounder, and wherein the single enclosure is configured to be mounted on a wall in the building. 2. The device according to claim 1, wherein the first wireless network is using an unlicensed radio frequency band that is an Industrial, Scientific and Medical (ISM) radio band. 3. The device according to claim 1, wherein the first wireless network is a Wireless Personal Area Network (WPAN), the antenna is a WPAN antenna, and the wireless transceiver is a WPAN modem. 4. The device according to claim 3, wherein the WPAN is according to, is based on, or is compatible with, Bluetooth™ or IEEE 802.15.1-2005 standard, or wherein the WPAN is a wireless control network that is according to, based on, or complaint with, Zigbee™, IEEE 802.15.4-2003, or Z-Wave™ standard. 5. The device according to claim 1, wherein the first wireless network is a Wireless Local Area Network (WLAN), the antenna is a WLAN antenna, and the wireless transceiver is a WLAN modem. 6. The device according to claim 5, wherein the WLAN is according to, is based on, or is compatible with, IEEE 802.11-2012, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, or IEEE 802.11ac standard. 7. The device according to claim 1, wherein the first wireless network is a cellular telephone network, the antenna is a cellular telephone network antenna, and the wireless transceiver is a cellular telephone network modem. 8. The device according to claim 7, wherein the cellular telephone network is according to, is based on, or is compatible with, a Third Generation (3G) network that uses Universal Mobile Telecommunications System (UMTS) UMTS, Wideband Code Division Multiple Access (W-CDMA) W-CDMA UMTS, High Speed Packet Access (HSPA) HSPA, UMTS Time-Division Duplexing (TDD) TDD, CDMA2000 1×RTT, Evolution—Data Optimized (EV-DO) EV-DO, or Global System for Mobile communications (GSM) GSM, Enhanced Data rates for GSM Evolution (EDGE) EDGE-Evolution, or wherein the cellular telephone network is according to, is based on, or is compatible with, a Fourth Generation (4G) network that uses Evolved High Speed Packet Access (HSPA+) HSPA+, Mobile Worldwide Interoperability for Microwave Access (WiMAX) WiMAX, Long-Term Evolution (LTE) LTE, LTE-Advanced, Mobile Broadband Wireless Access (MBWA) MBWA, or is based on IEEE 802.20-2008. 9. The device according to claim 1, further comprising a memory coupled to the processor that stores a digital address that uniquely identifies the device in the first wireless network or in the Internet. 10. The device according to claim 9, wherein the digital address is a locally administered addresses or a universally administered digital address. 11. The device according to claim 9, wherein the digital address is a MAC layer address that is MAC-48, EUI-48, or EUI-64 address type. 12. The device according to claim 9, wherein the digital address a layer 3 address and is static or dynamic Internet Protocol (IP) IP address that is IP Version 4 (IPv4) IPv4 or IP Version 6 (IPv6) IPv6 type address. 13. The device according to claim 9, wherein the digital address is autonomously assigned or is assigned by another device via a communication interface using Dynamic Host Configuration Protocol (DHCP) DHCP. 14. The device according to claim 1, wherein the video camera further comprises one or more optical lens for focusing the received light and to guide a captured image, and wherein the video camera is based on, or using, photoelectric element that is based on Charge-Coupled Device (CCD) or a Complementary Metal-Oxide Semiconductor (CMOS) element. 15. The device according to claim 14, wherein the video camera captures visible light images. 16. The device according to claim 15, wherein the video camera further captures invisible light images. 17. The device according to claim 16, wherein the invisible light comprises infrared, ultraviolet, X-rays, or gamma rays. 18. The device according to claim 1, wherein the video data is using, is according to, or is compatible with, a digital video format. 19. The device according to claim 18, wherein the digital video format is based on one out of: TIFF (Tagged Image File Format), RAW format, AVI, DV, MOV, WMV, MP4, DCF (Design Rule for Camera Format), ITU-T H.261, ITU-T H.263, ITU-T H.264, ITU-T CCIR 601, ASF, Exif (Exchangeable Image File Format), and DPOF (Digital Print Order Format) standards. 20. The device according to claim 18, wherein the video data is using, is according to, or is compatible with, Standard-Definition (SD) or High-Definition (HD) standard. 21. The device according to claim 20, wherein the video data is using, is according to, or is compatible with, High-Definition (HD) standard that is using, is according to, or is compatible with, 1,280×720 pixels (720p) or 1,920×1,080 pixels (1080i/1080p). 22. The device according to claim 1, further comprising a intraframe or interframe compression based video compressor coupled to the video camera for lossy or non-lossy compressing the video data. 23. The device according to claim 22, wherein the compression uses, or is based on, a standard compression algorithm which is one or more out of JPEG (Joint Photographic Experts Group) and MPEG (Moving Picture Experts Group), ITU-T H.261, ITU-T H.263, ITU-T H.264 and ITU-T CCIR 601. 24. The device according to claim 1, wherein the device is mountable for capturing video external to the building. 25. The device according to claim 24, wherein the device is mountable for detecting or viewing a person at a door in the building. 26. The device according to claim 1, wherein the motion detector comprises an acoustic sensor for detecting the motion using sound. 27. The device according to claim 1, wherein the motion detector comprises an optical sensor for detecting the motion using opacity. 28. The device according to claim 1, wherein the motion detector comprises a magnetic sensor for detecting the motion using magnetism or geomagnetism. 29. The device according to claim 1, wherein the motion detector comprises energy emitter and sensor for sensing a reflected energy. 30. The device according to claim 29, wherein the transmitted energy comprises sound or ultrasound waves, or wherein the transmitted energy comprises electromagnetic waves, laser, or microwaves, and the motion detector comprises a radar. 31. The device according to claim 29, wherein the transmitted energy comprises visible or invisible light. 32. The device according to claim 1, wherein the motion detector comprises a Passive Infrared sensors (PIR), or an ultrasonic-waves sensor. 33. The device according to claim 1, wherein the motion detector is a directional detector. 34. The device according to claim 1, wherein the motion detector is mountable for detecting motion external to the building. 35. The device according to claim 1, further comprising a light source that emits light for illumination or indication coupled to be activated by the processor and powered by the battery. 36. The device according to claim 35, wherein the light source emits non-visible light. 37. The device according to claim 36, wherein the non-visible light is infrared, ultraviolet, X-rays, or gamma rays. 38. The device according to claim 35, wherein the light source consists of, or comprises, a lamp, an incandescent lamp, a gas discharge lamp, a fluorescent lamp, a Solid-State Lighting (SSL), a Light Emitting Diode (LED), an Organic LED (OLED), a polymer LED (PLED), or a laser diode. 39. The device according to claim 1, wherein the battery comprises a rechargeable battery. 40. The device according to claim 39, further comprising a battery compartment for housing the battery, and a connector for connecting to a battery charger for charging the battery. 41. The device according to claim 1, wherein the sounder is operative for emitting omnidirectional, unidirectional, or bidirectional pattern, audible or inaudible, sound waves. 42. The device according to claim 1, wherein the sounder comprises an electromagnetic loudspeaker, a piezoelectric speaker, an electrostatic loudspeaker (ESL), a ribbon or planar magnetic loudspeaker, or a bending wave loudspeaker. 43. The device according to claim 1, wherein the sounder is operative to emit a sound of a bell, a buzzer, a chime, a whistle, or a ringer. 44. The device according to claim 1, further comprising a memory that stores digital audio content, and wherein the sounder is further operative to play the digital audio content. 45. The device according to claim 44, wherein the digital audio content comprises pre-recorded or synthesized human voice. 46. The device according to claim 45, wherein the digital audio content comprises syllable, a word, a phrase, a sentence, a short story; or a long story. 47. The device according to claim 45, further comprising a hardware or software speech synthesizer for playing the human voice, and wherein the speech synthesizer is a concatenative type that uses, or is based on, unit selection, diphone synthesis, or domain-specific synthesis. 48. The device according to claim 45, further comprising a hardware or software speech synthesizer for playing the human voice, and wherein the speech synthesizer is a formant type, that uses, or is based on, articulatory synthesis or Hidden Markov Models (HMM). 49. The device according to claim 44, wherein the digital audio content comprises music. 50. The device according to claim 49, wherein the music comprises emulation of a music instrument. 51. The device according to claim 1, further comprising an actuator and an electrically actuated switch coupled for connecting electric power to the actuator, wherein the electrically actuated switch is actuated in response to the motion detector or the video data, or in response to command received from the server. 52. The device according to claim 51, wherein the electrically actuated switch is based on an electrical circuit that comprises an open collector transistor, an open drain transistor, a thyristor, a TRIAC, or an opto-isolator. 53. The device according to claim 51, wherein the electrically actuated switch is coupled for connecting electric power from the battery to the actuator. 54. The device according to claim 1, further comprising a motion actuator coupled to the processor to be controlled or activated in response to the motion detector or the video data, or in response to command received from the server. 55. The device according to claim 54, wherein the motion actuator causes linear or rotary motion, and the device further comprising a conversion mechanism for respectfully converting to rotary or linear motion based on a screw, a wheel and axle, or a cam. 56. The device according to claim 54, wherein the motion actuator consists of, or comprises, a pneumatic actuator, hydraulic actuator, or electrical actuator. 57. The device according to claim 54, wherein the motion actuator consists of, or comprises, an electrical motor. 58. The device according to claim 57, wherein the electrical motor is a brushed motor, a brushless motor, or an uncommutated DC motor. 59. The device according to claim 58, wherein the electrical motor is a DC stepper motor that is a Permanent Magnet (PM) motor, a Variable reluctance (VR) motor, or a hybrid synchronous stepper motor. 60. The device according to claim 57, wherein the electrical motor is an AC motor that is an induction motor, a synchronous motor, or an eddy current motor. 61. The device according to claim 60, wherein the AC motor is a single-phase AC induction motor, a two-phase AC servo motor, or a three-phase AC synchronous motor, and the AC motor is a split-phase motor, a capacitor-start motor, or a Permanent-Split Capacitor (PSC) motor. 62. The device according to claim 54, wherein the motion actuator is part of, or integrated with, an electronic door lock. 63. The device according to claim 1, wherein the single enclosure is fixedly mountable or attachable onto exterior surface or wall of the building. 64. The device according to claim 1, wherein the building comprises a house, school, store, factory, residential house, apartment, trailer, motor home, or office. 65. The device according to claim 1, wherein the single enclosure consists of, comprises, or is integrated with, an electrical outlet or a plug-in module that is pluggable to the outlet. 66. The device according to claim 1, further being be part of, integrated with, or coupled to, a door phone, intercom, doorbell. electronic door lock, or garage doors opener. 67. The device according to claim 1, further comprising a human operated switch coupled to the processor, wherein the device is further operative to transmit a second message to the server over the Internet via the first wireless network in response to the operation of the human operated switch. 68. The device according to claim 67, wherein the human operated switch comprises, or consists of, a tactile sensor that is sensitive to force, pressure, or human touch. 69. A system comprising the device according to claim 1 and the server, wherein the device serves as a client in a client-server model. 70. The system according to claim 69, wherein the server is operative to store the video data. received from the device. 71. The system according to claim 69, further comprising an image processor for processing the video data. 72. The system according to claim 71, wherein the server comprises the image processor. 73. The system according to claim 71, wherein the image processor is operative for face detection, face recognition, gesture recognition, compression or de-compression, or motion sensing of the video data. 74. The system according to claim 71, wherein the image processor is operative for Video Content Analysis (VCA). 75. The system according to claim 74, wherein the VCA includes Video Motion Detection (VMD), video tracking, egomotion estimation, identification, behavior analysis, situation awareness, dynamic masking, motion detection, object detection, face recognition, automatic number plate recognition, tamper detection, video tracking, or pattern recognition. 76. The system according to claim 69, for use with a mobile device external to the building, the mobile device comprises a display for displaying the video data and a microphone for capturing voice data, and wherein the server is operative to communicate with the mobile device over the Internet via a second wireless network. 77. The system according to claim 76, further comprising the mobile device. 78. The system according to claim 76 wherein in response to the received video data or first message from the device, the server is operative to transmit a notification to the mobile device over the Internet via the second wireless network. 79. The system according to claim 78, wherein in response to the received video data or first message from the device, the server is operative to transmit the video data to the mobile device over the Internet via the second wireless network for displaying by the display of the portable device. 80. The system according to claim 79, wherein the video data is displayed on the display of the mobile device in real-time or in near-real-time. 81. The system according to claim 78, wherein in response to the received video data or first message from the device, the server is operative to receive voice data from the mobile device over the Internet via the second wireless network and to transmit the received voice data to the first device for sounding by the sounder therein. 82. The system according to claim 78, further operative for viewing by the display a person that is at the door of the building. 83. The system according to claim 76, wherein the mobile device comprises, or consists of, a. mobile phone or a smartphone, and wherein the second wireless network is based on, or comprises, a WLAN or cellular telephone network.
A system and method in a building or vehicle for an actuator operation in response to a sensor according to a control logic, the system comprising a router or a gateway communicating with a device associated with the sensor and a device associated with the actuator over in-building or in-vehicle networks, and an external Internet-connected control server associated with the control logic implementing a PID closed linear control loop and communicating with the router over external network for controlling the in-building or in-vehicle phenomenon. The sensor may be a microphone or a camera, and the system may include voice or image processing as part of the control logic. A redundancy is used by using multiple sensors or actuators, or by using multiple data paths over the building or vehicle internal or external communication. The networks may be wired or wireless, and may be BAN, PAN, LAN, WAN, or home networks.1. A device for use with a first wireless network in a building and for use with a server external to the building, the device comprising: an antenna for communication over the first wireless network; a wireless transceiver coupled to the antenna for transmitting digital data to, and for receiving digital data from, the first wireless network; a video camera for providing video data; a motion detector for sensing a person motion; a sounder for emitting sound waves; a software and a processor for executing the software, the processor is coupled to control the wireless transceiver, the video camera, the sounder, and the motion detector; a battery for powering the device; and a single enclosure housing the antenna, the wireless transceiver, the video camera, the motion detector, and the battery, wherein the device is operative to transmit a first message to the server over the Internet via the first wireless network in response to sensing the person motion by the motion detector, wherein the device is operative to transmit the video data to the server over the Internet via the first wireless network, wherein the device is operative to receive voice data from the server over the Internet via the first wireless network, and to emit the received voice data by the sounder, and wherein the single enclosure is configured to be mounted on a wall in the building. 2. The device according to claim 1, wherein the first wireless network is using an unlicensed radio frequency band that is an Industrial, Scientific and Medical (ISM) radio band. 3. The device according to claim 1, wherein the first wireless network is a Wireless Personal Area Network (WPAN), the antenna is a WPAN antenna, and the wireless transceiver is a WPAN modem. 4. The device according to claim 3, wherein the WPAN is according to, is based on, or is compatible with, Bluetooth™ or IEEE 802.15.1-2005 standard, or wherein the WPAN is a wireless control network that is according to, based on, or complaint with, Zigbee™, IEEE 802.15.4-2003, or Z-Wave™ standard. 5. The device according to claim 1, wherein the first wireless network is a Wireless Local Area Network (WLAN), the antenna is a WLAN antenna, and the wireless transceiver is a WLAN modem. 6. The device according to claim 5, wherein the WLAN is according to, is based on, or is compatible with, IEEE 802.11-2012, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, or IEEE 802.11ac standard. 7. The device according to claim 1, wherein the first wireless network is a cellular telephone network, the antenna is a cellular telephone network antenna, and the wireless transceiver is a cellular telephone network modem. 8. The device according to claim 7, wherein the cellular telephone network is according to, is based on, or is compatible with, a Third Generation (3G) network that uses Universal Mobile Telecommunications System (UMTS) UMTS, Wideband Code Division Multiple Access (W-CDMA) W-CDMA UMTS, High Speed Packet Access (HSPA) HSPA, UMTS Time-Division Duplexing (TDD) TDD, CDMA2000 1×RTT, Evolution—Data Optimized (EV-DO) EV-DO, or Global System for Mobile communications (GSM) GSM, Enhanced Data rates for GSM Evolution (EDGE) EDGE-Evolution, or wherein the cellular telephone network is according to, is based on, or is compatible with, a Fourth Generation (4G) network that uses Evolved High Speed Packet Access (HSPA+) HSPA+, Mobile Worldwide Interoperability for Microwave Access (WiMAX) WiMAX, Long-Term Evolution (LTE) LTE, LTE-Advanced, Mobile Broadband Wireless Access (MBWA) MBWA, or is based on IEEE 802.20-2008. 9. The device according to claim 1, further comprising a memory coupled to the processor that stores a digital address that uniquely identifies the device in the first wireless network or in the Internet. 10. The device according to claim 9, wherein the digital address is a locally administered addresses or a universally administered digital address. 11. The device according to claim 9, wherein the digital address is a MAC layer address that is MAC-48, EUI-48, or EUI-64 address type. 12. The device according to claim 9, wherein the digital address a layer 3 address and is static or dynamic Internet Protocol (IP) IP address that is IP Version 4 (IPv4) IPv4 or IP Version 6 (IPv6) IPv6 type address. 13. The device according to claim 9, wherein the digital address is autonomously assigned or is assigned by another device via a communication interface using Dynamic Host Configuration Protocol (DHCP) DHCP. 14. The device according to claim 1, wherein the video camera further comprises one or more optical lens for focusing the received light and to guide a captured image, and wherein the video camera is based on, or using, photoelectric element that is based on Charge-Coupled Device (CCD) or a Complementary Metal-Oxide Semiconductor (CMOS) element. 15. The device according to claim 14, wherein the video camera captures visible light images. 16. The device according to claim 15, wherein the video camera further captures invisible light images. 17. The device according to claim 16, wherein the invisible light comprises infrared, ultraviolet, X-rays, or gamma rays. 18. The device according to claim 1, wherein the video data is using, is according to, or is compatible with, a digital video format. 19. The device according to claim 18, wherein the digital video format is based on one out of: TIFF (Tagged Image File Format), RAW format, AVI, DV, MOV, WMV, MP4, DCF (Design Rule for Camera Format), ITU-T H.261, ITU-T H.263, ITU-T H.264, ITU-T CCIR 601, ASF, Exif (Exchangeable Image File Format), and DPOF (Digital Print Order Format) standards. 20. The device according to claim 18, wherein the video data is using, is according to, or is compatible with, Standard-Definition (SD) or High-Definition (HD) standard. 21. The device according to claim 20, wherein the video data is using, is according to, or is compatible with, High-Definition (HD) standard that is using, is according to, or is compatible with, 1,280×720 pixels (720p) or 1,920×1,080 pixels (1080i/1080p). 22. The device according to claim 1, further comprising a intraframe or interframe compression based video compressor coupled to the video camera for lossy or non-lossy compressing the video data. 23. The device according to claim 22, wherein the compression uses, or is based on, a standard compression algorithm which is one or more out of JPEG (Joint Photographic Experts Group) and MPEG (Moving Picture Experts Group), ITU-T H.261, ITU-T H.263, ITU-T H.264 and ITU-T CCIR 601. 24. The device according to claim 1, wherein the device is mountable for capturing video external to the building. 25. The device according to claim 24, wherein the device is mountable for detecting or viewing a person at a door in the building. 26. The device according to claim 1, wherein the motion detector comprises an acoustic sensor for detecting the motion using sound. 27. The device according to claim 1, wherein the motion detector comprises an optical sensor for detecting the motion using opacity. 28. The device according to claim 1, wherein the motion detector comprises a magnetic sensor for detecting the motion using magnetism or geomagnetism. 29. The device according to claim 1, wherein the motion detector comprises energy emitter and sensor for sensing a reflected energy. 30. The device according to claim 29, wherein the transmitted energy comprises sound or ultrasound waves, or wherein the transmitted energy comprises electromagnetic waves, laser, or microwaves, and the motion detector comprises a radar. 31. The device according to claim 29, wherein the transmitted energy comprises visible or invisible light. 32. The device according to claim 1, wherein the motion detector comprises a Passive Infrared sensors (PIR), or an ultrasonic-waves sensor. 33. The device according to claim 1, wherein the motion detector is a directional detector. 34. The device according to claim 1, wherein the motion detector is mountable for detecting motion external to the building. 35. The device according to claim 1, further comprising a light source that emits light for illumination or indication coupled to be activated by the processor and powered by the battery. 36. The device according to claim 35, wherein the light source emits non-visible light. 37. The device according to claim 36, wherein the non-visible light is infrared, ultraviolet, X-rays, or gamma rays. 38. The device according to claim 35, wherein the light source consists of, or comprises, a lamp, an incandescent lamp, a gas discharge lamp, a fluorescent lamp, a Solid-State Lighting (SSL), a Light Emitting Diode (LED), an Organic LED (OLED), a polymer LED (PLED), or a laser diode. 39. The device according to claim 1, wherein the battery comprises a rechargeable battery. 40. The device according to claim 39, further comprising a battery compartment for housing the battery, and a connector for connecting to a battery charger for charging the battery. 41. The device according to claim 1, wherein the sounder is operative for emitting omnidirectional, unidirectional, or bidirectional pattern, audible or inaudible, sound waves. 42. The device according to claim 1, wherein the sounder comprises an electromagnetic loudspeaker, a piezoelectric speaker, an electrostatic loudspeaker (ESL), a ribbon or planar magnetic loudspeaker, or a bending wave loudspeaker. 43. The device according to claim 1, wherein the sounder is operative to emit a sound of a bell, a buzzer, a chime, a whistle, or a ringer. 44. The device according to claim 1, further comprising a memory that stores digital audio content, and wherein the sounder is further operative to play the digital audio content. 45. The device according to claim 44, wherein the digital audio content comprises pre-recorded or synthesized human voice. 46. The device according to claim 45, wherein the digital audio content comprises syllable, a word, a phrase, a sentence, a short story; or a long story. 47. The device according to claim 45, further comprising a hardware or software speech synthesizer for playing the human voice, and wherein the speech synthesizer is a concatenative type that uses, or is based on, unit selection, diphone synthesis, or domain-specific synthesis. 48. The device according to claim 45, further comprising a hardware or software speech synthesizer for playing the human voice, and wherein the speech synthesizer is a formant type, that uses, or is based on, articulatory synthesis or Hidden Markov Models (HMM). 49. The device according to claim 44, wherein the digital audio content comprises music. 50. The device according to claim 49, wherein the music comprises emulation of a music instrument. 51. The device according to claim 1, further comprising an actuator and an electrically actuated switch coupled for connecting electric power to the actuator, wherein the electrically actuated switch is actuated in response to the motion detector or the video data, or in response to command received from the server. 52. The device according to claim 51, wherein the electrically actuated switch is based on an electrical circuit that comprises an open collector transistor, an open drain transistor, a thyristor, a TRIAC, or an opto-isolator. 53. The device according to claim 51, wherein the electrically actuated switch is coupled for connecting electric power from the battery to the actuator. 54. The device according to claim 1, further comprising a motion actuator coupled to the processor to be controlled or activated in response to the motion detector or the video data, or in response to command received from the server. 55. The device according to claim 54, wherein the motion actuator causes linear or rotary motion, and the device further comprising a conversion mechanism for respectfully converting to rotary or linear motion based on a screw, a wheel and axle, or a cam. 56. The device according to claim 54, wherein the motion actuator consists of, or comprises, a pneumatic actuator, hydraulic actuator, or electrical actuator. 57. The device according to claim 54, wherein the motion actuator consists of, or comprises, an electrical motor. 58. The device according to claim 57, wherein the electrical motor is a brushed motor, a brushless motor, or an uncommutated DC motor. 59. The device according to claim 58, wherein the electrical motor is a DC stepper motor that is a Permanent Magnet (PM) motor, a Variable reluctance (VR) motor, or a hybrid synchronous stepper motor. 60. The device according to claim 57, wherein the electrical motor is an AC motor that is an induction motor, a synchronous motor, or an eddy current motor. 61. The device according to claim 60, wherein the AC motor is a single-phase AC induction motor, a two-phase AC servo motor, or a three-phase AC synchronous motor, and the AC motor is a split-phase motor, a capacitor-start motor, or a Permanent-Split Capacitor (PSC) motor. 62. The device according to claim 54, wherein the motion actuator is part of, or integrated with, an electronic door lock. 63. The device according to claim 1, wherein the single enclosure is fixedly mountable or attachable onto exterior surface or wall of the building. 64. The device according to claim 1, wherein the building comprises a house, school, store, factory, residential house, apartment, trailer, motor home, or office. 65. The device according to claim 1, wherein the single enclosure consists of, comprises, or is integrated with, an electrical outlet or a plug-in module that is pluggable to the outlet. 66. The device according to claim 1, further being be part of, integrated with, or coupled to, a door phone, intercom, doorbell. electronic door lock, or garage doors opener. 67. The device according to claim 1, further comprising a human operated switch coupled to the processor, wherein the device is further operative to transmit a second message to the server over the Internet via the first wireless network in response to the operation of the human operated switch. 68. The device according to claim 67, wherein the human operated switch comprises, or consists of, a tactile sensor that is sensitive to force, pressure, or human touch. 69. A system comprising the device according to claim 1 and the server, wherein the device serves as a client in a client-server model. 70. The system according to claim 69, wherein the server is operative to store the video data. received from the device. 71. The system according to claim 69, further comprising an image processor for processing the video data. 72. The system according to claim 71, wherein the server comprises the image processor. 73. The system according to claim 71, wherein the image processor is operative for face detection, face recognition, gesture recognition, compression or de-compression, or motion sensing of the video data. 74. The system according to claim 71, wherein the image processor is operative for Video Content Analysis (VCA). 75. The system according to claim 74, wherein the VCA includes Video Motion Detection (VMD), video tracking, egomotion estimation, identification, behavior analysis, situation awareness, dynamic masking, motion detection, object detection, face recognition, automatic number plate recognition, tamper detection, video tracking, or pattern recognition. 76. The system according to claim 69, for use with a mobile device external to the building, the mobile device comprises a display for displaying the video data and a microphone for capturing voice data, and wherein the server is operative to communicate with the mobile device over the Internet via a second wireless network. 77. The system according to claim 76, further comprising the mobile device. 78. The system according to claim 76 wherein in response to the received video data or first message from the device, the server is operative to transmit a notification to the mobile device over the Internet via the second wireless network. 79. The system according to claim 78, wherein in response to the received video data or first message from the device, the server is operative to transmit the video data to the mobile device over the Internet via the second wireless network for displaying by the display of the portable device. 80. The system according to claim 79, wherein the video data is displayed on the display of the mobile device in real-time or in near-real-time. 81. The system according to claim 78, wherein in response to the received video data or first message from the device, the server is operative to receive voice data from the mobile device over the Internet via the second wireless network and to transmit the received voice data to the first device for sounding by the sounder therein. 82. The system according to claim 78, further operative for viewing by the display a person that is at the door of the building. 83. The system according to claim 76, wherein the mobile device comprises, or consists of, a. mobile phone or a smartphone, and wherein the second wireless network is based on, or comprises, a WLAN or cellular telephone network.
2,400
9,264
9,264
15,898,103
2,424
Disclosed are various embodiments for associating and synchronizing extrinsic data with video content at particular points of time in the video content. In one embodiment, an application identifies a video content feature currently being presented via a display device. A current time in the video content feature are determined. Performers potentially depicted in the video content feature at the current time are determined. The application then generates a user interface configured to receive a user selection of a particular performer from the performers, where the user selection indicates that the particular performer is depicted in the video content feature at the current time.
1. A system, comprising: at least one computing device; and at least one application executable in the at least one computing device, wherein when executed the at least one application causes the at least one computing device to at least: identify a video content feature currently being presented via a display device; determine a current time in the video content feature; determine a plurality of performers potentially depicted in the video content feature at the current time; and generate a user interface configured to receive a user selection of a particular performer from the plurality of performers, the user selection indicating that the particular performer is depicted in the video content feature at the current time. 2. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least identify the video content feature based at least in part on audio fingerprinting. 3. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least determine the plurality of performers according to existing associations of the plurality of performers with the video content feature. 4. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least render the user interface on another display device. 5. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least render the video content feature and the user interface together on the display device. 6. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least: receive the user selection via the user interface; and validate the user selection based at least in part on receiving a confirmation from a different user that the user selection is correct. 7. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least: receive the user selection via the user interface; and validate the user selection based at least in part on receiving another user selection of the particular performer by a different user relative to the current time. 8. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least: receive the user selection via the user interface; and validate the user selection based at least in part on a user reputation score associated with the user selection. 9. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least: receive the user selection via the user interface; and record an association between the particular performer and the current time in the video content feature as an extrinsic data-time association in a data store. 10. A method, comprising: identifying, via at least one of one or more computing devices, a video content feature currently being presented via a display device; determining, via at least one of the one or more computing devices, a current time in the video content feature; determining, via at least one of the one or more computing devices, a plurality of performers potentially depicted in the video content feature at the current time; and generating, via at least one of the one or more computing devices, a user interface configured to receive a user selection of a particular performer from the plurality of performers, the user selection indicating that the particular performer is depicted in the video content feature at the current time. 11. The method of claim 10, further comprising identifying, via at least one of the one or more computing devices, the video content feature based at least in part on audio fingerprinting. 12. The method of claim 10, further comprising determining, via at least one of the one or more computing devices, the plurality of performers according to existing associations of the plurality of performers with the video content feature. 13. The method of claim 10, further comprising rendering, via at least one of the one or more computing devices, the user interface on another display device. 14. The method of claim 10, further comprising rendering, via at least one of the one or more computing devices, the video content feature and the user interface together on the display device. 15. The method of claim 10, further comprising: receiving, via at least one of the one or more computing devices, the user selection via the user interface; and validating, via at least one of the one or more computing devices, the user selection based at least in part on receiving a confirmation from a different user that the user selection is correct. 16. The method of claim 10, further comprising: receiving, via at least one of the one or more computing devices, the user selection via the user interface; and validating, via at least one of the one or more computing devices, the user selection based at least in part on receiving another user selection of the particular performer by a different user relative to the current time. 17. The method of claim 10, further comprising: receiving, via at least one of the one or more computing devices, the user selection via the user interface; and validating, via at least one of the one or more computing devices, the user selection based at least in part on a user reputation score associated with the user selection. 18. The method of claim 10, further comprising: receiving, via at least one of the one or more computing devices, the user selection via the user interface; and recording, via at least one of the one or more computing devices, an association between the particular performer and the current time in the video content feature as an extrinsic data-time association in a data store. 19. A non-transitory computer-readable medium embodying at least one application executable in at least one computing device, wherein when executed the at least one application causes the at least one computing device to at least: identify a video content feature currently being presented via a display device; determine a current time in the video content feature; determine a plurality of performers potentially depicted in the video content feature at the current time; and generate a user interface configured to receive a user selection of a particular performer from the plurality of performers, the user selection indicating that the particular performer is depicted in the video content feature at the current time. 20. The non-transitory computer-readable medium of claim 19, wherein when executed the at least one application further causes the at least one computing device to at least: receive the user selection via the user interface; and validate the user selection based at least in part on at least one of: a confirmation from a different user that the user selection is correct; another user selection of the particular performer by a different user relative to the current time; or a user reputation score associated with the user selection.
Disclosed are various embodiments for associating and synchronizing extrinsic data with video content at particular points of time in the video content. In one embodiment, an application identifies a video content feature currently being presented via a display device. A current time in the video content feature are determined. Performers potentially depicted in the video content feature at the current time are determined. The application then generates a user interface configured to receive a user selection of a particular performer from the performers, where the user selection indicates that the particular performer is depicted in the video content feature at the current time.1. A system, comprising: at least one computing device; and at least one application executable in the at least one computing device, wherein when executed the at least one application causes the at least one computing device to at least: identify a video content feature currently being presented via a display device; determine a current time in the video content feature; determine a plurality of performers potentially depicted in the video content feature at the current time; and generate a user interface configured to receive a user selection of a particular performer from the plurality of performers, the user selection indicating that the particular performer is depicted in the video content feature at the current time. 2. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least identify the video content feature based at least in part on audio fingerprinting. 3. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least determine the plurality of performers according to existing associations of the plurality of performers with the video content feature. 4. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least render the user interface on another display device. 5. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least render the video content feature and the user interface together on the display device. 6. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least: receive the user selection via the user interface; and validate the user selection based at least in part on receiving a confirmation from a different user that the user selection is correct. 7. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least: receive the user selection via the user interface; and validate the user selection based at least in part on receiving another user selection of the particular performer by a different user relative to the current time. 8. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least: receive the user selection via the user interface; and validate the user selection based at least in part on a user reputation score associated with the user selection. 9. The system of claim 1, wherein when executed the at least one application further causes the at least one computing device to at least: receive the user selection via the user interface; and record an association between the particular performer and the current time in the video content feature as an extrinsic data-time association in a data store. 10. A method, comprising: identifying, via at least one of one or more computing devices, a video content feature currently being presented via a display device; determining, via at least one of the one or more computing devices, a current time in the video content feature; determining, via at least one of the one or more computing devices, a plurality of performers potentially depicted in the video content feature at the current time; and generating, via at least one of the one or more computing devices, a user interface configured to receive a user selection of a particular performer from the plurality of performers, the user selection indicating that the particular performer is depicted in the video content feature at the current time. 11. The method of claim 10, further comprising identifying, via at least one of the one or more computing devices, the video content feature based at least in part on audio fingerprinting. 12. The method of claim 10, further comprising determining, via at least one of the one or more computing devices, the plurality of performers according to existing associations of the plurality of performers with the video content feature. 13. The method of claim 10, further comprising rendering, via at least one of the one or more computing devices, the user interface on another display device. 14. The method of claim 10, further comprising rendering, via at least one of the one or more computing devices, the video content feature and the user interface together on the display device. 15. The method of claim 10, further comprising: receiving, via at least one of the one or more computing devices, the user selection via the user interface; and validating, via at least one of the one or more computing devices, the user selection based at least in part on receiving a confirmation from a different user that the user selection is correct. 16. The method of claim 10, further comprising: receiving, via at least one of the one or more computing devices, the user selection via the user interface; and validating, via at least one of the one or more computing devices, the user selection based at least in part on receiving another user selection of the particular performer by a different user relative to the current time. 17. The method of claim 10, further comprising: receiving, via at least one of the one or more computing devices, the user selection via the user interface; and validating, via at least one of the one or more computing devices, the user selection based at least in part on a user reputation score associated with the user selection. 18. The method of claim 10, further comprising: receiving, via at least one of the one or more computing devices, the user selection via the user interface; and recording, via at least one of the one or more computing devices, an association between the particular performer and the current time in the video content feature as an extrinsic data-time association in a data store. 19. A non-transitory computer-readable medium embodying at least one application executable in at least one computing device, wherein when executed the at least one application causes the at least one computing device to at least: identify a video content feature currently being presented via a display device; determine a current time in the video content feature; determine a plurality of performers potentially depicted in the video content feature at the current time; and generate a user interface configured to receive a user selection of a particular performer from the plurality of performers, the user selection indicating that the particular performer is depicted in the video content feature at the current time. 20. The non-transitory computer-readable medium of claim 19, wherein when executed the at least one application further causes the at least one computing device to at least: receive the user selection via the user interface; and validate the user selection based at least in part on at least one of: a confirmation from a different user that the user selection is correct; another user selection of the particular performer by a different user relative to the current time; or a user reputation score associated with the user selection.
2,400
9,265
9,265
16,122,294
2,436
Systems and methods provide access to location-restricted resources outside of recognized locations. An example, a method includes receiving a request for a controlled access resource from a client device and determining that the request is not associated with a recognized location but that state data exists for the client device identifier. In response to identifying the state data, the method includes generating a link for accessing the controlled access resource at a server, generating an encrypted token including a timestamp, a random number, and licensed resource information from the state data, including the encrypted token in the link, and providing the link to the client device. The client device uses the link to request the controlled access resource from the server, which determines that the request includes the token, determines that the token is not expired, and provides the controlled access resource to the client device.
1. A method comprising: receiving a request for a controlled access resource from a client device, the request including a client device identifier; determining that the request is not associated with a recognized location; identifying state data for the client device identifier; generating a link for accessing the controlled access resource at a server; generating an encrypted token, the encrypted token including a timestamp, a random number, and licensed resource information from the state data; including the encrypted token in the link; and providing the link to the client device, the client device using the link to request the controlled access resource. 2. The method of claim 1, wherein the request is a first request and the controlled access resource is a first controlled access resource and prior to receiving the first request the method further comprises: receiving a second request for a second controlled access resource from the client device, the second request including the client device identifier; determining that the second request is associated with a recognized location; generating the state data for the client device; and storing the state data in a memory. 3. The method of claim 1, wherein the state data includes a time stamp, the client device identifier, and licensed resource information. 4. The method of claim 1, wherein the licensed resource information represents the recognized location. 5. The method of claim 4, wherein the licensed resource information represents the recognized location and controlled resources available to the recognized location. 6. The method of claim 1, wherein the recognized location is a domain name. 7. The method of claim 1, wherein the recognized location is an Internet Protocol (IP) address. 8. The method of claim 1, wherein the request is a query and the controlled access resource is a resource responsive to the query. 9. The method of claim 1, wherein the client device identifier is a user account. 10. The method of claim 1, wherein the client device using the link to request the controlled access resource includes, at a controlled resource server: receiving the link in a request for the controlled access resource; identifying the token in the link; decrypting the token; verifying the token by determining that the token has not expired based on the timestamp and determining that the controlled access resource is available based on the licensed resource information; and providing the controlled access resource to the client device responsive to the token being verified. 11. A system comprising: at least one processor; a datastore storing state data records for client devices; and memory storing instructions that, when executed by the at least one processor, cause the system to perform operations including: receiving a query from a client device, the client device having a device identifier, determining that at least one resource responsive to the query is a controlled access resource, in response to determining that the query is associated with a recognized location for the controlled access resource: generating a link to the controlled access resource, and generating a state data record for the client device in the datastore, the state data including the client device identifier, a timestamp, and an association with the recognized location, in response to determining that the query is not associated with a recognized location: identifying an unexpired state data record in the datastore for the client device identifier, in response to identifying the unexpired state data record, generating a token and including the token in a link to the controlled access resource, the token including a random number, a timestamp, and licensed resource information from the state data record, and in response to failing to identify the state data record in the datastore for the client device identifier, generating a link without the token, and returning a search result for the query to the client device, the search result including the link to the resource, wherein the client device uses the link to the resource to request the resource from a controlled access server, the controlled access server configured to provide access to resources from requests associated with recognized locations. 12. The system of claim 11, wherein in providing access to resources from requests associated with recognized locations the controlled access server is configured to: receive a link to a controlled access resource from a particular client device, the link having an associated location; determine whether the location is a recognized location; in response to determining that the location is a recognized location, provide the controlled access resource; and in response to determining that the location is not a recognized location: in response to determining that the link includes an unexpired token; provide the controlled access resource, and in response to determining that the link lacks a token or that a token included in the link has expired, denying access to the controlled access resource. 13. The system of claim 12, wherein the token further includes an IP subnet of an IP address for the request and the controlled access server is further configured to, in response to determining that the location is not a recognized location and the link includes an unexpired token: determine whether an IP subnet of the particular client device matches the IP subnet in the token; and in response to determining that the IP subnet does not match, deny access to the controlled access resource. 14. The system of claim 11, wherein the recognized location represents a geolocation. 15. The system of claim 11, wherein the recognized location is an IP address. 16. The system of claim 11, wherein the token is encrypted before inclusion into the link. 17. A method comprising: receiving a request for a controlled access resource from a client device, the request having a location; determining that the location is not a recognized location; determining that the request includes a token, the token including a timestamp, a random number, and licensed resource information; determining that the token is not expired based on the timestamp; determining that a resource identified by the licensed resource information matches the requested resource; and providing the controlled access resource to the client device, wherein the client device would otherwise be denied access to the controlled access resource. 18. The method of claim 17, wherein the token is encrypted and the method further includes decrypting the token. 19. The method of claim 17, wherein the token further includes an IP subnet and the method further includes determining that an IP address for the client device has an IP subnet that matches the IP subnet included in the token. 20. The method of claim 17, the method further including: incrementing a counter for the token, the token being identified by the random number; and determining that the counter for the token has not reached a threshold.
Systems and methods provide access to location-restricted resources outside of recognized locations. An example, a method includes receiving a request for a controlled access resource from a client device and determining that the request is not associated with a recognized location but that state data exists for the client device identifier. In response to identifying the state data, the method includes generating a link for accessing the controlled access resource at a server, generating an encrypted token including a timestamp, a random number, and licensed resource information from the state data, including the encrypted token in the link, and providing the link to the client device. The client device uses the link to request the controlled access resource from the server, which determines that the request includes the token, determines that the token is not expired, and provides the controlled access resource to the client device.1. A method comprising: receiving a request for a controlled access resource from a client device, the request including a client device identifier; determining that the request is not associated with a recognized location; identifying state data for the client device identifier; generating a link for accessing the controlled access resource at a server; generating an encrypted token, the encrypted token including a timestamp, a random number, and licensed resource information from the state data; including the encrypted token in the link; and providing the link to the client device, the client device using the link to request the controlled access resource. 2. The method of claim 1, wherein the request is a first request and the controlled access resource is a first controlled access resource and prior to receiving the first request the method further comprises: receiving a second request for a second controlled access resource from the client device, the second request including the client device identifier; determining that the second request is associated with a recognized location; generating the state data for the client device; and storing the state data in a memory. 3. The method of claim 1, wherein the state data includes a time stamp, the client device identifier, and licensed resource information. 4. The method of claim 1, wherein the licensed resource information represents the recognized location. 5. The method of claim 4, wherein the licensed resource information represents the recognized location and controlled resources available to the recognized location. 6. The method of claim 1, wherein the recognized location is a domain name. 7. The method of claim 1, wherein the recognized location is an Internet Protocol (IP) address. 8. The method of claim 1, wherein the request is a query and the controlled access resource is a resource responsive to the query. 9. The method of claim 1, wherein the client device identifier is a user account. 10. The method of claim 1, wherein the client device using the link to request the controlled access resource includes, at a controlled resource server: receiving the link in a request for the controlled access resource; identifying the token in the link; decrypting the token; verifying the token by determining that the token has not expired based on the timestamp and determining that the controlled access resource is available based on the licensed resource information; and providing the controlled access resource to the client device responsive to the token being verified. 11. A system comprising: at least one processor; a datastore storing state data records for client devices; and memory storing instructions that, when executed by the at least one processor, cause the system to perform operations including: receiving a query from a client device, the client device having a device identifier, determining that at least one resource responsive to the query is a controlled access resource, in response to determining that the query is associated with a recognized location for the controlled access resource: generating a link to the controlled access resource, and generating a state data record for the client device in the datastore, the state data including the client device identifier, a timestamp, and an association with the recognized location, in response to determining that the query is not associated with a recognized location: identifying an unexpired state data record in the datastore for the client device identifier, in response to identifying the unexpired state data record, generating a token and including the token in a link to the controlled access resource, the token including a random number, a timestamp, and licensed resource information from the state data record, and in response to failing to identify the state data record in the datastore for the client device identifier, generating a link without the token, and returning a search result for the query to the client device, the search result including the link to the resource, wherein the client device uses the link to the resource to request the resource from a controlled access server, the controlled access server configured to provide access to resources from requests associated with recognized locations. 12. The system of claim 11, wherein in providing access to resources from requests associated with recognized locations the controlled access server is configured to: receive a link to a controlled access resource from a particular client device, the link having an associated location; determine whether the location is a recognized location; in response to determining that the location is a recognized location, provide the controlled access resource; and in response to determining that the location is not a recognized location: in response to determining that the link includes an unexpired token; provide the controlled access resource, and in response to determining that the link lacks a token or that a token included in the link has expired, denying access to the controlled access resource. 13. The system of claim 12, wherein the token further includes an IP subnet of an IP address for the request and the controlled access server is further configured to, in response to determining that the location is not a recognized location and the link includes an unexpired token: determine whether an IP subnet of the particular client device matches the IP subnet in the token; and in response to determining that the IP subnet does not match, deny access to the controlled access resource. 14. The system of claim 11, wherein the recognized location represents a geolocation. 15. The system of claim 11, wherein the recognized location is an IP address. 16. The system of claim 11, wherein the token is encrypted before inclusion into the link. 17. A method comprising: receiving a request for a controlled access resource from a client device, the request having a location; determining that the location is not a recognized location; determining that the request includes a token, the token including a timestamp, a random number, and licensed resource information; determining that the token is not expired based on the timestamp; determining that a resource identified by the licensed resource information matches the requested resource; and providing the controlled access resource to the client device, wherein the client device would otherwise be denied access to the controlled access resource. 18. The method of claim 17, wherein the token is encrypted and the method further includes decrypting the token. 19. The method of claim 17, wherein the token further includes an IP subnet and the method further includes determining that an IP address for the client device has an IP subnet that matches the IP subnet included in the token. 20. The method of claim 17, the method further including: incrementing a counter for the token, the token being identified by the random number; and determining that the counter for the token has not reached a threshold.
2,400
9,266
9,266
15,072,775
2,419
A display system for a vehicle is disclosed. The system comprises an imager configured to capture image data in a field of view rearward relative the vehicle. The system further comprises a display device and a controller. The display device comprises a screen disposed in a passenger compartment of the vehicle. The controller is in communication with the imager and the display device. The controller is operable to process the image data to identify at least one feature. Based on a position or orientation of the at least one feature in the image data, the controller adjusts at least one of a position and an orientation of a desired view of the image data for display on the screen.
1. A display system for a vehicle comprising: an imager configured to capture image data in a field of view rearward relative to the vehicle; a display device comprising a screen disposed in a passenger compartment of the vehicle; a controller in communication with the imager and the display device, wherein the controller is operable to: process the image data to identify at least one feature; and adjust at least one of a position and an orientation of a desired view of the image data for display on the screen in response to a position or orientation of the at least one feature in the image data. 2. The display system according to claim 1, wherein the display device corresponds to a rear-view display device. 3. The display system according to claim 2, wherein the desired view corresponds to an angular offset of the image data for a rearview display device. 4. The display system according to claim 1, wherein the at least one feature comprises at least one of a vanishing point of a road and a horizon identified in the image data. 5. The display system according to claim 4, wherein the vanishing point is utilized to offset at least one of a horizontal position and a vertical position of the desired view of the image data. 6. The display system according to claim 4, wherein the at least one feature is utilized to offset at least one of a vertical position and a rotational orientation of the desired view of the image data. 7. The display system according to claim 1, wherein the controller is further operable to adjust a scale of the image data based on at least one user preference stored in a memory of the controller. 8. The display system according to claim 1, wherein the desired view corresponds to an offset of a vertical component and a horizontal component of the image data. 9. A method for displaying a rearward directed field of view for a vehicle, the method comprising: capturing image data in the field of view; processing the image data to identify at least one feature; adjusting at least one of a position and an orientation of a desired view of the image data in response a position or orientation of the at least one feature in the image data; and displaying the desired view on a rearview display of the vehicle. 10. The method according to claim 9, further comprising: receiving an input and adjusting the desired view of the image data in response to the input. 11. The method according to claim 9, wherein the at least one feature comprises at least one of a vanishing point of a road and a horizon identified in the image data. 12. The method according to claim 11, wherein the adjusting comprises offsetting at least one of a horizontal position and a vertical position of the desired view based on a location of the vanishing point in the image data. 13. The method according to claim 11, wherein the adjusting comprises offsetting a vertical position of the desired view based on a location of horizon in the image data. 14. The method according to claim 11, wherein the adjusting comprises offsetting a rotational orientation of the desired view based on an angle of the horizon in the image data. 15. The method according to claim 9, further comprising adjusting a scale of the image data based on a user preference. 16. An apparatus for displaying a rearward directed field of view for a vehicle, the apparatus comprising: a display device comprising a screen disposed in a passenger compartment of the vehicle; a controller in communication with the display device and an imager configured to capture image data in the field of view, wherein the controller is operable to: process the image data to identify at least one of a horizon and a vanishing point of a road; and adjust at least one of a position and an orientation of a desired view of the image data for display on the screen in response a position or orientation of at least one of the horizon and the vanishing point. 17. The apparatus according to claim 16, wherein the controller is configured to adjust an angular orientation of the desired view based on a slope of the horizon in the image data. 18. The apparatus according to claim 16, wherein the controller is configured to adjust a linear position of the desired view based on a position of the vanishing point. 19. The apparatus according to claim 16, wherein the controller is configured to adjust the desired view in the image data relative to a central focal point of the field of view in response to an input. 20. The apparatus according to claim 19, wherein the controller is further configured to crop the image data to define the desired view based on the input.
A display system for a vehicle is disclosed. The system comprises an imager configured to capture image data in a field of view rearward relative the vehicle. The system further comprises a display device and a controller. The display device comprises a screen disposed in a passenger compartment of the vehicle. The controller is in communication with the imager and the display device. The controller is operable to process the image data to identify at least one feature. Based on a position or orientation of the at least one feature in the image data, the controller adjusts at least one of a position and an orientation of a desired view of the image data for display on the screen.1. A display system for a vehicle comprising: an imager configured to capture image data in a field of view rearward relative to the vehicle; a display device comprising a screen disposed in a passenger compartment of the vehicle; a controller in communication with the imager and the display device, wherein the controller is operable to: process the image data to identify at least one feature; and adjust at least one of a position and an orientation of a desired view of the image data for display on the screen in response to a position or orientation of the at least one feature in the image data. 2. The display system according to claim 1, wherein the display device corresponds to a rear-view display device. 3. The display system according to claim 2, wherein the desired view corresponds to an angular offset of the image data for a rearview display device. 4. The display system according to claim 1, wherein the at least one feature comprises at least one of a vanishing point of a road and a horizon identified in the image data. 5. The display system according to claim 4, wherein the vanishing point is utilized to offset at least one of a horizontal position and a vertical position of the desired view of the image data. 6. The display system according to claim 4, wherein the at least one feature is utilized to offset at least one of a vertical position and a rotational orientation of the desired view of the image data. 7. The display system according to claim 1, wherein the controller is further operable to adjust a scale of the image data based on at least one user preference stored in a memory of the controller. 8. The display system according to claim 1, wherein the desired view corresponds to an offset of a vertical component and a horizontal component of the image data. 9. A method for displaying a rearward directed field of view for a vehicle, the method comprising: capturing image data in the field of view; processing the image data to identify at least one feature; adjusting at least one of a position and an orientation of a desired view of the image data in response a position or orientation of the at least one feature in the image data; and displaying the desired view on a rearview display of the vehicle. 10. The method according to claim 9, further comprising: receiving an input and adjusting the desired view of the image data in response to the input. 11. The method according to claim 9, wherein the at least one feature comprises at least one of a vanishing point of a road and a horizon identified in the image data. 12. The method according to claim 11, wherein the adjusting comprises offsetting at least one of a horizontal position and a vertical position of the desired view based on a location of the vanishing point in the image data. 13. The method according to claim 11, wherein the adjusting comprises offsetting a vertical position of the desired view based on a location of horizon in the image data. 14. The method according to claim 11, wherein the adjusting comprises offsetting a rotational orientation of the desired view based on an angle of the horizon in the image data. 15. The method according to claim 9, further comprising adjusting a scale of the image data based on a user preference. 16. An apparatus for displaying a rearward directed field of view for a vehicle, the apparatus comprising: a display device comprising a screen disposed in a passenger compartment of the vehicle; a controller in communication with the display device and an imager configured to capture image data in the field of view, wherein the controller is operable to: process the image data to identify at least one of a horizon and a vanishing point of a road; and adjust at least one of a position and an orientation of a desired view of the image data for display on the screen in response a position or orientation of at least one of the horizon and the vanishing point. 17. The apparatus according to claim 16, wherein the controller is configured to adjust an angular orientation of the desired view based on a slope of the horizon in the image data. 18. The apparatus according to claim 16, wherein the controller is configured to adjust a linear position of the desired view based on a position of the vanishing point. 19. The apparatus according to claim 16, wherein the controller is configured to adjust the desired view in the image data relative to a central focal point of the field of view in response to an input. 20. The apparatus according to claim 19, wherein the controller is further configured to crop the image data to define the desired view based on the input.
2,400
9,267
9,267
15,591,406
2,485
A multi-camera vehicle vision system and method. In one embodiment a map is generated about a moving vehicle. Frames of image data are provided with a series of cameras extending along a surface of the vehicle. The image data frames are processed to identify an object of interest. An object of interest is classified among a set of object types and location of an identified object of interest is determined. Object type and location information is provided to a control unit spaced apart from the cameras via a data link. Road map data is generated to illustrate changes in position of the moving vehicle along a roadway based on data other than the image data provided by the cameras. A display of the road map data is generated with the object type and location information overlaid on the road map data to indicate object location relative to the vehicle.
1. A method of generating a map about a moving vehicle comprising: providing frames of image data with a series of cameras extending along a surface of the vehicle; processing the image data frames to identify an object of interest; classifying an object of interest among a set of object types and determining location of an identified object of interest as a function of time; providing object type and location information to a central control unit spaced apart from the cameras via a data link; generating road map data to illustrate changes in position of the moving vehicle along a roadway based on data other than the image data provided by the cameras; and generating a display of the road map data with the object type and location information overlaid on the road map data to indicate object location relative to the vehicle. 2. The method of claim 1 where the step of classifying an object of interest is performed by template matching with multiple scan windows of different sizes applied through entire image data frames generated by cameras to determine whether a region in an image frame matches an object type characteristic. 3. The method of claim 1 where an object is identified in one among multiple detection zones about the vehicle and, for a given field of view angle capturing an image data frame in the detection zone, position information for the object is approximated based on the distance, that the portion the detection zone, in which the object is positioned, is from the vehicle or the relative size of the object image in the given field of view to the size of the image data frame. 4. A network based vision system operable to monitor a plurality of object detection zones in a region about a vehicle traveling over a roadway for presence or location of objects about the vehicle, the system comprising: a plurality of image acquisition devices for acquiring multiple fields of view of a scene surrounding the vehicle, each device having programmable settings, connected to transmit data and receive instructions, the image acquisition devices configurable into multiple series each comprising one or more of the image acquisition devices, a control unit connected through the network to receive data from the image acquisition devices and control configuration of the object detection zones, the control unit including a programmable microprocessor, memory, and data storage containing data and executable software which runs on the microprocessor, the memory and storage operatively connected to the microprocessor, the storage including a non-transitory computer readable medium containing program instructions representing software executable on the processor, which instructions, when executed by the processor, cause the control unit to perform a sequence of steps based on an association between each object detection zone and a series of the image acquisition devices by which the control unit: receives and applies information indicative of a detected object type or detected location from one or more of the image acquisition devices, and automatically reassigns one or more of the image acquisition devices from one series to another series based on one or more predetermined criteria. 5. The vision system of claim 4 where the program instructions base reassignment of the one or more image acquisition devices to a different series on a criterion taken from the group consisting of vehicle speed, location of a detected object relative to the vehicle, and change in vehicle direction of motion. 6. The vision system of claim 4 where the program instructions cause the control unit to apply the information to generate an overlay indicative of object type or position on a real time map of the roadway. 7. The vision system of claim 4 wherein the system operates each series of image acquisition devices to identify and classify one or more objects or the position of the one or more objects. 8. The vision system of claim 4 where reassignment of the one or more image acquisition devices from one series to another series modifies a characteristic of a detection zone while the vehicle is operating, and the characteristic is taken from the group consisting of size or shape of the detection zone, distance between a portion of the detection zone and the vehicle, captured field of view of a scene in the detection zone, field of view angle of an image acquisition device assigned to the detection zone, depth of field of an image acquisition device assigned to the detection zone, and ability to detect an object positioned in the detection zone based on image size of the object. 9. The vision system of claim 4 where the program instructions cause the control unit to reassign image acquisition devices among different ones of the series to modify ability of the system to detect, classify or track an object in response to a change in vehicle operation or a change in roadway situation about the vehicle. 10. The vision system of claim 4 where the vision system is configured to operate the image acquisition devices in four detection zones. 11. The vision system of claim 4 where the program instructions cause the system to adjust one or more settings of the image acquisition devices taken from the group comprising field of view, depth of field and pointing direction for image acquisition. 12. The vision system of claim 4 where the image acquisition devices are grouped in two dimensional array units, devices in each array unit deployable based on execution of the program instructions to automatically reassign the image acquisition devices from one series to another series. 13. A network based vision system operable to monitor a plurality of object detection zones about a vehicle traveling over a roadway for presence or location of objects about the vehicle, the system comprising: a plurality of image acquisition devices for acquiring multiple fields of view of a scene surrounding the vehicle, each device having programmable settings, connected to transmit data and receive instructions, the image acquisition devices configurable into multiple series to detect, classify, or determine the position of, an object in one of the detection zones, a control unit connected through the network to receive data from the image acquisition devices and control the shape of a first of the object detection zones based on operation of image acquisition devices in a first of the series, the control unit including a programmable microprocessor, memory, and data storage containing data and executable software which runs on the microprocessor, the memory and storage operatively connected to the microprocessor, the storage including a non-transitory computer readable medium containing program instructions representing software executable on the processor, which instructions, when executed by the processor, cause the control unit to perform a sequence of steps based on an association between each object detection zone and a series of the image acquisition devices by which the control unit: receives and applies information indicative of a detected object type or detected location from one or more of the image acquisition devices, and automatically adjusts an optical setting or a pointing direction of one or more of the image acquisition devices in the first series to alter an object detection response characteristic of the system in a portion of the first object detection zone and thereby modify the range of distances that a portion of the first object detection zone extends away from the vehicle. 14. The vision system of claim 13 where the adjustment alters the size and range of object detection in the portion of the first object detection zone. 15. The vision system of claim 13 where the adjustment in the optical setting or pointing direction of an image acquisition device in the first series is responsive to a change in vehicle operation or a change in roadway situation about the vehicle. 16. The vision system of claim 13 where the adjustment in the optical setting or pointing direction of an image acquisition device in the first series modifies the ability of the system to detect, classify or track an object. 17. The vision system of claim 13 where the adjustment in the optical setting or pointing direction of an image acquisition device in the first series modifies a characteristic of the system response due to presence of an object in the portion of the first object detection zone. 18. The vision system of claim 17 where the adjustment changes an optical setting which results in a change, in the portion of the first object detection zone, of: captured field of view of a scene in the first object detection zone, field of view angle of an image acquisition device assigned to the first object detection zone, depth of field of an image acquisition device assigned to the detection zone, or ability to detect an object positioned in the zone based on image size of the object. 19. The vision system of claim 13 where the program instructions cause the control unit to apply the information to generate an overlay indicative of object type or position on a real time map of the roadway. 20. A network based vision system operable to monitor a plurality of object detection zones about a vehicle traveling over a roadway for presence or location of objects about the vehicle, the system comprising: to detect, classify, or determine the position of, an object in one of the detection zones, and a control unit connected through the network to receive data from the image acquisition devices via a serial bus network or a video data bus, the control unit including a multi-channel digital video receiver, a programmable microprocessor, memory, and data storage containing data and executable software which runs on the microprocessor, the memory and storage operatively connected to the microprocessor, the storage including a non-transitory computer readable medium containing program instructions representing software executable on the processor, which instructions, when executed by the processor, cause the control unit to perform a sequence of steps based on an association between each object detection zone and a series of the image acquisition devices by which the control unit: receives and applies non-video information indicative of a detected object type or detected location from one or more of the image acquisition devices to generate an overlay indicative of object type or position on a real time map of the roadway; and, when a determination is made, based on execution of the program instructions, that selection criteria are met, the input selection is changed from a first mode, in which non-video information is received, to a second mode to begin assimilating multi-channel frames of camera video data. 21. The vision system of claim 20 where the data feed comprising non-video information is received via a CAN transceiver in the control unit and the multi-channel frames of camera video data are received via a High Speed video data bus compliant with an IEEE1394 serial bus architecture.
A multi-camera vehicle vision system and method. In one embodiment a map is generated about a moving vehicle. Frames of image data are provided with a series of cameras extending along a surface of the vehicle. The image data frames are processed to identify an object of interest. An object of interest is classified among a set of object types and location of an identified object of interest is determined. Object type and location information is provided to a control unit spaced apart from the cameras via a data link. Road map data is generated to illustrate changes in position of the moving vehicle along a roadway based on data other than the image data provided by the cameras. A display of the road map data is generated with the object type and location information overlaid on the road map data to indicate object location relative to the vehicle.1. A method of generating a map about a moving vehicle comprising: providing frames of image data with a series of cameras extending along a surface of the vehicle; processing the image data frames to identify an object of interest; classifying an object of interest among a set of object types and determining location of an identified object of interest as a function of time; providing object type and location information to a central control unit spaced apart from the cameras via a data link; generating road map data to illustrate changes in position of the moving vehicle along a roadway based on data other than the image data provided by the cameras; and generating a display of the road map data with the object type and location information overlaid on the road map data to indicate object location relative to the vehicle. 2. The method of claim 1 where the step of classifying an object of interest is performed by template matching with multiple scan windows of different sizes applied through entire image data frames generated by cameras to determine whether a region in an image frame matches an object type characteristic. 3. The method of claim 1 where an object is identified in one among multiple detection zones about the vehicle and, for a given field of view angle capturing an image data frame in the detection zone, position information for the object is approximated based on the distance, that the portion the detection zone, in which the object is positioned, is from the vehicle or the relative size of the object image in the given field of view to the size of the image data frame. 4. A network based vision system operable to monitor a plurality of object detection zones in a region about a vehicle traveling over a roadway for presence or location of objects about the vehicle, the system comprising: a plurality of image acquisition devices for acquiring multiple fields of view of a scene surrounding the vehicle, each device having programmable settings, connected to transmit data and receive instructions, the image acquisition devices configurable into multiple series each comprising one or more of the image acquisition devices, a control unit connected through the network to receive data from the image acquisition devices and control configuration of the object detection zones, the control unit including a programmable microprocessor, memory, and data storage containing data and executable software which runs on the microprocessor, the memory and storage operatively connected to the microprocessor, the storage including a non-transitory computer readable medium containing program instructions representing software executable on the processor, which instructions, when executed by the processor, cause the control unit to perform a sequence of steps based on an association between each object detection zone and a series of the image acquisition devices by which the control unit: receives and applies information indicative of a detected object type or detected location from one or more of the image acquisition devices, and automatically reassigns one or more of the image acquisition devices from one series to another series based on one or more predetermined criteria. 5. The vision system of claim 4 where the program instructions base reassignment of the one or more image acquisition devices to a different series on a criterion taken from the group consisting of vehicle speed, location of a detected object relative to the vehicle, and change in vehicle direction of motion. 6. The vision system of claim 4 where the program instructions cause the control unit to apply the information to generate an overlay indicative of object type or position on a real time map of the roadway. 7. The vision system of claim 4 wherein the system operates each series of image acquisition devices to identify and classify one or more objects or the position of the one or more objects. 8. The vision system of claim 4 where reassignment of the one or more image acquisition devices from one series to another series modifies a characteristic of a detection zone while the vehicle is operating, and the characteristic is taken from the group consisting of size or shape of the detection zone, distance between a portion of the detection zone and the vehicle, captured field of view of a scene in the detection zone, field of view angle of an image acquisition device assigned to the detection zone, depth of field of an image acquisition device assigned to the detection zone, and ability to detect an object positioned in the detection zone based on image size of the object. 9. The vision system of claim 4 where the program instructions cause the control unit to reassign image acquisition devices among different ones of the series to modify ability of the system to detect, classify or track an object in response to a change in vehicle operation or a change in roadway situation about the vehicle. 10. The vision system of claim 4 where the vision system is configured to operate the image acquisition devices in four detection zones. 11. The vision system of claim 4 where the program instructions cause the system to adjust one or more settings of the image acquisition devices taken from the group comprising field of view, depth of field and pointing direction for image acquisition. 12. The vision system of claim 4 where the image acquisition devices are grouped in two dimensional array units, devices in each array unit deployable based on execution of the program instructions to automatically reassign the image acquisition devices from one series to another series. 13. A network based vision system operable to monitor a plurality of object detection zones about a vehicle traveling over a roadway for presence or location of objects about the vehicle, the system comprising: a plurality of image acquisition devices for acquiring multiple fields of view of a scene surrounding the vehicle, each device having programmable settings, connected to transmit data and receive instructions, the image acquisition devices configurable into multiple series to detect, classify, or determine the position of, an object in one of the detection zones, a control unit connected through the network to receive data from the image acquisition devices and control the shape of a first of the object detection zones based on operation of image acquisition devices in a first of the series, the control unit including a programmable microprocessor, memory, and data storage containing data and executable software which runs on the microprocessor, the memory and storage operatively connected to the microprocessor, the storage including a non-transitory computer readable medium containing program instructions representing software executable on the processor, which instructions, when executed by the processor, cause the control unit to perform a sequence of steps based on an association between each object detection zone and a series of the image acquisition devices by which the control unit: receives and applies information indicative of a detected object type or detected location from one or more of the image acquisition devices, and automatically adjusts an optical setting or a pointing direction of one or more of the image acquisition devices in the first series to alter an object detection response characteristic of the system in a portion of the first object detection zone and thereby modify the range of distances that a portion of the first object detection zone extends away from the vehicle. 14. The vision system of claim 13 where the adjustment alters the size and range of object detection in the portion of the first object detection zone. 15. The vision system of claim 13 where the adjustment in the optical setting or pointing direction of an image acquisition device in the first series is responsive to a change in vehicle operation or a change in roadway situation about the vehicle. 16. The vision system of claim 13 where the adjustment in the optical setting or pointing direction of an image acquisition device in the first series modifies the ability of the system to detect, classify or track an object. 17. The vision system of claim 13 where the adjustment in the optical setting or pointing direction of an image acquisition device in the first series modifies a characteristic of the system response due to presence of an object in the portion of the first object detection zone. 18. The vision system of claim 17 where the adjustment changes an optical setting which results in a change, in the portion of the first object detection zone, of: captured field of view of a scene in the first object detection zone, field of view angle of an image acquisition device assigned to the first object detection zone, depth of field of an image acquisition device assigned to the detection zone, or ability to detect an object positioned in the zone based on image size of the object. 19. The vision system of claim 13 where the program instructions cause the control unit to apply the information to generate an overlay indicative of object type or position on a real time map of the roadway. 20. A network based vision system operable to monitor a plurality of object detection zones about a vehicle traveling over a roadway for presence or location of objects about the vehicle, the system comprising: to detect, classify, or determine the position of, an object in one of the detection zones, and a control unit connected through the network to receive data from the image acquisition devices via a serial bus network or a video data bus, the control unit including a multi-channel digital video receiver, a programmable microprocessor, memory, and data storage containing data and executable software which runs on the microprocessor, the memory and storage operatively connected to the microprocessor, the storage including a non-transitory computer readable medium containing program instructions representing software executable on the processor, which instructions, when executed by the processor, cause the control unit to perform a sequence of steps based on an association between each object detection zone and a series of the image acquisition devices by which the control unit: receives and applies non-video information indicative of a detected object type or detected location from one or more of the image acquisition devices to generate an overlay indicative of object type or position on a real time map of the roadway; and, when a determination is made, based on execution of the program instructions, that selection criteria are met, the input selection is changed from a first mode, in which non-video information is received, to a second mode to begin assimilating multi-channel frames of camera video data. 21. The vision system of claim 20 where the data feed comprising non-video information is received via a CAN transceiver in the control unit and the multi-channel frames of camera video data are received via a High Speed video data bus compliant with an IEEE1394 serial bus architecture.
2,400
9,268
9,268
15,943,393
2,447
Systems, methods, and apparatus to identify media presentation devices are disclosed. An example method includes associating a domain name service query received at a pseudo DNS server with a media exposure measurement location based on a public Internet Protocol address of the received domain name service query, wherein the pseudo DNS server does not provide domain name-to-IP address translation, and wherein the pseudo DNS server is to receive the domain name service query and transmit a redirect message identifying a conventional DNS server. The example method further includes crediting the media exposure measurement location with accessing media identified based on the domain name service query.
1. An apparatus for monitoring network activity comprising: an associator to associate a domain name service query received at a pseudo DNS server with a media exposure measurement location based on a public Internet Protocol address of the received domain name service query, wherein the pseudo DNS server does not provide domain name-to-IP address translation, wherein the pseudo DNS server is to receive the domain name service query and transmit a redirect message identifying a conventional DNS server; and a crediter to credit the media exposure measurement location with accessing media identified based on the domain name service query. 2. The apparatus of claim 1, further including a registrar to associate the public IP address with the media exposure measurement location based on registration data from a panelist. 3. The apparatus of claim 2, wherein the registrar is to associate the public IP address with demographic information of the panelist. 4. The apparatus of claim 2, wherein the registrar is to receive the registration data via an electronic interface, the electronic interface conveying the public IP address of the media exposure measurement location. 5. The apparatus of claim 2, wherein the registration data includes an identification of a device at the media exposure measurement location. 6. The apparatus of claim 1, wherein the domain name service query includes at least one of a name, an acronym, an abbreviation, or a title associated with a media content provider. 7. The apparatus of claim 1, wherein the conventional DNS server is to perform domain name-to-IP address translation, the conventional DNS server to provide a DNS response associated with an address of Internet media content. 8. A non-transitory computer readable storage medium comprising instructions which, when executed, cause a machine to at least: associate a domain name service query received at a pseudo DNS server with a media exposure measurement location based on a public Internet Protocol address of the received domain name service query, wherein the pseudo DNS server does not provide domain name-to-IP address translation, wherein the pseudo DNS server is to receive the domain name service query and transmit a redirect message identifying a conventional DNS server; and credit the media exposure measurement location with accessing media identified based on the domain name service query. 9. The non-transitory computer readable storage medium of claim 8, wherein the instructions, when executed, further cause the machine to associate the public IP address with the media exposure measurement location based on registration data from a panelist. 10. The non-transitory computer readable storage medium of claim 9, wherein the instructions, when executed, further cause the machine to associate the public IP address with demographic information of the panelist. 11. The non-transitory computer readable storage medium of claim 9, wherein the instructions, when executed, further cause the machine to receive the registration data via an electronic interface, the electronic interface conveying the public IP address of the media exposure measurement location. 12. The non-transitory computer readable storage medium of claim 9, wherein the registration data includes an identification of a device at the media exposure measurement location. 13. The non-transitory computer readable storage medium of claim 8, wherein the domain name service query includes at least one of a name, an acronym, an abbreviation, or a title associated with a media content provider. 14. The non-transitory computer readable storage medium of claim 8, wherein the conventional DNS server is to perform domain name-to-IP address translation, the conventional DNS server to provide a DNS response associated with an address of Internet media content. 15. A method of monitoring network activity, the method comprising: associating a domain name service query received at a pseudo DNS server with a media exposure measurement location based on a public Internet Protocol address of the received domain name service query, wherein the pseudo DNS server does not provide domain name-to-IP address translation, wherein the pseudo DNS server is to receive the domain name service query and transmit a redirect message identifying a conventional DNS server; and crediting the media exposure measurement location with accessing media identified based on the domain name service query. 16. The method of claim 15, further including associating the public IP address with the media exposure measurement location based on registration data from a panelist. 17. The method of claim 16, further including associating the public IP address with demographic information of the panelist. 18. The method of claim 16, further including receiving the registration data via an electronic interface, the electronic interface conveying the public IP address of the media exposure measurement location. 19. The method of claim 16, wherein the registration data includes an identification of a device at the media exposure measurement location. 20. The method of claim 15, wherein the domain name service query includes at least one of a name, an acronym, an abbreviation, or a title associated with a media content provider.
Systems, methods, and apparatus to identify media presentation devices are disclosed. An example method includes associating a domain name service query received at a pseudo DNS server with a media exposure measurement location based on a public Internet Protocol address of the received domain name service query, wherein the pseudo DNS server does not provide domain name-to-IP address translation, and wherein the pseudo DNS server is to receive the domain name service query and transmit a redirect message identifying a conventional DNS server. The example method further includes crediting the media exposure measurement location with accessing media identified based on the domain name service query.1. An apparatus for monitoring network activity comprising: an associator to associate a domain name service query received at a pseudo DNS server with a media exposure measurement location based on a public Internet Protocol address of the received domain name service query, wherein the pseudo DNS server does not provide domain name-to-IP address translation, wherein the pseudo DNS server is to receive the domain name service query and transmit a redirect message identifying a conventional DNS server; and a crediter to credit the media exposure measurement location with accessing media identified based on the domain name service query. 2. The apparatus of claim 1, further including a registrar to associate the public IP address with the media exposure measurement location based on registration data from a panelist. 3. The apparatus of claim 2, wherein the registrar is to associate the public IP address with demographic information of the panelist. 4. The apparatus of claim 2, wherein the registrar is to receive the registration data via an electronic interface, the electronic interface conveying the public IP address of the media exposure measurement location. 5. The apparatus of claim 2, wherein the registration data includes an identification of a device at the media exposure measurement location. 6. The apparatus of claim 1, wherein the domain name service query includes at least one of a name, an acronym, an abbreviation, or a title associated with a media content provider. 7. The apparatus of claim 1, wherein the conventional DNS server is to perform domain name-to-IP address translation, the conventional DNS server to provide a DNS response associated with an address of Internet media content. 8. A non-transitory computer readable storage medium comprising instructions which, when executed, cause a machine to at least: associate a domain name service query received at a pseudo DNS server with a media exposure measurement location based on a public Internet Protocol address of the received domain name service query, wherein the pseudo DNS server does not provide domain name-to-IP address translation, wherein the pseudo DNS server is to receive the domain name service query and transmit a redirect message identifying a conventional DNS server; and credit the media exposure measurement location with accessing media identified based on the domain name service query. 9. The non-transitory computer readable storage medium of claim 8, wherein the instructions, when executed, further cause the machine to associate the public IP address with the media exposure measurement location based on registration data from a panelist. 10. The non-transitory computer readable storage medium of claim 9, wherein the instructions, when executed, further cause the machine to associate the public IP address with demographic information of the panelist. 11. The non-transitory computer readable storage medium of claim 9, wherein the instructions, when executed, further cause the machine to receive the registration data via an electronic interface, the electronic interface conveying the public IP address of the media exposure measurement location. 12. The non-transitory computer readable storage medium of claim 9, wherein the registration data includes an identification of a device at the media exposure measurement location. 13. The non-transitory computer readable storage medium of claim 8, wherein the domain name service query includes at least one of a name, an acronym, an abbreviation, or a title associated with a media content provider. 14. The non-transitory computer readable storage medium of claim 8, wherein the conventional DNS server is to perform domain name-to-IP address translation, the conventional DNS server to provide a DNS response associated with an address of Internet media content. 15. A method of monitoring network activity, the method comprising: associating a domain name service query received at a pseudo DNS server with a media exposure measurement location based on a public Internet Protocol address of the received domain name service query, wherein the pseudo DNS server does not provide domain name-to-IP address translation, wherein the pseudo DNS server is to receive the domain name service query and transmit a redirect message identifying a conventional DNS server; and crediting the media exposure measurement location with accessing media identified based on the domain name service query. 16. The method of claim 15, further including associating the public IP address with the media exposure measurement location based on registration data from a panelist. 17. The method of claim 16, further including associating the public IP address with demographic information of the panelist. 18. The method of claim 16, further including receiving the registration data via an electronic interface, the electronic interface conveying the public IP address of the media exposure measurement location. 19. The method of claim 16, wherein the registration data includes an identification of a device at the media exposure measurement location. 20. The method of claim 15, wherein the domain name service query includes at least one of a name, an acronym, an abbreviation, or a title associated with a media content provider.
2,400
9,269
9,269
14,609,654
2,412
Methods and systems for replaying buffered audio of a telephone call are provided herein. In some embodiments, a method for replaying buffered audio of a telephone call, comprises buffering audio data associated with a telephone call when a quality of an established data connection decreases below a first threshold quality measure; playing the buffered audio data from the buffer; determining the quality of the established data connection exceeds a second threshold quality measure; and replaying the audio data from the buffer, wherein replaying the audio comprises modifying the playback rate of the buffered audio data during playback.
1. A computer implemented method for replaying buffered audio of a telephone call, comprising: buffering audio data associated with a telephone call when a quality of an established data connection decreases below a first threshold quality measure; playing the buffered audio data from the buffer; determining the quality of the established data connection exceeds a second threshold quality measure; and replaying the audio data from the buffer, wherein replaying the audio comprises modifying a playback rate of the buffered audio data during playback. 2. The method of claim 1, wherein the quality of the established data connection exceeds the second threshold quality measure after the telephone call disconnects and reconnects. 3. The method of claim 1, wherein playback stops when the buffer is emptied. 4. The method of claim 1, wherein playback prior to reaching the second threshold quality measure comprises a slowdown in the playback rate. 5. The method of claim 4, wherein slowing down the playback rate includes at least one of lengthening pauses and silences in the audio or reducing a playback speed by a predefined factor. 6. The method of claim 5, wherein the playback rate is based on telemetry data including at least one of average call quality, packets lost, or time to reconnect after a call disconnects. 7. The method of claim 1, wherein playback after reaching the second threshold quality measure comprises speeding up the playback rate. 8. The method of claim 7, wherein speeding up the playback rate includes at least one of removing pauses and silences in the audio or increasing the playback speed by a predefined factor. 9. The method of claim 8, wherein the playback rate is based on telemetry data including at least one of average call quality, packets lost, or time to reconnect after a call disconnects. 10. The method of claim 1, wherein a buffer size is based on historic disconnection statistics at a current location based on telemetry data including at least one of call duration, average quality, packets lost, whether a call was disconnected and reconnected, or a reconnection time. 11. The method of claim 1, wherein replaying the audio data from the buffer further comprises reducing a pitch of the audio during playback. 12. A system for replaying buffered audio of a telephone call, comprising: a quality monitoring module configured to monitor a quality of an established data connection of the telephone call; an audio buffering module configured to buffer audio data associated with a telephone call when a quality of an established data connection decreases below a first threshold quality measure and stop buffering audio when the quality of the established data connection increases above a second threshold quality measure; and an audio playback module configured to replay the audio data from the buffer wherein replaying the audio data comprises modifying a playback rate of the buffered audio data during playback. 13. The system of claim 12, wherein the quality of the established data connection exceeds the second threshold quality measure after the telephone call disconnects and reconnects. 14. The system of claim 12, wherein the audio playback module is further configured to stop playback when the buffer is emptied. 15. The system of claim 12, wherein playback prior to reaching a second threshold quality measure comprises a slowdown in the playback rate. 16. The system of claim 15, wherein slowing down the playback rate includes at least one of lengthening pauses and silences in the audio or reducing a playback speed by a predefined factor. 17. The system of claim 16, wherein the slowdown rate is based on telemetry data including at least one of average call quality, packets lost, or time to reconnect after a call disconnects. 18. The system of claim 12, wherein playback after reaching the second threshold quality measure comprises speeding up the playback rate. 19. The system of claim 18, wherein speeding up the playback rate includes at least one of removing pauses and silences in the audio or increasing the playback speed by a predefined factor. 20. The system of claim 19, wherein the speed at which the playback rate is increased is based on telemetry data including at least one of average call quality, packets lost, or time to reconnect after a call disconnects. 21. The system of claim 12, wherein a buffer size is based on historic disconnection statistics at a current location based on telemetry data including at least one of call duration, average quality, packets lost, whether a call was disconnected and reconnected, or a reconnection time. 22. The system of claim 12, wherein replaying the audio data from the buffer further comprises reducing a pitch of the audio during playback. 23. A non-transitory computer readable medium for storing computer instructions that, when executed by at least one processor causes the at least one processor to perform a method for replaying buffered audio of a telephone call, comprising: buffering audio data associated with a telephone call when a quality of an established data connection decreases below a first threshold quality measure; playing the buffered audio data from the buffer; determining the quality of the established data connection exceeds a second threshold quality measure; and replaying the audio data from the buffer, wherein replaying the audio comprises modifying a playback rate of the buffered audio data during playback.
Methods and systems for replaying buffered audio of a telephone call are provided herein. In some embodiments, a method for replaying buffered audio of a telephone call, comprises buffering audio data associated with a telephone call when a quality of an established data connection decreases below a first threshold quality measure; playing the buffered audio data from the buffer; determining the quality of the established data connection exceeds a second threshold quality measure; and replaying the audio data from the buffer, wherein replaying the audio comprises modifying the playback rate of the buffered audio data during playback.1. A computer implemented method for replaying buffered audio of a telephone call, comprising: buffering audio data associated with a telephone call when a quality of an established data connection decreases below a first threshold quality measure; playing the buffered audio data from the buffer; determining the quality of the established data connection exceeds a second threshold quality measure; and replaying the audio data from the buffer, wherein replaying the audio comprises modifying a playback rate of the buffered audio data during playback. 2. The method of claim 1, wherein the quality of the established data connection exceeds the second threshold quality measure after the telephone call disconnects and reconnects. 3. The method of claim 1, wherein playback stops when the buffer is emptied. 4. The method of claim 1, wherein playback prior to reaching the second threshold quality measure comprises a slowdown in the playback rate. 5. The method of claim 4, wherein slowing down the playback rate includes at least one of lengthening pauses and silences in the audio or reducing a playback speed by a predefined factor. 6. The method of claim 5, wherein the playback rate is based on telemetry data including at least one of average call quality, packets lost, or time to reconnect after a call disconnects. 7. The method of claim 1, wherein playback after reaching the second threshold quality measure comprises speeding up the playback rate. 8. The method of claim 7, wherein speeding up the playback rate includes at least one of removing pauses and silences in the audio or increasing the playback speed by a predefined factor. 9. The method of claim 8, wherein the playback rate is based on telemetry data including at least one of average call quality, packets lost, or time to reconnect after a call disconnects. 10. The method of claim 1, wherein a buffer size is based on historic disconnection statistics at a current location based on telemetry data including at least one of call duration, average quality, packets lost, whether a call was disconnected and reconnected, or a reconnection time. 11. The method of claim 1, wherein replaying the audio data from the buffer further comprises reducing a pitch of the audio during playback. 12. A system for replaying buffered audio of a telephone call, comprising: a quality monitoring module configured to monitor a quality of an established data connection of the telephone call; an audio buffering module configured to buffer audio data associated with a telephone call when a quality of an established data connection decreases below a first threshold quality measure and stop buffering audio when the quality of the established data connection increases above a second threshold quality measure; and an audio playback module configured to replay the audio data from the buffer wherein replaying the audio data comprises modifying a playback rate of the buffered audio data during playback. 13. The system of claim 12, wherein the quality of the established data connection exceeds the second threshold quality measure after the telephone call disconnects and reconnects. 14. The system of claim 12, wherein the audio playback module is further configured to stop playback when the buffer is emptied. 15. The system of claim 12, wherein playback prior to reaching a second threshold quality measure comprises a slowdown in the playback rate. 16. The system of claim 15, wherein slowing down the playback rate includes at least one of lengthening pauses and silences in the audio or reducing a playback speed by a predefined factor. 17. The system of claim 16, wherein the slowdown rate is based on telemetry data including at least one of average call quality, packets lost, or time to reconnect after a call disconnects. 18. The system of claim 12, wherein playback after reaching the second threshold quality measure comprises speeding up the playback rate. 19. The system of claim 18, wherein speeding up the playback rate includes at least one of removing pauses and silences in the audio or increasing the playback speed by a predefined factor. 20. The system of claim 19, wherein the speed at which the playback rate is increased is based on telemetry data including at least one of average call quality, packets lost, or time to reconnect after a call disconnects. 21. The system of claim 12, wherein a buffer size is based on historic disconnection statistics at a current location based on telemetry data including at least one of call duration, average quality, packets lost, whether a call was disconnected and reconnected, or a reconnection time. 22. The system of claim 12, wherein replaying the audio data from the buffer further comprises reducing a pitch of the audio during playback. 23. A non-transitory computer readable medium for storing computer instructions that, when executed by at least one processor causes the at least one processor to perform a method for replaying buffered audio of a telephone call, comprising: buffering audio data associated with a telephone call when a quality of an established data connection decreases below a first threshold quality measure; playing the buffered audio data from the buffer; determining the quality of the established data connection exceeds a second threshold quality measure; and replaying the audio data from the buffer, wherein replaying the audio comprises modifying a playback rate of the buffered audio data during playback.
2,400
9,270
9,270
16,391,668
2,448
Automated processes and systems for detecting abnormally behaving objects of a distributed computing system are described. Processes and systems obtain metrics that are generated in a historical time window and are associated with an object of the distributed computing system. Processes and system use the metrics to compute a time-dependent system indicator over the historical time window. Each value of the system indicator corresponds to a point in time of the historical time window when the object was in a normal or an abnormal state. Processes and systems use the normal and abnormal states of the system indicator in the historical time window to train a state classifier that is used to detect run-time abnormal behavior of the object. When the state classifier identifies abnormal behavior of the object, an alert is generated, indicating the abnormal behavior of the object.
1. In a process that detects abnormal behavior of an object of a distributed computing system using metrics associated with the object and recorded in a historical time window, the improvement comprising: applying a principal component analysis technique to the metrics to determine principal components of the metrics in the historical time window; for each time stamp in the historical time window, computing a system-indicator value for the object based on principal component values of the principal components at the time stamp, each system-indicator value identifying an abnormal or normal state of the object at a time stamp in the historical time window; computing a state classifier for the object based on the system-indicator values and corresponding time stamps in the historical time window; using the state classifier to detect abnormal behavior of the object based on a run-time metrics associated with the object: and generating an alert that identifies abnormal behavior of the object in response to detection of abnormal behavior of the object by the state classifier, thereby enabling identification of the abnormal behavior of the object. 2. The process of claim 1 further comprising: deleting constant and nearly constant metrics from the metrics; and synchronizing the metrics to a general sequence of time stamps. 3. The process of claim 2 wherein deleting the constant and nearly constant metrics in the metrics comprises: computing a standard deviation for each metric in the metric data; and deleting each metric with a standard deviation less than a standard deviation threshold. 4. The process of claim 1 wherein applying the principal component analysis technique to the metrics comprises: for each metric of the metrics computing a mean of metric values of the metric, and subtracting the mean from each metric value of the metric to obtain a mean-centered metric; computing a deviation matrix based on the mean-centered metrics; computing eigenvalues and eigenvectors for the deviation matrix; computing the principal components of the deviation matrix based on the eigenvalues and eigenvectors; and identifying high-variance principal components of the principal components. 5. The process of claim 4 wherein identifying the high-variance principal components of the principal components comprises: computing a variance for each principal component; computing a percentage of variance for each subset of principal components, each subset comprising a different number of principal components with the largest corresponding variances; determining a smallest percentage of variances that is greater than a percentage of variance threshold; and identifying the principal components that correspond to the smallest percentage of variances as the high-variance principal components. 6. The process of claim 1 wherein computing the state classifier for the object comprises: computing a bound for the system-indicator values; labeling system-indicator values that violate the bound as abnormal system-indicator values; labeling system-indicator values that do not violate the bound as normal system-indicator values; computing a support vector machine matrix based the outlier and normal system-indicator values; computing the state classifier based on the support vector machine matrix. 7. The process of claim 1 wherein using the state classifier to detect abnormal behavior of the object comprises: deleting constant and nearly constant metrics from the run-time metrics: synchronizing the run-time metrics to a general sequence of time stamps: computing a run-time mean-centered metrics based on the synchronized and non-constant sets of metrics: computing run-time principal components of the run-time mean-centered metrics; computing a run-time system indicator based on the run-time principal components; and applying the state classifier to the run-time system-indicator values to detect abnormal behavior of the object. 8. A computer system to detect abnormal behavior of an object of a distributed computing system, the system comprising: one or more processors: one or more data-storage devices; and machine-readable instructions stored in the one or more data-storage devices that when executed using the one or more processors controls the system performs operations comprising: retrieving metrics associated with the object and recorded in a historical time window from the one or more data-storage devices; applying a principal component analysis technique on the metrics to determine principal components of the metrics in the historical time window; for each time stamp in the historical time window, computing a system-indicator value for the object based on principal component values of the principal components at the time stamp, each system-indicator value identifying an abnormal or normal state of the object at a time stamp in the historical time window; computing a state classifier for the object based on the system-indicator values and corresponding time stamps in the historical time window; using the state classifier to detect abnormal behavior of the object based on a run-time metrics associated with the object; and generating an alert that identifies abnormal behavior of the object in response to detection of abnormal behavior of the object by the state classifier. 9. The computer system of claim 8 further comprising: deleting constant and nearly constant metrics from the metrics; and synchronizing the metrics to a general sequence of time stamps. 10. The computer system of claim 9 wherein deleting the constant and nearly constant metrics in the metrics comprises: computing a standard deviation for each metric in the metric data; and deleting each metric with a standard deviation less than a standard deviation threshold. 11. The computer system of claim 8 wherein applying the principal component analysis technique to the metrics comprises: for each metric of the metrics computing a mean of metric values of the metric, and subtracting the mean from each metric value of the metric to obtain a mean-centered metric; computing a deviation matrix based on the mean-centered metrics; computing eigenvalues and eigenvectors for the deviation matrix; computing the principal components of the deviation matrix based on the eigenvalues and eigenvectors; and identifying high-variance principal components of the principal components. 12. The computer system of claim 11 wherein identifying the high-variance principal components of the principal components comprises: computing a variance for each principal component; computing a percentage of variance for each subset of principal components, each subset comprising a different number of principal components with the largest corresponding variances; determining a smallest percentage of variances that is greater than a percentage of variance threshold; and identifying the principal components that correspond to the smallest percentage of variances as the high-variance principal components. 13. The computer system of claim 8 wherein computing the state classifier for the object comprises: computing a bound for the system-indicator values; labeling system-indicator values that violate the bound as abnormal system-indicator values; labeling system-indicator values that do not violate the bound as normal system-indicator values; computing a support vector machine matrix based the outlier and normal system-indicator values: computing the state classifier based on the support vector machine matrix. 14. The computer system of claim 8 wherein using the state classifier to detect abnormal behavior of the object comprises: deleting constant and nearly constant metrics from the run-time metrics; synchronizing the run-time metrics to a general sequence of time stamp; computing a run-time mean-centered metrics based on the synchronized and non-constant sets of metrics; computing run-time principal components of the run-time mean-centered metrics; computing a run-time system indicator based on the run-time principal components; and applying the state classifier to the run-time system-indicator values to detect abnormal behavior of the object. 15. A non-transitory computer-readable medium encoded with machine-readable instructions that implement a method carried out by one or more processors of a computer system that performs operations comprising: retrieving a metrics associated with the object and recorded in a historical time window from the one or more data-storage devices; applying a principal component analysis technique on the metrics to determine principal components of the metrics in the historical time window; for each time stamp in the historical time window, computing a system-indicator value for the object based on principal component values of the principal components at the time stamp, each system-indicator value identifying an abnormal or normal state of the object at a time stamp in the historical time window; computing a state classifier for the object based on the system-indicator values and corresponding time stamps in the historical time window; using the state classifier to detect abnormal behavior of the object based on a run-time metrics associated with the object; and generating an alert that identifies abnormal behavior of the object in response to detection of abnormal behavior of the object by the state classifier. 16. The medium of claim 15 further comprising: deleting constant and nearly constant metrics from the metrics; and synchronizing the metrics to a general sequence of time stamps. 17. The medium of claim 16 wherein deleting the constant and nearly constant metrics in the metrics comprises: computing a standard deviation for each metric in the metric data; and deleting each metric with a standard deviation less than a standard deviation threshold. 18. The medium of claim 15 wherein applying the principal component analysis technique to the metrics comprises: for each metric of the metrics computing a mean of metric values of the metric; and subtracting the mean from each metric value of the metric to obtain a mean-centered metric; computing a deviation matrix based on the mean-centered metrics; computing eigenvalues and eigenvectors for the deviation matrix; computing the principal components of the deviation matrix based on the eigenvalues and eigenvectors; and identifying high-variance principal components of the principal components. 19. The medium of claim 18 wherein identifying the high-variance principal components of the principal components comprises: computing a variance for each principal component; computing a percentage of variance for each subset of principal components, each subset comprising a different number of principal components with the largest corresponding variances; determining a smallest percentage of variances that is greater than a percentage of variance threshold; and identifying the principal components that correspond to the smallest percentage of variances as the high-variance principal components. 20. The medium of claim 15 wherein computing the state classifier for the object comprises: computing a bound for the system-indicator values; labeling system-indicator values that violate the bound as abnormal system-indicator values; labeling system-indicator values that do not violate the bound as normal system-indicator values; computing a support vector machine matrix based the outlier and normal system-indicator values; computing the state classifier based on the support vector machine matrix. 21. The medium of claim 15 wherein using the state classifier to detect abnormal behavior for of the object comprises: deleting constant and nearly constant metrics from the run-time metrics; synchronizing the run-time metrics to a general sequence of time stamps; computing a run-time mean-centered metrics based on the synchronized and non-constant sets of metrics; computing run-time principal components of the run-time mean-centered metrics; computing a run-time system indicator based on the run-time principal components; and applying the state classifier to the run-time system-indicator values to detect abnormal behavior of the object.
Automated processes and systems for detecting abnormally behaving objects of a distributed computing system are described. Processes and systems obtain metrics that are generated in a historical time window and are associated with an object of the distributed computing system. Processes and system use the metrics to compute a time-dependent system indicator over the historical time window. Each value of the system indicator corresponds to a point in time of the historical time window when the object was in a normal or an abnormal state. Processes and systems use the normal and abnormal states of the system indicator in the historical time window to train a state classifier that is used to detect run-time abnormal behavior of the object. When the state classifier identifies abnormal behavior of the object, an alert is generated, indicating the abnormal behavior of the object.1. In a process that detects abnormal behavior of an object of a distributed computing system using metrics associated with the object and recorded in a historical time window, the improvement comprising: applying a principal component analysis technique to the metrics to determine principal components of the metrics in the historical time window; for each time stamp in the historical time window, computing a system-indicator value for the object based on principal component values of the principal components at the time stamp, each system-indicator value identifying an abnormal or normal state of the object at a time stamp in the historical time window; computing a state classifier for the object based on the system-indicator values and corresponding time stamps in the historical time window; using the state classifier to detect abnormal behavior of the object based on a run-time metrics associated with the object: and generating an alert that identifies abnormal behavior of the object in response to detection of abnormal behavior of the object by the state classifier, thereby enabling identification of the abnormal behavior of the object. 2. The process of claim 1 further comprising: deleting constant and nearly constant metrics from the metrics; and synchronizing the metrics to a general sequence of time stamps. 3. The process of claim 2 wherein deleting the constant and nearly constant metrics in the metrics comprises: computing a standard deviation for each metric in the metric data; and deleting each metric with a standard deviation less than a standard deviation threshold. 4. The process of claim 1 wherein applying the principal component analysis technique to the metrics comprises: for each metric of the metrics computing a mean of metric values of the metric, and subtracting the mean from each metric value of the metric to obtain a mean-centered metric; computing a deviation matrix based on the mean-centered metrics; computing eigenvalues and eigenvectors for the deviation matrix; computing the principal components of the deviation matrix based on the eigenvalues and eigenvectors; and identifying high-variance principal components of the principal components. 5. The process of claim 4 wherein identifying the high-variance principal components of the principal components comprises: computing a variance for each principal component; computing a percentage of variance for each subset of principal components, each subset comprising a different number of principal components with the largest corresponding variances; determining a smallest percentage of variances that is greater than a percentage of variance threshold; and identifying the principal components that correspond to the smallest percentage of variances as the high-variance principal components. 6. The process of claim 1 wherein computing the state classifier for the object comprises: computing a bound for the system-indicator values; labeling system-indicator values that violate the bound as abnormal system-indicator values; labeling system-indicator values that do not violate the bound as normal system-indicator values; computing a support vector machine matrix based the outlier and normal system-indicator values; computing the state classifier based on the support vector machine matrix. 7. The process of claim 1 wherein using the state classifier to detect abnormal behavior of the object comprises: deleting constant and nearly constant metrics from the run-time metrics: synchronizing the run-time metrics to a general sequence of time stamps: computing a run-time mean-centered metrics based on the synchronized and non-constant sets of metrics: computing run-time principal components of the run-time mean-centered metrics; computing a run-time system indicator based on the run-time principal components; and applying the state classifier to the run-time system-indicator values to detect abnormal behavior of the object. 8. A computer system to detect abnormal behavior of an object of a distributed computing system, the system comprising: one or more processors: one or more data-storage devices; and machine-readable instructions stored in the one or more data-storage devices that when executed using the one or more processors controls the system performs operations comprising: retrieving metrics associated with the object and recorded in a historical time window from the one or more data-storage devices; applying a principal component analysis technique on the metrics to determine principal components of the metrics in the historical time window; for each time stamp in the historical time window, computing a system-indicator value for the object based on principal component values of the principal components at the time stamp, each system-indicator value identifying an abnormal or normal state of the object at a time stamp in the historical time window; computing a state classifier for the object based on the system-indicator values and corresponding time stamps in the historical time window; using the state classifier to detect abnormal behavior of the object based on a run-time metrics associated with the object; and generating an alert that identifies abnormal behavior of the object in response to detection of abnormal behavior of the object by the state classifier. 9. The computer system of claim 8 further comprising: deleting constant and nearly constant metrics from the metrics; and synchronizing the metrics to a general sequence of time stamps. 10. The computer system of claim 9 wherein deleting the constant and nearly constant metrics in the metrics comprises: computing a standard deviation for each metric in the metric data; and deleting each metric with a standard deviation less than a standard deviation threshold. 11. The computer system of claim 8 wherein applying the principal component analysis technique to the metrics comprises: for each metric of the metrics computing a mean of metric values of the metric, and subtracting the mean from each metric value of the metric to obtain a mean-centered metric; computing a deviation matrix based on the mean-centered metrics; computing eigenvalues and eigenvectors for the deviation matrix; computing the principal components of the deviation matrix based on the eigenvalues and eigenvectors; and identifying high-variance principal components of the principal components. 12. The computer system of claim 11 wherein identifying the high-variance principal components of the principal components comprises: computing a variance for each principal component; computing a percentage of variance for each subset of principal components, each subset comprising a different number of principal components with the largest corresponding variances; determining a smallest percentage of variances that is greater than a percentage of variance threshold; and identifying the principal components that correspond to the smallest percentage of variances as the high-variance principal components. 13. The computer system of claim 8 wherein computing the state classifier for the object comprises: computing a bound for the system-indicator values; labeling system-indicator values that violate the bound as abnormal system-indicator values; labeling system-indicator values that do not violate the bound as normal system-indicator values; computing a support vector machine matrix based the outlier and normal system-indicator values: computing the state classifier based on the support vector machine matrix. 14. The computer system of claim 8 wherein using the state classifier to detect abnormal behavior of the object comprises: deleting constant and nearly constant metrics from the run-time metrics; synchronizing the run-time metrics to a general sequence of time stamp; computing a run-time mean-centered metrics based on the synchronized and non-constant sets of metrics; computing run-time principal components of the run-time mean-centered metrics; computing a run-time system indicator based on the run-time principal components; and applying the state classifier to the run-time system-indicator values to detect abnormal behavior of the object. 15. A non-transitory computer-readable medium encoded with machine-readable instructions that implement a method carried out by one or more processors of a computer system that performs operations comprising: retrieving a metrics associated with the object and recorded in a historical time window from the one or more data-storage devices; applying a principal component analysis technique on the metrics to determine principal components of the metrics in the historical time window; for each time stamp in the historical time window, computing a system-indicator value for the object based on principal component values of the principal components at the time stamp, each system-indicator value identifying an abnormal or normal state of the object at a time stamp in the historical time window; computing a state classifier for the object based on the system-indicator values and corresponding time stamps in the historical time window; using the state classifier to detect abnormal behavior of the object based on a run-time metrics associated with the object; and generating an alert that identifies abnormal behavior of the object in response to detection of abnormal behavior of the object by the state classifier. 16. The medium of claim 15 further comprising: deleting constant and nearly constant metrics from the metrics; and synchronizing the metrics to a general sequence of time stamps. 17. The medium of claim 16 wherein deleting the constant and nearly constant metrics in the metrics comprises: computing a standard deviation for each metric in the metric data; and deleting each metric with a standard deviation less than a standard deviation threshold. 18. The medium of claim 15 wherein applying the principal component analysis technique to the metrics comprises: for each metric of the metrics computing a mean of metric values of the metric; and subtracting the mean from each metric value of the metric to obtain a mean-centered metric; computing a deviation matrix based on the mean-centered metrics; computing eigenvalues and eigenvectors for the deviation matrix; computing the principal components of the deviation matrix based on the eigenvalues and eigenvectors; and identifying high-variance principal components of the principal components. 19. The medium of claim 18 wherein identifying the high-variance principal components of the principal components comprises: computing a variance for each principal component; computing a percentage of variance for each subset of principal components, each subset comprising a different number of principal components with the largest corresponding variances; determining a smallest percentage of variances that is greater than a percentage of variance threshold; and identifying the principal components that correspond to the smallest percentage of variances as the high-variance principal components. 20. The medium of claim 15 wherein computing the state classifier for the object comprises: computing a bound for the system-indicator values; labeling system-indicator values that violate the bound as abnormal system-indicator values; labeling system-indicator values that do not violate the bound as normal system-indicator values; computing a support vector machine matrix based the outlier and normal system-indicator values; computing the state classifier based on the support vector machine matrix. 21. The medium of claim 15 wherein using the state classifier to detect abnormal behavior for of the object comprises: deleting constant and nearly constant metrics from the run-time metrics; synchronizing the run-time metrics to a general sequence of time stamps; computing a run-time mean-centered metrics based on the synchronized and non-constant sets of metrics; computing run-time principal components of the run-time mean-centered metrics; computing a run-time system indicator based on the run-time principal components; and applying the state classifier to the run-time system-indicator values to detect abnormal behavior of the object.
2,400
9,271
9,271
15,868,686
2,452
Snapshots of storage volumes and containers of a bundled application may be created and used to rollback or clone the bundled application. Clone snapshots of storage volumes may be gradually populated with data from prior snapshots to reduce loading on a primary snapshot. Components of cloned applications may communicate with one another using addresses of these components in the parent application. Containers of the bundled application may communicate with an open virtual switch (OVS) that implements flows to implement translation between clone and parent addresses. Containers may be modified to execute operation-specific entrypoint functions prior to invoking an entrypoint of an application instance loaded in the containers.
1. A method comprising: providing, on computing devices of a distributed computing system including a network, a first bundled application including a plurality of first containers executing on the computing devices and having first container addresses, each container of the plurality of first containers being loaded with an executable program; communicating among the plurality of first containers over the network by addressing first packets to the first container addresses; creating a second bundled application that is a clone of the first bundled application such that the second bundled application includes a plurality of second containers executing on of the computing devices, each container of the plurality of second containers being a clone of a corresponding container of the plurality of second containers and having the first container address of the corresponding container of the plurality of second containers associated therewith and a second container address; and communicating among the plurality of second containers over the network by addressing second packets to the first container addresses and routing the packets to the plurality of second containers rather than the plurality of first containers. 2. The method of claim 1, further comprising: providing on each computing device of the computing devices a virtual switch; performing, with a computing device of the computing devices as a subject computing device and a container of the plurality of second containers executing on the subject computing device as a subject container: receiving, by the virtual switch of the subject computing device, first packets from the subject container; and changing, by the virtual switch of the subject computing device, a source address in the first packets from the first container address of the subject container to the second container address of the subject container to obtain modified first packets; transmitting, by the virtual switch of the subject computing device, the modified first packets over the network. 3. The method of claim 1, further comprising: providing on each computing device of the computing devices a virtual switch; performing, with a computing device the computing devices as a subject computing device and a container of the plurality of second containers executing on the subject computing device as a subject container: receiving, by the virtual switch of the subject computing device, first packets from the subject container; and (a) changing, by the virtual switch of the subject computing device, a source address in the first packets from the first container address of the subject container to the second container address of the subject container; (b) changing, by the virtual switch of the subject computing device, a destination address in the first packets from the first container address of a target container of the first packets to the second container address of the target container of the first packets; transmitting, by the virtual switch of the subject computing device, the first packets as modified according to (a) and (b) over the network. 4. The method of claim 3, further comprising, by the subject computing device: receiving, by the virtual switch of the subject computing device, second packets from the network; and (c) changing, by the virtual switch of the subject computing device, a source address in the second packets from the second container address of a source container of the second packets to the first container address of the source container of the second packets; (d) changing, by the virtual switch of the subject computing device, a destination address in the second packets from the second container address of the subject container to the first container address of the subject container; and transmitting, by the virtual switch of the subject computing device, the first packets as modified according to (c) and (d) to the subject container. 5. The method of claim 1, wherein the first bundled application includes a plurality of first storage volumes mounted to the plurality of first containers, the method further comprising: creating second storage volumes that are clones of the first storage volumes; and mounting the second storage volumes to the plurality of second containers. 6. The method of claim 5, further comprising: writing, by the plurality of first containers, data to the plurality of first storage volumes, the data including references to the first container addresses; and wherein the second storage volumes retain the references to the first container addresses. 7. The method of claim 1, further comprising: executing the plurality of first containers in a plurality of virtual nodes in a cloud computing system, the virtual nodes further being assigned host addresses; implementing a virtual switch within at least one node of the plurality of virtual nodes; receiving, by the virtual switch, an outbound packet including the first container address of a subject container of the plurality of first containers; (a) replacing, in the outbound packet by the virtual switch, the first container address of the subject container with the host address of a subject node of the plurality of virtual nodes executing the subject container; creating, by the virtual switch, a mapping between a port number of the host address of the subject node and the first container address; and transmitting, by the virtual switch, the outbound packet as modified at (a) to a destination address in the outbound packet. 8. The method of claim 7, further comprising: receiving, by the virtual switch, an inbound packet including the port number and the host address of the subject node; (b) replacing, in the inbound packet by the virtual switch, the host address of the subject node with the first container address of the subject container according to the mapping; and transmitting, by the virtual switch, the inbound packet as modified at (b) to the subject container. 9. The method of claim 1, further comprising: deploying the first bundled application by instantiating the plurality of first containers according to an application manifest processed by an orchestration layer executing in the distributed computing system. 10. The method of claim 1, wherein the plurality of first containers execute on a first set of computing devices of the computing devices, the method further comprising: creating a snapshot of the first bundled application; and restarting the snapshot of the first bundled application on a second set of computing devices of the computing devices that is different from the first set of computing devices to create the second bundled application. 11. A system comprising: a network; and a distributed computing system coupled to the network and including: a first set of computing devices executing a first bundled application including a plurality of first containers executing on the first set of computing devices and having first container addresses, each container of the plurality of first containers being loaded with an executable program, the plurality of first containers being programmed to communicate with one another over the network by addressing first packets to the first container addresses; and a second set of computing devices that includes one of (a) the same computing devices as the first set of computing devices and (b) different computing devices from the first set of computing devices, the second set of computing devices executing a second bundled application that is a clone of the first bundled application such that the second bundled application includes a plurality of second containers executing on the second set of computing devices, each container of the plurality of second containers being a clone of a corresponding container of the plurality of second containers and having the first container address of the corresponding container of the plurality of second containers associated therewith and a second container address, the plurality of second containers programmed to communicate with one another over the network by addressing second packets to the first container addresses, the network routing the packets to the plurality of second containers rather than the plurality of first containers. 12. The system of claim 1, wherein each computing device of the second set of computing devices is further programmed to: implement a virtual switch; perform, for a subject container of the plurality of second containers executing on the each computing device: receive, by the virtual switch, first packets from the subject container; and change, by the virtual switch, a source address in the first packets from the first container address of the subject container to the second container address of the subject container to obtain modified first packets; transmit, by the virtual switch of the subject computing device, the modified first packets over the network. 13. The system of claim 1, wherein each computing device of the second set of computing devices is further programmed to: implement a virtual switch; perform, for a subject container of the plurality of second containers executing on the each computing device: receive, by the virtual switch, first packets from the subject container; and (a) change, by the virtual switch, a source address in the first packets from the first container address of the subject container to the second container address of the subject container; (b) change, by the virtual switch, a destination address in the first packets from the first container address of a target container of the first packets to the second container address of the target container of the first packets; transmit, by the virtual switch of the subject computing device, the first packets as modified according to (a) and (b) over the network. 14. The system of claim 13, wherein each computing device of the second set of computing devices is further programmed to: perform, for the subject container of the plurality of second containers executing on the each computing device: receive, by the virtual switch, second packets from the network; and (c) change, by the virtual switch, a source address in the second packets from the second container address of a source container of the second packets to the first container address of the source container of the second packets; (d) change, by the virtual switch, a destination address in the second packets from the second container address of the subject container to the first container address of the subject container; transmit, by the virtual switch, the first packets as modified according to (c) and (d) to the subject container. 15. The system of claim 11, wherein the first bundled application includes a plurality of first storage volumes mounted to the plurality of first containers and the second bundled application includes second storage volumes that are clones of the first storage volumes mounted to the second storage volumes to the plurality of second containers. 16. The system of claim 15, wherein the plurality of first containers are further programmed to write, data to the plurality of first storage volumes, the data including references to the first container addresses; and wherein the second storage volumes retain the references to the first container addresses. 17. The system of claim 11, wherein: wherein the distributed computing system is a cloud computing system and the first containers execute in a plurality of virtual nodes in the cloud computing system, the virtual nodes further being assigned host addresses; wherein at least one node of the plurality of virtual nodes implements a virtual switch programmed to: receive an outbound packet including the first container address of a subject container of the plurality of first containers; (a) replace, in the outbound packet, the first container address of the subject container with the host address of a subject node of the plurality of virtual nodes executing the subject container; create a mapping between a port number of the host address of the subject node and the first container address; and transmit the outbound packet as modified at (a) to a destination address in the outbound packet. 18. The system of claim 17, wherein the virtual switch is further programmed to: receive an inbound packet including the port number and the host address of the subject node; (b) replace, in the inbound packet, the host address of the subject node with the first container address of the subject container according to the mapping; and transmitting the inbound packet as modified at (b) to the subject container. 19. The system of claim 11, further comprising an orchestration computing device programmed to: deploy the first bundled application by invoking instantiation of the plurality of first containers according to an application manifest. 20. The system of claim 11, wherein the orchestration computing device is further programmed to: create a snapshot of the first bundled application; and restart the snapshot of the first bundled application on the second set of computing devices to create the second bundled application.
Snapshots of storage volumes and containers of a bundled application may be created and used to rollback or clone the bundled application. Clone snapshots of storage volumes may be gradually populated with data from prior snapshots to reduce loading on a primary snapshot. Components of cloned applications may communicate with one another using addresses of these components in the parent application. Containers of the bundled application may communicate with an open virtual switch (OVS) that implements flows to implement translation between clone and parent addresses. Containers may be modified to execute operation-specific entrypoint functions prior to invoking an entrypoint of an application instance loaded in the containers.1. A method comprising: providing, on computing devices of a distributed computing system including a network, a first bundled application including a plurality of first containers executing on the computing devices and having first container addresses, each container of the plurality of first containers being loaded with an executable program; communicating among the plurality of first containers over the network by addressing first packets to the first container addresses; creating a second bundled application that is a clone of the first bundled application such that the second bundled application includes a plurality of second containers executing on of the computing devices, each container of the plurality of second containers being a clone of a corresponding container of the plurality of second containers and having the first container address of the corresponding container of the plurality of second containers associated therewith and a second container address; and communicating among the plurality of second containers over the network by addressing second packets to the first container addresses and routing the packets to the plurality of second containers rather than the plurality of first containers. 2. The method of claim 1, further comprising: providing on each computing device of the computing devices a virtual switch; performing, with a computing device of the computing devices as a subject computing device and a container of the plurality of second containers executing on the subject computing device as a subject container: receiving, by the virtual switch of the subject computing device, first packets from the subject container; and changing, by the virtual switch of the subject computing device, a source address in the first packets from the first container address of the subject container to the second container address of the subject container to obtain modified first packets; transmitting, by the virtual switch of the subject computing device, the modified first packets over the network. 3. The method of claim 1, further comprising: providing on each computing device of the computing devices a virtual switch; performing, with a computing device the computing devices as a subject computing device and a container of the plurality of second containers executing on the subject computing device as a subject container: receiving, by the virtual switch of the subject computing device, first packets from the subject container; and (a) changing, by the virtual switch of the subject computing device, a source address in the first packets from the first container address of the subject container to the second container address of the subject container; (b) changing, by the virtual switch of the subject computing device, a destination address in the first packets from the first container address of a target container of the first packets to the second container address of the target container of the first packets; transmitting, by the virtual switch of the subject computing device, the first packets as modified according to (a) and (b) over the network. 4. The method of claim 3, further comprising, by the subject computing device: receiving, by the virtual switch of the subject computing device, second packets from the network; and (c) changing, by the virtual switch of the subject computing device, a source address in the second packets from the second container address of a source container of the second packets to the first container address of the source container of the second packets; (d) changing, by the virtual switch of the subject computing device, a destination address in the second packets from the second container address of the subject container to the first container address of the subject container; and transmitting, by the virtual switch of the subject computing device, the first packets as modified according to (c) and (d) to the subject container. 5. The method of claim 1, wherein the first bundled application includes a plurality of first storage volumes mounted to the plurality of first containers, the method further comprising: creating second storage volumes that are clones of the first storage volumes; and mounting the second storage volumes to the plurality of second containers. 6. The method of claim 5, further comprising: writing, by the plurality of first containers, data to the plurality of first storage volumes, the data including references to the first container addresses; and wherein the second storage volumes retain the references to the first container addresses. 7. The method of claim 1, further comprising: executing the plurality of first containers in a plurality of virtual nodes in a cloud computing system, the virtual nodes further being assigned host addresses; implementing a virtual switch within at least one node of the plurality of virtual nodes; receiving, by the virtual switch, an outbound packet including the first container address of a subject container of the plurality of first containers; (a) replacing, in the outbound packet by the virtual switch, the first container address of the subject container with the host address of a subject node of the plurality of virtual nodes executing the subject container; creating, by the virtual switch, a mapping between a port number of the host address of the subject node and the first container address; and transmitting, by the virtual switch, the outbound packet as modified at (a) to a destination address in the outbound packet. 8. The method of claim 7, further comprising: receiving, by the virtual switch, an inbound packet including the port number and the host address of the subject node; (b) replacing, in the inbound packet by the virtual switch, the host address of the subject node with the first container address of the subject container according to the mapping; and transmitting, by the virtual switch, the inbound packet as modified at (b) to the subject container. 9. The method of claim 1, further comprising: deploying the first bundled application by instantiating the plurality of first containers according to an application manifest processed by an orchestration layer executing in the distributed computing system. 10. The method of claim 1, wherein the plurality of first containers execute on a first set of computing devices of the computing devices, the method further comprising: creating a snapshot of the first bundled application; and restarting the snapshot of the first bundled application on a second set of computing devices of the computing devices that is different from the first set of computing devices to create the second bundled application. 11. A system comprising: a network; and a distributed computing system coupled to the network and including: a first set of computing devices executing a first bundled application including a plurality of first containers executing on the first set of computing devices and having first container addresses, each container of the plurality of first containers being loaded with an executable program, the plurality of first containers being programmed to communicate with one another over the network by addressing first packets to the first container addresses; and a second set of computing devices that includes one of (a) the same computing devices as the first set of computing devices and (b) different computing devices from the first set of computing devices, the second set of computing devices executing a second bundled application that is a clone of the first bundled application such that the second bundled application includes a plurality of second containers executing on the second set of computing devices, each container of the plurality of second containers being a clone of a corresponding container of the plurality of second containers and having the first container address of the corresponding container of the plurality of second containers associated therewith and a second container address, the plurality of second containers programmed to communicate with one another over the network by addressing second packets to the first container addresses, the network routing the packets to the plurality of second containers rather than the plurality of first containers. 12. The system of claim 1, wherein each computing device of the second set of computing devices is further programmed to: implement a virtual switch; perform, for a subject container of the plurality of second containers executing on the each computing device: receive, by the virtual switch, first packets from the subject container; and change, by the virtual switch, a source address in the first packets from the first container address of the subject container to the second container address of the subject container to obtain modified first packets; transmit, by the virtual switch of the subject computing device, the modified first packets over the network. 13. The system of claim 1, wherein each computing device of the second set of computing devices is further programmed to: implement a virtual switch; perform, for a subject container of the plurality of second containers executing on the each computing device: receive, by the virtual switch, first packets from the subject container; and (a) change, by the virtual switch, a source address in the first packets from the first container address of the subject container to the second container address of the subject container; (b) change, by the virtual switch, a destination address in the first packets from the first container address of a target container of the first packets to the second container address of the target container of the first packets; transmit, by the virtual switch of the subject computing device, the first packets as modified according to (a) and (b) over the network. 14. The system of claim 13, wherein each computing device of the second set of computing devices is further programmed to: perform, for the subject container of the plurality of second containers executing on the each computing device: receive, by the virtual switch, second packets from the network; and (c) change, by the virtual switch, a source address in the second packets from the second container address of a source container of the second packets to the first container address of the source container of the second packets; (d) change, by the virtual switch, a destination address in the second packets from the second container address of the subject container to the first container address of the subject container; transmit, by the virtual switch, the first packets as modified according to (c) and (d) to the subject container. 15. The system of claim 11, wherein the first bundled application includes a plurality of first storage volumes mounted to the plurality of first containers and the second bundled application includes second storage volumes that are clones of the first storage volumes mounted to the second storage volumes to the plurality of second containers. 16. The system of claim 15, wherein the plurality of first containers are further programmed to write, data to the plurality of first storage volumes, the data including references to the first container addresses; and wherein the second storage volumes retain the references to the first container addresses. 17. The system of claim 11, wherein: wherein the distributed computing system is a cloud computing system and the first containers execute in a plurality of virtual nodes in the cloud computing system, the virtual nodes further being assigned host addresses; wherein at least one node of the plurality of virtual nodes implements a virtual switch programmed to: receive an outbound packet including the first container address of a subject container of the plurality of first containers; (a) replace, in the outbound packet, the first container address of the subject container with the host address of a subject node of the plurality of virtual nodes executing the subject container; create a mapping between a port number of the host address of the subject node and the first container address; and transmit the outbound packet as modified at (a) to a destination address in the outbound packet. 18. The system of claim 17, wherein the virtual switch is further programmed to: receive an inbound packet including the port number and the host address of the subject node; (b) replace, in the inbound packet, the host address of the subject node with the first container address of the subject container according to the mapping; and transmitting the inbound packet as modified at (b) to the subject container. 19. The system of claim 11, further comprising an orchestration computing device programmed to: deploy the first bundled application by invoking instantiation of the plurality of first containers according to an application manifest. 20. The system of claim 11, wherein the orchestration computing device is further programmed to: create a snapshot of the first bundled application; and restart the snapshot of the first bundled application on the second set of computing devices to create the second bundled application.
2,400
9,272
9,272
16,159,436
2,439
A first mobile device displays a visual representation of at least a portion of a basketball court and receives user input indicating a sequence of actions to be performed on the basketball court by a player. The first mobile device encodes the sequence of actions into a data structure and sends the data structure to a server to cause the server to initiate a notification to at least at a second mobile device. The second mobile device receives the data structure and displays the visual representation of the basketball court concurrently with at least one user interface element corresponding to at least one action in the sequence of actions. Placement of the at least one user interface element relative to a basketball hoop is determined, at the second mobile device after receipt of the data structure, based at least in part of a profile of the player.
1. A system comprising: a first mobile device configured to execute a first instance of a mobile application to: display a visual representation of at least a portion of a basketball court; receive user input responsive to the visual representation, the user input indicating a sequence of actions to be performed on the basketball court by a player in the course of taking a skills test; encode the sequence of actions into a data structure; and send the data structure to a server to cause the server to initiate a notification regarding the skills test to at least at a second mobile device associated with the player; and the second mobile device configured to execute a second instance of the mobile application to: receive the data structure; and display the visual representation of the basketball court concurrently with at least one user interface element corresponding to at least one action in the sequence of actions, wherein a placement of the at least one user interface element relative to a basketball hoop in the visual representation is determined, at the second mobile device after receipt of the data structure, based at least in part of a profile of the player. 2. The system of claim 1, wherein the sequence of actions includes at least one of shooting a basketball, moving without the basketball to a first particular location on the basketball court, dribbling the basketball to a second particular location on the basketball court, passing the basketball, or catching a basketball. 3. The system of claim 1, wherein the data structure includes a plurality of elements. 4. The system of claim 3, wherein a first element of the plurality of elements corresponds to a shooting location on the basketball court and includes data regarding a number of shot attempts to be taken from the shooting location. 5. The system of claim 4, wherein a second element of the plurality of elements corresponds to a second shooting location on the basketball court and wherein the sequence of actions indicates that the player is to shoot a basketball from the second shooting location after shooting the basketball from the shooting location. 6. The system of claim 1, wherein the at least one user interface element comprises an icon or an animation. 7. The system of claim 1, wherein placement of the at least one user interface element is determined based on a skill level of the player indicated in the profile of the player. 8. The system of claim 7, wherein the skill level of the player includes at least one of high school, college, or professional. 9. The system of claim 1, wherein the notification comprises a push notification. 10. The system of claim 1, further comprising a third mobile device associated with a second player, wherein the third mobile device is configured to execute a third instance of the mobile application to determine a second placement of the at least one user interface element based at least in part on a second profile of the second player, wherein the second placement is different from the placement. 11. The system of claim 1, wherein the second mobile device is further configured to execute the second instance of the mobile application to capture video of the player taking the skills test and to upload the video for verification that the player took the skills test. 12. The system of claim 1, wherein the second mobile device is located at a certified testing facility. 13. The system of claim 1, wherein the first mobile device is further configured to execute the first instance of the mobile application to receive test performance data associated with the player taking the skills test. 14. The system of claim 13, wherein the first mobile device is further configured to execute the first instance of the mobile application to generate forward projections based on the test performance data and aggregate data. 15. The system of claim 14, wherein the forward projections include at least one of expected points, goals, assists, rebounds, blocks, or steals, and wherein the aggregate data is based on test performance data corresponding to other players. 16. The system of claim 13, wherein the first mobile device is further configured to execute the first instance of the mobile application to generate team forward projection based on the test performance data and aggregate data, wherein the team forward projection includes at least one of: expected wins, losses, win streaks, loss streaks, win percentage, opponent predictions, or weather predictions, and wherein the aggregate data includes open domain data. 17. A method comprising: receiving, at a computer via a sports social media application, data indicating a test to be performed by a basketball player associated with the computer; initiating the test based on the data; capturing video of the basketball player performing the test; generating test performance data based on the video; and sending, by the computer, the test performance data via the sports social media application. 18. The method of claim 17, further comprising generating audible instructions based on the data, wherein the data is received from a first device, and wherein the test performance data is sent to a second device. 19. A computer-readable storage device storing instructions that, when executed, cause a computer to perform operations comprising: receiving data indicating a test to be performed by a basketball player; initiating the test based on the data; capturing video of the basketball player performing the test; generating test performance data based on the video; and sending the test performance data to an electronic device. 20. The computer-readable storage device of claim 19, further comprising outputting at least one instruction associated with the test, the at least one instruction determined based on a profile of the basketball player.
A first mobile device displays a visual representation of at least a portion of a basketball court and receives user input indicating a sequence of actions to be performed on the basketball court by a player. The first mobile device encodes the sequence of actions into a data structure and sends the data structure to a server to cause the server to initiate a notification to at least at a second mobile device. The second mobile device receives the data structure and displays the visual representation of the basketball court concurrently with at least one user interface element corresponding to at least one action in the sequence of actions. Placement of the at least one user interface element relative to a basketball hoop is determined, at the second mobile device after receipt of the data structure, based at least in part of a profile of the player.1. A system comprising: a first mobile device configured to execute a first instance of a mobile application to: display a visual representation of at least a portion of a basketball court; receive user input responsive to the visual representation, the user input indicating a sequence of actions to be performed on the basketball court by a player in the course of taking a skills test; encode the sequence of actions into a data structure; and send the data structure to a server to cause the server to initiate a notification regarding the skills test to at least at a second mobile device associated with the player; and the second mobile device configured to execute a second instance of the mobile application to: receive the data structure; and display the visual representation of the basketball court concurrently with at least one user interface element corresponding to at least one action in the sequence of actions, wherein a placement of the at least one user interface element relative to a basketball hoop in the visual representation is determined, at the second mobile device after receipt of the data structure, based at least in part of a profile of the player. 2. The system of claim 1, wherein the sequence of actions includes at least one of shooting a basketball, moving without the basketball to a first particular location on the basketball court, dribbling the basketball to a second particular location on the basketball court, passing the basketball, or catching a basketball. 3. The system of claim 1, wherein the data structure includes a plurality of elements. 4. The system of claim 3, wherein a first element of the plurality of elements corresponds to a shooting location on the basketball court and includes data regarding a number of shot attempts to be taken from the shooting location. 5. The system of claim 4, wherein a second element of the plurality of elements corresponds to a second shooting location on the basketball court and wherein the sequence of actions indicates that the player is to shoot a basketball from the second shooting location after shooting the basketball from the shooting location. 6. The system of claim 1, wherein the at least one user interface element comprises an icon or an animation. 7. The system of claim 1, wherein placement of the at least one user interface element is determined based on a skill level of the player indicated in the profile of the player. 8. The system of claim 7, wherein the skill level of the player includes at least one of high school, college, or professional. 9. The system of claim 1, wherein the notification comprises a push notification. 10. The system of claim 1, further comprising a third mobile device associated with a second player, wherein the third mobile device is configured to execute a third instance of the mobile application to determine a second placement of the at least one user interface element based at least in part on a second profile of the second player, wherein the second placement is different from the placement. 11. The system of claim 1, wherein the second mobile device is further configured to execute the second instance of the mobile application to capture video of the player taking the skills test and to upload the video for verification that the player took the skills test. 12. The system of claim 1, wherein the second mobile device is located at a certified testing facility. 13. The system of claim 1, wherein the first mobile device is further configured to execute the first instance of the mobile application to receive test performance data associated with the player taking the skills test. 14. The system of claim 13, wherein the first mobile device is further configured to execute the first instance of the mobile application to generate forward projections based on the test performance data and aggregate data. 15. The system of claim 14, wherein the forward projections include at least one of expected points, goals, assists, rebounds, blocks, or steals, and wherein the aggregate data is based on test performance data corresponding to other players. 16. The system of claim 13, wherein the first mobile device is further configured to execute the first instance of the mobile application to generate team forward projection based on the test performance data and aggregate data, wherein the team forward projection includes at least one of: expected wins, losses, win streaks, loss streaks, win percentage, opponent predictions, or weather predictions, and wherein the aggregate data includes open domain data. 17. A method comprising: receiving, at a computer via a sports social media application, data indicating a test to be performed by a basketball player associated with the computer; initiating the test based on the data; capturing video of the basketball player performing the test; generating test performance data based on the video; and sending, by the computer, the test performance data via the sports social media application. 18. The method of claim 17, further comprising generating audible instructions based on the data, wherein the data is received from a first device, and wherein the test performance data is sent to a second device. 19. A computer-readable storage device storing instructions that, when executed, cause a computer to perform operations comprising: receiving data indicating a test to be performed by a basketball player; initiating the test based on the data; capturing video of the basketball player performing the test; generating test performance data based on the video; and sending the test performance data to an electronic device. 20. The computer-readable storage device of claim 19, further comprising outputting at least one instruction associated with the test, the at least one instruction determined based on a profile of the basketball player.
2,400
9,273
9,273
16,024,818
2,444
A method may include receiving an instruction to route the data to a destination. The method may additionally include inspecting the data to identify metadata associated with the data. The method may further include identifying, based on the metadata, a first routing path and a second routing path that both lead to the destination. The first routing path may include a first communication link, and the second routing path may include a second communication link. The method may also include identifying the first routing path based on a configuration preference of the routing policy. The method may additionally include transmitting the data along the first routing path via the first communication link.
1. A method, comprising: receiving data including an instruction to route the data to a destination; inspecting the data to identify metadata associated with the data; identifying, based on the metadata, a first routing path that leads to the destination and a second routing path that leads to the destination, the first routing path including a first communication link, and the second routing path including a second communication link; identifying, based on the metadata, a configuration preference of a routing policy for the data to be routed along the first routing path; selecting the first routing path based on the configuration preference of the routing policy; and transmitting the data along the first routing path via the first communication link. 2. The method of claim 1, wherein inspecting the data to identify the metadata associated with the data comprises identifying at least one of: a cost associated with a transmission of the data, a service level agreement (SLA) associated with the data, a source address, a source port, a destination address, a destination port, a protocol, a differentiated services code point (DSCP) value, a type of service (TOS) value, an application, a user, a user group. 3. The method of claim 1, wherein the first communication link and the second communication link include one of: an Internet connection; a MultiProtocol Label Switching (MPLS) connection; a cellular connection, or a cable connection. 4. The method of claim 1, wherein the first routing path and the second routing path include a same number of links, circuits, and tunnels for the data to reach the destination. 5. The method of claim 1, wherein the first routing path and the second routing path include a same number of hops for the data to reach the destination. 6. The method of claim 1, wherein the data includes at least one packet or a data flow. 7. The method of claim 1, wherein inspecting the data to identify the metadata associated with the data comprises inspecting a header, the header including a DSCP value in the header to indicate a predefined routing path. 8. The method of claim 7, wherein selecting the first routing path based on the configuration preference of the routing policy comprises rewriting the DSCP value in the header to indicate the first routing path, wherein transmitting the data along the first routing path via the first communication link comprises transmitting the data along the first routing path via the first communication link based on the DSCP value in the header. 9. The method of claim 1, wherein selecting the first routing path comprises determining a first performance score for the first communication link in view of the configuration preference of the routing policy and a second performance score for the second communication link in view of the configuration preference of the routing policy, wherein the first performance score for the first communication link is indicative of a higher performance than the second performance score for the second communication link. 10. The method of claim 9, wherein determining the first performance score for the first communication link in view of the configuration preference of the routing policy comprises determining the first performance score based on at least one of jitter, latency, and loss associated with the first communication link, and wherein determining the second performance score for the second communication link in view of the configuration preference of the routing policy comprises determining the second performance score based on at least one of jitter, latency, and loss associated with the second communication link. 11. The method of claim 1, wherein selecting the first routing path based on the configuration preference a of the routing policy comprises: identifying an application associated with the data; determining whether the configuration preference includes a data routing rule for the application; and selecting the first routing path based on a determination that the configuration preference includes a data routing rule for the application to route along routing paths with characteristics similar to the first routing path. 12. A non-transitory computer-readable medium that includes computer-readable instructions stored thereon that are executable by a processor to perform or control performance of operations comprising: receive data including an instruction to route the data to a destination; inspect the data to identify metadata associated with the data; identify, based on the metadata, a first routing path that leads to the destination and a second routing path that leads to the destination, the first routing path including a first communication link, and the second routing path including a second communication link; identify, based on the metadata, a configuration preference of a routing policy for the data to be routed along the first routing path; select the first routing path based on the configuration preference of the routing policy; and transmit the data along the first routing path via the first communication link. 13. The non-transitory computer-readable medium of claim 12, wherein the metadata associated with the data includes at least one of: a cost associated with a transmission of the data, a service level agreement (SLA) associated with the data, a source address, a source port, a destination address, a destination port, a protocol, a differentiated services code point (DSCP) value, a type of service (TOS) value, an application, a user, a user group. 14. The non-transitory computer-readable medium of claim 12, wherein inspecting the data to identify the metadata associated with the data comprises inspecting a header, the header including a DSCP value in the header to indicate a predefined routing path. 15. The non-transitory computer-readable medium of claim 12, wherein selecting the first routing path comprises determining a first performance score for the first communication link in view of the configuration preference of the routing policy and a second performance score for the second communication link in view of the configuration preference of the routing policy, wherein the first performance score for the first communication link is indicative of a higher performance than the second performance score for the second communication link. 16. The non-transitory computer-readable medium of claim 15, wherein determining the first performance score for the first communication link in view of the configuration preference of the routing policy comprises determining the first performance score based on at least one of jitter, latency, and loss associated with the first communication link, and wherein determining the second performance score for the second communication link in view of the configuration preference of the routing policy comprises determining the second performance score based on at least one of jitter, latency, and loss associated with the second communication link. 17. A system comprising: a memory; and one or more processors, the one or more processors configured to perform operations comprising: receive data including an instruction to route the data to a destination; inspect the data to identify metadata associated with the data; identify, based on the metadata, a first routing path that leads to the destination and a second routing path that leads to the destination, the first routing path including a first communication link, and the second routing path including a second communication link; identify, based on the metadata, a configuration preference of a routing policy for the data to be routed along the first routing path; select the first routing path based on the configuration preference of the routing policy; and transmit the data along the first routing path via the first communication link. 18. The system of claim 17, wherein when inspecting the data to identify the metadata associated with the data, the one or more processors are configured to inspect a header, the header including a DSCP value in the header to indicate a predefined routing path. 19. The system of claim 17, wherein when selecting the first routing path, the one or more processors are configured to determine a first performance score for the first communication link in view of the configuration preference of the routing policy and a second performance score for the second communication link in view of the configuration preference of the routing policy, wherein the first performance score for the first communication link is indicative of a higher performance than the second performance score for the second communication link. 20. The system of claim 19, wherein when determining the first performance score for the first communication link in view of the configuration preference of the routing policy, the one or more processors are configured to determine the first performance score based on at least one of jitter, latency, and loss associated with the first communication link, and wherein when determining the second performance score for the second communication link in view of the configuration preference of the routing policy, the one or more processors are configured to determine the second performance score based on at least one of jitter, latency, and loss associated with the second communication link.
A method may include receiving an instruction to route the data to a destination. The method may additionally include inspecting the data to identify metadata associated with the data. The method may further include identifying, based on the metadata, a first routing path and a second routing path that both lead to the destination. The first routing path may include a first communication link, and the second routing path may include a second communication link. The method may also include identifying the first routing path based on a configuration preference of the routing policy. The method may additionally include transmitting the data along the first routing path via the first communication link.1. A method, comprising: receiving data including an instruction to route the data to a destination; inspecting the data to identify metadata associated with the data; identifying, based on the metadata, a first routing path that leads to the destination and a second routing path that leads to the destination, the first routing path including a first communication link, and the second routing path including a second communication link; identifying, based on the metadata, a configuration preference of a routing policy for the data to be routed along the first routing path; selecting the first routing path based on the configuration preference of the routing policy; and transmitting the data along the first routing path via the first communication link. 2. The method of claim 1, wherein inspecting the data to identify the metadata associated with the data comprises identifying at least one of: a cost associated with a transmission of the data, a service level agreement (SLA) associated with the data, a source address, a source port, a destination address, a destination port, a protocol, a differentiated services code point (DSCP) value, a type of service (TOS) value, an application, a user, a user group. 3. The method of claim 1, wherein the first communication link and the second communication link include one of: an Internet connection; a MultiProtocol Label Switching (MPLS) connection; a cellular connection, or a cable connection. 4. The method of claim 1, wherein the first routing path and the second routing path include a same number of links, circuits, and tunnels for the data to reach the destination. 5. The method of claim 1, wherein the first routing path and the second routing path include a same number of hops for the data to reach the destination. 6. The method of claim 1, wherein the data includes at least one packet or a data flow. 7. The method of claim 1, wherein inspecting the data to identify the metadata associated with the data comprises inspecting a header, the header including a DSCP value in the header to indicate a predefined routing path. 8. The method of claim 7, wherein selecting the first routing path based on the configuration preference of the routing policy comprises rewriting the DSCP value in the header to indicate the first routing path, wherein transmitting the data along the first routing path via the first communication link comprises transmitting the data along the first routing path via the first communication link based on the DSCP value in the header. 9. The method of claim 1, wherein selecting the first routing path comprises determining a first performance score for the first communication link in view of the configuration preference of the routing policy and a second performance score for the second communication link in view of the configuration preference of the routing policy, wherein the first performance score for the first communication link is indicative of a higher performance than the second performance score for the second communication link. 10. The method of claim 9, wherein determining the first performance score for the first communication link in view of the configuration preference of the routing policy comprises determining the first performance score based on at least one of jitter, latency, and loss associated with the first communication link, and wherein determining the second performance score for the second communication link in view of the configuration preference of the routing policy comprises determining the second performance score based on at least one of jitter, latency, and loss associated with the second communication link. 11. The method of claim 1, wherein selecting the first routing path based on the configuration preference a of the routing policy comprises: identifying an application associated with the data; determining whether the configuration preference includes a data routing rule for the application; and selecting the first routing path based on a determination that the configuration preference includes a data routing rule for the application to route along routing paths with characteristics similar to the first routing path. 12. A non-transitory computer-readable medium that includes computer-readable instructions stored thereon that are executable by a processor to perform or control performance of operations comprising: receive data including an instruction to route the data to a destination; inspect the data to identify metadata associated with the data; identify, based on the metadata, a first routing path that leads to the destination and a second routing path that leads to the destination, the first routing path including a first communication link, and the second routing path including a second communication link; identify, based on the metadata, a configuration preference of a routing policy for the data to be routed along the first routing path; select the first routing path based on the configuration preference of the routing policy; and transmit the data along the first routing path via the first communication link. 13. The non-transitory computer-readable medium of claim 12, wherein the metadata associated with the data includes at least one of: a cost associated with a transmission of the data, a service level agreement (SLA) associated with the data, a source address, a source port, a destination address, a destination port, a protocol, a differentiated services code point (DSCP) value, a type of service (TOS) value, an application, a user, a user group. 14. The non-transitory computer-readable medium of claim 12, wherein inspecting the data to identify the metadata associated with the data comprises inspecting a header, the header including a DSCP value in the header to indicate a predefined routing path. 15. The non-transitory computer-readable medium of claim 12, wherein selecting the first routing path comprises determining a first performance score for the first communication link in view of the configuration preference of the routing policy and a second performance score for the second communication link in view of the configuration preference of the routing policy, wherein the first performance score for the first communication link is indicative of a higher performance than the second performance score for the second communication link. 16. The non-transitory computer-readable medium of claim 15, wherein determining the first performance score for the first communication link in view of the configuration preference of the routing policy comprises determining the first performance score based on at least one of jitter, latency, and loss associated with the first communication link, and wherein determining the second performance score for the second communication link in view of the configuration preference of the routing policy comprises determining the second performance score based on at least one of jitter, latency, and loss associated with the second communication link. 17. A system comprising: a memory; and one or more processors, the one or more processors configured to perform operations comprising: receive data including an instruction to route the data to a destination; inspect the data to identify metadata associated with the data; identify, based on the metadata, a first routing path that leads to the destination and a second routing path that leads to the destination, the first routing path including a first communication link, and the second routing path including a second communication link; identify, based on the metadata, a configuration preference of a routing policy for the data to be routed along the first routing path; select the first routing path based on the configuration preference of the routing policy; and transmit the data along the first routing path via the first communication link. 18. The system of claim 17, wherein when inspecting the data to identify the metadata associated with the data, the one or more processors are configured to inspect a header, the header including a DSCP value in the header to indicate a predefined routing path. 19. The system of claim 17, wherein when selecting the first routing path, the one or more processors are configured to determine a first performance score for the first communication link in view of the configuration preference of the routing policy and a second performance score for the second communication link in view of the configuration preference of the routing policy, wherein the first performance score for the first communication link is indicative of a higher performance than the second performance score for the second communication link. 20. The system of claim 19, wherein when determining the first performance score for the first communication link in view of the configuration preference of the routing policy, the one or more processors are configured to determine the first performance score based on at least one of jitter, latency, and loss associated with the first communication link, and wherein when determining the second performance score for the second communication link in view of the configuration preference of the routing policy, the one or more processors are configured to determine the second performance score based on at least one of jitter, latency, and loss associated with the second communication link.
2,400
9,274
9,274
15,249,653
2,461
A method of estimating available bandwidth for a network comprising a transmitting device and a receiving device, the method comprising: transmitting a media packet stream over the network to the receiving device, the media packets comprising media data for streaming media at the receiving device; transmitting one or more probe packets over the network so as to test the available bandwidth of the network, wherein the probe packets comprise duplicate data of the media packet stream; and determining, during transmission of the probe packets, a measure of network bandwidth availability in dependence on one or more metrics associated with receiving the media packet stream at the receiving device.
1. A method of estimating available bandwidth for a network comprising a transmitting device and a receiving device, the method comprising: transmitting a media packet stream over the network to the receiving device, the media packets comprising media data for streaming media at the receiving device; transmitting one or more probe packet(s) over the network so as to test the available bandwidth of the network, wherein the probe packet(s) comprise duplicate data of the media packet stream; and determining, during transmission of the probe packet(s), a measure of network bandwidth availability in dependence on one or more metrics associated with receiving the media packet stream at the receiving device. 2. A method as claimed in claim 1, wherein the probe packets are duplicates of packets from the media packet stream. 3. A method as claimed in claim 1 further comprising receiving the probe packet(s) and using the data in the received probe packet(s) for playing media at the receiving device. 4. A method as claimed in claim 1, further comprising, for the or each received probe packet, determining whether the probe packet is a duplicate packet of a media packet that has been received prior to receiving the probe packet and, if not, placing the probe packet in a jitter buffer. 5. A method as claimed in claim 1, further comprising, if the measure indicates a reduction in the available bandwidth sufficient to degrade the quality of the media stream, stopping the transmission of the probe packets. 6. A method as claimed in claim 1, further comprising, if the measure indicates sufficient available bandwidth, increasing a transmission bitrate for the media stream. 7. A method as claimed in claim 6, wherein said increase of the transmission bitrate comprises enabling a video stream. 8. A method as claimed in claim 1, wherein the probe packets are transmitted at regular time intervals, wherein, if the measure indicates a reduction in the bandwidth of the network sufficient to degrade the quality of the media stream, increasing the amount of time between the time intervals. 9. A transmitting device for estimating available bandwidth for a network comprising the transmitting device and a receiving device, the device comprising: a transceiver configured to transmit a media packet stream over the network to the receiving device, the media packets comprising media data for streaming media at the receiving device; a controller configured to cause the transceiver to transmit one or more probe packet(s) over the network so as to test the available bandwidth of the network, wherein the probe packet(s) comprise duplicate data of the media packet stream; and a bandwidth estimator configured to determine, during transmission of the probe packet(s), a measure of network bandwidth availability in dependence on one or more metrics associated with receiving the media packet stream at the receiving device. 10. A device as claimed in claim 9, wherein the probe packets are duplicates of packets from the media packet stream. 11. A device as claimed in claim 9, wherein the controller is configured to stop the transmission of the probe packets if during transmission of the probe packets the measure indicates a reduction in the available bandwidth sufficient to degrade the quality of the media stream. 12. A device as claimed in claim 9, wherein the controller is configured to increase a transmission bitrate for the media stream if during transmission of the probe packets the measure indicates sufficient available bandwidth. 13. A device as claimed in claim 12, wherein said increase of the transmission bitrate comprises enabling a video stream. 14. A device as claimed in claim 9, wherein the probe packets are transmitted at regular time intervals and the controller is configured to increase the amount of time between the time intervals if during transmission of the probe packets the measure indicates a reduction in the bandwidth of the network sufficient to degrade the quality of the media stream. 15. A network comprising a transmitting device as claimed in claim 9 and a receiving device, the receiving device comprising: a transceiver configured to receive the probe packet(s); and a media consumer configured to use the data in the received probe packet(s) for playing media. 16. A network as claimed in claim 15, wherein the receiving device is configured to, for the or each received probe packet: determine whether the probe packet is a duplicate packet of a media packet that has been received prior to receiving the probe packet and, if not, place the probe packet in a jitter buffer. 17. A non-transitory computer readable storage medium having stored thereon computer readable instructions that, when executed at a computer system, cause the computer system to perform a method of estimating available bandwidth for a network comprising a transmitting device and a receiving device, the method comprising: transmitting a media packet stream over the network to the receiving device, the media packets comprising media data for streaming media at the receiving device; transmitting one or more probe packet(s) over the network so as to test the available bandwidth of the network, wherein the probe packet(s) comprise duplicate data of the media packet stream; and determining, during transmission of the probe packet(s), a measure of network bandwidth availability in dependence on one or more metrics associated with receiving the media packet stream at the receiving device.
A method of estimating available bandwidth for a network comprising a transmitting device and a receiving device, the method comprising: transmitting a media packet stream over the network to the receiving device, the media packets comprising media data for streaming media at the receiving device; transmitting one or more probe packets over the network so as to test the available bandwidth of the network, wherein the probe packets comprise duplicate data of the media packet stream; and determining, during transmission of the probe packets, a measure of network bandwidth availability in dependence on one or more metrics associated with receiving the media packet stream at the receiving device.1. A method of estimating available bandwidth for a network comprising a transmitting device and a receiving device, the method comprising: transmitting a media packet stream over the network to the receiving device, the media packets comprising media data for streaming media at the receiving device; transmitting one or more probe packet(s) over the network so as to test the available bandwidth of the network, wherein the probe packet(s) comprise duplicate data of the media packet stream; and determining, during transmission of the probe packet(s), a measure of network bandwidth availability in dependence on one or more metrics associated with receiving the media packet stream at the receiving device. 2. A method as claimed in claim 1, wherein the probe packets are duplicates of packets from the media packet stream. 3. A method as claimed in claim 1 further comprising receiving the probe packet(s) and using the data in the received probe packet(s) for playing media at the receiving device. 4. A method as claimed in claim 1, further comprising, for the or each received probe packet, determining whether the probe packet is a duplicate packet of a media packet that has been received prior to receiving the probe packet and, if not, placing the probe packet in a jitter buffer. 5. A method as claimed in claim 1, further comprising, if the measure indicates a reduction in the available bandwidth sufficient to degrade the quality of the media stream, stopping the transmission of the probe packets. 6. A method as claimed in claim 1, further comprising, if the measure indicates sufficient available bandwidth, increasing a transmission bitrate for the media stream. 7. A method as claimed in claim 6, wherein said increase of the transmission bitrate comprises enabling a video stream. 8. A method as claimed in claim 1, wherein the probe packets are transmitted at regular time intervals, wherein, if the measure indicates a reduction in the bandwidth of the network sufficient to degrade the quality of the media stream, increasing the amount of time between the time intervals. 9. A transmitting device for estimating available bandwidth for a network comprising the transmitting device and a receiving device, the device comprising: a transceiver configured to transmit a media packet stream over the network to the receiving device, the media packets comprising media data for streaming media at the receiving device; a controller configured to cause the transceiver to transmit one or more probe packet(s) over the network so as to test the available bandwidth of the network, wherein the probe packet(s) comprise duplicate data of the media packet stream; and a bandwidth estimator configured to determine, during transmission of the probe packet(s), a measure of network bandwidth availability in dependence on one or more metrics associated with receiving the media packet stream at the receiving device. 10. A device as claimed in claim 9, wherein the probe packets are duplicates of packets from the media packet stream. 11. A device as claimed in claim 9, wherein the controller is configured to stop the transmission of the probe packets if during transmission of the probe packets the measure indicates a reduction in the available bandwidth sufficient to degrade the quality of the media stream. 12. A device as claimed in claim 9, wherein the controller is configured to increase a transmission bitrate for the media stream if during transmission of the probe packets the measure indicates sufficient available bandwidth. 13. A device as claimed in claim 12, wherein said increase of the transmission bitrate comprises enabling a video stream. 14. A device as claimed in claim 9, wherein the probe packets are transmitted at regular time intervals and the controller is configured to increase the amount of time between the time intervals if during transmission of the probe packets the measure indicates a reduction in the bandwidth of the network sufficient to degrade the quality of the media stream. 15. A network comprising a transmitting device as claimed in claim 9 and a receiving device, the receiving device comprising: a transceiver configured to receive the probe packet(s); and a media consumer configured to use the data in the received probe packet(s) for playing media. 16. A network as claimed in claim 15, wherein the receiving device is configured to, for the or each received probe packet: determine whether the probe packet is a duplicate packet of a media packet that has been received prior to receiving the probe packet and, if not, place the probe packet in a jitter buffer. 17. A non-transitory computer readable storage medium having stored thereon computer readable instructions that, when executed at a computer system, cause the computer system to perform a method of estimating available bandwidth for a network comprising a transmitting device and a receiving device, the method comprising: transmitting a media packet stream over the network to the receiving device, the media packets comprising media data for streaming media at the receiving device; transmitting one or more probe packet(s) over the network so as to test the available bandwidth of the network, wherein the probe packet(s) comprise duplicate data of the media packet stream; and determining, during transmission of the probe packet(s), a measure of network bandwidth availability in dependence on one or more metrics associated with receiving the media packet stream at the receiving device.
2,400
9,275
9,275
15,045,205
2,432
This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.
1. A method comprising: receiving a network traffic from a first endpoint group of a network destined for a second endpoint group of the network; capturing first network flow data between the first endpoint group and the second endpoint group based at least in part by enforcing a first network policy of the network with respect to the network traffic; receiving a request to simulate enforcement of a second network policy between the first endpoint group and the second endpoint group; determining second network flow data between the first endpoint group and the second endpoint group by simulating enforcement of the second network policy with respect to the network traffic; and providing an indication whether to enforce the second network policy based at least in part on the second network flow data. 2. The method of claim 1, further comprising: receiving aggregate network flow data from a plurality of sensors of the network, the plurality of sensors including at least a first sensor of a physical switch of the network, a second sensor of a hypervisor associated with the physical switch, a third sensor of a virtual machine associated with the hypervisor; determining, based at least in part on the aggregate network flow data, a dependency map of an application executing in the network, the dependency map indicating a pattern of network traffic associated with the application; determining, based at least in part on the dependency map, at least one network policy for the network; and storing the at least one network policy in a policy table. 3. The method of claim 2, wherein the at least one network policy comprises a whitelist rule. 4. The method of claim 2, wherein the at least one network policy comprises a blacklist rule, and the method further comprises: converting, based at least in part on the dependency map, the blacklist rule to a whitelist rule. 5. The method of claim 2, further comprising: simulating removal of at least one network policy from the policy table; and determining third network flow data without the at least one network policy in effect. 6. The method of claim 2, further comprising: simulating addition of at least one endpoint to the first endpoint group or the second endpoint group; and determining third network flow data associated with the at least one endpoint. 7. The method of claim 1, further comprising: simulating removal of at least one endpoint from the first endpoint group or the second endpoint group; and determining third network flow data associated with the at least one endpoint. 8. The method of claim 1, further comprising: simulating membership of at least one endpoint in the first endpoint group to the second endpoint group; and determining third network flow data associated with the at least one endpoint. 9. A system comprising: one or more processors; and memory including instructions that, upon being executed by the one or more processors, cause the system to: p1 receive a network traffic from a first endpoint group of a network destined for a second endpoint group of the network; capture first network flow data between the first endpoint group and the second endpoint group based at least in part by enforcing a first network policy of the network with respect to the network traffic; receive a request to simulate enforcement of a second network policy between the first endpoint group and the second endpoint group; determine second network flow data between the first endpoint group and the second endpoint group by simulating enforcement of the second network policy with respect to the network traffic; and provide an indication whether to enforce the second network policy based at least in part on the second network flow data. 10. The system of claim 9, wherein the instructions upon being executed further cause the system to: receive aggregate network flow data from a plurality of sensors of the network, the plurality of sensors including at least a first sensor of a physical switch of the network, a second sensor of a hypervisor associated with the physical switch, a third sensor of a virtual machine associated with the hypervisor; determine, based at least in part on the aggregate network flow data, a dependency map of an application executing in the network, the dependency map indicating a pattern of network traffic associated with the application; determine, based at least in part on the dependency map, at least one network policy for the network; and store the at least one network policy in a policy table. 11. The system of claim 10, wherein the at least one network policy comprises a whitelist rule. 12. The system of claim 10, wherein the at least one network policy comprises a blacklist rule, and the instructions upon being executed further cause the system to: convert, based at least in part on the dependency map, the blacklist rule to a whitelist rule. 13. The system of claim 9, wherein the instructions upon being executed further cause the system to: simulate removal of at least one network policy from the policy table; and determine third network flow data without the at least one network policy in effect. 14. The system of claim 9, wherein the instructions upon being executed further cause the system to: simulate addition of at least one endpoint to the first endpoint group or the second endpoint group; and determine third network flow data associated with the at least one endpoint. 15. The system of claim 9, wherein the instructions upon being executed further cause the system to: simulate modification of at least one endpoint in the first endpoint group to the second endpoint group; and determine third network flow data associated with the at least one endpoint. 16. A non-transitory computer-readable storage medium having stored therein instructions that, upon being executed by a processor, cause the processor to: receive a network traffic from a first endpoint group of a network destined for a second endpoint group of the network; capture first network flow data between the first endpoint group and the second endpoint group based at least in part by enforcing a first network policy of the network with respect to the network traffic; p1 receive a request to simulate enforcement of a second network policy between the first endpoint group and the second endpoint group; determine second network flow data between the first endpoint group and the second endpoint group by simulating enforcement of the second network policy with respect to the network traffic; and provide an indication whether to enforce the second network policy based at least in part on the second network flow data. 17. The non-transitory computer-readable storage medium of claim 16, wherein the instructions upon being executed further cause the processor to: receive aggregate network flow data from a plurality of sensors of the network, the plurality of sensors including at least a first sensor of a physical switch of the network, a second sensor of a hypervisor associated with the physical switch, a third sensor of a virtual machine associated with the hypervisor; determine, based at least in part on the aggregate network flow data, a dependency map of an application executing in the network, the dependency map indicating a pattern of network traffic associated with the application; determine, based at least in part on the dependency map, at least one network policy for the network; and store the at least one network policy in a policy table. 18. The non-transitory computer-readable storage medium of claim 17, wherein the instructions upon being executed further cause the processor to: simulate removal of at least one network policy from the policy table; and determine second simulated network flow data without the at least one network policy in effect. 19. The non-transitory computer-readable storage medium of claim 16, wherein the instructions upon being executed further cause the processor to: simulate addition of at least one endpoint to the first endpoint group or the second endpoint group; and determine third network flow data associated with the at least one endpoint. 20. The non-transitory computer-readable storage medium of claim 16, wherein the instructions upon being executed further cause the processor to: simulate modification of at least one endpoint in the first endpoint group to the second endpoint group; and determine third network flow data associated with the at least.
This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.1. A method comprising: receiving a network traffic from a first endpoint group of a network destined for a second endpoint group of the network; capturing first network flow data between the first endpoint group and the second endpoint group based at least in part by enforcing a first network policy of the network with respect to the network traffic; receiving a request to simulate enforcement of a second network policy between the first endpoint group and the second endpoint group; determining second network flow data between the first endpoint group and the second endpoint group by simulating enforcement of the second network policy with respect to the network traffic; and providing an indication whether to enforce the second network policy based at least in part on the second network flow data. 2. The method of claim 1, further comprising: receiving aggregate network flow data from a plurality of sensors of the network, the plurality of sensors including at least a first sensor of a physical switch of the network, a second sensor of a hypervisor associated with the physical switch, a third sensor of a virtual machine associated with the hypervisor; determining, based at least in part on the aggregate network flow data, a dependency map of an application executing in the network, the dependency map indicating a pattern of network traffic associated with the application; determining, based at least in part on the dependency map, at least one network policy for the network; and storing the at least one network policy in a policy table. 3. The method of claim 2, wherein the at least one network policy comprises a whitelist rule. 4. The method of claim 2, wherein the at least one network policy comprises a blacklist rule, and the method further comprises: converting, based at least in part on the dependency map, the blacklist rule to a whitelist rule. 5. The method of claim 2, further comprising: simulating removal of at least one network policy from the policy table; and determining third network flow data without the at least one network policy in effect. 6. The method of claim 2, further comprising: simulating addition of at least one endpoint to the first endpoint group or the second endpoint group; and determining third network flow data associated with the at least one endpoint. 7. The method of claim 1, further comprising: simulating removal of at least one endpoint from the first endpoint group or the second endpoint group; and determining third network flow data associated with the at least one endpoint. 8. The method of claim 1, further comprising: simulating membership of at least one endpoint in the first endpoint group to the second endpoint group; and determining third network flow data associated with the at least one endpoint. 9. A system comprising: one or more processors; and memory including instructions that, upon being executed by the one or more processors, cause the system to: p1 receive a network traffic from a first endpoint group of a network destined for a second endpoint group of the network; capture first network flow data between the first endpoint group and the second endpoint group based at least in part by enforcing a first network policy of the network with respect to the network traffic; receive a request to simulate enforcement of a second network policy between the first endpoint group and the second endpoint group; determine second network flow data between the first endpoint group and the second endpoint group by simulating enforcement of the second network policy with respect to the network traffic; and provide an indication whether to enforce the second network policy based at least in part on the second network flow data. 10. The system of claim 9, wherein the instructions upon being executed further cause the system to: receive aggregate network flow data from a plurality of sensors of the network, the plurality of sensors including at least a first sensor of a physical switch of the network, a second sensor of a hypervisor associated with the physical switch, a third sensor of a virtual machine associated with the hypervisor; determine, based at least in part on the aggregate network flow data, a dependency map of an application executing in the network, the dependency map indicating a pattern of network traffic associated with the application; determine, based at least in part on the dependency map, at least one network policy for the network; and store the at least one network policy in a policy table. 11. The system of claim 10, wherein the at least one network policy comprises a whitelist rule. 12. The system of claim 10, wherein the at least one network policy comprises a blacklist rule, and the instructions upon being executed further cause the system to: convert, based at least in part on the dependency map, the blacklist rule to a whitelist rule. 13. The system of claim 9, wherein the instructions upon being executed further cause the system to: simulate removal of at least one network policy from the policy table; and determine third network flow data without the at least one network policy in effect. 14. The system of claim 9, wherein the instructions upon being executed further cause the system to: simulate addition of at least one endpoint to the first endpoint group or the second endpoint group; and determine third network flow data associated with the at least one endpoint. 15. The system of claim 9, wherein the instructions upon being executed further cause the system to: simulate modification of at least one endpoint in the first endpoint group to the second endpoint group; and determine third network flow data associated with the at least one endpoint. 16. A non-transitory computer-readable storage medium having stored therein instructions that, upon being executed by a processor, cause the processor to: receive a network traffic from a first endpoint group of a network destined for a second endpoint group of the network; capture first network flow data between the first endpoint group and the second endpoint group based at least in part by enforcing a first network policy of the network with respect to the network traffic; p1 receive a request to simulate enforcement of a second network policy between the first endpoint group and the second endpoint group; determine second network flow data between the first endpoint group and the second endpoint group by simulating enforcement of the second network policy with respect to the network traffic; and provide an indication whether to enforce the second network policy based at least in part on the second network flow data. 17. The non-transitory computer-readable storage medium of claim 16, wherein the instructions upon being executed further cause the processor to: receive aggregate network flow data from a plurality of sensors of the network, the plurality of sensors including at least a first sensor of a physical switch of the network, a second sensor of a hypervisor associated with the physical switch, a third sensor of a virtual machine associated with the hypervisor; determine, based at least in part on the aggregate network flow data, a dependency map of an application executing in the network, the dependency map indicating a pattern of network traffic associated with the application; determine, based at least in part on the dependency map, at least one network policy for the network; and store the at least one network policy in a policy table. 18. The non-transitory computer-readable storage medium of claim 17, wherein the instructions upon being executed further cause the processor to: simulate removal of at least one network policy from the policy table; and determine second simulated network flow data without the at least one network policy in effect. 19. The non-transitory computer-readable storage medium of claim 16, wherein the instructions upon being executed further cause the processor to: simulate addition of at least one endpoint to the first endpoint group or the second endpoint group; and determine third network flow data associated with the at least one endpoint. 20. The non-transitory computer-readable storage medium of claim 16, wherein the instructions upon being executed further cause the processor to: simulate modification of at least one endpoint in the first endpoint group to the second endpoint group; and determine third network flow data associated with the at least.
2,400
9,276
9,276
13,733,845
2,485
A method, comprises monitoring a encoding process of a source video file performed by an encoder; obtaining an encoding decision parameter used to encode a picture of the source video file during the encoding process; comparing the encoding decision parameter to a threshold; based on the step of comparing, identifying the picture as a candidate picture for a visual defect or coding error; and storing a timestamp of the candidate picture.
1. A method, comprising: monitoring a encoding process of a source video file performed by an encoder; obtaining an encoding decision parameter used to encode a picture of the source video file during the encoding process; comparing the encoding decision parameter to a threshold; based on the step of comparing, identifying the picture as a candidate picture for a visual defect or coding error; and storing a timestamp of the candidate picture. 2. The method of claim 1, wherein the step of monitoring the encoding process comprises reading a statistics file generated by an encoder during a first pass of the encoding process. 3. The method of claim 1, wherein the encoding decision parameter comprises a number of bits allocated to encode the picture. 4. The method of claim 1, wherein the encoding decision parameter comprises a number of bits allocated to encode a motion vector used to encode the picture. 5. The method of claim 1, wherein the encoding decision parameter comprises a number of bits allocated to encode all motion vectors used to encode the picture. 6. The method of claim 1, wherein the encoding decision parameter comprises a difference between a non-rate-limited number of encoding bits and a rate-limited number of encoding bits. 7. The method of claim 6, wherein the non-rate-limited number of encoding bits is a non-rate-limited number of motion vector encoding bits and the rate-limited number of encoding bits is a rate-limited number of motion vector encoding bits. 8. The method of claim 1, wherein the time stamp of the candidate picture is stored as a metadata in an output file of the encoding process. 9. The method of claim 8, wherein the time stamp of the candidate picture is stored as a chapter mark in an output file of the encoding process. 10. The method of claim 1, wherein the threshold is a static threshold. 11. The method of claim 1, wherein the threshold is a dynamic threshold obtained from encoding decision parameters of other pictures of the source video file. 12. A system comprising: an encoder configured to encode a source video file into an output video file; and a monitor configured to perform the steps of: monitoring a encoding process of the source video file performed by the encoder; obtaining an encoding decision parameter used to encode a picture of the source video file during the encoding process; comparing the encoding decision parameter to a threshold; based on the step of comparing, identifying the picture as a candidate picture for a visual defect or coding error; and storing a timestamp of the candidate picture. 13. The system of claim 12, wherein the step of monitoring the encoding process comprises reading a statistics file generated by the encoder during a first pass of the encoding process. 14. The system of claim 12, wherein the encoding decision parameter comprises a number of bits allocated to encode the picture. 15. The system of claim 12, wherein the encoding decision parameter comprises a number of bits allocated to encode a motion vector used to encode the picture. 16. The system of claim 12, wherein the encoding decision parameter comprises a number of bits allocated to encode all motion vectors used to encode the picture. 17. The system of claim 12, wherein the encoding decision parameter comprises a difference between a non-rate-limited number of encoding bits and a rate-limited number of encoding bits. 18. The system of claim 17, wherein the non-rate-limited number of encoding bits is a non-rate-limited number of motion vector encoding bits and the rate-limited number of encoding bits is a rate-limited number of motion vector encoding bits. 19. The system of claim 12, wherein the time stamp of the candidate picture is stored as a metadata in an output file of the encoding process. 20. The system of claim 18, wherein the time stamp of the candidate picture is stored as a chapter mark in an output file of the encoding process. 21. The system of claim 12, wherein the threshold is a static threshold. 22. The system of claim 12, wherein the threshold is a dynamic threshold obtained from encoding decision parameters of other pictures of the source video file.
A method, comprises monitoring a encoding process of a source video file performed by an encoder; obtaining an encoding decision parameter used to encode a picture of the source video file during the encoding process; comparing the encoding decision parameter to a threshold; based on the step of comparing, identifying the picture as a candidate picture for a visual defect or coding error; and storing a timestamp of the candidate picture.1. A method, comprising: monitoring a encoding process of a source video file performed by an encoder; obtaining an encoding decision parameter used to encode a picture of the source video file during the encoding process; comparing the encoding decision parameter to a threshold; based on the step of comparing, identifying the picture as a candidate picture for a visual defect or coding error; and storing a timestamp of the candidate picture. 2. The method of claim 1, wherein the step of monitoring the encoding process comprises reading a statistics file generated by an encoder during a first pass of the encoding process. 3. The method of claim 1, wherein the encoding decision parameter comprises a number of bits allocated to encode the picture. 4. The method of claim 1, wherein the encoding decision parameter comprises a number of bits allocated to encode a motion vector used to encode the picture. 5. The method of claim 1, wherein the encoding decision parameter comprises a number of bits allocated to encode all motion vectors used to encode the picture. 6. The method of claim 1, wherein the encoding decision parameter comprises a difference between a non-rate-limited number of encoding bits and a rate-limited number of encoding bits. 7. The method of claim 6, wherein the non-rate-limited number of encoding bits is a non-rate-limited number of motion vector encoding bits and the rate-limited number of encoding bits is a rate-limited number of motion vector encoding bits. 8. The method of claim 1, wherein the time stamp of the candidate picture is stored as a metadata in an output file of the encoding process. 9. The method of claim 8, wherein the time stamp of the candidate picture is stored as a chapter mark in an output file of the encoding process. 10. The method of claim 1, wherein the threshold is a static threshold. 11. The method of claim 1, wherein the threshold is a dynamic threshold obtained from encoding decision parameters of other pictures of the source video file. 12. A system comprising: an encoder configured to encode a source video file into an output video file; and a monitor configured to perform the steps of: monitoring a encoding process of the source video file performed by the encoder; obtaining an encoding decision parameter used to encode a picture of the source video file during the encoding process; comparing the encoding decision parameter to a threshold; based on the step of comparing, identifying the picture as a candidate picture for a visual defect or coding error; and storing a timestamp of the candidate picture. 13. The system of claim 12, wherein the step of monitoring the encoding process comprises reading a statistics file generated by the encoder during a first pass of the encoding process. 14. The system of claim 12, wherein the encoding decision parameter comprises a number of bits allocated to encode the picture. 15. The system of claim 12, wherein the encoding decision parameter comprises a number of bits allocated to encode a motion vector used to encode the picture. 16. The system of claim 12, wherein the encoding decision parameter comprises a number of bits allocated to encode all motion vectors used to encode the picture. 17. The system of claim 12, wherein the encoding decision parameter comprises a difference between a non-rate-limited number of encoding bits and a rate-limited number of encoding bits. 18. The system of claim 17, wherein the non-rate-limited number of encoding bits is a non-rate-limited number of motion vector encoding bits and the rate-limited number of encoding bits is a rate-limited number of motion vector encoding bits. 19. The system of claim 12, wherein the time stamp of the candidate picture is stored as a metadata in an output file of the encoding process. 20. The system of claim 18, wherein the time stamp of the candidate picture is stored as a chapter mark in an output file of the encoding process. 21. The system of claim 12, wherein the threshold is a static threshold. 22. The system of claim 12, wherein the threshold is a dynamic threshold obtained from encoding decision parameters of other pictures of the source video file.
2,400
9,277
9,277
16,217,544
2,426
Systems and methods are provided for facilitating the selection of content for a television broadcast system. A first request for content in a broadcasting based format is received from a television broadcast system. A second request for content in a computer based format is sent to a network-based content selection system. A content identifier associated with selected content is received from the network-based content selection system and sent to the television broadcast system.
1. A method for facilitating selection of content for a television broadcast system, comprising: receiving a first request for content in a broadcasting based format from a television broadcast system; sending a second request for content in a computer based format to a network-based content selection system; receiving a content identifier associated with selected content from the network-based content selection system; and sending the content identifier to the television broadcast system. 2. The method of claim 1, wherein the broadcasting based format comprises cue tones. 3. The method of claim 1, wherein the computer based format comprises JavaScript. 4. The method of claim 1, wherein the first request for content received from the television broadcast system is in response to a first marker in a transmission log indicating that a time window for broadcasting content is opened. 5. The method of claim 1, wherein sending a second request for content in a computer based format to a network-based content selection system comprises: intermittently sending the second request for content to the network-based content selection system at a predefined time interval. 6. The method of claim 5, wherein intermittently sending the second request for content to the network-based content selection system at a predefined time interval comprises: intermittently sending the second request for content to the network-based content selection system until a confirmation is received indicating that the selected content has been broadcasted. 7. The method of claim 5, wherein intermittently sending the second request for content to the network-based content selection system at a predefined time interval comprises: intermittently sending the second request for content to the network-based content selection system until an indication to stop requesting content is received. 8. The method of claim 7, wherein the indication to stop requesting content is received in response to a second marker in a transmission log indicating that a time window for broadcasting content is closed. 9. A non-transitory computer readable medium storing computer program instructions for facilitating selection of content for a television broadcast system, which, when executed on a processor, cause the processor to perform operations comprising: receiving a first request for content in a broadcasting based format from a television broadcast system; sending a second request for content in a computer based format to a network-based content selection system; receiving a content identifier associated with selected content from the network-based content selection system; and sending the content identifier to the television broadcast system. 10. The non-transitory computer readable medium of claim 9, wherein the broadcasting based format comprises cue tones. 11. The non-transitory computer readable medium of claim 9, wherein the computer based format comprises JavaScript. 12. The non-transitory computer readable medium of claim 9, wherein the first request for content received from the television broadcast system is in response to a first marker in a transmission log indicating that a time window for broadcasting content is opened. 13. An apparatus comprising: a processor; and a memory to store computer program instructions for facilitating selection of content for a television broadcast system, the computer program instructions when executed on the processor cause the processor to perform operations comprising: receiving a first request for content in a broadcasting based format from a television broadcast system; sending a second request for content in a computer based format to a network-based content selection system; receiving a content identifier associated with selected content from the network-based content selection system; and sending the content identifier to the television broadcast system. 14. The apparatus of claim 13, wherein the broadcasting based format comprises cue tones and the computer based format comprises JavaScript. 15. The apparatus of claim 13, wherein sending a second request for content in a computer based format to a network-based content selection system comprises: intermittently sending the second request for content to the network-based content selection system at a predefined time interval. 16. The apparatus of claim 15, wherein intermittently sending the second request for content to the network-based content selection system at a predefined time interval comprises: intermittently sending the second request for content to the network-based content selection system until a confirmation is received indicating that the selected content has been broadcasted. 17. The apparatus of claim 15, wherein intermittently sending the second request for content to the network-based content selection system at a predefined time interval comprises: intermittently sending the second request for content to the network-based content selection system until an indication to stop requesting content is received. 18. The apparatus of claim 17, wherein the indication to stop requesting content is received in response to a second marker in a transmission log indicating that a time window for broadcasting content is closed. 19. A system for broadcasting content, comprising: a television broadcast system configured to send a first request for content in a broadcasting based format to a bridging system; the bridging system configured to send a second request for content in a computer based format to a network-based content selection system in response to the first request for content in the broadcasting based format; the network-based content selection system configured to: select content in response to the second request for content, and send a content identifier associated with the selected content to the bridging system, and the bridging system configured to send the content identifier to the television broadcast system. 20. The system of claim 19, wherein the broadcasting based format comprises cue tones and the computer based format comprises JavaScript.
Systems and methods are provided for facilitating the selection of content for a television broadcast system. A first request for content in a broadcasting based format is received from a television broadcast system. A second request for content in a computer based format is sent to a network-based content selection system. A content identifier associated with selected content is received from the network-based content selection system and sent to the television broadcast system.1. A method for facilitating selection of content for a television broadcast system, comprising: receiving a first request for content in a broadcasting based format from a television broadcast system; sending a second request for content in a computer based format to a network-based content selection system; receiving a content identifier associated with selected content from the network-based content selection system; and sending the content identifier to the television broadcast system. 2. The method of claim 1, wherein the broadcasting based format comprises cue tones. 3. The method of claim 1, wherein the computer based format comprises JavaScript. 4. The method of claim 1, wherein the first request for content received from the television broadcast system is in response to a first marker in a transmission log indicating that a time window for broadcasting content is opened. 5. The method of claim 1, wherein sending a second request for content in a computer based format to a network-based content selection system comprises: intermittently sending the second request for content to the network-based content selection system at a predefined time interval. 6. The method of claim 5, wherein intermittently sending the second request for content to the network-based content selection system at a predefined time interval comprises: intermittently sending the second request for content to the network-based content selection system until a confirmation is received indicating that the selected content has been broadcasted. 7. The method of claim 5, wherein intermittently sending the second request for content to the network-based content selection system at a predefined time interval comprises: intermittently sending the second request for content to the network-based content selection system until an indication to stop requesting content is received. 8. The method of claim 7, wherein the indication to stop requesting content is received in response to a second marker in a transmission log indicating that a time window for broadcasting content is closed. 9. A non-transitory computer readable medium storing computer program instructions for facilitating selection of content for a television broadcast system, which, when executed on a processor, cause the processor to perform operations comprising: receiving a first request for content in a broadcasting based format from a television broadcast system; sending a second request for content in a computer based format to a network-based content selection system; receiving a content identifier associated with selected content from the network-based content selection system; and sending the content identifier to the television broadcast system. 10. The non-transitory computer readable medium of claim 9, wherein the broadcasting based format comprises cue tones. 11. The non-transitory computer readable medium of claim 9, wherein the computer based format comprises JavaScript. 12. The non-transitory computer readable medium of claim 9, wherein the first request for content received from the television broadcast system is in response to a first marker in a transmission log indicating that a time window for broadcasting content is opened. 13. An apparatus comprising: a processor; and a memory to store computer program instructions for facilitating selection of content for a television broadcast system, the computer program instructions when executed on the processor cause the processor to perform operations comprising: receiving a first request for content in a broadcasting based format from a television broadcast system; sending a second request for content in a computer based format to a network-based content selection system; receiving a content identifier associated with selected content from the network-based content selection system; and sending the content identifier to the television broadcast system. 14. The apparatus of claim 13, wherein the broadcasting based format comprises cue tones and the computer based format comprises JavaScript. 15. The apparatus of claim 13, wherein sending a second request for content in a computer based format to a network-based content selection system comprises: intermittently sending the second request for content to the network-based content selection system at a predefined time interval. 16. The apparatus of claim 15, wherein intermittently sending the second request for content to the network-based content selection system at a predefined time interval comprises: intermittently sending the second request for content to the network-based content selection system until a confirmation is received indicating that the selected content has been broadcasted. 17. The apparatus of claim 15, wherein intermittently sending the second request for content to the network-based content selection system at a predefined time interval comprises: intermittently sending the second request for content to the network-based content selection system until an indication to stop requesting content is received. 18. The apparatus of claim 17, wherein the indication to stop requesting content is received in response to a second marker in a transmission log indicating that a time window for broadcasting content is closed. 19. A system for broadcasting content, comprising: a television broadcast system configured to send a first request for content in a broadcasting based format to a bridging system; the bridging system configured to send a second request for content in a computer based format to a network-based content selection system in response to the first request for content in the broadcasting based format; the network-based content selection system configured to: select content in response to the second request for content, and send a content identifier associated with the selected content to the bridging system, and the bridging system configured to send the content identifier to the television broadcast system. 20. The system of claim 19, wherein the broadcasting based format comprises cue tones and the computer based format comprises JavaScript.
2,400
9,278
9,278
15,874,978
2,454
The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that automatically and dynamically generate and provision digital content to network-connected devices operating within a computing environment. For example, an apparatus may receive information generated by an application program executed by a communications device and based on the generated information, obtain an identifier of a third party associated with the executed application program. The apparatus may further identify and obtain first elements of digital content that include a representation of the identifier, and generate a second element of digital content that incorporates a subset of the first elements of digital content. The apparatus may also transmit the second element of digital content through a programmatic interface to the communications device, which may display the second element of digital content on an interface.
1. An apparatus, comprising: a communications unit; a storage unit storing instructions; and at least one processor coupled to the communications unit and the storage unit, the at least processor being configured to execute the instructions to: receive a first signal via the communications unit, the received signal including information generated by an application program executed by a communications device; based on the generated information, obtain an identifier of a third party associated with the executed application program; identify and obtain first elements of digital content that include a representation of the identifier; generate a second element of digital content that incorporates a subset of the first elements of digital content; and transmit a second signal via the communications unit to the communications device, the second signal being transmitted through a programmatic interface associated with the executed application program, the second signal including the second element of digital content, and the communications device being configured by the executed application program to display the second element of digital content on an interface. 2. The apparatus of claim 1, wherein: the generated information comprises application data that characterizes the executed application program; and the at least one processor is further configured to obtain the identifier based on a portion of the application data. 3. The apparatus of claim 2, wherein: the generated information further comprises location data identifying a first geographic location of the communications device; and the at least one processor is further configured to obtain the identifier based on a portion of the location data, the third party being associated with a second geographic location disposed proximate to the first geographic location. 4. The apparatus of claim 2, wherein a value of a parameter that characterizes the third party is consistent with preference data associated with the communications device. 5. The apparatus of claim 2, wherein a value of a parameter characterizing a user of the communications device is consistent with targeting data associated with the third party. 6. The apparatus of claim 1, wherein the at least one processor is further configured to receive the first signal from the communications device via the communications unit. 7. The apparatus of claim 1, wherein the at least one processor is further configured to: generate and transmit, via the communications unit, a third signal to a first computing system, the third signal comprising a portion of the generated information, and the first computing system being configured to load, from the storage unit, the identifier of the third party based on the portion of the generated information; and receive a fourth signal from the first computing system via the communications unit, the fourth signal comprising the identifier of the third party. 8. The apparatus of claim 7, wherein the at least one processor is further configured to: generate and transmit, via the communications unit, a fifth signal to a second computing system, the fifth signal comprising the identifier of the third party, and the second computing system being configured to load, from the storage unit, at least one of the first elements of digital content; and receive a sixth signal from the second computing system via the communications unit, the sixth signal comprising the at least one of the first elements of digital content. 9. The apparatus of claim 1, wherein the at least one processor is further configured to incorporate the subset of the first elements of digital content into the second element of digital content in accordance with data characterizing a combination scheme. 10. The apparatus of claim 9, wherein the at least one processor is further configured to incorporate the subset of the first elements of digital content into the second element of digital content based on an application of a machine learning algorithm, a clustering algorithm, or a collaborative filtering algorithm to data characterizing the subset of the first elements of digital content. 11. The apparatus of claim 9, wherein the at least one processor is further configured to: compute a weight factor reflecting a relevance of each of the first elements of digital content to the third party or the communications device; select the subset of the first elements of digital content based on the computed weight factors; and incorporate the subset of the first elements of digital content into the second element of digital content in accordance with the computed weight factors. 12. A computer-implemented method, comprising: receiving, by at least one processor, a first signal including information generated by an application program, the application program being executed by a communications device; based on the generated information, obtaining an identifier of a third party associated with the executed application program; identifying and obtaining, by the at least one processor, first elements of digital content that include a representation of the identifier; generating, by the at least one processor, a second element of digital content that incorporates a subset of the first elements of digital content; and transmitting, by the at least one processor, a second signal that includes the second element of digital content to the communications device, the second signal being transmitted through a programmatic interface associated with the executed application program, and the communications device being configured by the executed application program to display the second element of digital content on an interface. 13. The computer-implemented method of claim 12, wherein: the generated information comprises application data that characterizes the executed application program; and the method further comprises obtaining the identifier based on a portion of the application data. 14. The computer-implemented method of claim 13, wherein: the generated information further comprises location data identifying a first geographic location of the communications device; and the method further comprises obtaining the identifier based on a portion of the location data, the third party being associated with a second geographic location disposed proximate to the first geographic location. 15. The computer-implemented method of claim 13, wherein a value of a parameter that characterizes the third party is consistent with preference data associated with the communications device. 16. The computer-implemented method of claim 13, wherein a value of a parameter characterizing a user of the communications device is consistent with targeting data associated with the third party. 17. The computer-implemented method of claim 12, further comprising incorporating the subset of the first elements of digital content into the second element of digital content in accordance with data characterizing a combination scheme. 18. The computer-implemented method of claim 17, further comprising incorporating the subset of the first elements of digital content into the second element of digital content based on an application of a machine learning algorithm, a clustering algorithm, or a collaborative filtering algorithm to data characterizing the subset of the first elements of digital content. 19. The computer-implemented method of claim 17, further comprising: computing a weight factor reflecting a relevance of each of the first elements of digital content to the third party or the communications device; selecting the subset of the first elements of digital content based on the computed weight factors; and incorporating the subset of the first elements of digital content into the second element of digital content in accordance with the computed weight factors. 20. A tangible, non-transitory computer-readable medium storing instructions that, when executed by at least one processor, perform a method comprising: receiving a first signal including information generated by an application program, the application program being executed by a communications device; based on the generated information, obtaining an identifier of a third party associated with the executed application program; identifying and obtaining first elements of digital content that include a representation of the identifier; generating a second element of digital content that incorporates a subset of the first elements of digital content; and transmitting a second signal that includes the second element of digital content to the communications device, the second signal being transmitted through a programmatic interface associated with the executed application program, and the communications device being configured by the executed application program to display the second element of digital content on an interface.
The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that automatically and dynamically generate and provision digital content to network-connected devices operating within a computing environment. For example, an apparatus may receive information generated by an application program executed by a communications device and based on the generated information, obtain an identifier of a third party associated with the executed application program. The apparatus may further identify and obtain first elements of digital content that include a representation of the identifier, and generate a second element of digital content that incorporates a subset of the first elements of digital content. The apparatus may also transmit the second element of digital content through a programmatic interface to the communications device, which may display the second element of digital content on an interface.1. An apparatus, comprising: a communications unit; a storage unit storing instructions; and at least one processor coupled to the communications unit and the storage unit, the at least processor being configured to execute the instructions to: receive a first signal via the communications unit, the received signal including information generated by an application program executed by a communications device; based on the generated information, obtain an identifier of a third party associated with the executed application program; identify and obtain first elements of digital content that include a representation of the identifier; generate a second element of digital content that incorporates a subset of the first elements of digital content; and transmit a second signal via the communications unit to the communications device, the second signal being transmitted through a programmatic interface associated with the executed application program, the second signal including the second element of digital content, and the communications device being configured by the executed application program to display the second element of digital content on an interface. 2. The apparatus of claim 1, wherein: the generated information comprises application data that characterizes the executed application program; and the at least one processor is further configured to obtain the identifier based on a portion of the application data. 3. The apparatus of claim 2, wherein: the generated information further comprises location data identifying a first geographic location of the communications device; and the at least one processor is further configured to obtain the identifier based on a portion of the location data, the third party being associated with a second geographic location disposed proximate to the first geographic location. 4. The apparatus of claim 2, wherein a value of a parameter that characterizes the third party is consistent with preference data associated with the communications device. 5. The apparatus of claim 2, wherein a value of a parameter characterizing a user of the communications device is consistent with targeting data associated with the third party. 6. The apparatus of claim 1, wherein the at least one processor is further configured to receive the first signal from the communications device via the communications unit. 7. The apparatus of claim 1, wherein the at least one processor is further configured to: generate and transmit, via the communications unit, a third signal to a first computing system, the third signal comprising a portion of the generated information, and the first computing system being configured to load, from the storage unit, the identifier of the third party based on the portion of the generated information; and receive a fourth signal from the first computing system via the communications unit, the fourth signal comprising the identifier of the third party. 8. The apparatus of claim 7, wherein the at least one processor is further configured to: generate and transmit, via the communications unit, a fifth signal to a second computing system, the fifth signal comprising the identifier of the third party, and the second computing system being configured to load, from the storage unit, at least one of the first elements of digital content; and receive a sixth signal from the second computing system via the communications unit, the sixth signal comprising the at least one of the first elements of digital content. 9. The apparatus of claim 1, wherein the at least one processor is further configured to incorporate the subset of the first elements of digital content into the second element of digital content in accordance with data characterizing a combination scheme. 10. The apparatus of claim 9, wherein the at least one processor is further configured to incorporate the subset of the first elements of digital content into the second element of digital content based on an application of a machine learning algorithm, a clustering algorithm, or a collaborative filtering algorithm to data characterizing the subset of the first elements of digital content. 11. The apparatus of claim 9, wherein the at least one processor is further configured to: compute a weight factor reflecting a relevance of each of the first elements of digital content to the third party or the communications device; select the subset of the first elements of digital content based on the computed weight factors; and incorporate the subset of the first elements of digital content into the second element of digital content in accordance with the computed weight factors. 12. A computer-implemented method, comprising: receiving, by at least one processor, a first signal including information generated by an application program, the application program being executed by a communications device; based on the generated information, obtaining an identifier of a third party associated with the executed application program; identifying and obtaining, by the at least one processor, first elements of digital content that include a representation of the identifier; generating, by the at least one processor, a second element of digital content that incorporates a subset of the first elements of digital content; and transmitting, by the at least one processor, a second signal that includes the second element of digital content to the communications device, the second signal being transmitted through a programmatic interface associated with the executed application program, and the communications device being configured by the executed application program to display the second element of digital content on an interface. 13. The computer-implemented method of claim 12, wherein: the generated information comprises application data that characterizes the executed application program; and the method further comprises obtaining the identifier based on a portion of the application data. 14. The computer-implemented method of claim 13, wherein: the generated information further comprises location data identifying a first geographic location of the communications device; and the method further comprises obtaining the identifier based on a portion of the location data, the third party being associated with a second geographic location disposed proximate to the first geographic location. 15. The computer-implemented method of claim 13, wherein a value of a parameter that characterizes the third party is consistent with preference data associated with the communications device. 16. The computer-implemented method of claim 13, wherein a value of a parameter characterizing a user of the communications device is consistent with targeting data associated with the third party. 17. The computer-implemented method of claim 12, further comprising incorporating the subset of the first elements of digital content into the second element of digital content in accordance with data characterizing a combination scheme. 18. The computer-implemented method of claim 17, further comprising incorporating the subset of the first elements of digital content into the second element of digital content based on an application of a machine learning algorithm, a clustering algorithm, or a collaborative filtering algorithm to data characterizing the subset of the first elements of digital content. 19. The computer-implemented method of claim 17, further comprising: computing a weight factor reflecting a relevance of each of the first elements of digital content to the third party or the communications device; selecting the subset of the first elements of digital content based on the computed weight factors; and incorporating the subset of the first elements of digital content into the second element of digital content in accordance with the computed weight factors. 20. A tangible, non-transitory computer-readable medium storing instructions that, when executed by at least one processor, perform a method comprising: receiving a first signal including information generated by an application program, the application program being executed by a communications device; based on the generated information, obtaining an identifier of a third party associated with the executed application program; identifying and obtaining first elements of digital content that include a representation of the identifier; generating a second element of digital content that incorporates a subset of the first elements of digital content; and transmitting a second signal that includes the second element of digital content to the communications device, the second signal being transmitted through a programmatic interface associated with the executed application program, and the communications device being configured by the executed application program to display the second element of digital content on an interface.
2,400
9,279
9,279
16,151,474
2,423
Methods, and systems, including computer programs encoded on computer-readable storage mediums, including a method to identify viewed content items, comprising receiving a content item to be displayed on user computing devices and receiving a request to serve the content item in conjunction with an electronic document. The server provides the content item to a user computing device for display and determines that a particular amount of the content item was displayed for a particular amount of time on the user computing device. In response to the determination, the server logs that the content item was displayed on the user computing device.
1. A computer-implemented method to identify viewed content items, comprising: receiving, by one or more computing devices, a content item to be displayed on user computing devices; receiving, by the one or more computing devices, a request to serve the content item in conjunction with an electronic document; providing, by the one or more computing devices, the content item to a user computing device for display; determining, by the one or more computing devices, that a particular amount of the content item was displayed for a particular amount of time on the user computing device; and in response to the determination, logging, by the one or more computing devices, that the content item was displayed on the user computing device. 2. The computer implemented method of claim 1, further comprising logging, by the one or more computing devices, that the content item was not successfully displayed on the user computing device in response to determining that the content item was not displayed for the particular amount of time. 3. The computer implemented method of claim 1, further comprising logging, by the one or more computing devices, that the content item was not successfully displayed on the user computing device in response to determining that the particular amount of the content item was not displayed. 4. The computer implemented method of claim 1, wherein the particular amount of the content item is 50% of the content item. 5. The computer implemented method of claim 1, wherein the particular amount of time is three seconds. 6. The computer implemented method of claim 1, wherein the content item was displayed continuously for the particular amount of time. 7. The computer implemented method of claim 1, wherein the electronic document is a website. 8. The computer implemented method of claim 1, wherein the content item is an advertisement. 9. The computer implemented method of claim 1, further comprising notifying, by the one or more computing devices, a provider of the content item that the content item has been successfully displayed. 10. A computer program product, comprising: a non-transitory computer-executable storage device having computer-executable program instructions embodied thereon that when executed by one or more computing devices cause the computer to provide content items on selected locations on electronic documents, the computer-readable program instructions comprising: computer-executable instructions to receive a content item to be displayed on user computing devices; computer-executable instructions to request to serve the content item in conjunction with an electronic document; computer-executable instructions to provide the content item to a user computing device for display; computer-executable instructions to determine that a particular amount of the content item was displayed for a particular amount of time on the user computing device; and computer-executable instructions to log that the content item was displayed on the user computing device in response to the determination. 11. The computer program product of claim 10, further comprising instructions to log that the content item was not successfully displayed on the user computing device in response to determining that the content item was not displayed for the particular amount of time. 12. The computer program product of claim 10, further comprising instructions to log that the content item was not successfully displayed on the user computing device in response to determining that the particular amount of the content item was not displayed. 13. The computer program product of claim 10, wherein the particular amount of the content item is 50% of the content item. 14. The computer program product of claim 10, wherein the particular amount of time is three seconds. 15. The computer program product of claim 10, wherein the content item was displayed continuously for the particular amount of time. 16. A system to provide content items on selected locations on electronic documents, comprising: a storage device; and a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to: receive a content item to be displayed on user computing devices; receive a request to serve the content item in conjunction with an electronic document; provide the content item to a user computing device for display; determine that a particular amount of the content item was displayed for a particular amount of time on the user computing device; and log that the content item was displayed on the user computing device in response to the determination. 17. The system of claim 16, wherein the particular amount of the content item is 50% of the content item. 18. The system of claim 16, wherein the particular amount of time is three seconds. 19. The system of claim 16, wherein the content item is an advertisement. 20. The system of claim 16, further comprising instructions to notify a provider of the content item that the content item has been successfully displayed.
Methods, and systems, including computer programs encoded on computer-readable storage mediums, including a method to identify viewed content items, comprising receiving a content item to be displayed on user computing devices and receiving a request to serve the content item in conjunction with an electronic document. The server provides the content item to a user computing device for display and determines that a particular amount of the content item was displayed for a particular amount of time on the user computing device. In response to the determination, the server logs that the content item was displayed on the user computing device.1. A computer-implemented method to identify viewed content items, comprising: receiving, by one or more computing devices, a content item to be displayed on user computing devices; receiving, by the one or more computing devices, a request to serve the content item in conjunction with an electronic document; providing, by the one or more computing devices, the content item to a user computing device for display; determining, by the one or more computing devices, that a particular amount of the content item was displayed for a particular amount of time on the user computing device; and in response to the determination, logging, by the one or more computing devices, that the content item was displayed on the user computing device. 2. The computer implemented method of claim 1, further comprising logging, by the one or more computing devices, that the content item was not successfully displayed on the user computing device in response to determining that the content item was not displayed for the particular amount of time. 3. The computer implemented method of claim 1, further comprising logging, by the one or more computing devices, that the content item was not successfully displayed on the user computing device in response to determining that the particular amount of the content item was not displayed. 4. The computer implemented method of claim 1, wherein the particular amount of the content item is 50% of the content item. 5. The computer implemented method of claim 1, wherein the particular amount of time is three seconds. 6. The computer implemented method of claim 1, wherein the content item was displayed continuously for the particular amount of time. 7. The computer implemented method of claim 1, wherein the electronic document is a website. 8. The computer implemented method of claim 1, wherein the content item is an advertisement. 9. The computer implemented method of claim 1, further comprising notifying, by the one or more computing devices, a provider of the content item that the content item has been successfully displayed. 10. A computer program product, comprising: a non-transitory computer-executable storage device having computer-executable program instructions embodied thereon that when executed by one or more computing devices cause the computer to provide content items on selected locations on electronic documents, the computer-readable program instructions comprising: computer-executable instructions to receive a content item to be displayed on user computing devices; computer-executable instructions to request to serve the content item in conjunction with an electronic document; computer-executable instructions to provide the content item to a user computing device for display; computer-executable instructions to determine that a particular amount of the content item was displayed for a particular amount of time on the user computing device; and computer-executable instructions to log that the content item was displayed on the user computing device in response to the determination. 11. The computer program product of claim 10, further comprising instructions to log that the content item was not successfully displayed on the user computing device in response to determining that the content item was not displayed for the particular amount of time. 12. The computer program product of claim 10, further comprising instructions to log that the content item was not successfully displayed on the user computing device in response to determining that the particular amount of the content item was not displayed. 13. The computer program product of claim 10, wherein the particular amount of the content item is 50% of the content item. 14. The computer program product of claim 10, wherein the particular amount of time is three seconds. 15. The computer program product of claim 10, wherein the content item was displayed continuously for the particular amount of time. 16. A system to provide content items on selected locations on electronic documents, comprising: a storage device; and a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to: receive a content item to be displayed on user computing devices; receive a request to serve the content item in conjunction with an electronic document; provide the content item to a user computing device for display; determine that a particular amount of the content item was displayed for a particular amount of time on the user computing device; and log that the content item was displayed on the user computing device in response to the determination. 17. The system of claim 16, wherein the particular amount of the content item is 50% of the content item. 18. The system of claim 16, wherein the particular amount of time is three seconds. 19. The system of claim 16, wherein the content item is an advertisement. 20. The system of claim 16, further comprising instructions to notify a provider of the content item that the content item has been successfully displayed.
2,400
9,280
9,280
15,220,317
2,458
A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests and/or customer service agent control over a customer's access device. Some embodiments include logic configured to manage and enhance communication channels between devices.
1. A communication server device comprising: an agent interface configured for a human agent to communicate between the agent interface and a remote client; enhancement logic configured to receive a communication from the remote client via a first communication channel and to execute application logic on the remote client, the application logic being configured to open a second communication channel between the remote client and the server device using an identifier of the remote client, the second communication channel having an enhanced communication functionality relative to the first communication channel; account identification logic configured to associate the identifier of the remote client with an account of a user of the remote client; and a processer configured to execute at least the enhancement logic. 2. A communication server device comprising: an agent interface configured for a human agent to communicate between the agent interface and a remote client; enhancement logic configured to receive a communication from the remote client via a first communication channel and to execute application logic on the remote client, the application logic being configured to open a second communication channel between a device locally connected to the remote client and the server device using an identifier stored on the remote client, the second communication channel having an enhanced communication functionality relative to the first communication channel; and a processer configured to execute at least the enhancement logic. 3. The device of claim 1, wherein the enhancement logic is configured to execute the application logic on the remote client by sending a command via a third communication channel. 4. The device of claim 1, wherein the command sent via the third communication channel is sent using the identifier of the remote client received via the first communication channel. 5. The device of claim 1, wherein the enhanced communication functionality includes an ability to send data using packets via TCP/IP protocols. 6. The device of claim 1, wherein the enhanced communication functionality includes an ability to send data using an internet protocol address. 7. The device of claim 1, wherein the agent interface is further configured for the human agent to initiate a request for information from the remote client, and further including request logic configured to send the request to the remote client and to receive a response to the request, the request including a command. 8. The device of claim 1, wherein the agent interface is further configured for the human agent to send commands to the application executing on the remote client. 9. The device of claim 1, further comprising authentication logic configured to authenticate a user of the remote client via the second communication channel. 10. The device of claim 1, further comprising account identification logic configured to associate the identifier of the remote client with an identifier of an account of the user, wherein the identifier of the account of the user is received from the remote client via the second communication channel. 11. The device of claim 10, wherein the identifier of the account is an e-mail address or a username. 12. The device of claim 10, wherein the identifier of the remote client is a telephone number. 13. The device of claim 1, wherein the enhancement logic is configured to keep both the first communication channel and the second communication channel at the same time. 14. The device of claim 1, wherein the enhancement logic is configured to direct the second communication channel to a human agent, the human agent being in communication with the remote client via the first communication channel. 15. The device of claim 1, wherein the enhancement logic is configured to download the application logic to the remote client. 16. The device of claim 1, wherein the enhancement logic is configured to execute the application logic on the remote client using an SMS or MMS message. 17. An access device comprising: an I/O configured for the access device to communicate with a remote server via at least a first communication channel and a second communication channel; a display configured to present information to a user of the access device; application logic configured to receive activation data from the remote server, to open the second communication channel between the access device and the remote server in response to the activation data, and to communicate an identifier associated with the access device to the remote server via the second communication channel, wherein the activation data is sent from the remote server to an identifier of the access device, the identifier of the access device being communicated to the remote server via the first communication channel; and a processor configured to execute at least the application logic. 18. The access device of claim 17, wherein the application logic is configured to communicate with a remote API or a customer service agent, via the second communication channel. 19. The device of claim 17, wherein the I/O is configured for the activation data to be received from the remote server via a third communication channel. 20. The device of claim 17, wherein the first communication channel includes a PTSN. 21. The device of claim 17, wherein the application logic is configured to receive the activation data in a SMS or MMS communication channel. 22. The device of claim 17, wherein second communication channel includes the internet. 23. The device of claim 17, wherein the identifier of the access devices includes a callerID number. 24. The device of claim 17, wherein the application logic is further configured to receive a request for customer service from the remote server, to activate a user input of the access device in response to the request, to display information to a user of the access device in response to the request, to receive input from the user in response to the information, and to communicate the input to the remote server via the second communication channel. 25. The device of claim 24, wherein the second communication channel is configured to securely communicate the input to the remote server and the first communication channel is not configured to securely communicate the input to the remote server. 26. The device of claim 17, wherein the second communication channel is configured to communicate digital commands between the application logic and the remote server and the first communication channel is not configured to communicate digital commands between the application logic and the remote server. 27. The device of claim 17, further comprising identification logic configured to send the identifier of the access device to the remote server via the first communication channel. 28-52. (canceled)
A system for automatic authentication of service requests includes authentication of a remote access device. This authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier. Some embodiments include an intelligent pipeline configured for managing queues of customer service requests and/or customer service agent control over a customer's access device. Some embodiments include logic configured to manage and enhance communication channels between devices.1. A communication server device comprising: an agent interface configured for a human agent to communicate between the agent interface and a remote client; enhancement logic configured to receive a communication from the remote client via a first communication channel and to execute application logic on the remote client, the application logic being configured to open a second communication channel between the remote client and the server device using an identifier of the remote client, the second communication channel having an enhanced communication functionality relative to the first communication channel; account identification logic configured to associate the identifier of the remote client with an account of a user of the remote client; and a processer configured to execute at least the enhancement logic. 2. A communication server device comprising: an agent interface configured for a human agent to communicate between the agent interface and a remote client; enhancement logic configured to receive a communication from the remote client via a first communication channel and to execute application logic on the remote client, the application logic being configured to open a second communication channel between a device locally connected to the remote client and the server device using an identifier stored on the remote client, the second communication channel having an enhanced communication functionality relative to the first communication channel; and a processer configured to execute at least the enhancement logic. 3. The device of claim 1, wherein the enhancement logic is configured to execute the application logic on the remote client by sending a command via a third communication channel. 4. The device of claim 1, wherein the command sent via the third communication channel is sent using the identifier of the remote client received via the first communication channel. 5. The device of claim 1, wherein the enhanced communication functionality includes an ability to send data using packets via TCP/IP protocols. 6. The device of claim 1, wherein the enhanced communication functionality includes an ability to send data using an internet protocol address. 7. The device of claim 1, wherein the agent interface is further configured for the human agent to initiate a request for information from the remote client, and further including request logic configured to send the request to the remote client and to receive a response to the request, the request including a command. 8. The device of claim 1, wherein the agent interface is further configured for the human agent to send commands to the application executing on the remote client. 9. The device of claim 1, further comprising authentication logic configured to authenticate a user of the remote client via the second communication channel. 10. The device of claim 1, further comprising account identification logic configured to associate the identifier of the remote client with an identifier of an account of the user, wherein the identifier of the account of the user is received from the remote client via the second communication channel. 11. The device of claim 10, wherein the identifier of the account is an e-mail address or a username. 12. The device of claim 10, wherein the identifier of the remote client is a telephone number. 13. The device of claim 1, wherein the enhancement logic is configured to keep both the first communication channel and the second communication channel at the same time. 14. The device of claim 1, wherein the enhancement logic is configured to direct the second communication channel to a human agent, the human agent being in communication with the remote client via the first communication channel. 15. The device of claim 1, wherein the enhancement logic is configured to download the application logic to the remote client. 16. The device of claim 1, wherein the enhancement logic is configured to execute the application logic on the remote client using an SMS or MMS message. 17. An access device comprising: an I/O configured for the access device to communicate with a remote server via at least a first communication channel and a second communication channel; a display configured to present information to a user of the access device; application logic configured to receive activation data from the remote server, to open the second communication channel between the access device and the remote server in response to the activation data, and to communicate an identifier associated with the access device to the remote server via the second communication channel, wherein the activation data is sent from the remote server to an identifier of the access device, the identifier of the access device being communicated to the remote server via the first communication channel; and a processor configured to execute at least the application logic. 18. The access device of claim 17, wherein the application logic is configured to communicate with a remote API or a customer service agent, via the second communication channel. 19. The device of claim 17, wherein the I/O is configured for the activation data to be received from the remote server via a third communication channel. 20. The device of claim 17, wherein the first communication channel includes a PTSN. 21. The device of claim 17, wherein the application logic is configured to receive the activation data in a SMS or MMS communication channel. 22. The device of claim 17, wherein second communication channel includes the internet. 23. The device of claim 17, wherein the identifier of the access devices includes a callerID number. 24. The device of claim 17, wherein the application logic is further configured to receive a request for customer service from the remote server, to activate a user input of the access device in response to the request, to display information to a user of the access device in response to the request, to receive input from the user in response to the information, and to communicate the input to the remote server via the second communication channel. 25. The device of claim 24, wherein the second communication channel is configured to securely communicate the input to the remote server and the first communication channel is not configured to securely communicate the input to the remote server. 26. The device of claim 17, wherein the second communication channel is configured to communicate digital commands between the application logic and the remote server and the first communication channel is not configured to communicate digital commands between the application logic and the remote server. 27. The device of claim 17, further comprising identification logic configured to send the identifier of the access device to the remote server via the first communication channel. 28-52. (canceled)
2,400
9,281
9,281
14,142,294
2,459
One embodiment provides a computing device. The computing device includes a processor; a network interface comprising at least one port and a network interface identifier; and a distributed module configured to identify each directly connected other computing device, receive and store a forwarding policy from a centralized controller module, and forward a received packet based, at least in part, on the forwarding policy.
1. A computing device, comprising: a processor; a network interface comprising at least one port and a network interface identifier; and a distributed module configured to identify each directly connected other computing device, receive and store a forwarding policy from a centralized controller module, and forward a received packet based, at least in part, on the forwarding policy. 2. The computing device of claim 1, further comprising the centralized controller module. 3. The computing device of claim 1, wherein the forwarding policy is received by the network interface in-band. 4. The computing device of claim 1, wherein the network interface identifier is a MAC (media access control) address, the distributed module is further configured to receive an IP (Internet Protocol) address from the centralized controller module and the received packet is forwarded based, at least in part, on the IP address. 5. The computing device of claim 1, wherein the forwarding is based, at least in part, on network conditions local to the computing device. 6. A network system, comprising: a plurality of computing devices, each computing device comprising: a processor; a network interface comprising at least one port and a network interface identifier; and a distributed module configured to identify each directly connected other computing device, receive and store a forwarding policy from a centralized controller module, and forward a received packet based, at least in part, on the forwarding policy. 7. The network system of claim 6, wherein one of the computing devices further comprises the centralized controller module. 8. The network system of claim 6, wherein the forwarding policy is received by each network interface in-band. 9. The network system of claim 6, wherein the network interface identifier is a MAC (media access control) address, each distributed module is further configured to receive a respective IP (Internet Protocol) address from the centralized controller module and each received packet is forwarded based, at least in part, on the respective IP address. 10. The network system of claim 6, wherein the forwarding is based, at least in part, on network conditions local to the respective computing device. 11. A method, comprising: identifying, by a distributed module, each directly connected computing device based, at least in part, on a respective network interface identifier; receiving and storing, by the distributed module, a forwarding policy from a centralized controller module; and forwarding, by the distributed module, a received packet based, at least in part, on the forwarding policy. 12. The method of claim 11, further comprising: providing, by the centralized controller module, the forwarding policy in-band. 13. The method of claim 11, further comprising: storing, by the distributed module, a local topology related to each respective network interface identifier; and determining, by the centralized controller module, a network topology based, at least in part, on the local topology. 14. The method of claim 11, further comprising: determining, by the distributed module, local network conditions, the forwarding based, at least in part, on the local network conditions. 15. The method of claim 13, further comprising: assigning, by the centralized controller module, an IP (Internet Protocol) address to at least some of the directly connected computing devices based, at least in part, on the network topology. 16. A system comprising, one or more storage devices having stored thereon, individually or in combination, instructions that when executed by one or more processors result in the following operations comprising: identifying each directly connected computing device based, at least in part, on a respective network interface identifier; receiving and storing a forwarding policy from a centralized controller module; and forwarding a received packet based, at least in part, on the forwarding policy. 17. The system of claim 16, wherein the instructions that when executed by one or more processors results in the following additional operations comprising: providing the forwarding policy in-band. 18. The system of claim 16, wherein the instructions that when executed by one or more processors results in the following additional operations comprising: storing a local topology related to each respective network interface identifier; and determining a network topology based, at least in part, on the local topology. 19. The system of claim 16, wherein the instructions that when executed by one or more processors results in the following additional operations comprising: determining local network conditions, the forwarding based, at least in part, on the local network conditions. 20. The system of claim 18, wherein the instructions that when executed by one or more processors results in the following additional operations comprising: assigning an IP (Internet Protocol) address to at least some of the directly connected computing devices based, at least in part, on the network topology.
One embodiment provides a computing device. The computing device includes a processor; a network interface comprising at least one port and a network interface identifier; and a distributed module configured to identify each directly connected other computing device, receive and store a forwarding policy from a centralized controller module, and forward a received packet based, at least in part, on the forwarding policy.1. A computing device, comprising: a processor; a network interface comprising at least one port and a network interface identifier; and a distributed module configured to identify each directly connected other computing device, receive and store a forwarding policy from a centralized controller module, and forward a received packet based, at least in part, on the forwarding policy. 2. The computing device of claim 1, further comprising the centralized controller module. 3. The computing device of claim 1, wherein the forwarding policy is received by the network interface in-band. 4. The computing device of claim 1, wherein the network interface identifier is a MAC (media access control) address, the distributed module is further configured to receive an IP (Internet Protocol) address from the centralized controller module and the received packet is forwarded based, at least in part, on the IP address. 5. The computing device of claim 1, wherein the forwarding is based, at least in part, on network conditions local to the computing device. 6. A network system, comprising: a plurality of computing devices, each computing device comprising: a processor; a network interface comprising at least one port and a network interface identifier; and a distributed module configured to identify each directly connected other computing device, receive and store a forwarding policy from a centralized controller module, and forward a received packet based, at least in part, on the forwarding policy. 7. The network system of claim 6, wherein one of the computing devices further comprises the centralized controller module. 8. The network system of claim 6, wherein the forwarding policy is received by each network interface in-band. 9. The network system of claim 6, wherein the network interface identifier is a MAC (media access control) address, each distributed module is further configured to receive a respective IP (Internet Protocol) address from the centralized controller module and each received packet is forwarded based, at least in part, on the respective IP address. 10. The network system of claim 6, wherein the forwarding is based, at least in part, on network conditions local to the respective computing device. 11. A method, comprising: identifying, by a distributed module, each directly connected computing device based, at least in part, on a respective network interface identifier; receiving and storing, by the distributed module, a forwarding policy from a centralized controller module; and forwarding, by the distributed module, a received packet based, at least in part, on the forwarding policy. 12. The method of claim 11, further comprising: providing, by the centralized controller module, the forwarding policy in-band. 13. The method of claim 11, further comprising: storing, by the distributed module, a local topology related to each respective network interface identifier; and determining, by the centralized controller module, a network topology based, at least in part, on the local topology. 14. The method of claim 11, further comprising: determining, by the distributed module, local network conditions, the forwarding based, at least in part, on the local network conditions. 15. The method of claim 13, further comprising: assigning, by the centralized controller module, an IP (Internet Protocol) address to at least some of the directly connected computing devices based, at least in part, on the network topology. 16. A system comprising, one or more storage devices having stored thereon, individually or in combination, instructions that when executed by one or more processors result in the following operations comprising: identifying each directly connected computing device based, at least in part, on a respective network interface identifier; receiving and storing a forwarding policy from a centralized controller module; and forwarding a received packet based, at least in part, on the forwarding policy. 17. The system of claim 16, wherein the instructions that when executed by one or more processors results in the following additional operations comprising: providing the forwarding policy in-band. 18. The system of claim 16, wherein the instructions that when executed by one or more processors results in the following additional operations comprising: storing a local topology related to each respective network interface identifier; and determining a network topology based, at least in part, on the local topology. 19. The system of claim 16, wherein the instructions that when executed by one or more processors results in the following additional operations comprising: determining local network conditions, the forwarding based, at least in part, on the local network conditions. 20. The system of claim 18, wherein the instructions that when executed by one or more processors results in the following additional operations comprising: assigning an IP (Internet Protocol) address to at least some of the directly connected computing devices based, at least in part, on the network topology.
2,400
9,282
9,282
16,824,957
2,494
Disclosed embodiments relate to systems and methods for automatically detecting and addressing security risks in code segments. Techniques include accessing a plurality of code segments developed for execution in a network environment, automatically identifying a first code segment from the plurality of code segments for analysis, automatically performing a first code-level security risk assessment for the first code segment, and determining a first security risk level for the first code segment based on the application programming interface risk level. The first code-level security risk assessment may be performed based on at least one of an application programming interface risk level, an embedded credentials risk level, and a target resource risk level. Further techniques may include determining a second security risk level for a modified version of the first code segment; and enabling a comparison between the first security risk level and the second security risk level.
1-20. (canceled) 21. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for automatically detecting and addressing security risks in code segments, the operations comprising: automatically identifying a code segment included in or developed for inclusion in a body of code for execution in a network environment; automatically performing a code-level security risk assessment for the code segment based on an embedded credentials risk level, the embedded credentials risk level being determined based on at least a number or a type of one or more credentials coded into the code segment to be asserted by the code segment to access at least one target resource, and further based on at least one of: an application programming interface risk level, determined based on at least a number or a type of one or more application programming interface action calls associated with the code segment, or a target resource risk level, determined based on at least a number or a type of one or more references to the at least one target resource; determining a security risk level for the code segment based on the embedded credentials risk level and at least one of the application programming interface risk level, or the target resource risk level; identifying, based on the security risk level, an anomaly in the code segment indicating a security risk associated with the code segment; and applying, based on the identification, a control action associated with at least one of the code segment, the network environment, or an identity associated with the code segment. 22. The non-transitory computer readable medium of claim 21, wherein identifying the anomaly comprises: identifying at least one additional code segment developed for execution in the network environment; determining a security risk level for the additional code segment; and comparing the security risk levels for the code segment and the additional code segment. 23. The non-transitory computer readable medium of claim 22, wherein the additional code segment is included in the body of code. 24. The non-transitory computer readable medium of claim 22, wherein the additional code segment comprises a modification of the code segment. 25. The non-transitory computer readable medium of claim 21, wherein identifying the anomaly comprises identifying suspicious code injected into the code segment. 26. The non-transitory computer readable medium of claim 21, wherein automatically identifying the code segment comprises dynamically scanning the network environment in real time. 27. The non-transitory computer readable medium of claim 21, wherein the identity comprises a creator of the code segment. 28. The non-transitory computer readable medium of claim 21, wherein the control action comprises modifying at least one authentication requirement associated with the identity. 29. The non-transitory computer readable medium of claim 21, wherein the control action comprises modifying at least one authentication requirement associated with the code segment. 30. The non-transitory computer readable medium of claim 21, wherein the control action comprises flagging the one or more credentials. 31. The non-transitory computer readable medium of claim 21, wherein the control action comprises disabling the one or more credentials. 32. The non-transitory computer readable medium of claim 21, wherein the control action comprises removing the one or more credentials from the code segment. 33. The non-transitory computer readable medium of claim 21, wherein the control action comprises reporting the anomaly. 34. A computer-implemented method for automatically detecting and addressing security risks in code segments, the method comprising: automatically identifying a code segment included in or developed for inclusion in a body of code for execution in a network environment; automatically performing a code-level security risk assessment for the code segment based on an embedded credentials risk level, the embedded credentials risk level being determined based on at least a number or a type of one or more credentials coded into the code segment to be asserted by the code segment to access at least one target resource, and further based on at least one of: an application programming interface risk level, determined based on at least a number or a type of one or more application programming interface action calls associated with the code segment, or a target resource risk level, determined based on at least a number or a type of one or more references to the at least one target resource; determining a security risk level for the code segment based on the embedded credentials risk level and at least one of the application programming interface risk level, or the target resource risk level; identifying, based on the security risk level, an anomaly in the code segment indicating a security risk associated with the code segment; and applying, based on the identification, a control action associated with at least one of the code segment, the network environment, or an identity associated with the code segment. 35. The computer-implemented method of claim 34, wherein identifying the anomaly comprises: identifying at least one additional code segment developed for execution in the network environment; determining a security risk level for the additional code segment; and comparing the security risk levels for the code segment and the additional code segment. 36. The computer-implemented method of claim 34, wherein the operations further comprise updating a profile associated with a creator of the first code segment based on the security risk. 37. The computer-implemented method of claim 34, wherein the application programming interface risk level is based on a determination of whether the one or more application programming interface action calls have security risks. 38. The computer-implemented method of claim 34, wherein the embedded credentials risk level is determined based on a degree of privileged access associated with the one or more credentials. 39. The computer-implemented method of claim 34, wherein the target resource risk level is determined based on a determination of whether the target resources are sensitive network resources. 40. The computer-implemented method of claim 34, wherein applying the control action comprises reporting the anomaly.
Disclosed embodiments relate to systems and methods for automatically detecting and addressing security risks in code segments. Techniques include accessing a plurality of code segments developed for execution in a network environment, automatically identifying a first code segment from the plurality of code segments for analysis, automatically performing a first code-level security risk assessment for the first code segment, and determining a first security risk level for the first code segment based on the application programming interface risk level. The first code-level security risk assessment may be performed based on at least one of an application programming interface risk level, an embedded credentials risk level, and a target resource risk level. Further techniques may include determining a second security risk level for a modified version of the first code segment; and enabling a comparison between the first security risk level and the second security risk level.1-20. (canceled) 21. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for automatically detecting and addressing security risks in code segments, the operations comprising: automatically identifying a code segment included in or developed for inclusion in a body of code for execution in a network environment; automatically performing a code-level security risk assessment for the code segment based on an embedded credentials risk level, the embedded credentials risk level being determined based on at least a number or a type of one or more credentials coded into the code segment to be asserted by the code segment to access at least one target resource, and further based on at least one of: an application programming interface risk level, determined based on at least a number or a type of one or more application programming interface action calls associated with the code segment, or a target resource risk level, determined based on at least a number or a type of one or more references to the at least one target resource; determining a security risk level for the code segment based on the embedded credentials risk level and at least one of the application programming interface risk level, or the target resource risk level; identifying, based on the security risk level, an anomaly in the code segment indicating a security risk associated with the code segment; and applying, based on the identification, a control action associated with at least one of the code segment, the network environment, or an identity associated with the code segment. 22. The non-transitory computer readable medium of claim 21, wherein identifying the anomaly comprises: identifying at least one additional code segment developed for execution in the network environment; determining a security risk level for the additional code segment; and comparing the security risk levels for the code segment and the additional code segment. 23. The non-transitory computer readable medium of claim 22, wherein the additional code segment is included in the body of code. 24. The non-transitory computer readable medium of claim 22, wherein the additional code segment comprises a modification of the code segment. 25. The non-transitory computer readable medium of claim 21, wherein identifying the anomaly comprises identifying suspicious code injected into the code segment. 26. The non-transitory computer readable medium of claim 21, wherein automatically identifying the code segment comprises dynamically scanning the network environment in real time. 27. The non-transitory computer readable medium of claim 21, wherein the identity comprises a creator of the code segment. 28. The non-transitory computer readable medium of claim 21, wherein the control action comprises modifying at least one authentication requirement associated with the identity. 29. The non-transitory computer readable medium of claim 21, wherein the control action comprises modifying at least one authentication requirement associated with the code segment. 30. The non-transitory computer readable medium of claim 21, wherein the control action comprises flagging the one or more credentials. 31. The non-transitory computer readable medium of claim 21, wherein the control action comprises disabling the one or more credentials. 32. The non-transitory computer readable medium of claim 21, wherein the control action comprises removing the one or more credentials from the code segment. 33. The non-transitory computer readable medium of claim 21, wherein the control action comprises reporting the anomaly. 34. A computer-implemented method for automatically detecting and addressing security risks in code segments, the method comprising: automatically identifying a code segment included in or developed for inclusion in a body of code for execution in a network environment; automatically performing a code-level security risk assessment for the code segment based on an embedded credentials risk level, the embedded credentials risk level being determined based on at least a number or a type of one or more credentials coded into the code segment to be asserted by the code segment to access at least one target resource, and further based on at least one of: an application programming interface risk level, determined based on at least a number or a type of one or more application programming interface action calls associated with the code segment, or a target resource risk level, determined based on at least a number or a type of one or more references to the at least one target resource; determining a security risk level for the code segment based on the embedded credentials risk level and at least one of the application programming interface risk level, or the target resource risk level; identifying, based on the security risk level, an anomaly in the code segment indicating a security risk associated with the code segment; and applying, based on the identification, a control action associated with at least one of the code segment, the network environment, or an identity associated with the code segment. 35. The computer-implemented method of claim 34, wherein identifying the anomaly comprises: identifying at least one additional code segment developed for execution in the network environment; determining a security risk level for the additional code segment; and comparing the security risk levels for the code segment and the additional code segment. 36. The computer-implemented method of claim 34, wherein the operations further comprise updating a profile associated with a creator of the first code segment based on the security risk. 37. The computer-implemented method of claim 34, wherein the application programming interface risk level is based on a determination of whether the one or more application programming interface action calls have security risks. 38. The computer-implemented method of claim 34, wherein the embedded credentials risk level is determined based on a degree of privileged access associated with the one or more credentials. 39. The computer-implemented method of claim 34, wherein the target resource risk level is determined based on a determination of whether the target resources are sensitive network resources. 40. The computer-implemented method of claim 34, wherein applying the control action comprises reporting the anomaly.
2,400
9,283
9,283
15,805,119
2,424
Methods, systems, and apparatus for initializing a dimensioning system based on a location of a vehicle carrying an object to be dimensioned. An example method disclosed herein includes receiving, from a location system, location data indicating a location of a vehicle carrying an object; responsive to the location data indicating that the vehicle is approaching an imaging area, initializing, using a logic circuit, a sensor to be primed for capturing data representative of the object; receiving, from a motion detector carried by the vehicle, motion data indicating a speed of the vehicle; and triggering, using the logic circuitry, the sensor to capture data representative of the object at a sample rate based on the speed of the vehicle.
1. A method comprising: receiving, from a location system, location data indicating a location of a vehicle carrying an object; responsive to the location data indicating that the vehicle is approaching an imaging area, initializing, using a logic circuit, a sensor to be primed for capturing data representative of the object; receiving, from a motion detector carried by the vehicle, motion data indicating a speed of the vehicle; and triggering, using the logic circuitry, the sensor to capture data representative of the object at a sample rate based on the speed of the vehicle. 2. The method of claim 1, wherein initializing the sensor comprises: transmitting, to the sensor, an instruction to clear data stored in a buffer associated with the sensors. 3. The method of claim 1, wherein initializing the sensor comprises: transmitting, to the sensor, an instruction to allocate memory for storing the captured data. 4. The method of claim 1, wherein the sensor is a three dimensional sensor configured to generate depth values at each of a plurality of coordinates. 5. The method of claim 1, wherein initializing the sensor comprises: transmitting, to the sensor, an instruction to warm up from a standby temperature to an operating temperature. 6. The method of claim 1, further comprising: transmitting, to an inertial motion unit (IMU) at the vehicle, an instruction to report the motion data. 7. The method of claim 6, further comprising: analyzing, using the logic circuitry, the motion data to determine the sample rate based on the speed of the vehicle and a processing capacity of the logic circuitry or the sensor. 8. The method of claim 1, wherein initializing sensor comprises: transmitting, to the sensor, an instruction to execute a recalibration routine. 9. The method of claim 1, further comprising: responsive to receiving the location data, causing, using the logic circuitry, a server to stop performing a task in preparation to receive the captured data. 10. The method of claim 1, further comprising: responsive to receiving, from the location system, additional location data indicating that the object has left the imaging area, ceasing the triggering of the sensor. 11. The method of claim 1, further comprising determining a dimension of the object based on the captured data. 12. A method comprising: receiving, from a location system, location data indicating a location of a vehicle carrying an object; responsive to the location data indicating that the vehicle is approaching an imaging area, initializing, using a logic circuit, sensors to be primed for capturing data representative of the object; transmitting, to the sensors, an instruction to synchronize timing circuitry at each of the sensors with one another based on the speed of the vehicle; simultaneously triggering, using the logic circuitry, the sensors to capture data representative of the obj ect. 13. The method of claim 12, further comprising: transmitting, to an inertial motion unit (IMU) at the vehicle, an instruction to report the motion data. 14. The method of claim 13, wherein synchronizing the timing circuitry for each of the sensors comprises: determining, using the logic circuitry and based on the motion data, an expected time at which the vehicle will enter the imaging area; and transmitting, to the sensors, an instruction to cause a timer at each of the sensors to expire at the expected time. 15. The method of claim 12, wherein synchronizing the timing circuitry for each of the sensors comprises: transmitting, to the sensors, an instruction to set a clock at each of the sensors to a common time. 16. The method of claim 12, wherein the sensors are three dimensional sensors configured to generate depth values at each of a plurality of coordinates. 17. The method of claim 12, wherein initializing the sensors comprises: transmitting, to the sensors, an instruction to warm up from a standby temperature to an operating temperature. 18. The method of claim 12, further comprising determining a dimension of the object based on the captured data. 19. A tangible machine-readable medium comprising instructions that, when executed, cause a machine to at least: receive, from a location system, location data indicating a location of a vehicle carrying an object; responsive to the location data indicating that the vehicle is approaching an imaging area, initialize a sensor to be primed for capturing data representative of the object; receive, from a motion detector carried by the vehicle, motion data indicating a speed of the vehicle; and trigger the sensor to capture data representative of the object at a sample rate based on the speed of the vehicle. 20. The tangible machine-readable medium as defined in claim 19, wherein the instructions, when executed, cause the machine to analyze the motion data to determine the sample rate based on the speed of the vehicle and a processing capacity of the machine or the sensor. 21.-26. (canceled)
Methods, systems, and apparatus for initializing a dimensioning system based on a location of a vehicle carrying an object to be dimensioned. An example method disclosed herein includes receiving, from a location system, location data indicating a location of a vehicle carrying an object; responsive to the location data indicating that the vehicle is approaching an imaging area, initializing, using a logic circuit, a sensor to be primed for capturing data representative of the object; receiving, from a motion detector carried by the vehicle, motion data indicating a speed of the vehicle; and triggering, using the logic circuitry, the sensor to capture data representative of the object at a sample rate based on the speed of the vehicle.1. A method comprising: receiving, from a location system, location data indicating a location of a vehicle carrying an object; responsive to the location data indicating that the vehicle is approaching an imaging area, initializing, using a logic circuit, a sensor to be primed for capturing data representative of the object; receiving, from a motion detector carried by the vehicle, motion data indicating a speed of the vehicle; and triggering, using the logic circuitry, the sensor to capture data representative of the object at a sample rate based on the speed of the vehicle. 2. The method of claim 1, wherein initializing the sensor comprises: transmitting, to the sensor, an instruction to clear data stored in a buffer associated with the sensors. 3. The method of claim 1, wherein initializing the sensor comprises: transmitting, to the sensor, an instruction to allocate memory for storing the captured data. 4. The method of claim 1, wherein the sensor is a three dimensional sensor configured to generate depth values at each of a plurality of coordinates. 5. The method of claim 1, wherein initializing the sensor comprises: transmitting, to the sensor, an instruction to warm up from a standby temperature to an operating temperature. 6. The method of claim 1, further comprising: transmitting, to an inertial motion unit (IMU) at the vehicle, an instruction to report the motion data. 7. The method of claim 6, further comprising: analyzing, using the logic circuitry, the motion data to determine the sample rate based on the speed of the vehicle and a processing capacity of the logic circuitry or the sensor. 8. The method of claim 1, wherein initializing sensor comprises: transmitting, to the sensor, an instruction to execute a recalibration routine. 9. The method of claim 1, further comprising: responsive to receiving the location data, causing, using the logic circuitry, a server to stop performing a task in preparation to receive the captured data. 10. The method of claim 1, further comprising: responsive to receiving, from the location system, additional location data indicating that the object has left the imaging area, ceasing the triggering of the sensor. 11. The method of claim 1, further comprising determining a dimension of the object based on the captured data. 12. A method comprising: receiving, from a location system, location data indicating a location of a vehicle carrying an object; responsive to the location data indicating that the vehicle is approaching an imaging area, initializing, using a logic circuit, sensors to be primed for capturing data representative of the object; transmitting, to the sensors, an instruction to synchronize timing circuitry at each of the sensors with one another based on the speed of the vehicle; simultaneously triggering, using the logic circuitry, the sensors to capture data representative of the obj ect. 13. The method of claim 12, further comprising: transmitting, to an inertial motion unit (IMU) at the vehicle, an instruction to report the motion data. 14. The method of claim 13, wherein synchronizing the timing circuitry for each of the sensors comprises: determining, using the logic circuitry and based on the motion data, an expected time at which the vehicle will enter the imaging area; and transmitting, to the sensors, an instruction to cause a timer at each of the sensors to expire at the expected time. 15. The method of claim 12, wherein synchronizing the timing circuitry for each of the sensors comprises: transmitting, to the sensors, an instruction to set a clock at each of the sensors to a common time. 16. The method of claim 12, wherein the sensors are three dimensional sensors configured to generate depth values at each of a plurality of coordinates. 17. The method of claim 12, wherein initializing the sensors comprises: transmitting, to the sensors, an instruction to warm up from a standby temperature to an operating temperature. 18. The method of claim 12, further comprising determining a dimension of the object based on the captured data. 19. A tangible machine-readable medium comprising instructions that, when executed, cause a machine to at least: receive, from a location system, location data indicating a location of a vehicle carrying an object; responsive to the location data indicating that the vehicle is approaching an imaging area, initialize a sensor to be primed for capturing data representative of the object; receive, from a motion detector carried by the vehicle, motion data indicating a speed of the vehicle; and trigger the sensor to capture data representative of the object at a sample rate based on the speed of the vehicle. 20. The tangible machine-readable medium as defined in claim 19, wherein the instructions, when executed, cause the machine to analyze the motion data to determine the sample rate based on the speed of the vehicle and a processing capacity of the machine or the sensor. 21.-26. (canceled)
2,400
9,284
9,284
15,422,295
2,431
In one embodiment, a system for managing a virtualization environment comprises a plurality of host machines, one or more virtual disks comprising a plurality of storage devices, a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines and conducts I/O transactions with the one or more virtual disks, and a virtualized file server self-healing system configured to identify one or more corrupt units of stored data at one or more levels of a storage hierarchy associated with the storage devices, wherein the levels comprise one or more of file level, filesystem level, and storage level, and when data corruption is detected, cause each FSVM on which at least a portion of the unit of stored data is located to recover the unit of stored data.
1. A system for managing a virtualization environment, the system comprising: a plurality of host machines, wherein each of the host machines comprises a hypervisor, one or more user virtual machines (user VMs), and a virtual machine controller; one or more virtual disks comprising a plurality of storage devices, the one or more virtual disks being accessible by the virtual machine controllers, wherein the virtual machine controllers conduct I/O transactions with the one or more virtual disks; a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines and conducts I/O transactions with the one or more virtual disks, and a virtualized file server self-healing system configured to: identify one or more corrupt units of stored data at one or more levels of a storage hierarchy associated with the storage devices, wherein the levels comprise one or more of file level, filesystem level, and storage level; when data corruption is detected, cause each FSVM on which at least a portion of the unit of stored data is located to recover the unit of stored data. 2. The system of claim 1, wherein to identify the one or more corrupt units of stored data, the self-healing system is configured to perform one or more consistency checks at each level of the storage hierarchy. 3. The system of claim 2, wherein to perform to perform one or more consistency checks, the self-healing system is configured to: calculate checksums of each unit of stored data at each level of the storage hierarchy; and compare the calculated checksums to expected checksums associated with the corresponding level of the storage hierarchy. 4. The system of claim 2, wherein to identify one or more corrupt units of stored data at the file level, the self-healing system is configured to invoke a virus or malware detector. 5. The system of claim 2, wherein to identify one or more corrupt units of stored data at the filesystem level, the self-healing system is configured to compute a checksum of the filesystem and compare the computed checksum to an expected checksum of the filesystem. 6. The system of claim 2, wherein to identify one or more corrupt units of stored data at the storage level, the self-healing system is configured to compute a checksum of a volume group and compare the computed checksum to an expected checksum of the volume group. 7. The system of claim 1, wherein to initiate recovery of the unit of stored data, the self-healing system is configured to restore the unit of stored data from a most-recent snapshot that includes the unit of stored data. 8. The system of claim 1, wherein to identify one or more corrupt units of stored data, the self-healing system is configured to monitor the corruption and data loss on all FSVMs of the VF S. 9. One or more computer-readable non-transitory storage media embodying software for managing a virtualization environment, the media comprising instructions operable when executed to: provide a plurality of host machines, wherein each of the host machines comprises a hypervisor, one or more user virtual machines (user VMs), and a virtual machine controller; provide one or more virtual disks comprising a plurality of storage devices, the one or more virtual disks being accessible by the virtual machine controllers, wherein the virtual machine controllers conduct I/O transactions with the one or more virtual disks; provide a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines and conducts I/O transactions with the one or more virtual disks; identify one or more corrupt units of stored data at one or more levels of a storage hierarchy associated with the storage devices, wherein the levels comprise one or more of file level, filesystem level, and storage level; and when data corruption is detected, cause each FSVM on which at least a portion of the unit of stored data is located to recover the unit of stored data. 10. The media of claim 9, wherein to identify the one or more corrupt units of stored data, the instructions are further operable when executed to perform one or more consistency checks at each level of the storage hierarchy. 11. The media of claim 10, wherein to perform to perform one or more consistency checks, the instructions are further operable when executed to: calculate checksums of each unit of stored data at each level of the storage hierarchy; and compare the calculated checksums to expected checksums associated with the corresponding level of the storage hierarchy. 12. The media of claim 10, wherein to identify one or more corrupt units of stored data at the file level, the instructions are further operable when executed to invoke a virus or malware detector. 13. The media of claim 10, wherein to identify one or more corrupt units of stored data at the filesystem level, the instructions are further operable when executed to compute a checksum of the filesystem and compare the computed checksum to an expected checksum of the filesystem. 14. The media of claim 10, wherein to identify one or more corrupt units of stored data at the storage level, the instructions are further operable when executed to compute a checksum of a volume group and compare the computed checksum to an expected checksum of the volume group. 15. The media of claim 9, wherein to initiate recovery of the unit of stored data, the instructions are further operable when executed to restore the unit of stored data from a most-recent snapshot that includes the unit of stored data. 16. The media of claim 9, wherein to identify one or more corrupt units of stored data, the instructions are further operable when executed to monitor the corruption and data loss on all FSVMs of the VFS. 17. A method for managing a virtualization environment, the method comprising: by one or more computing devices, providing a plurality of host machines, wherein each of the host machines comprises a hypervisor, one or more user virtual machines (user VMs), and a virtual machine controller; by the one or more computing devices, providing one or more virtual disks comprising a plurality of storage devices, the one or more virtual disks being accessible by the virtual machine controllers, wherein the virtual machine controllers conduct I/O transactions with the one or more virtual disks; by the one or more computing devices, providing a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines and conducts I/O transactions with the one or more virtual disks; by the one or more computing devices, identifying one or more corrupt units of stored data at one or more levels of a storage hierarchy associated with the storage devices, wherein the levels comprise one or more of file level, filesystem level, and storage level; and by the one or more computing devices, when data corruption is detected, causing each FSVM on which at least a portion of the unit of stored data is located to recover the unit of stored data. 18. The method of claim 17, wherein identifying the one or more corrupt units of stored data comprises performing one or more consistency checks at each level of the storage hierarchy. 19. The method of claim 18, wherein performing one or more consistency checks comprises: by the one or more computing devices, calculating checksums of each unit of stored data at each level of the storage hierarchy; and by the one or more computing devices, comparing the calculated checksums to expected checksums associated with the corresponding level of the storage hierarchy. 20. The method of claim 18, wherein identifying one or more corrupt units of stored data at the file level comprises invoking a virus or malware detector.
In one embodiment, a system for managing a virtualization environment comprises a plurality of host machines, one or more virtual disks comprising a plurality of storage devices, a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines and conducts I/O transactions with the one or more virtual disks, and a virtualized file server self-healing system configured to identify one or more corrupt units of stored data at one or more levels of a storage hierarchy associated with the storage devices, wherein the levels comprise one or more of file level, filesystem level, and storage level, and when data corruption is detected, cause each FSVM on which at least a portion of the unit of stored data is located to recover the unit of stored data.1. A system for managing a virtualization environment, the system comprising: a plurality of host machines, wherein each of the host machines comprises a hypervisor, one or more user virtual machines (user VMs), and a virtual machine controller; one or more virtual disks comprising a plurality of storage devices, the one or more virtual disks being accessible by the virtual machine controllers, wherein the virtual machine controllers conduct I/O transactions with the one or more virtual disks; a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines and conducts I/O transactions with the one or more virtual disks, and a virtualized file server self-healing system configured to: identify one or more corrupt units of stored data at one or more levels of a storage hierarchy associated with the storage devices, wherein the levels comprise one or more of file level, filesystem level, and storage level; when data corruption is detected, cause each FSVM on which at least a portion of the unit of stored data is located to recover the unit of stored data. 2. The system of claim 1, wherein to identify the one or more corrupt units of stored data, the self-healing system is configured to perform one or more consistency checks at each level of the storage hierarchy. 3. The system of claim 2, wherein to perform to perform one or more consistency checks, the self-healing system is configured to: calculate checksums of each unit of stored data at each level of the storage hierarchy; and compare the calculated checksums to expected checksums associated with the corresponding level of the storage hierarchy. 4. The system of claim 2, wherein to identify one or more corrupt units of stored data at the file level, the self-healing system is configured to invoke a virus or malware detector. 5. The system of claim 2, wherein to identify one or more corrupt units of stored data at the filesystem level, the self-healing system is configured to compute a checksum of the filesystem and compare the computed checksum to an expected checksum of the filesystem. 6. The system of claim 2, wherein to identify one or more corrupt units of stored data at the storage level, the self-healing system is configured to compute a checksum of a volume group and compare the computed checksum to an expected checksum of the volume group. 7. The system of claim 1, wherein to initiate recovery of the unit of stored data, the self-healing system is configured to restore the unit of stored data from a most-recent snapshot that includes the unit of stored data. 8. The system of claim 1, wherein to identify one or more corrupt units of stored data, the self-healing system is configured to monitor the corruption and data loss on all FSVMs of the VF S. 9. One or more computer-readable non-transitory storage media embodying software for managing a virtualization environment, the media comprising instructions operable when executed to: provide a plurality of host machines, wherein each of the host machines comprises a hypervisor, one or more user virtual machines (user VMs), and a virtual machine controller; provide one or more virtual disks comprising a plurality of storage devices, the one or more virtual disks being accessible by the virtual machine controllers, wherein the virtual machine controllers conduct I/O transactions with the one or more virtual disks; provide a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines and conducts I/O transactions with the one or more virtual disks; identify one or more corrupt units of stored data at one or more levels of a storage hierarchy associated with the storage devices, wherein the levels comprise one or more of file level, filesystem level, and storage level; and when data corruption is detected, cause each FSVM on which at least a portion of the unit of stored data is located to recover the unit of stored data. 10. The media of claim 9, wherein to identify the one or more corrupt units of stored data, the instructions are further operable when executed to perform one or more consistency checks at each level of the storage hierarchy. 11. The media of claim 10, wherein to perform to perform one or more consistency checks, the instructions are further operable when executed to: calculate checksums of each unit of stored data at each level of the storage hierarchy; and compare the calculated checksums to expected checksums associated with the corresponding level of the storage hierarchy. 12. The media of claim 10, wherein to identify one or more corrupt units of stored data at the file level, the instructions are further operable when executed to invoke a virus or malware detector. 13. The media of claim 10, wherein to identify one or more corrupt units of stored data at the filesystem level, the instructions are further operable when executed to compute a checksum of the filesystem and compare the computed checksum to an expected checksum of the filesystem. 14. The media of claim 10, wherein to identify one or more corrupt units of stored data at the storage level, the instructions are further operable when executed to compute a checksum of a volume group and compare the computed checksum to an expected checksum of the volume group. 15. The media of claim 9, wherein to initiate recovery of the unit of stored data, the instructions are further operable when executed to restore the unit of stored data from a most-recent snapshot that includes the unit of stored data. 16. The media of claim 9, wherein to identify one or more corrupt units of stored data, the instructions are further operable when executed to monitor the corruption and data loss on all FSVMs of the VFS. 17. A method for managing a virtualization environment, the method comprising: by one or more computing devices, providing a plurality of host machines, wherein each of the host machines comprises a hypervisor, one or more user virtual machines (user VMs), and a virtual machine controller; by the one or more computing devices, providing one or more virtual disks comprising a plurality of storage devices, the one or more virtual disks being accessible by the virtual machine controllers, wherein the virtual machine controllers conduct I/O transactions with the one or more virtual disks; by the one or more computing devices, providing a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines and conducts I/O transactions with the one or more virtual disks; by the one or more computing devices, identifying one or more corrupt units of stored data at one or more levels of a storage hierarchy associated with the storage devices, wherein the levels comprise one or more of file level, filesystem level, and storage level; and by the one or more computing devices, when data corruption is detected, causing each FSVM on which at least a portion of the unit of stored data is located to recover the unit of stored data. 18. The method of claim 17, wherein identifying the one or more corrupt units of stored data comprises performing one or more consistency checks at each level of the storage hierarchy. 19. The method of claim 18, wherein performing one or more consistency checks comprises: by the one or more computing devices, calculating checksums of each unit of stored data at each level of the storage hierarchy; and by the one or more computing devices, comparing the calculated checksums to expected checksums associated with the corresponding level of the storage hierarchy. 20. The method of claim 18, wherein identifying one or more corrupt units of stored data at the file level comprises invoking a virus or malware detector.
2,400
9,285
9,285
16,014,057
2,419
A base station used in a home security or home automation/control system is described. The base station is configured to automatically accept new sensors or control modules by placing such new sensors or control modules in proximity to the base station.
1. A method performed by a base station for setup of a wireless home monitoring and control system, comprising: receiving, by a processor via a receiver coupled to the processor, a wireless signal from a wireless sensor or a wireless control module; determining, by the processor, that the wireless sensor or the wireless control module is within a predetermined distance from the base station; and when the processor determines that the wireless sensor or the wireless control module is within the predetermined distance: extracting, by the processor, an identification of the wireless sensor or the wireless control module from the wireless signal; and storing, by the processor, the identification in a memory coupled to the processor. 2. The method of claim 1, further comprising: causing, by the base station, the wireless sensor or the wireless control module to actuate; wherein receiving the wireless signal occurs in response to actuation of the wireless sensor or the wireless control module. 3. The method of claim 2, wherein causing the wireless sensor or the wireless control module to actuate comprises emitting, by a source within the base station, a magnetic field; wherein a user brings the wireless sensor or control module within a second predetermined distance of the magnetic field. 4. The method of claim 3, wherein the predetermined distance and the second predetermined distance are equal to each other. 5. The method of claim 1, wherein determining that the wireless sensor or the wireless control module is within the predetermined distance from the base station comprises: determining, by the processor, that the signal strength of the wireless signal exceeds a predetermined threshold. 6. The method of claim 1, wherein determining that the wireless sensor or the wireless control module is within a predetermined distance from the base station is performed while the base station is in a normal mode of operation. 7. The method of claim 1, further comprising: in response to storing the identification in the memory, causing, by the processor, a user interface coupled to the processor to alert a user that the wireless sensor or the wireless control module has been accepted by the base station. 8. The method of claim 1, further comprising: in response to storing the identification in the memory, causing, by the processor, a user interface coupled to the processor to query a user as to a location where the wireless sensor or the wireless control module is to be installed; receiving, by the processor, input from the user via the user interface relating to the location; and storing, by the processor, the location in association with the identification in the memory. 9. The method of claim 1, further comprising: in response to storing the identification in the memory, causing, by the processor, a user interface coupled to the processor to query a user as to a type of wireless sensor or wireless control module; receiving, by the processor, input from the user via the user interface relating to the type of wireless sensor or wireless control module; and storing, by the processor, the type in association with the identification in the memory. 10. The method of claim 1, further comprising: when the processor determines that the wireless sensor or the wireless control module is not within the predetermined distance: extracting an identification of the wireless sensor or the wireless control module from the wireless signal; determining, by the processor, whether the identification has been previously stored in the memory; and when the identification has previously been stored in the memory, processing the wireless signal; and when the identification has been not been previously stored in the memory, ignoring the wireless signal 11. A base station for providing home monitoring and control, comprising: a receiver; a memory for storing processor-executable instructions; a processor coupled to the receiver and the memory for executing the processor-executable instructions that causes the base station to: receive, by the processor, a wireless signal from a wireless sensor or a wireless control module; determine, by the processor, that the wireless sensor or the wireless control module is within a predetermined distance from the base station; and when the processor determines that the wireless sensor or the wireless control module is within the predetermined distance: extract, by the processor, an identification of the wireless sensor or the wireless control module from the wireless signal; and store, by the processor, the identification in the memory coupled to the processor. 12. The base station of claim 11, further comprising: a magnet for causing the wireless sensor or the wireless control module to transmit the wireless signal when the wireless sensor or the wireless control module is placed within a second predetermined distance from the base station; wherein receiving the wireless signal occurs in response to the wireless sensor or the wireless control module being placed within the second predetermined distance. 13. The base station of claim 12, wherein the predetermined distance and the second predetermined distance are equal to each other. 14. The base station of claim 11, wherein the processor-executable instructions that cause the base station to determine that the wireless sensor or the wireless control module is within the predetermined distance from the base station comprises instructions that cause the base station to: determine, by the processor, that the signal strength of the wireless signal exceeds a predetermined threshold. 15. The base station of claim 11, wherein determining that the wireless sensor or the wireless control module is within a predetermined distance from the base station is performed while the base station is in a normal mode of operation. 16. The base station of claim 11, further comprising a user interface coupled to the processor, and further comprising processor-executable instructions that cause the base station to: in response to storing the identification in the memory, cause, by the processor, the user interface to alert a user that the wireless sensor or the wireless control module has been accepted by the base station. 17. The base station of claim 11, further comprising a user interface coupled to the processor, and further comprising processor-executable instructions that cause the base station to: in response to storing the identification in the memory, cause, by the processor, the user interface to query a user as to a location where the wireless sensor or the wireless control module is to be installed; receive, by the processor, input from the user via the user interface relating to the location; and store, by the processor, the location in association with the identification in the memory. 18. The base station of claim 11, further comprising a user interface coupled to the processor, and further comprising processor-executable instructions that cause the base station to: in response to storing the identification in the memory, cause, by the processor, the user interface to query a user as to a type of wireless sensor or wireless control module; receive, by the processor, input from the user via the user interface relating to the type of wireless sensor or wireless control module; and store, by the processor, the type in association with the identification in the memory. 19. The base station of claim 11, further comprising processor-executable instructions that cause the base station to: when the processor determines that the wireless sensor or the wireless control module is not within the predetermined distance: extract an identification of the wireless sensor or the wireless control module from the wireless signal; determine, by the processor, whether the identification has been previously stored in the memory; and when the identification has previously been stored in the memory, process the wireless signal; and when the identification has been not been previously stored in the memory, ignore the wireless signal.
A base station used in a home security or home automation/control system is described. The base station is configured to automatically accept new sensors or control modules by placing such new sensors or control modules in proximity to the base station.1. A method performed by a base station for setup of a wireless home monitoring and control system, comprising: receiving, by a processor via a receiver coupled to the processor, a wireless signal from a wireless sensor or a wireless control module; determining, by the processor, that the wireless sensor or the wireless control module is within a predetermined distance from the base station; and when the processor determines that the wireless sensor or the wireless control module is within the predetermined distance: extracting, by the processor, an identification of the wireless sensor or the wireless control module from the wireless signal; and storing, by the processor, the identification in a memory coupled to the processor. 2. The method of claim 1, further comprising: causing, by the base station, the wireless sensor or the wireless control module to actuate; wherein receiving the wireless signal occurs in response to actuation of the wireless sensor or the wireless control module. 3. The method of claim 2, wherein causing the wireless sensor or the wireless control module to actuate comprises emitting, by a source within the base station, a magnetic field; wherein a user brings the wireless sensor or control module within a second predetermined distance of the magnetic field. 4. The method of claim 3, wherein the predetermined distance and the second predetermined distance are equal to each other. 5. The method of claim 1, wherein determining that the wireless sensor or the wireless control module is within the predetermined distance from the base station comprises: determining, by the processor, that the signal strength of the wireless signal exceeds a predetermined threshold. 6. The method of claim 1, wherein determining that the wireless sensor or the wireless control module is within a predetermined distance from the base station is performed while the base station is in a normal mode of operation. 7. The method of claim 1, further comprising: in response to storing the identification in the memory, causing, by the processor, a user interface coupled to the processor to alert a user that the wireless sensor or the wireless control module has been accepted by the base station. 8. The method of claim 1, further comprising: in response to storing the identification in the memory, causing, by the processor, a user interface coupled to the processor to query a user as to a location where the wireless sensor or the wireless control module is to be installed; receiving, by the processor, input from the user via the user interface relating to the location; and storing, by the processor, the location in association with the identification in the memory. 9. The method of claim 1, further comprising: in response to storing the identification in the memory, causing, by the processor, a user interface coupled to the processor to query a user as to a type of wireless sensor or wireless control module; receiving, by the processor, input from the user via the user interface relating to the type of wireless sensor or wireless control module; and storing, by the processor, the type in association with the identification in the memory. 10. The method of claim 1, further comprising: when the processor determines that the wireless sensor or the wireless control module is not within the predetermined distance: extracting an identification of the wireless sensor or the wireless control module from the wireless signal; determining, by the processor, whether the identification has been previously stored in the memory; and when the identification has previously been stored in the memory, processing the wireless signal; and when the identification has been not been previously stored in the memory, ignoring the wireless signal 11. A base station for providing home monitoring and control, comprising: a receiver; a memory for storing processor-executable instructions; a processor coupled to the receiver and the memory for executing the processor-executable instructions that causes the base station to: receive, by the processor, a wireless signal from a wireless sensor or a wireless control module; determine, by the processor, that the wireless sensor or the wireless control module is within a predetermined distance from the base station; and when the processor determines that the wireless sensor or the wireless control module is within the predetermined distance: extract, by the processor, an identification of the wireless sensor or the wireless control module from the wireless signal; and store, by the processor, the identification in the memory coupled to the processor. 12. The base station of claim 11, further comprising: a magnet for causing the wireless sensor or the wireless control module to transmit the wireless signal when the wireless sensor or the wireless control module is placed within a second predetermined distance from the base station; wherein receiving the wireless signal occurs in response to the wireless sensor or the wireless control module being placed within the second predetermined distance. 13. The base station of claim 12, wherein the predetermined distance and the second predetermined distance are equal to each other. 14. The base station of claim 11, wherein the processor-executable instructions that cause the base station to determine that the wireless sensor or the wireless control module is within the predetermined distance from the base station comprises instructions that cause the base station to: determine, by the processor, that the signal strength of the wireless signal exceeds a predetermined threshold. 15. The base station of claim 11, wherein determining that the wireless sensor or the wireless control module is within a predetermined distance from the base station is performed while the base station is in a normal mode of operation. 16. The base station of claim 11, further comprising a user interface coupled to the processor, and further comprising processor-executable instructions that cause the base station to: in response to storing the identification in the memory, cause, by the processor, the user interface to alert a user that the wireless sensor or the wireless control module has been accepted by the base station. 17. The base station of claim 11, further comprising a user interface coupled to the processor, and further comprising processor-executable instructions that cause the base station to: in response to storing the identification in the memory, cause, by the processor, the user interface to query a user as to a location where the wireless sensor or the wireless control module is to be installed; receive, by the processor, input from the user via the user interface relating to the location; and store, by the processor, the location in association with the identification in the memory. 18. The base station of claim 11, further comprising a user interface coupled to the processor, and further comprising processor-executable instructions that cause the base station to: in response to storing the identification in the memory, cause, by the processor, the user interface to query a user as to a type of wireless sensor or wireless control module; receive, by the processor, input from the user via the user interface relating to the type of wireless sensor or wireless control module; and store, by the processor, the type in association with the identification in the memory. 19. The base station of claim 11, further comprising processor-executable instructions that cause the base station to: when the processor determines that the wireless sensor or the wireless control module is not within the predetermined distance: extract an identification of the wireless sensor or the wireless control module from the wireless signal; determine, by the processor, whether the identification has been previously stored in the memory; and when the identification has previously been stored in the memory, process the wireless signal; and when the identification has been not been previously stored in the memory, ignore the wireless signal.
2,400
9,286
9,286
16,248,462
2,426
An entry adapter configured to communicate cable television (CATV) signals from a CATV network to one or more network devices and to communicate Multi-Media over Coaxial Alliance (MoCA) signals with a MoCA server, the entry adapter including one or more MoCA ports, and a signal combination device configured to direct the CATV signals toward one or more access ports without substantial attenuation, to substantially attenuate the CATV signals directed toward the one or more MoCA ports, to pass the MoCA signals from the one or more MoCA ports to the one or more access ports, and to pass the MoCA signals from the one or more access ports to the one or more MoCA ports.
1. An entry adapter for receiving cable-television (CATV) signals from a CATV network, providing the CATV signals to one or more network devices and a Multi-Media over Coaxial Alliance (MoCA) server, and communicating MoCA signals between the MoCA server and one or more MoCA devices, the entry adapter comprising: an input port configured to be connected to the CATV network; a MoCA-blocking filter electrically connected to the input port and configured to block MoCA signals from transmitting to the input port; a signal combination device in electrical communication with the input port via the MoCA-blocking filter, the signal combination device comprising: a first splitter having a first leg terminal electrically connected to the MoCA-blocking filter, a second leg terminal, and a common terminal, wherein the first splitter is configured to attenuate signals passing between the first and second leg terminals by at least about 40 decibels, and wherein the first splitter is configured to combine downstream CATV signals received at the first leg terminal with MoCA signals received at the second leg terminal, and provide a broadband signal to the common terminal; and a second splitter having a common terminal electrically connected to the common terminal of the first splitter, a first leg terminal, and a second leg terminal, wherein the second splitter is configured to provide copies of the broadband signal received at the common terminal thereof to the first and second leg terminals thereof; a MoCA-passing filter electrically connected to the second leg terminal of the first splitter, wherein the MoCA-pas sing filter is configured to block CATV signals from proceeding therethrough; a first access port electrically connected the first leg terminal of the second splitter, and configured to be connected to the MoCA server; a second access port electrically connected to the second leg terminal of the second splitter, and configured to be connected to the one or more network devices; a plurality of MoCA ports configured to be connected to the one or more MoCA devices; and a MoCA splitter having a common terminal electrically connected to the MoCA-passing filter and a plurality of leg terminals, wherein the MoCA ports are electrically connected to the plurality of leg terminals, wherein the MoCA splitter is configured to communicate MoCA signals between the plurality of MoCA ports without substantially attenuating the MoCA signals, to communicate MoCA signals from the plurality of leg terminals to MoCA-passing filter, and from the MoCA-pas sing filter to the plurality of leg terminals, and wherein the MoCA-blocking filter is configured to reflect the MoCA signals towards the MoCA server so as to reduce attenuation in the MoCA signals that proceed from one of the plurality of MoCA ports to the first access port. 2. The entry adapter of claim 1, wherein the MoCA signals have a frequency of between about 1125 MHz and about 1675 MHz, and wherein the CATV signals have a frequency of between about 5 MHz and about 1002 MHz. 3. An entry adapter for a cable television (CATV) network, comprising: an input port configured to receive downstream CATV signals from the CATV network and to communicate upstream CATV signals to the CATV network; a signal combination device having a first leg terminal configured to receive the downstream CATV signals from the input port, a second leg terminal, and a common terminal, wherein the signal combination device is configured to attenuate signals passing between the first and second leg terminals; a first access port configured to receive the downstream CATV signals from the common terminal of the signal combination device, to communicate upstream CATV signals to the common terminal, and to communicate Multi-Media over Coaxial Alliance (MoCA) signals to the common terminal; a MoCA-pas sing filter electrically connected to the second leg terminal of the signal combination device, wherein the MoCA-pas sing filter is configured to block CATV signals from passing therethrough, and to allow MoCA signals to pass substantially unattenuated therethrough; and one or more MoCA ports electrically connected to the MoCA-passing filter, the one or more MoCA ports being configured to send MoCA signals to the first access port via the MoCA-pas sing filter and the signal combination device, and to receive MoCA signal from the first access port via the signal combination device and the MoCA-passing filter. 4. The entry adapter of claim 3, wherein the signal combination device comprises a first splitter having the common leg terminal, first leg terminal, and second leg terminal. 5. The entry adapter of claim 4, wherein the first splitter is configured to attenuate the downstream signals communicated from the first leg terminal to the second leg terminal by at least about 40 decibels. 6. The entry adapter of claim 4, wherein the signal combination device further comprises a second splitter having a common terminal electrically connected to the common terminal of the first splitter, a first leg terminal electrically connected to the first access port, and a second leg terminal electrically connected to one or more second access ports. 7. The entry adapter of claim 3, wherein the signal combination device does not include a frequency-based filter between the first and second leg terminals. 8. The entry adapter of claim 3, further comprising a MoCA-blocking filter electrically connected to the input port and the first leg terminal of the signal combination device and interposed therebetween, wherein the MoCA-blocking filter is configured to block MoCA signals from reaching the input port from the first access port, and to block MoCA signals from reaching the input port from the one or more MoCA ports. 9. The entry adapter of claim 8, wherein the MoCA-blocking filter is configured to reflect MoCA signals toward the first access port. 10. The entry adapter of claim 3, further comprising a MoCA splitter having a common terminal electrically connected to the MoCA-passing filter, a first leg terminal electrically connected to one of the one or more MoCA ports, and a second leg terminal electrically connected to another one of the one or more MoCA ports. 11. The entry adapter of claim 10, wherein the MoCA splitter is configured to transmit MoCA signals between the first and second legs without substantial attenuation. 12. The entry adapter of claim 11, wherein the MoCA splitter is configured to attenuate the MoCA signals between the first and second legs by at most about 22 decibels. 13. The entry adapter of claim 3, wherein the MoCA signals have a frequency of between about 1125 MHz and about 1675 MHz, and wherein the CATV signals have a frequency of between about 5 MHz and about 1002 MHz. 14. The entry adapter of claim 3, further comprising a MoCA extender comprising: an extender input port electrically connected to one of the one or more MoCA ports; a second MoCA splitter electrically connected to the extender input port; and a plurality of second MoCA ports electrically connected to the second MoCA splitter, wherein each of the plurality of second MoCA ports are configured to be connected to a MoCA device. 15. The entry adapter of claim 14, further comprising an entry adapter housing at least partially containing the input port, the signal combination device, the first access port, and the one or more MoCA ports, wherein the MoCA extender further includes an extender housing at least partially containing the extender input port, the second MoCA splitter, and the plurality of second MoCA ports, the extender housing being connectable to the entry adapter housing, and wherein the MoCA-blocking filter is positioned external to the entry adapter housing. 16. An entry adapter, comprising: an input port configured to communicate cable television (CATV) signals with a CATV network; one or more access ports configured to communicate the CATV signals to one or more network devices and to communicate Multi-Media over Coaxial Alliance (MoCA) signals with a MoCA server; one or more MoCA ports configured to communicate the MoCA signals with a MoCA device; and a signal combination device in electrical communication with the input port, the one or more access ports, and the one or more MoCA ports configured to receive the CATV signals from the input port, to direct the CATV signals toward the one or more access ports without substantial attenuation, to substantially attenuate the CATV signals directed toward the one or more MoCA ports, to pass the MoCA signals from the one or more MoCA ports to the one or more access ports, and to pass the MoCA signals from the one or more access ports to the one or more MoCA ports. 17. The entry adapter of claim 16, wherein the signal combination device comprises a first splitter having a common terminal in electrical communication with the input port, a first leg terminal in electrical communication with the one or more access ports, and a second leg terminal in electrical communication with the one or more MoCA ports. 18. The entry adapter of claim 17, wherein the first splitter is configured to attenuate signals passing between the first and second leg terminals without using a frequency-based filter. 19. The entry adapter of claim 18, wherein the first splitter is configured to attenuate signals passing between the first and second leg terminals by at least about 40 decibels. 20. The entry adapter of claim 16, wherein the signal combination device further comprises a second splitter having a common terminal that is electrically connected to the common terminal of the first splitter, a first leg terminal that is electrically connected to the first access port, and a second leg terminal that is electrically connected to one or more second access ports. 21. The entry adapter of claim 16, further comprising a MoCA-passing filter electrically connected to the one or more MoCA ports and to the signal combination device, wherein the MoCA-pas sing filter is configured to block the CATV signals from passing to the one or more MoCA ports, and to allow the MoCA signals to pass therethrough without substantial attenuation. 22. The entry adapter of claim 16, further comprising a MoCA-blocking filter electrically connected to the input port and the signal combination device, wherein the MoCA-blocking filter is configured to block the MoCA signals from reaching the input port from the signal combination device, and to reflect the MoCA signals toward the first access port.
An entry adapter configured to communicate cable television (CATV) signals from a CATV network to one or more network devices and to communicate Multi-Media over Coaxial Alliance (MoCA) signals with a MoCA server, the entry adapter including one or more MoCA ports, and a signal combination device configured to direct the CATV signals toward one or more access ports without substantial attenuation, to substantially attenuate the CATV signals directed toward the one or more MoCA ports, to pass the MoCA signals from the one or more MoCA ports to the one or more access ports, and to pass the MoCA signals from the one or more access ports to the one or more MoCA ports.1. An entry adapter for receiving cable-television (CATV) signals from a CATV network, providing the CATV signals to one or more network devices and a Multi-Media over Coaxial Alliance (MoCA) server, and communicating MoCA signals between the MoCA server and one or more MoCA devices, the entry adapter comprising: an input port configured to be connected to the CATV network; a MoCA-blocking filter electrically connected to the input port and configured to block MoCA signals from transmitting to the input port; a signal combination device in electrical communication with the input port via the MoCA-blocking filter, the signal combination device comprising: a first splitter having a first leg terminal electrically connected to the MoCA-blocking filter, a second leg terminal, and a common terminal, wherein the first splitter is configured to attenuate signals passing between the first and second leg terminals by at least about 40 decibels, and wherein the first splitter is configured to combine downstream CATV signals received at the first leg terminal with MoCA signals received at the second leg terminal, and provide a broadband signal to the common terminal; and a second splitter having a common terminal electrically connected to the common terminal of the first splitter, a first leg terminal, and a second leg terminal, wherein the second splitter is configured to provide copies of the broadband signal received at the common terminal thereof to the first and second leg terminals thereof; a MoCA-passing filter electrically connected to the second leg terminal of the first splitter, wherein the MoCA-pas sing filter is configured to block CATV signals from proceeding therethrough; a first access port electrically connected the first leg terminal of the second splitter, and configured to be connected to the MoCA server; a second access port electrically connected to the second leg terminal of the second splitter, and configured to be connected to the one or more network devices; a plurality of MoCA ports configured to be connected to the one or more MoCA devices; and a MoCA splitter having a common terminal electrically connected to the MoCA-passing filter and a plurality of leg terminals, wherein the MoCA ports are electrically connected to the plurality of leg terminals, wherein the MoCA splitter is configured to communicate MoCA signals between the plurality of MoCA ports without substantially attenuating the MoCA signals, to communicate MoCA signals from the plurality of leg terminals to MoCA-passing filter, and from the MoCA-pas sing filter to the plurality of leg terminals, and wherein the MoCA-blocking filter is configured to reflect the MoCA signals towards the MoCA server so as to reduce attenuation in the MoCA signals that proceed from one of the plurality of MoCA ports to the first access port. 2. The entry adapter of claim 1, wherein the MoCA signals have a frequency of between about 1125 MHz and about 1675 MHz, and wherein the CATV signals have a frequency of between about 5 MHz and about 1002 MHz. 3. An entry adapter for a cable television (CATV) network, comprising: an input port configured to receive downstream CATV signals from the CATV network and to communicate upstream CATV signals to the CATV network; a signal combination device having a first leg terminal configured to receive the downstream CATV signals from the input port, a second leg terminal, and a common terminal, wherein the signal combination device is configured to attenuate signals passing between the first and second leg terminals; a first access port configured to receive the downstream CATV signals from the common terminal of the signal combination device, to communicate upstream CATV signals to the common terminal, and to communicate Multi-Media over Coaxial Alliance (MoCA) signals to the common terminal; a MoCA-pas sing filter electrically connected to the second leg terminal of the signal combination device, wherein the MoCA-pas sing filter is configured to block CATV signals from passing therethrough, and to allow MoCA signals to pass substantially unattenuated therethrough; and one or more MoCA ports electrically connected to the MoCA-passing filter, the one or more MoCA ports being configured to send MoCA signals to the first access port via the MoCA-pas sing filter and the signal combination device, and to receive MoCA signal from the first access port via the signal combination device and the MoCA-passing filter. 4. The entry adapter of claim 3, wherein the signal combination device comprises a first splitter having the common leg terminal, first leg terminal, and second leg terminal. 5. The entry adapter of claim 4, wherein the first splitter is configured to attenuate the downstream signals communicated from the first leg terminal to the second leg terminal by at least about 40 decibels. 6. The entry adapter of claim 4, wherein the signal combination device further comprises a second splitter having a common terminal electrically connected to the common terminal of the first splitter, a first leg terminal electrically connected to the first access port, and a second leg terminal electrically connected to one or more second access ports. 7. The entry adapter of claim 3, wherein the signal combination device does not include a frequency-based filter between the first and second leg terminals. 8. The entry adapter of claim 3, further comprising a MoCA-blocking filter electrically connected to the input port and the first leg terminal of the signal combination device and interposed therebetween, wherein the MoCA-blocking filter is configured to block MoCA signals from reaching the input port from the first access port, and to block MoCA signals from reaching the input port from the one or more MoCA ports. 9. The entry adapter of claim 8, wherein the MoCA-blocking filter is configured to reflect MoCA signals toward the first access port. 10. The entry adapter of claim 3, further comprising a MoCA splitter having a common terminal electrically connected to the MoCA-passing filter, a first leg terminal electrically connected to one of the one or more MoCA ports, and a second leg terminal electrically connected to another one of the one or more MoCA ports. 11. The entry adapter of claim 10, wherein the MoCA splitter is configured to transmit MoCA signals between the first and second legs without substantial attenuation. 12. The entry adapter of claim 11, wherein the MoCA splitter is configured to attenuate the MoCA signals between the first and second legs by at most about 22 decibels. 13. The entry adapter of claim 3, wherein the MoCA signals have a frequency of between about 1125 MHz and about 1675 MHz, and wherein the CATV signals have a frequency of between about 5 MHz and about 1002 MHz. 14. The entry adapter of claim 3, further comprising a MoCA extender comprising: an extender input port electrically connected to one of the one or more MoCA ports; a second MoCA splitter electrically connected to the extender input port; and a plurality of second MoCA ports electrically connected to the second MoCA splitter, wherein each of the plurality of second MoCA ports are configured to be connected to a MoCA device. 15. The entry adapter of claim 14, further comprising an entry adapter housing at least partially containing the input port, the signal combination device, the first access port, and the one or more MoCA ports, wherein the MoCA extender further includes an extender housing at least partially containing the extender input port, the second MoCA splitter, and the plurality of second MoCA ports, the extender housing being connectable to the entry adapter housing, and wherein the MoCA-blocking filter is positioned external to the entry adapter housing. 16. An entry adapter, comprising: an input port configured to communicate cable television (CATV) signals with a CATV network; one or more access ports configured to communicate the CATV signals to one or more network devices and to communicate Multi-Media over Coaxial Alliance (MoCA) signals with a MoCA server; one or more MoCA ports configured to communicate the MoCA signals with a MoCA device; and a signal combination device in electrical communication with the input port, the one or more access ports, and the one or more MoCA ports configured to receive the CATV signals from the input port, to direct the CATV signals toward the one or more access ports without substantial attenuation, to substantially attenuate the CATV signals directed toward the one or more MoCA ports, to pass the MoCA signals from the one or more MoCA ports to the one or more access ports, and to pass the MoCA signals from the one or more access ports to the one or more MoCA ports. 17. The entry adapter of claim 16, wherein the signal combination device comprises a first splitter having a common terminal in electrical communication with the input port, a first leg terminal in electrical communication with the one or more access ports, and a second leg terminal in electrical communication with the one or more MoCA ports. 18. The entry adapter of claim 17, wherein the first splitter is configured to attenuate signals passing between the first and second leg terminals without using a frequency-based filter. 19. The entry adapter of claim 18, wherein the first splitter is configured to attenuate signals passing between the first and second leg terminals by at least about 40 decibels. 20. The entry adapter of claim 16, wherein the signal combination device further comprises a second splitter having a common terminal that is electrically connected to the common terminal of the first splitter, a first leg terminal that is electrically connected to the first access port, and a second leg terminal that is electrically connected to one or more second access ports. 21. The entry adapter of claim 16, further comprising a MoCA-passing filter electrically connected to the one or more MoCA ports and to the signal combination device, wherein the MoCA-pas sing filter is configured to block the CATV signals from passing to the one or more MoCA ports, and to allow the MoCA signals to pass therethrough without substantial attenuation. 22. The entry adapter of claim 16, further comprising a MoCA-blocking filter electrically connected to the input port and the signal combination device, wherein the MoCA-blocking filter is configured to block the MoCA signals from reaching the input port from the signal combination device, and to reflect the MoCA signals toward the first access port.
2,400
9,287
9,287
16,027,434
2,421
Systems, methods, and storage media for authenticating a remote viewing device for rendering digital content are disclosed. Exemplary implementations may: transmit an initial display to be displayed on the viewing device; receive a request, from the viewing device, to view content; transmit an indication of the request to a mobile device associated with a user who is authorized to view the content; receive, from the mobile device, approval of the viewing device for viewing the content; and authenticate the viewing device for viewing the content in response to the approval of viewing device whereby the content can be viewed on the viewing device.
1. A system configured for authenticating a remote viewing device for rendering digital content, the system comprising: one or more hardware processors configured by machine-readable instructions to: transmit an initial display to be displayed on the viewing device; receive a request, from the viewing device, to view content; transmit an indication of the request to a mobile device associated with a user who is authorized to view the content, the mobile device being a device that is different from the viewing device, whereby the mobile device generates a message to be displayed to the user, the message prompting the user to approve the viewing device; receive, from the mobile device, approval of the viewing device for viewing the content; and authenticate the viewing device for viewing the content in response to the approval of the viewing device whereby the content can be viewed on the viewing device. 2. The system of claim 1, wherein the content is subject to a subscription requirement and the user has subscribed to the content. 3. The system of claim 1, wherein the message generated by the mobile device is a push notification. 4. The system of claim 3, wherein the push notification provides the user with the options of opening an app associated with the content, logging in to a service associated with the content, or dismissing the push notification. 5. The system of claim 1, wherein the step of authenticating the viewing device comprises consuming, by the viewing device, a key. 6. The system of claim 5, wherein the key includes an authorization code. 7. The system of claim 6, wherein the step of transmitting an indication of the request includes transmitting the authorization code to the mobile device. 8. The system of claim 3, wherein the one or more hardware processors are further configured by machine-readable instructions to set a state variable stored in the mobile device to a state indicate that the push notification should be generated, the push notification being generated in response to detection of the state of the state variable. 9. A method of authenticating a remote viewing device for rendering digital content, the method comprising: transmitting an initial display to be displayed on the viewing device; receiving a request, from the viewing device, to view content; transmitting an indication of the request to a mobile device associated with a user who is authorized to view the content, the mobile device being a device that is different from the viewing device, whereby the mobile device generates a message to be displayed to the user, the message prompting the user to approve the viewing device; receiving, from the mobile device, approval of the viewing device for viewing the content; and authenticating the viewing device for viewing the content in response to the approval of the viewing device whereby the content can be viewed on the viewing device. 10. The method of claim 9, wherein the content is subject to a subscription requirement and the user has subscribed to the content. 11. The method of claim 9, wherein the message generated by the mobile device is a push notification. 12. The method of claim 11, wherein the push notification provides the user with the options of opening an app associated with the content, logging in to a service associated with the content, or dismissing the push notification. 13. The method of claim 9, wherein the step of authenticating the viewing device comprises consuming, by the viewing device, a key. 14. The method of claim 13, wherein the key includes an authorization code. 15. The method of claim 14, wherein the step of transmitting an indication of the request includes transmitting the authorization code to the mobile device. 16. The method of claim 11, further comprising, setting a state variable stored in the mobile device to a state indicate that the push notification should be generated, the push notification being generated in response to detection of the state of the state variable. 17. A non-transient computer-readable storage medium having instructions embodied thereon, the instructions being executable by one or more processors to perform a method for authenticating a remote viewing device for rendering digital content, the method comprising: transmitting an initial display to be displayed on the viewing device; receiving a request, from the viewing device, to view content; transmitting an indication of the request to a mobile device associated with a user who is authorized to view the content, the mobile device being a device that is different from the viewing device, whereby the mobile device generates a message to be displayed to the user, the message prompting the user to approve the viewing device; receiving, from the mobile device, approval of the viewing device for viewing the content; and authenticating the viewing device for viewing the content in response to the approval of the viewing device whereby the content can be viewed on the viewing device. 18. The computer-readable storage medium of claim 17, wherein the content is subject to a subscription requirement and the user has subscribed to the content. 19. The computer-readable storage medium of claim 17, wherein the message generated by the mobile device is a push notification. 20. The computer-readable storage medium of claim 19, wherein the push notification provides the user with the options of opening an app associated with the content, logging in to a service associated with the content, or dismissing the push notification. 21. The computer-readable storage medium of claim 17, wherein the step of authenticating the viewing device comprises consuming, by the viewing device, a key. 22. The computer-readable storage medium of claim 21, wherein the key includes an authorization code. 23. The computer-readable storage medium of claim 22, wherein the step of transmitting an indication of the request includes transmitting the authorization code to the mobile device. 24. The computer-readable storage medium of claim 19, wherein the method further comprises, setting a state variable stored in the mobile device to a state indicate that the push notification should be generated, the push notification being generated in response to detection of the state of the state variable.
Systems, methods, and storage media for authenticating a remote viewing device for rendering digital content are disclosed. Exemplary implementations may: transmit an initial display to be displayed on the viewing device; receive a request, from the viewing device, to view content; transmit an indication of the request to a mobile device associated with a user who is authorized to view the content; receive, from the mobile device, approval of the viewing device for viewing the content; and authenticate the viewing device for viewing the content in response to the approval of viewing device whereby the content can be viewed on the viewing device.1. A system configured for authenticating a remote viewing device for rendering digital content, the system comprising: one or more hardware processors configured by machine-readable instructions to: transmit an initial display to be displayed on the viewing device; receive a request, from the viewing device, to view content; transmit an indication of the request to a mobile device associated with a user who is authorized to view the content, the mobile device being a device that is different from the viewing device, whereby the mobile device generates a message to be displayed to the user, the message prompting the user to approve the viewing device; receive, from the mobile device, approval of the viewing device for viewing the content; and authenticate the viewing device for viewing the content in response to the approval of the viewing device whereby the content can be viewed on the viewing device. 2. The system of claim 1, wherein the content is subject to a subscription requirement and the user has subscribed to the content. 3. The system of claim 1, wherein the message generated by the mobile device is a push notification. 4. The system of claim 3, wherein the push notification provides the user with the options of opening an app associated with the content, logging in to a service associated with the content, or dismissing the push notification. 5. The system of claim 1, wherein the step of authenticating the viewing device comprises consuming, by the viewing device, a key. 6. The system of claim 5, wherein the key includes an authorization code. 7. The system of claim 6, wherein the step of transmitting an indication of the request includes transmitting the authorization code to the mobile device. 8. The system of claim 3, wherein the one or more hardware processors are further configured by machine-readable instructions to set a state variable stored in the mobile device to a state indicate that the push notification should be generated, the push notification being generated in response to detection of the state of the state variable. 9. A method of authenticating a remote viewing device for rendering digital content, the method comprising: transmitting an initial display to be displayed on the viewing device; receiving a request, from the viewing device, to view content; transmitting an indication of the request to a mobile device associated with a user who is authorized to view the content, the mobile device being a device that is different from the viewing device, whereby the mobile device generates a message to be displayed to the user, the message prompting the user to approve the viewing device; receiving, from the mobile device, approval of the viewing device for viewing the content; and authenticating the viewing device for viewing the content in response to the approval of the viewing device whereby the content can be viewed on the viewing device. 10. The method of claim 9, wherein the content is subject to a subscription requirement and the user has subscribed to the content. 11. The method of claim 9, wherein the message generated by the mobile device is a push notification. 12. The method of claim 11, wherein the push notification provides the user with the options of opening an app associated with the content, logging in to a service associated with the content, or dismissing the push notification. 13. The method of claim 9, wherein the step of authenticating the viewing device comprises consuming, by the viewing device, a key. 14. The method of claim 13, wherein the key includes an authorization code. 15. The method of claim 14, wherein the step of transmitting an indication of the request includes transmitting the authorization code to the mobile device. 16. The method of claim 11, further comprising, setting a state variable stored in the mobile device to a state indicate that the push notification should be generated, the push notification being generated in response to detection of the state of the state variable. 17. A non-transient computer-readable storage medium having instructions embodied thereon, the instructions being executable by one or more processors to perform a method for authenticating a remote viewing device for rendering digital content, the method comprising: transmitting an initial display to be displayed on the viewing device; receiving a request, from the viewing device, to view content; transmitting an indication of the request to a mobile device associated with a user who is authorized to view the content, the mobile device being a device that is different from the viewing device, whereby the mobile device generates a message to be displayed to the user, the message prompting the user to approve the viewing device; receiving, from the mobile device, approval of the viewing device for viewing the content; and authenticating the viewing device for viewing the content in response to the approval of the viewing device whereby the content can be viewed on the viewing device. 18. The computer-readable storage medium of claim 17, wherein the content is subject to a subscription requirement and the user has subscribed to the content. 19. The computer-readable storage medium of claim 17, wherein the message generated by the mobile device is a push notification. 20. The computer-readable storage medium of claim 19, wherein the push notification provides the user with the options of opening an app associated with the content, logging in to a service associated with the content, or dismissing the push notification. 21. The computer-readable storage medium of claim 17, wherein the step of authenticating the viewing device comprises consuming, by the viewing device, a key. 22. The computer-readable storage medium of claim 21, wherein the key includes an authorization code. 23. The computer-readable storage medium of claim 22, wherein the step of transmitting an indication of the request includes transmitting the authorization code to the mobile device. 24. The computer-readable storage medium of claim 19, wherein the method further comprises, setting a state variable stored in the mobile device to a state indicate that the push notification should be generated, the push notification being generated in response to detection of the state of the state variable.
2,400
9,288
9,288
15,279,389
2,439
A method for secure communication between an initiator and a recipient is provided that includes sending to the recipient by the initiator a command packet, the command packet including a randomly generated time offset designating a time window in which the initiator expects to receive a response packet from the recipient, and receiving by the initiator in response to the command packet a response packet from the recipient, the response packet including a randomly generated time offset designating a time window in which the recipient expects to receive a subsequent command packet from the initiator.
1. A method for secure communication between an initiator and a recipient, the method comprising: sending to the recipient by the initiator a first command packet, the first command packet comprising a randomly generated time offset designating a time window in which the initiator expects to receive a response packet from the recipient; and receiving by the initiator in response to the first command packet a first response packet from the recipient, the first response packet comprising a randomly generated time offset designating a time window in which the recipient expects to receive a subsequent command packet from the initiator. 2. The method of claim 1, further comprising: sending to the recipient by the initiator a second command packet initiating a communication sequence with the recipient; and receiving by the initiator in response to the second command packet a second response packet from the recipient acknowledging receipt of the second command packet, the second response packet comprising a randomly generated time offset designating a time window in which the recipient expects to receive a subsequent command packet from the initiator. 3. The method of claim 1, further comprising sending to the recipient by the initiator a third command packet indicating transmission of a plurality of sequential command packets, the third command packet comprising a randomly generated time offset designating a time window in which the initiator will send a next command packet in the plurality of sequential command packets to the recipient; and sending to the recipient by the initiator a final command packet of the plurality of sequential command packets, the final command packet comprising a randomly generated time offset designating a time window in which the initiator expects to receive a response packet from the recipient. 4. The method of claim 1, further comprising: receiving by the initiator in response to a command packet a second response packet from the recipient, the second response packet indicating transmission of a plurality of sequential response packets, the second response packet comprising a randomly generated time offset designating a time window in which the recipient will send a next response packet in the plurality of sequential response packets to the initiator; and receiving by the initiator a final response packet of the plurality of sequential response packets, the final response packet comprising a randomly generated time offset designating a time window in which the recipient expects to receive a command packet from the initiator. 5. The method of claim 1, wherein the initiator is a primary processor comprised in a multi-layer printed circuit board (PCB) and the recipient is a secondary security processor comprised in the multi-layer PCB, wherein the primary processor is coupled to the second security processor via an inter-processor connection in an internal layer of the multi-layer PCB. 6. The method of claim 1, wherein the initiator and the recipient communicate via a wireless interface. 7. The method of claim 1, wherein a predetermined variance around expected start times of time windows is used to compensate for variance between a time base of the initiator and a time base of the recipient. 8. An apparatus comprising: a secondary security processor configured to store sensitive data; and a primary processor coupled to the secondary security processor, wherein the primary processor and the secondary security processor are configured to execute a random time window protocol to communicate sensitive data in which, in accordance with a random time window protocol, the primary processor is configured to: send a first command packet to the secondary security processor, the first command packet comprising a randomly generated time offset designating a time window in which the primary processor expects to receive a response packet from the secondary security processor; and receive in response to the first command packet a first response packet from the secondary security processor, the first response packet comprising a randomly generated time offset designating a time window in which the secondary security processor expects to receive a subsequent command packet from the primary processor. 9. The apparatus of claim 6, wherein the primary processor further configured to: send a second command packet to the secondary security processor initiating a communication sequence with the secondary security processor; and receive in response to the second command packet a second response packet from the secondary security processor acknowledging receipt of the second command packet, the second response packet comprising a randomly generated time offset designating a time window in which the secondary security processor expects to receive a subsequent command packet from the primary processor. 10. The apparatus of claim 6, wherein the primary processor is further configured to: send a third command packet to the secondary security processor indicating transmission of a plurality of sequential command packets, the third command packet comprising a randomly generated time offset designating a time window in which the primary processor will send a next command packet in the plurality of sequential command packets to the secondary security processor; and send a final command packet of the plurality of sequential command packets to the secondary security processor, the final command packet comprising a randomly generated time offset designating a time window in which the primary processor expects to receive a response packet from the secondary security processor. 11. The apparatus of claim 6, wherein the primary processor is further configured to: receive in response to a command packet a second response packet from the secondary security processor, the second response packet indicating transmission of a plurality of sequential response packets, the second response packet comprising a randomly generated time offset designating a time window in which the secondary security processor will send a next response packet in the plurality of sequential response packets to the primary processor; and receive a final response packet of the plurality of sequential response packets, the final response packet comprising a randomly generated time offset designating a time window in which the secondary security processor expects to receive a command packet from the primary processor. 12. The apparatus of claim 6, wherein the secondary security processor and the primary processor are comprised in a multi-layer printed circuit board (PCB), wherein the primary processor is coupled to the second security processor via an inter-processor connection in an internal layer of the multi-layer PCB. 13. The apparatus of claim 6, wherein the primary processor is coupled to the secondary security processor via a wireless interface. 14. The apparatus of claim 6, wherein a predetermined variance around expected start times of time windows is used to compensate for variance between a time base of the primary processor and a time base of the secondary security processor. 15. An apparatus comprising: a first processor configured to use a random time window protocol for communication with a second processor; and the second processor coupled to the first processor via a communication interface, the second processor configured to use the random time window protocol for communication with the first processor; wherein the random time window protocol is a command response protocol in which a randomly generated time offset designating a time window for transmission of a subsequent packet is comprised in packets of a communication sequence between an initiator of the communication sequence and a recipient of the communication sequence. 16. The apparatus of claim 15, wherein the random time window protocol comprises a start command packet for starting a communication sequence by the initiator, a start acknowledgement response packet for acknowledging the start command packet by the recipient, an end command packet for ending a communication sequence by the initiator, and an end acknowledgement response packet for acknowledging the end command packet by the recipient, wherein the start command packet does not include a randomly generated time offset, the start acknowledgment response packet includes a randomly generated time offset designating a time window for transmission of a subsequent command packet by the initiator, the end command packet includes a randomly generated time offset designating a time window for transmission of the end acknowledgment response packet by the recipient, and the end acknowledgement response packet includes a time offset value indicating end of communication with the initiator. 17. The apparatus of claim 15, wherein the random time window protocol comprises a command packet for initiating transmission of a plurality of sequential command packets to the recipient, wherein each command packet of the plurality of sequential command packets except a final command packet comprises a randomly generated time offset designating a time window in which the next command packet of the plurality of sequential command packets will be transmitted by the initiator. 18. The apparatus of claim 15, wherein the random time window protocol comprises a response packet for initiating transmission of a plurality of sequential response packets to the initiator, wherein each response packet of the plurality of sequential response packets except a final response packet comprises a randomly generated time offset designating a time window in which the next response packet of the plurality of sequential response packets will be transmitted by the recipient. 19. The apparatus of claim 15, wherein the communication interface is an inter-processor connection in an internal layer of a multi-layer printed circuit board (PCB) comprising the first processor and the second processor. 20. The apparatus of claim 15, wherein the communication interface is a wireless interface.
A method for secure communication between an initiator and a recipient is provided that includes sending to the recipient by the initiator a command packet, the command packet including a randomly generated time offset designating a time window in which the initiator expects to receive a response packet from the recipient, and receiving by the initiator in response to the command packet a response packet from the recipient, the response packet including a randomly generated time offset designating a time window in which the recipient expects to receive a subsequent command packet from the initiator.1. A method for secure communication between an initiator and a recipient, the method comprising: sending to the recipient by the initiator a first command packet, the first command packet comprising a randomly generated time offset designating a time window in which the initiator expects to receive a response packet from the recipient; and receiving by the initiator in response to the first command packet a first response packet from the recipient, the first response packet comprising a randomly generated time offset designating a time window in which the recipient expects to receive a subsequent command packet from the initiator. 2. The method of claim 1, further comprising: sending to the recipient by the initiator a second command packet initiating a communication sequence with the recipient; and receiving by the initiator in response to the second command packet a second response packet from the recipient acknowledging receipt of the second command packet, the second response packet comprising a randomly generated time offset designating a time window in which the recipient expects to receive a subsequent command packet from the initiator. 3. The method of claim 1, further comprising sending to the recipient by the initiator a third command packet indicating transmission of a plurality of sequential command packets, the third command packet comprising a randomly generated time offset designating a time window in which the initiator will send a next command packet in the plurality of sequential command packets to the recipient; and sending to the recipient by the initiator a final command packet of the plurality of sequential command packets, the final command packet comprising a randomly generated time offset designating a time window in which the initiator expects to receive a response packet from the recipient. 4. The method of claim 1, further comprising: receiving by the initiator in response to a command packet a second response packet from the recipient, the second response packet indicating transmission of a plurality of sequential response packets, the second response packet comprising a randomly generated time offset designating a time window in which the recipient will send a next response packet in the plurality of sequential response packets to the initiator; and receiving by the initiator a final response packet of the plurality of sequential response packets, the final response packet comprising a randomly generated time offset designating a time window in which the recipient expects to receive a command packet from the initiator. 5. The method of claim 1, wherein the initiator is a primary processor comprised in a multi-layer printed circuit board (PCB) and the recipient is a secondary security processor comprised in the multi-layer PCB, wherein the primary processor is coupled to the second security processor via an inter-processor connection in an internal layer of the multi-layer PCB. 6. The method of claim 1, wherein the initiator and the recipient communicate via a wireless interface. 7. The method of claim 1, wherein a predetermined variance around expected start times of time windows is used to compensate for variance between a time base of the initiator and a time base of the recipient. 8. An apparatus comprising: a secondary security processor configured to store sensitive data; and a primary processor coupled to the secondary security processor, wherein the primary processor and the secondary security processor are configured to execute a random time window protocol to communicate sensitive data in which, in accordance with a random time window protocol, the primary processor is configured to: send a first command packet to the secondary security processor, the first command packet comprising a randomly generated time offset designating a time window in which the primary processor expects to receive a response packet from the secondary security processor; and receive in response to the first command packet a first response packet from the secondary security processor, the first response packet comprising a randomly generated time offset designating a time window in which the secondary security processor expects to receive a subsequent command packet from the primary processor. 9. The apparatus of claim 6, wherein the primary processor further configured to: send a second command packet to the secondary security processor initiating a communication sequence with the secondary security processor; and receive in response to the second command packet a second response packet from the secondary security processor acknowledging receipt of the second command packet, the second response packet comprising a randomly generated time offset designating a time window in which the secondary security processor expects to receive a subsequent command packet from the primary processor. 10. The apparatus of claim 6, wherein the primary processor is further configured to: send a third command packet to the secondary security processor indicating transmission of a plurality of sequential command packets, the third command packet comprising a randomly generated time offset designating a time window in which the primary processor will send a next command packet in the plurality of sequential command packets to the secondary security processor; and send a final command packet of the plurality of sequential command packets to the secondary security processor, the final command packet comprising a randomly generated time offset designating a time window in which the primary processor expects to receive a response packet from the secondary security processor. 11. The apparatus of claim 6, wherein the primary processor is further configured to: receive in response to a command packet a second response packet from the secondary security processor, the second response packet indicating transmission of a plurality of sequential response packets, the second response packet comprising a randomly generated time offset designating a time window in which the secondary security processor will send a next response packet in the plurality of sequential response packets to the primary processor; and receive a final response packet of the plurality of sequential response packets, the final response packet comprising a randomly generated time offset designating a time window in which the secondary security processor expects to receive a command packet from the primary processor. 12. The apparatus of claim 6, wherein the secondary security processor and the primary processor are comprised in a multi-layer printed circuit board (PCB), wherein the primary processor is coupled to the second security processor via an inter-processor connection in an internal layer of the multi-layer PCB. 13. The apparatus of claim 6, wherein the primary processor is coupled to the secondary security processor via a wireless interface. 14. The apparatus of claim 6, wherein a predetermined variance around expected start times of time windows is used to compensate for variance between a time base of the primary processor and a time base of the secondary security processor. 15. An apparatus comprising: a first processor configured to use a random time window protocol for communication with a second processor; and the second processor coupled to the first processor via a communication interface, the second processor configured to use the random time window protocol for communication with the first processor; wherein the random time window protocol is a command response protocol in which a randomly generated time offset designating a time window for transmission of a subsequent packet is comprised in packets of a communication sequence between an initiator of the communication sequence and a recipient of the communication sequence. 16. The apparatus of claim 15, wherein the random time window protocol comprises a start command packet for starting a communication sequence by the initiator, a start acknowledgement response packet for acknowledging the start command packet by the recipient, an end command packet for ending a communication sequence by the initiator, and an end acknowledgement response packet for acknowledging the end command packet by the recipient, wherein the start command packet does not include a randomly generated time offset, the start acknowledgment response packet includes a randomly generated time offset designating a time window for transmission of a subsequent command packet by the initiator, the end command packet includes a randomly generated time offset designating a time window for transmission of the end acknowledgment response packet by the recipient, and the end acknowledgement response packet includes a time offset value indicating end of communication with the initiator. 17. The apparatus of claim 15, wherein the random time window protocol comprises a command packet for initiating transmission of a plurality of sequential command packets to the recipient, wherein each command packet of the plurality of sequential command packets except a final command packet comprises a randomly generated time offset designating a time window in which the next command packet of the plurality of sequential command packets will be transmitted by the initiator. 18. The apparatus of claim 15, wherein the random time window protocol comprises a response packet for initiating transmission of a plurality of sequential response packets to the initiator, wherein each response packet of the plurality of sequential response packets except a final response packet comprises a randomly generated time offset designating a time window in which the next response packet of the plurality of sequential response packets will be transmitted by the recipient. 19. The apparatus of claim 15, wherein the communication interface is an inter-processor connection in an internal layer of a multi-layer printed circuit board (PCB) comprising the first processor and the second processor. 20. The apparatus of claim 15, wherein the communication interface is a wireless interface.
2,400
9,289
9,289
16,294,991
2,486
A tool for use with an image capturing device for enabling capture of an image for analysis and/or evaluation. The tool includes a first end and a second end being connected by at least one wall. The first end is configured to be positioned over a surface enclosing a target facial area of a user for image capture thereof, and the second end is configured to receive the image capturing device. The second end includes an inner surface facing the first end and an outer surface. The tool may also include a reflective device located at the inner surface of the second end for aligning the position of the first end over the surface such that the target facial area is enclosed for image capture thereof.
1. A tool for use with an image capturing device for enabling capture of a quality image, comprising: a first end and a second end being connected by at least one wall, the first end configured to be positioned over a surface enclosing a target facial area of a user for image capture thereof, the second end configured to receive the image capturing device, the second end comprises an inner surface facing the first end and an outer surface; and a reflective device located at the inner surface of the second end for aligning the position of the first end over the surface such that the target facial area is enclosed for image capture thereof by enabling the user to locate the reflection of a predetermined object in the reflective device, wherein the distance between the first end and the second end is predetermined and the location of the reflective device at the inner surface of the second end is predetermined, and whereby when the user locates the reflection of the predetermined object in the reflective device, a quality image of the target facial area may be captured by the image capturing device. 2. The tool of claim 1, wherein the predetermined distance between the first end and the second end corresponds to a minimum focusing distance of the image capturing device. 3. The tool of claim 1, wherein the predetermined distance between the first end and the second end is in the range of about 80 mm to about 600 mm. 4. The tool of claim 1, wherein the target facial area for image capture thereof comprises any one of the following facial areas: cheek area, nose area, forehead area, mouth area, chin area, one or more teeth, periorbital area, entire face area, and combination thereof. 5. The tool of claim 1, wherein the surface area of each of the first end and the second end is in the range of about 1,000 mm2 to about 33,000 mm2. 6. The tool of claim 1, wherein the second end comprises a window for positioning of a lens of the image capturing device when a lens-side surface of the image capturing device is adjacent to the outer surface of the second end. 7. The tool of claim 1, wherein the predetermined location of the reflective device is at a distance of about 3 mm to about 106 mm with respect to a lens of the image capturing device when a lens-side surface of the image capturing device is adjacent to the outer surface of the second end. 8. The tool of claim 1, wherein the reflective surface area of the reflective device is in the range of about 80 mm2 to about 650 mm2. 9. The tool of claim 1, wherein the inner surface of the second end forms an angle with the at least one wall, and the angle ranges from about 80 degrees to about 135 degrees. 10. The tool of claim 1, further comprising a connector for connecting the tool to the image capturing device such that a lens-side surface of the image capturing device is adjacent to the outer surface of the second end. 11. The tool of claim 10, wherein the connector is selected from the group consisting of an adhesive, a hook and loop fastener, a magnetic fastener, a clip-on fastener, an elastic fastener, a suction cup fastener, and combinations thereof. 12. The tool of claim 1, wherein the tool is made from one or more materials selected from the group consisting of paper, paperboard, polystyrene, polystyrene terephthalate, polypropylene, silicon rubber, and combinations thereof. 13. The tool of claim 1, further comprising a light source located at the second end. 14. The tool of claim 1, wherein the image capturing device is part of a mobile device or smart device, or is part of a personal computer, or is a handheld camera. 15. The tool of claim 1, wherein the tool is used in conjunction with a software application having a recognition feature for the predetermined object for enabling automatic image capture by the image capturing device when the user locates the reflection of the predetermined object in the reflective device. 16. The tool of claim 1, wherein the predetermined object is selected from the group consisting of: the user's eye, the user's eye brow, the user's one or more laugh lines, the user's one or more crow's feet in the periorbital area, a reference point in the periorbital area, a reference point in the facial area, or combinations thereof. 17. The tool of claim 1, wherein the tool comprises a carton or a portion of a carton of a product. 18. A method for capturing a quality image using an image capturing device and a tool for use with the image capturing device, the tool comprising a first end and a second end connected by at least one wall, the second end comprising an inner surface facing the first end and an outer surface, and a reflective device located at the inner surface of the second end, the method comprising: locating the second end of the tool to a lens-side surface of the image capturing device by a connector such that the lens-side surface of the image capturing device is adjacent to the outer surface of the second end; positioning the first end of the tool over a surface enclosing a target facial area of a user for image capture thereof; aligning the position of the first end such that the target facial area is enclosed for image capture thereof by enabling the user to locate the reflection of a predetermined object in the reflective device; and capturing, using the image capturing device, a quality image of the target facial area when the user locates the reflection of the predetermined object in the reflective device, wherein the distance between the first end and the second end is predetermined and the location of the mirror at the inner surface of the second end is predetermined. 19. The method of claim 18, further comprising using the tool in conjunction with a software application having a recognition feature for the predetermined object for enabling automatic image capture by the image capturing device when the user locates the reflection of the predetermined object in the reflective device. 20. The method of claim 18, wherein the predetermined object is selected from the group consisting of the user's eye, the user's eye brow, the user's one or more laugh lines, the user's one or more crow's feet in the periorbital area, a reference point in the periorbital area a facial area, or combinations thereof.
A tool for use with an image capturing device for enabling capture of an image for analysis and/or evaluation. The tool includes a first end and a second end being connected by at least one wall. The first end is configured to be positioned over a surface enclosing a target facial area of a user for image capture thereof, and the second end is configured to receive the image capturing device. The second end includes an inner surface facing the first end and an outer surface. The tool may also include a reflective device located at the inner surface of the second end for aligning the position of the first end over the surface such that the target facial area is enclosed for image capture thereof.1. A tool for use with an image capturing device for enabling capture of a quality image, comprising: a first end and a second end being connected by at least one wall, the first end configured to be positioned over a surface enclosing a target facial area of a user for image capture thereof, the second end configured to receive the image capturing device, the second end comprises an inner surface facing the first end and an outer surface; and a reflective device located at the inner surface of the second end for aligning the position of the first end over the surface such that the target facial area is enclosed for image capture thereof by enabling the user to locate the reflection of a predetermined object in the reflective device, wherein the distance between the first end and the second end is predetermined and the location of the reflective device at the inner surface of the second end is predetermined, and whereby when the user locates the reflection of the predetermined object in the reflective device, a quality image of the target facial area may be captured by the image capturing device. 2. The tool of claim 1, wherein the predetermined distance between the first end and the second end corresponds to a minimum focusing distance of the image capturing device. 3. The tool of claim 1, wherein the predetermined distance between the first end and the second end is in the range of about 80 mm to about 600 mm. 4. The tool of claim 1, wherein the target facial area for image capture thereof comprises any one of the following facial areas: cheek area, nose area, forehead area, mouth area, chin area, one or more teeth, periorbital area, entire face area, and combination thereof. 5. The tool of claim 1, wherein the surface area of each of the first end and the second end is in the range of about 1,000 mm2 to about 33,000 mm2. 6. The tool of claim 1, wherein the second end comprises a window for positioning of a lens of the image capturing device when a lens-side surface of the image capturing device is adjacent to the outer surface of the second end. 7. The tool of claim 1, wherein the predetermined location of the reflective device is at a distance of about 3 mm to about 106 mm with respect to a lens of the image capturing device when a lens-side surface of the image capturing device is adjacent to the outer surface of the second end. 8. The tool of claim 1, wherein the reflective surface area of the reflective device is in the range of about 80 mm2 to about 650 mm2. 9. The tool of claim 1, wherein the inner surface of the second end forms an angle with the at least one wall, and the angle ranges from about 80 degrees to about 135 degrees. 10. The tool of claim 1, further comprising a connector for connecting the tool to the image capturing device such that a lens-side surface of the image capturing device is adjacent to the outer surface of the second end. 11. The tool of claim 10, wherein the connector is selected from the group consisting of an adhesive, a hook and loop fastener, a magnetic fastener, a clip-on fastener, an elastic fastener, a suction cup fastener, and combinations thereof. 12. The tool of claim 1, wherein the tool is made from one or more materials selected from the group consisting of paper, paperboard, polystyrene, polystyrene terephthalate, polypropylene, silicon rubber, and combinations thereof. 13. The tool of claim 1, further comprising a light source located at the second end. 14. The tool of claim 1, wherein the image capturing device is part of a mobile device or smart device, or is part of a personal computer, or is a handheld camera. 15. The tool of claim 1, wherein the tool is used in conjunction with a software application having a recognition feature for the predetermined object for enabling automatic image capture by the image capturing device when the user locates the reflection of the predetermined object in the reflective device. 16. The tool of claim 1, wherein the predetermined object is selected from the group consisting of: the user's eye, the user's eye brow, the user's one or more laugh lines, the user's one or more crow's feet in the periorbital area, a reference point in the periorbital area, a reference point in the facial area, or combinations thereof. 17. The tool of claim 1, wherein the tool comprises a carton or a portion of a carton of a product. 18. A method for capturing a quality image using an image capturing device and a tool for use with the image capturing device, the tool comprising a first end and a second end connected by at least one wall, the second end comprising an inner surface facing the first end and an outer surface, and a reflective device located at the inner surface of the second end, the method comprising: locating the second end of the tool to a lens-side surface of the image capturing device by a connector such that the lens-side surface of the image capturing device is adjacent to the outer surface of the second end; positioning the first end of the tool over a surface enclosing a target facial area of a user for image capture thereof; aligning the position of the first end such that the target facial area is enclosed for image capture thereof by enabling the user to locate the reflection of a predetermined object in the reflective device; and capturing, using the image capturing device, a quality image of the target facial area when the user locates the reflection of the predetermined object in the reflective device, wherein the distance between the first end and the second end is predetermined and the location of the mirror at the inner surface of the second end is predetermined. 19. The method of claim 18, further comprising using the tool in conjunction with a software application having a recognition feature for the predetermined object for enabling automatic image capture by the image capturing device when the user locates the reflection of the predetermined object in the reflective device. 20. The method of claim 18, wherein the predetermined object is selected from the group consisting of the user's eye, the user's eye brow, the user's one or more laugh lines, the user's one or more crow's feet in the periorbital area, a reference point in the periorbital area a facial area, or combinations thereof.
2,400
9,290
9,290
15,500,530
2,439
According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.
1. A non-transitory computer readable medium having stored thereon machine readable instructions to provide key splitting, the machine readable instructions, when executed, cause at least one processor to: generate a master key; generate a random mask; generate a masked version of the master key by using the random mask; forward the masked version of the master key to a key manager; responsive to forwarding the masked version of the master key, receive a new mask from the key manager; and determine a data key based on the new mask and the random mask. 2. The non-transitory computer readable medium according to claim 1, wherein the machine readable instructions to generate the masked version of the master key comprise instructions to: use one of an exclusive or (XOR), an addition, and a multiplication operation to generate the masked version of the master key. 3. The non-transitory computer readable medium according to claim 1, wherein the machine readable instructions to determine the data key based on the new mask and the random mask comprise instructions to: determine the data key based on an exclusive or (XOR) operation between the new mask and the random mask. 4. The non-transitory computer readable medium according to claim 1, wherein the new mask is based on a random selection of another mask by the key manager and the masked version of the master key. 5. The non-transitory computer readable medium according to claim 1, further comprising machine readable instructions to: generate a data processing instance to utilize the data key to encrypt, decrypt, or authenticate the data. 6. The non-transitory computer readable medium according to claim 5, wherein the machine readable instructions to generate the data processing instance comprise instructions to: generate an ephemeral instantiation of the data processing instance to utilize the random mask and the data key to encrypt, decrypt, or authenticate the data; and utilize another ephemeral instantiation of a data processing instance that utilizes another random mask and another data key to encrypt, decrypt, or authenticate further data. 7. The non-transitory computer readable medium according to claim 1, wherein the data comprises a set of data objects, and wherein the machine readable instructions further comprise instructions to: use the data key to derive a plurality of data keys, wherein each data key of the plurality of data keys corresponds to a respective data object of the set of data objects. 8. A key splitting system comprising: at least one processor; and a memory storing machine readable instructions that when executed by the at least one processor cause the at least one processor to: receive a masked version of a master key, wherein the master key is masked by using a mask that is generated at an entity that is related to data; receive a new mask that is based on selection of a previous data key and is further based on the mask that is generated at the entity that is related to the data; and determine a further new mask based on the new mask that is based on selection of the previous data key and that is based on the masked version of the master key. 9. The key splitting system according to claim 8, wherein the new mask is based on a random selection of the previous data key. 10. The key splitting system according to claim 8, wherein the machine readable instructions to determine the further new mask further cause the at least one processor to: determine the further new mask based on an exclusive or (XOR) operation between the new mask and the masked version of the master key. 11. A method for key splitting, the method comprising: generating, by a computer system comprising a physical processor, a master key at an entity that is related to data; generating, by the computer system comprising the physical processor, a mask at the entity that is related to the data; generating, by the computer system comprising the physical processor, a masked version of the master key by using the mask; forwarding, by the computer system comprising the physical processor, the masked version of the master key to a key manager; receiving, by the computer system comprising the physical processor, a new mask from the key manager, wherein the new mask is related to a previous data key; and determining, by the computer system comprising the physical processor, the previous data key based on the new mask and the mask generated by the entity that is related to the data. 12. The method according to claim 11, wherein the data comprises a set of data objects, and wherein the method further comprises: using, by the computer system comprising the physical processor, the previous data key to derive a plurality of data keys, wherein each data key of the plurality of data keys corresponds to a respective data object of the set of data objects. 13. The method according to claim 11, further comprising: generating, by the computer system comprising the physical processor, a data processing instance to utilize the data key to encrypt, decrypt, or authenticate the data. 14. The method according to claim 11, wherein generating the mask at the entity that is related to the data further comprises: generating, by the computer system comprising the physical processor, a random mask at the entity that is related to the data. 15. The method according to claim 11, wherein the data comprises an index, and wherein the new mask is related to the previous data key by the index of the data.
According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.1. A non-transitory computer readable medium having stored thereon machine readable instructions to provide key splitting, the machine readable instructions, when executed, cause at least one processor to: generate a master key; generate a random mask; generate a masked version of the master key by using the random mask; forward the masked version of the master key to a key manager; responsive to forwarding the masked version of the master key, receive a new mask from the key manager; and determine a data key based on the new mask and the random mask. 2. The non-transitory computer readable medium according to claim 1, wherein the machine readable instructions to generate the masked version of the master key comprise instructions to: use one of an exclusive or (XOR), an addition, and a multiplication operation to generate the masked version of the master key. 3. The non-transitory computer readable medium according to claim 1, wherein the machine readable instructions to determine the data key based on the new mask and the random mask comprise instructions to: determine the data key based on an exclusive or (XOR) operation between the new mask and the random mask. 4. The non-transitory computer readable medium according to claim 1, wherein the new mask is based on a random selection of another mask by the key manager and the masked version of the master key. 5. The non-transitory computer readable medium according to claim 1, further comprising machine readable instructions to: generate a data processing instance to utilize the data key to encrypt, decrypt, or authenticate the data. 6. The non-transitory computer readable medium according to claim 5, wherein the machine readable instructions to generate the data processing instance comprise instructions to: generate an ephemeral instantiation of the data processing instance to utilize the random mask and the data key to encrypt, decrypt, or authenticate the data; and utilize another ephemeral instantiation of a data processing instance that utilizes another random mask and another data key to encrypt, decrypt, or authenticate further data. 7. The non-transitory computer readable medium according to claim 1, wherein the data comprises a set of data objects, and wherein the machine readable instructions further comprise instructions to: use the data key to derive a plurality of data keys, wherein each data key of the plurality of data keys corresponds to a respective data object of the set of data objects. 8. A key splitting system comprising: at least one processor; and a memory storing machine readable instructions that when executed by the at least one processor cause the at least one processor to: receive a masked version of a master key, wherein the master key is masked by using a mask that is generated at an entity that is related to data; receive a new mask that is based on selection of a previous data key and is further based on the mask that is generated at the entity that is related to the data; and determine a further new mask based on the new mask that is based on selection of the previous data key and that is based on the masked version of the master key. 9. The key splitting system according to claim 8, wherein the new mask is based on a random selection of the previous data key. 10. The key splitting system according to claim 8, wherein the machine readable instructions to determine the further new mask further cause the at least one processor to: determine the further new mask based on an exclusive or (XOR) operation between the new mask and the masked version of the master key. 11. A method for key splitting, the method comprising: generating, by a computer system comprising a physical processor, a master key at an entity that is related to data; generating, by the computer system comprising the physical processor, a mask at the entity that is related to the data; generating, by the computer system comprising the physical processor, a masked version of the master key by using the mask; forwarding, by the computer system comprising the physical processor, the masked version of the master key to a key manager; receiving, by the computer system comprising the physical processor, a new mask from the key manager, wherein the new mask is related to a previous data key; and determining, by the computer system comprising the physical processor, the previous data key based on the new mask and the mask generated by the entity that is related to the data. 12. The method according to claim 11, wherein the data comprises a set of data objects, and wherein the method further comprises: using, by the computer system comprising the physical processor, the previous data key to derive a plurality of data keys, wherein each data key of the plurality of data keys corresponds to a respective data object of the set of data objects. 13. The method according to claim 11, further comprising: generating, by the computer system comprising the physical processor, a data processing instance to utilize the data key to encrypt, decrypt, or authenticate the data. 14. The method according to claim 11, wherein generating the mask at the entity that is related to the data further comprises: generating, by the computer system comprising the physical processor, a random mask at the entity that is related to the data. 15. The method according to claim 11, wherein the data comprises an index, and wherein the new mask is related to the previous data key by the index of the data.
2,400
9,291
9,291
14,513,571
2,481
Methods, devices and systems for remotely operating a machine using a communication device. In one aspect, a method includes generating images showing at least one operating range of the machine by using at least one camera of the machine, transmitting the generated images and an image of an operating surface of the machine to the communication device via a radio network, displaying at least one of: the operating surface image and at least one of the generated images on an operating display of the communication device, accepting machine operation commands input by an operator using the operating display, and then transmitting the machine operation commands via the radio network, thereby remotely operating the machine.
1. A method of remotely operating a machine using a communication device, the method comprising: generating images showing at least one operating range of the machine, using at least one camera of the machine; transmitting the generated images and an image of an operating surface of the machine to the communication device via a radio network; displaying at least one of: the operating surface image and at least one of the generated images on an operating display of the communication device; accepting machine operation commands input by an operator using the operating display; and then transmitting the machine operation commands via the radio network, thereby remotely operating the machine. 2. The method of claim 1, wherein the machine operation commands are selected to perform at least one of a repair operation and a maintenance operation based on a review of images displayed on the operating display. 3. The method of claim 1, wherein generating images showing at least one operating range of the machine comprises: generating a plurality of images showing multiple operating ranges of the machine using a plurality of cameras positioned at respective machine positions. 4. The method of claim 1, wherein generating images showing at least one operating range of the machine comprises: generating images from a plurality of viewing angles using a plurality of cameras positioned at respective machine positions. 5. The method of claim 1, wherein the radio network is a machine-integrated wireless local area network (WLAN), and wherein the operating surface of the machine is transmitted to the communication device by virtual network computing (VNC) protocol. 6. The method of claim 1, further comprising remotely monitoring a status of the machine using the operating display of the communication device. 7. The method of claim 1, wherein displaying at least one of: the operating surface image and at least one of the generated images on an operating display of the communication device comprises: displaying at least one of the generated images and the machine operating surface image as complete images on the operating display. 8. The method of claim 1, wherein displaying at least one of: the operating surface image and at least one of the generated images on an operating display of the communication device comprises: displaying at least one of the generated images at least partially superimposed with the machine operating surface image on the operating display. 9. The method of claim 8, wherein the superimposed images are superimposed at least in a partially transparent manner. 10. The method of claim 8, wherein displaying at least one of: the operating surface image and at least one of the generated camera images on an operating display device of the communication device comprises: displaying at least one of the generated images and the machine operating surface image beside each other as partial images on the operating display. 11. The method of claim 1, wherein the machine operating surface image is transmitted as an image of a display of an operating device of the machine. 12. The method of claim 11, further comprising: deactivating the operating device of the machine upon transmitting the machine operating surface image to the communication device via the radio network. 13. A material processing machine comprising: a machine operating device for controlling local operation of the machine, the machine operating device having a machine display for displaying an operating surface of the machine; at least one camera configured to generate data representing images showing at least one operating range of the machine; and a controller configured to: transmit the camera image data and data representing the machine operating surface to a remote communication device over a radio network, and receive machine control commands from the remote communication device over the radio network. 14. The machine of claim 13, wherein the camera is connected to the controller via the radio network. 15. The machine of claim 13, wherein the controller is configured to deactivate the machine operating device upon transmitting the data representing the machine operating surface to a remote communication device. 16. The machine of claim 13, comprising one of a two-dimensional (2D) laser cutting machine, a laser pipe cutting machine, a punching machine, and a workpiece bending machine.
Methods, devices and systems for remotely operating a machine using a communication device. In one aspect, a method includes generating images showing at least one operating range of the machine by using at least one camera of the machine, transmitting the generated images and an image of an operating surface of the machine to the communication device via a radio network, displaying at least one of: the operating surface image and at least one of the generated images on an operating display of the communication device, accepting machine operation commands input by an operator using the operating display, and then transmitting the machine operation commands via the radio network, thereby remotely operating the machine.1. A method of remotely operating a machine using a communication device, the method comprising: generating images showing at least one operating range of the machine, using at least one camera of the machine; transmitting the generated images and an image of an operating surface of the machine to the communication device via a radio network; displaying at least one of: the operating surface image and at least one of the generated images on an operating display of the communication device; accepting machine operation commands input by an operator using the operating display; and then transmitting the machine operation commands via the radio network, thereby remotely operating the machine. 2. The method of claim 1, wherein the machine operation commands are selected to perform at least one of a repair operation and a maintenance operation based on a review of images displayed on the operating display. 3. The method of claim 1, wherein generating images showing at least one operating range of the machine comprises: generating a plurality of images showing multiple operating ranges of the machine using a plurality of cameras positioned at respective machine positions. 4. The method of claim 1, wherein generating images showing at least one operating range of the machine comprises: generating images from a plurality of viewing angles using a plurality of cameras positioned at respective machine positions. 5. The method of claim 1, wherein the radio network is a machine-integrated wireless local area network (WLAN), and wherein the operating surface of the machine is transmitted to the communication device by virtual network computing (VNC) protocol. 6. The method of claim 1, further comprising remotely monitoring a status of the machine using the operating display of the communication device. 7. The method of claim 1, wherein displaying at least one of: the operating surface image and at least one of the generated images on an operating display of the communication device comprises: displaying at least one of the generated images and the machine operating surface image as complete images on the operating display. 8. The method of claim 1, wherein displaying at least one of: the operating surface image and at least one of the generated images on an operating display of the communication device comprises: displaying at least one of the generated images at least partially superimposed with the machine operating surface image on the operating display. 9. The method of claim 8, wherein the superimposed images are superimposed at least in a partially transparent manner. 10. The method of claim 8, wherein displaying at least one of: the operating surface image and at least one of the generated camera images on an operating display device of the communication device comprises: displaying at least one of the generated images and the machine operating surface image beside each other as partial images on the operating display. 11. The method of claim 1, wherein the machine operating surface image is transmitted as an image of a display of an operating device of the machine. 12. The method of claim 11, further comprising: deactivating the operating device of the machine upon transmitting the machine operating surface image to the communication device via the radio network. 13. A material processing machine comprising: a machine operating device for controlling local operation of the machine, the machine operating device having a machine display for displaying an operating surface of the machine; at least one camera configured to generate data representing images showing at least one operating range of the machine; and a controller configured to: transmit the camera image data and data representing the machine operating surface to a remote communication device over a radio network, and receive machine control commands from the remote communication device over the radio network. 14. The machine of claim 13, wherein the camera is connected to the controller via the radio network. 15. The machine of claim 13, wherein the controller is configured to deactivate the machine operating device upon transmitting the data representing the machine operating surface to a remote communication device. 16. The machine of claim 13, comprising one of a two-dimensional (2D) laser cutting machine, a laser pipe cutting machine, a punching machine, and a workpiece bending machine.
2,400
9,292
9,292
16,278,614
2,413
For CSI reporting mechanisms, a user equipment (UE) includes a transceiver and a processor operably connected to the transceiver. The transceiver is configured to receive channel state information (CSI) process configuration information including at least one beamformed type associated with a plurality of non-zero-power (NZP) CSI reference signal (CSI-RS) resource configurations and receive a CSI-RS resource index (CRI) reporting configuration. The processor is configured to calculate, in response to receipt of the configuration information, a CRI and a channel quality indicator (CQI). The transceiver is further configured to report the CRI and the CQI by transmitting the CRI and the CQI on an uplink channel.
1. A method by a terminal in a wireless communication system, the method comprising: receiving, from a base station, a first information on a channel state information reference signal (CSI-RS) configuration and second information on a CSI-RS resource indicator (CRI) reporting configuration; determining a periodicity and an offset for a CRI reporting based on the second information, in case that a number of antenna ports in each configured CSI-RS resources is one; and transmitting, to the base station, the CRI reporting based on the periodicity and the offset. 2. The method of claim 1, wherein the first information includes information on a type of the CSI-RS configuration and information on a plurality of non-zero-power (NZP) CSI-RS resources, and wherein the type of the CSI-RS configuration is a beamformed CSI-RS. 3. The method of claim 1, wherein the CRI reporting is transmitted in a subframe satisfying (10×nf+└ns/2┘−NOFFSET,CQI−NOFFSET,CRI) mod (Npd·MCRI)=0, and wherein nf is a frame index, ns is a slot index, NOFFSET,CQI is a subframe offset for a channel quality indicator (CQI) reporting, NOFFSET,CRI is the offset for the CRI reporting, Npd is a periodicity for the CQI reporting, Npd·MCRI is the periodicity for the CRI reporting, and MCRI is an integer. 4. The method of claim 1, wherein the second information on the CRI reporting configuration includes a value, and the value is mapped to a value for the periodicity and a value for the offset. 5. A method by a base station in a wireless communication system, the method comprising: transmitting, to a terminal, a first information on a channel state information reference signal (CSI-RS) configuration and second information on a CSI-RS resource indicator (CRI) reporting configuration; and receiving, from the terminal, a CRI reporting based on a periodicity and an offset for the CRI reporting determined based on the second information, in case that a number of antenna ports in each configured CSI-RS resource is one. 6. The method of claim 5, wherein the first information includes information on a type of the CSI-RS configuration and information on a plurality of non-zero-power (NZP) CSI-RS resources, and wherein the type of the CSI-RS configuration is a beamformed CSI-RS. 7. The method of claim 5, wherein the CRI reporting is received in a subframe satisfying (10×nf+└ns/2┘−NOFFSET,CQI−NOFFSET,CRI) mod (Npd·MCRI)=0, wherein nf is a frame index, ns is a slot index, NOFFSET,CQI is a subframe offset for a channel quality indicator (CQI) reporting, NOFFSET,CRI is the offset for the CRI reporting, Npd is a periodicity for the CQI reporting, Npd·MCRI is the periodicity for the CRI reporting, and MCRI is an integer, and wherein the information second on the CRI reporting includes a value, and the value is mapped to a value for the periodicity and a value for the offset. 8. A terminal in a wireless communication system, the terminal comprising: a transceiver configured to transmit and receive a signal; and a controller coupled with the transceiver and configured to: receive, from a base station, a first information on a channel state information reference signal (CSI-RS) configuration and second information on a CSI-RS resource indicator (CRI) reporting configuration, determine a periodicity and an offset for a CRI reporting based on the second information, in case that a number of antenna ports in each configured CSI-RS resource is one, and transmit, to the base station, the CRI reporting based on the periodicity and the offset. 9. The terminal of claim 8, wherein the first information includes information on a type of the CSI-RS configuration and information on a plurality of non-zero-power (NZP) CSI-RS resources, and wherein the type of the CSI-RS configuration is a beamformed CSI-RS. 10. The terminal of claim 8, wherein the CRI reporting is transmitted in a subframe satisfying (10×nf+└ns/2┘−NOFFSET,CQI−NOFFSET,CRI) mod (Npd·MCRI)=0, and wherein nf is a frame index, ns is a slot index, NOFFSET,CQI is a subframe offset for a channel quality indicator, CQI, reporting, NOFFSET,CRI is the offset for the CRI reporting, Npd is a periodicity for the CQI reporting, Npd·MCRI is the periodicity for the CRI reporting, and MCRI is an integer. 11. The terminal of claim 8, wherein the second information on the CRI reporting configuration includes a value, and the value is mapped to a value for the periodicity and a value for the offset. 12. A base station in a wireless communication system, the base station comprising: a transceiver configured to transmit and receive a signal; and a controller coupled with the transceiver and configured to: transmit, to a terminal, a first information on a channel state information reference signal (CSI-RS) configuration and second information on a CSI-RS resource indicator (CRI) reporting configuration, and receive, from the terminal, a CRI reporting based on a periodicity and an offset for the CRI reporting determined based on the second information, in case that a number of antenna ports in each configured CSI-RS resource is one. 13. The base station of claim 12, wherein the first information includes information on a type of the CSI-RS configuration and information on a plurality of non-zero-power (NZP) CSI-RS resources, and wherein the type of the CSI-RS configuration is a beamformed CSI-RS. 14. The base station of claim 12, wherein the CRI reporting is received in a subframe satisfying (10×nf+└ns/2┘−NOFFSET,CQI−NOFFSET,CRI) mod (Npd·MCRI)=0, and wherein nf is a frame index, ns is a slot index, NOFFSET,CQI is a subframe offset for a channel quality indicator (CQI) reporting, NOFFSET,CRI is the offset for the CRI reporting, Npd is a periodicity for the CQI reporting, Npd·MCRI is the periodicity for the CRI reporting, and MCRI is an integer. 15. The base station of claim 12, wherein the second information on the CRI reporting configuration includes a value, and the value is mapped to a value for the periodicity and a value for the offset.
For CSI reporting mechanisms, a user equipment (UE) includes a transceiver and a processor operably connected to the transceiver. The transceiver is configured to receive channel state information (CSI) process configuration information including at least one beamformed type associated with a plurality of non-zero-power (NZP) CSI reference signal (CSI-RS) resource configurations and receive a CSI-RS resource index (CRI) reporting configuration. The processor is configured to calculate, in response to receipt of the configuration information, a CRI and a channel quality indicator (CQI). The transceiver is further configured to report the CRI and the CQI by transmitting the CRI and the CQI on an uplink channel.1. A method by a terminal in a wireless communication system, the method comprising: receiving, from a base station, a first information on a channel state information reference signal (CSI-RS) configuration and second information on a CSI-RS resource indicator (CRI) reporting configuration; determining a periodicity and an offset for a CRI reporting based on the second information, in case that a number of antenna ports in each configured CSI-RS resources is one; and transmitting, to the base station, the CRI reporting based on the periodicity and the offset. 2. The method of claim 1, wherein the first information includes information on a type of the CSI-RS configuration and information on a plurality of non-zero-power (NZP) CSI-RS resources, and wherein the type of the CSI-RS configuration is a beamformed CSI-RS. 3. The method of claim 1, wherein the CRI reporting is transmitted in a subframe satisfying (10×nf+└ns/2┘−NOFFSET,CQI−NOFFSET,CRI) mod (Npd·MCRI)=0, and wherein nf is a frame index, ns is a slot index, NOFFSET,CQI is a subframe offset for a channel quality indicator (CQI) reporting, NOFFSET,CRI is the offset for the CRI reporting, Npd is a periodicity for the CQI reporting, Npd·MCRI is the periodicity for the CRI reporting, and MCRI is an integer. 4. The method of claim 1, wherein the second information on the CRI reporting configuration includes a value, and the value is mapped to a value for the periodicity and a value for the offset. 5. A method by a base station in a wireless communication system, the method comprising: transmitting, to a terminal, a first information on a channel state information reference signal (CSI-RS) configuration and second information on a CSI-RS resource indicator (CRI) reporting configuration; and receiving, from the terminal, a CRI reporting based on a periodicity and an offset for the CRI reporting determined based on the second information, in case that a number of antenna ports in each configured CSI-RS resource is one. 6. The method of claim 5, wherein the first information includes information on a type of the CSI-RS configuration and information on a plurality of non-zero-power (NZP) CSI-RS resources, and wherein the type of the CSI-RS configuration is a beamformed CSI-RS. 7. The method of claim 5, wherein the CRI reporting is received in a subframe satisfying (10×nf+└ns/2┘−NOFFSET,CQI−NOFFSET,CRI) mod (Npd·MCRI)=0, wherein nf is a frame index, ns is a slot index, NOFFSET,CQI is a subframe offset for a channel quality indicator (CQI) reporting, NOFFSET,CRI is the offset for the CRI reporting, Npd is a periodicity for the CQI reporting, Npd·MCRI is the periodicity for the CRI reporting, and MCRI is an integer, and wherein the information second on the CRI reporting includes a value, and the value is mapped to a value for the periodicity and a value for the offset. 8. A terminal in a wireless communication system, the terminal comprising: a transceiver configured to transmit and receive a signal; and a controller coupled with the transceiver and configured to: receive, from a base station, a first information on a channel state information reference signal (CSI-RS) configuration and second information on a CSI-RS resource indicator (CRI) reporting configuration, determine a periodicity and an offset for a CRI reporting based on the second information, in case that a number of antenna ports in each configured CSI-RS resource is one, and transmit, to the base station, the CRI reporting based on the periodicity and the offset. 9. The terminal of claim 8, wherein the first information includes information on a type of the CSI-RS configuration and information on a plurality of non-zero-power (NZP) CSI-RS resources, and wherein the type of the CSI-RS configuration is a beamformed CSI-RS. 10. The terminal of claim 8, wherein the CRI reporting is transmitted in a subframe satisfying (10×nf+└ns/2┘−NOFFSET,CQI−NOFFSET,CRI) mod (Npd·MCRI)=0, and wherein nf is a frame index, ns is a slot index, NOFFSET,CQI is a subframe offset for a channel quality indicator, CQI, reporting, NOFFSET,CRI is the offset for the CRI reporting, Npd is a periodicity for the CQI reporting, Npd·MCRI is the periodicity for the CRI reporting, and MCRI is an integer. 11. The terminal of claim 8, wherein the second information on the CRI reporting configuration includes a value, and the value is mapped to a value for the periodicity and a value for the offset. 12. A base station in a wireless communication system, the base station comprising: a transceiver configured to transmit and receive a signal; and a controller coupled with the transceiver and configured to: transmit, to a terminal, a first information on a channel state information reference signal (CSI-RS) configuration and second information on a CSI-RS resource indicator (CRI) reporting configuration, and receive, from the terminal, a CRI reporting based on a periodicity and an offset for the CRI reporting determined based on the second information, in case that a number of antenna ports in each configured CSI-RS resource is one. 13. The base station of claim 12, wherein the first information includes information on a type of the CSI-RS configuration and information on a plurality of non-zero-power (NZP) CSI-RS resources, and wherein the type of the CSI-RS configuration is a beamformed CSI-RS. 14. The base station of claim 12, wherein the CRI reporting is received in a subframe satisfying (10×nf+└ns/2┘−NOFFSET,CQI−NOFFSET,CRI) mod (Npd·MCRI)=0, and wherein nf is a frame index, ns is a slot index, NOFFSET,CQI is a subframe offset for a channel quality indicator (CQI) reporting, NOFFSET,CRI is the offset for the CRI reporting, Npd is a periodicity for the CQI reporting, Npd·MCRI is the periodicity for the CRI reporting, and MCRI is an integer. 15. The base station of claim 12, wherein the second information on the CRI reporting configuration includes a value, and the value is mapped to a value for the periodicity and a value for the offset.
2,400
9,293
9,293
16,386,074
2,447
The disclosed systems and methods include receiving a message by a communication client, where the message includes a trigger event that is to occur for a condition to be checked, and the condition includes a parameter value for evaluating whether the condition has been satisfied. The systems and methods further include monitoring a user terminal subsequent to receiving the message to determine whether the trigger event occurs at the user terminal in addition, the disclosed systems and methods determine whether the condition has been satisfied at the user terminal in response to a determination that the trigger event occurred, and display a selectable option for reconfiguring an attribute of the communication client in response to a determination that the condition has been satisfied. The disclosed systems and methods also include reconfiguring the attribute of the communication client in response to a selection of the selectable option,
1. A method comprising: receiving a message by a communication client, the message comprising a trigger event that is to occur for a condition to be checked, the condition comprising a parameter value for evaluating whether the condition has been satisfied; monitoring a user terminal subsequent to receiving the message to determine whether the trigger event occurs at the user terminal; determining whether the condition has been satisfied at the user terminal in response to a determination that the trigger event occurred; displaying a selectable option for reconfiguring an attribute of the communication client in response to a determination that the condition has been satisfied; and reconfiguring the attribute of the communication client in response to a selection of the selectable option. 2. The method according to claim 1 further comprising reading a current value of a parameter in the user terminal and comparing the current value to the parameter value of the condition. 3. The method according to claim 2, wherein the parameter value defines a maximum number of times the message is to be displayed by the communication client. 4. The method according to claim 2, wherein the parameter value defines a start time and an end time for displaying the message. 5. The method according to claim 1, further comprising transmitting, prior to the receiving, a request for the message over a communication network. 6. The method according to claim 5, wherein the request for the message comprises an identifier of a plurality of messages stored at the user terminal. 7. The method according to claim 5, wherein the request for messages comprises at least one of a version number for a communication client executed on time user terminal and an identifier of an operating system executed on the user terminal. 8. The method according to claim 1, wherein the message is received at the user terminal in a bundle comprising a plurality of messages. 9. The method according to claim 1, further comprising: displaying a selectable control configured to cause display of information included with the message. 10. The method according to claim 9, wherein the selectable control is a hyperlink comprising a network address of the information. 11. A system comprising: one or more processors; and one or more computer-readable storage devices having computer-executable instructions stored thereon that, when executed by the one or more processors, configure a user terminal to perform a plurality of operations comprising: receiving a message by a communication client, the message comprising a trigger event that is to occur for a condition to be checked, the condition comprising a parameter value for evaluating whether the condition has been satisfied; monitoring the user terminal subsequent to receiving the message to determine whether the trigger event occurs at the user terminal; determining whether the condition has been satisfied at the user terminal in response to a determination that the trigger event occurred; displaying a selectable option for reconfiguring an attribute of the communication client in response to a determination that the condition has been satisfied; and reconfiguring the attribute of the communication client in response to a selection of the selectable option. 12. The system according to claim 11, wherein the plurality of operations further comprises reading a current value of a parameter in the user terminal and comparing the current value to the parameter value of the condition. 13. The system according to claim 12, wherein the parameter value defines a maximum number of times the message is to be displayed by the communication client. 14. The system according to claim 12, wherein the parameter value defines a start time and an end time for displaying the message. 15. The system according to claim 11, wherein the plurality of operations further comprises transmitting, prior to the receiving, a request for the message over a communication network. 16. The system according to claim 15, wherein the request for the message comprises an identifier of a plurality of messages stored at the user terminal. 17. The system according to claim 15, wherein the request for messages comprises at least one of a version number for a communication client executed on the user terminal and an identifier of an operating system executed on the user terminal. 18. The system according to claim 11, wherein the message is received at the user terminal in a bundle comprising a plurality of messages. 19. The system according to claim 11, wherein the plurality of operations further comprises: displaying a selectable control configured to cause display of information included with the message. 20. The system according to claim 19, wherein the selectable control is a hyperlink comprising a network address of the information.
The disclosed systems and methods include receiving a message by a communication client, where the message includes a trigger event that is to occur for a condition to be checked, and the condition includes a parameter value for evaluating whether the condition has been satisfied. The systems and methods further include monitoring a user terminal subsequent to receiving the message to determine whether the trigger event occurs at the user terminal in addition, the disclosed systems and methods determine whether the condition has been satisfied at the user terminal in response to a determination that the trigger event occurred, and display a selectable option for reconfiguring an attribute of the communication client in response to a determination that the condition has been satisfied. The disclosed systems and methods also include reconfiguring the attribute of the communication client in response to a selection of the selectable option,1. A method comprising: receiving a message by a communication client, the message comprising a trigger event that is to occur for a condition to be checked, the condition comprising a parameter value for evaluating whether the condition has been satisfied; monitoring a user terminal subsequent to receiving the message to determine whether the trigger event occurs at the user terminal; determining whether the condition has been satisfied at the user terminal in response to a determination that the trigger event occurred; displaying a selectable option for reconfiguring an attribute of the communication client in response to a determination that the condition has been satisfied; and reconfiguring the attribute of the communication client in response to a selection of the selectable option. 2. The method according to claim 1 further comprising reading a current value of a parameter in the user terminal and comparing the current value to the parameter value of the condition. 3. The method according to claim 2, wherein the parameter value defines a maximum number of times the message is to be displayed by the communication client. 4. The method according to claim 2, wherein the parameter value defines a start time and an end time for displaying the message. 5. The method according to claim 1, further comprising transmitting, prior to the receiving, a request for the message over a communication network. 6. The method according to claim 5, wherein the request for the message comprises an identifier of a plurality of messages stored at the user terminal. 7. The method according to claim 5, wherein the request for messages comprises at least one of a version number for a communication client executed on time user terminal and an identifier of an operating system executed on the user terminal. 8. The method according to claim 1, wherein the message is received at the user terminal in a bundle comprising a plurality of messages. 9. The method according to claim 1, further comprising: displaying a selectable control configured to cause display of information included with the message. 10. The method according to claim 9, wherein the selectable control is a hyperlink comprising a network address of the information. 11. A system comprising: one or more processors; and one or more computer-readable storage devices having computer-executable instructions stored thereon that, when executed by the one or more processors, configure a user terminal to perform a plurality of operations comprising: receiving a message by a communication client, the message comprising a trigger event that is to occur for a condition to be checked, the condition comprising a parameter value for evaluating whether the condition has been satisfied; monitoring the user terminal subsequent to receiving the message to determine whether the trigger event occurs at the user terminal; determining whether the condition has been satisfied at the user terminal in response to a determination that the trigger event occurred; displaying a selectable option for reconfiguring an attribute of the communication client in response to a determination that the condition has been satisfied; and reconfiguring the attribute of the communication client in response to a selection of the selectable option. 12. The system according to claim 11, wherein the plurality of operations further comprises reading a current value of a parameter in the user terminal and comparing the current value to the parameter value of the condition. 13. The system according to claim 12, wherein the parameter value defines a maximum number of times the message is to be displayed by the communication client. 14. The system according to claim 12, wherein the parameter value defines a start time and an end time for displaying the message. 15. The system according to claim 11, wherein the plurality of operations further comprises transmitting, prior to the receiving, a request for the message over a communication network. 16. The system according to claim 15, wherein the request for the message comprises an identifier of a plurality of messages stored at the user terminal. 17. The system according to claim 15, wherein the request for messages comprises at least one of a version number for a communication client executed on the user terminal and an identifier of an operating system executed on the user terminal. 18. The system according to claim 11, wherein the message is received at the user terminal in a bundle comprising a plurality of messages. 19. The system according to claim 11, wherein the plurality of operations further comprises: displaying a selectable control configured to cause display of information included with the message. 20. The system according to claim 19, wherein the selectable control is a hyperlink comprising a network address of the information.
2,400
9,294
9,294
14,769,320
2,487
One or more imaging device(s) inside a car that look(s) at occupants (driver, front passenger, rear passengers) and cover(s) multiple security, comfort, driver assistance and occupant state related functions, wherein the imaging device includes an illumination in the near infrared. An imaging device inside the car that can measure occupants' vital signs (heart rate, respiration rate, blood oxygen saturation) using contactless imaging photoplethysmography.
1. An automotive vehicle occupant monitoring device, comprising: at least one source of electromagnetic radiation, said source of electromagnetic radiation for generating electromagnetic radiation and for projecting said electromagnetic radiation in a projected pattern into a region of interest within an interior compartment of said automotive vehicle, at least one imaging device for detecting reflected radiation of said projected pattern, said scattered radiation being reflected or scattered from one or more objects located within said region of interest; and a detection unit operatively coupled to said at least one imaging device, said detection unit comprising an intensity evaluation module for evaluating an intensity or amplitude of said reflected radiation over time. 2. The automotive vehicle occupant monitoring device according to claim 1, wherein said projected pattern comprises one or more radiation spots. 3. The automotive vehicle occupant monitoring device according to claim 1, wherein said source of electromagnetic radiation comprises a controllable projecting unit configured for projecting the projected pattern to a plurality of defined positions within said region of interest, and wherein said detection unit is operatively coupled to said controllable projecting unit and configured for controlling the position of the projected pattern and for evaluating an intensity or amplitude of said reflected radiation over time from said plurality of defined positions. 4. The automotive vehicle occupant monitoring device according to claim 1, wherein said electromagnetic radiation is an infrared light. 5. The automotive vehicle occupant monitoring device according to claim 1, wherein said detection unit is further configured for performing imaging photoplethysmography (iPPG) on the basis of the reflected radiation. 6. The automotive vehicle occupant monitoring device according to claim 1, wherein said imaging device is configured for recording situational images of the region of interest and wherein said detection unit is further configured for optical pattern recognition in the recorded situational images. 7. The automotive vehicle occupant monitoring device according to claim 1, further comprising light compensation means for compensating the influence of changing ambient light conditions. 8. The automotive vehicle occupant monitoring device according to claim 1, further comprising motion compensation means for compensating the influence of motion of the object within the region of interest. 9. Automotive vehicle comprising at least one automotive vehicle occupant monitoring device according to claim 1. 10. Automotive vehicle according to claim 9, wherein said region of interest includes a front seat area and/or a rear seat area of a vehicle compartment. 11. Automotive vehicle according to claim 9, wherein an output signal of said occupant monitoring device is used in one or more of robust occupant detection while discriminating objects, seat belt reminder function, seat classification for airbag, child left behind detection, optimization of driver assistance systems, air conditioning optimization and automated emergency call support functions.
One or more imaging device(s) inside a car that look(s) at occupants (driver, front passenger, rear passengers) and cover(s) multiple security, comfort, driver assistance and occupant state related functions, wherein the imaging device includes an illumination in the near infrared. An imaging device inside the car that can measure occupants' vital signs (heart rate, respiration rate, blood oxygen saturation) using contactless imaging photoplethysmography.1. An automotive vehicle occupant monitoring device, comprising: at least one source of electromagnetic radiation, said source of electromagnetic radiation for generating electromagnetic radiation and for projecting said electromagnetic radiation in a projected pattern into a region of interest within an interior compartment of said automotive vehicle, at least one imaging device for detecting reflected radiation of said projected pattern, said scattered radiation being reflected or scattered from one or more objects located within said region of interest; and a detection unit operatively coupled to said at least one imaging device, said detection unit comprising an intensity evaluation module for evaluating an intensity or amplitude of said reflected radiation over time. 2. The automotive vehicle occupant monitoring device according to claim 1, wherein said projected pattern comprises one or more radiation spots. 3. The automotive vehicle occupant monitoring device according to claim 1, wherein said source of electromagnetic radiation comprises a controllable projecting unit configured for projecting the projected pattern to a plurality of defined positions within said region of interest, and wherein said detection unit is operatively coupled to said controllable projecting unit and configured for controlling the position of the projected pattern and for evaluating an intensity or amplitude of said reflected radiation over time from said plurality of defined positions. 4. The automotive vehicle occupant monitoring device according to claim 1, wherein said electromagnetic radiation is an infrared light. 5. The automotive vehicle occupant monitoring device according to claim 1, wherein said detection unit is further configured for performing imaging photoplethysmography (iPPG) on the basis of the reflected radiation. 6. The automotive vehicle occupant monitoring device according to claim 1, wherein said imaging device is configured for recording situational images of the region of interest and wherein said detection unit is further configured for optical pattern recognition in the recorded situational images. 7. The automotive vehicle occupant monitoring device according to claim 1, further comprising light compensation means for compensating the influence of changing ambient light conditions. 8. The automotive vehicle occupant monitoring device according to claim 1, further comprising motion compensation means for compensating the influence of motion of the object within the region of interest. 9. Automotive vehicle comprising at least one automotive vehicle occupant monitoring device according to claim 1. 10. Automotive vehicle according to claim 9, wherein said region of interest includes a front seat area and/or a rear seat area of a vehicle compartment. 11. Automotive vehicle according to claim 9, wherein an output signal of said occupant monitoring device is used in one or more of robust occupant detection while discriminating objects, seat belt reminder function, seat classification for airbag, child left behind detection, optimization of driver assistance systems, air conditioning optimization and automated emergency call support functions.
2,400
9,295
9,295
15,770,951
2,459
Back end calls triggered by a user interaction with a client user interface may be identified. The user interaction may be correlated with a logic flow, and the logic flow may be associated with the back end calls. A supervised learning model may be trained using a labeled data set comprising the back end calls and their associated logic flow. Rules may be derived from the supervised learning model for classifying other back end calls. The rules may be outputted to a classifier that utilizes the rules to associate the other back end calls with the logic flow.
1. A non-transitory machine-readable storage medium encoded with instructions executable by a processor, the storage medium comprising: identifying instructions to identify back end calls triggered by a user interaction with a client user interface; correlating instructions to correlate the user interaction with a logic flow; associating instructions to associate the logic flow with the back end calls; training instructions to train a supervised learning model using a labeled data set comprising the back end calls and their associated logic flow; deriving instructions to derive rules from the supervised learning model for classifying other back end calls; and outputting instructions to output the rules to a classifier that utilizes the rules to associate the other back end calls with the logic flow. 2. The non-transitory machine-readable storage medium of claim 1, wherein the back end calls are made to a URL, and the other back end calls are unclassified back end calls that are made to the URL. 3. The non-transitory machine-readable storage medium of claim 1, wherein the labeled data set comprises HTTP parameters of the back end calls. 4. The non-transitory machine-readable storage medium of claim 3, wherein the HTTP parameters comprise at least one of an HTTP header and a POST payload. 5. The non-transitory machine-readable storage medium of claim 1, further comprising prioritizing instructions to prioritize protocol parameters of the back end calls according to a probability of association with the logic flow. 6. The non-transitory machine-readable storage medium of claim 1, wherein the outputting instructions output the rules to the classifier located on an application server. 7. The non-transitory machine-readable storage medium of claim 1, wherein the outputting instructions output the rules to the classifier located on a data processing server that consumes HTTP parameters of the back end calls. 8. The non-transitory machine-readable storage medium of claim 1, wherein the logic flow is a purchasing flow or a search flow. 9. The non-transitory-machine-readable storage medium of claim 1, wherein the classifier uses the rules at runtime to associate the other back end calls with the logic flow. 10. The non-transitory machine-readable storage medium of claim 1, wherein the rules comprise at least one of a decision tree, a support vector machine, a logistic regression model, and classification rules. 11. A method, comprising: detecting a user interaction with a client user interface; associating a logic flow with back end calls to a URL that were triggered by the user interaction; training a supervised learning model using at least the back end calls and their associated logic flow; deriving from the supervised learning model rules for classifying other back end calls; and outputting the rules to a classifier application that utilizes the rules to associate the other back end calls with the logic flow. 12. The method of claim 11, wherein the back end calls are made to a URL, and the other back end calls are unclassified back end calls that are made to the URL. 13. The method of claim 11, further comprising prioritizing HTTP parameters of the back end calls according to a probability of association with the logic flow. 14. The method of claim 11, wherein the rules comprise at least one of a decision tree, a support vector machine, a logistic regression model, and classification rules. 15. A system, comprising: a storage to store rules derived from a supervised learning model, the rules associating HTTP parameters with a particular logic flow; and a processor to: receive a back end call comprising unclassified HTTP parameters; at runtime and using the rules, associate the unclassified HTTP parameters with the particular logic flow to generate classified HTTP parameters; and output the classified HTTP parameters to an application performance management tool.
Back end calls triggered by a user interaction with a client user interface may be identified. The user interaction may be correlated with a logic flow, and the logic flow may be associated with the back end calls. A supervised learning model may be trained using a labeled data set comprising the back end calls and their associated logic flow. Rules may be derived from the supervised learning model for classifying other back end calls. The rules may be outputted to a classifier that utilizes the rules to associate the other back end calls with the logic flow.1. A non-transitory machine-readable storage medium encoded with instructions executable by a processor, the storage medium comprising: identifying instructions to identify back end calls triggered by a user interaction with a client user interface; correlating instructions to correlate the user interaction with a logic flow; associating instructions to associate the logic flow with the back end calls; training instructions to train a supervised learning model using a labeled data set comprising the back end calls and their associated logic flow; deriving instructions to derive rules from the supervised learning model for classifying other back end calls; and outputting instructions to output the rules to a classifier that utilizes the rules to associate the other back end calls with the logic flow. 2. The non-transitory machine-readable storage medium of claim 1, wherein the back end calls are made to a URL, and the other back end calls are unclassified back end calls that are made to the URL. 3. The non-transitory machine-readable storage medium of claim 1, wherein the labeled data set comprises HTTP parameters of the back end calls. 4. The non-transitory machine-readable storage medium of claim 3, wherein the HTTP parameters comprise at least one of an HTTP header and a POST payload. 5. The non-transitory machine-readable storage medium of claim 1, further comprising prioritizing instructions to prioritize protocol parameters of the back end calls according to a probability of association with the logic flow. 6. The non-transitory machine-readable storage medium of claim 1, wherein the outputting instructions output the rules to the classifier located on an application server. 7. The non-transitory machine-readable storage medium of claim 1, wherein the outputting instructions output the rules to the classifier located on a data processing server that consumes HTTP parameters of the back end calls. 8. The non-transitory machine-readable storage medium of claim 1, wherein the logic flow is a purchasing flow or a search flow. 9. The non-transitory-machine-readable storage medium of claim 1, wherein the classifier uses the rules at runtime to associate the other back end calls with the logic flow. 10. The non-transitory machine-readable storage medium of claim 1, wherein the rules comprise at least one of a decision tree, a support vector machine, a logistic regression model, and classification rules. 11. A method, comprising: detecting a user interaction with a client user interface; associating a logic flow with back end calls to a URL that were triggered by the user interaction; training a supervised learning model using at least the back end calls and their associated logic flow; deriving from the supervised learning model rules for classifying other back end calls; and outputting the rules to a classifier application that utilizes the rules to associate the other back end calls with the logic flow. 12. The method of claim 11, wherein the back end calls are made to a URL, and the other back end calls are unclassified back end calls that are made to the URL. 13. The method of claim 11, further comprising prioritizing HTTP parameters of the back end calls according to a probability of association with the logic flow. 14. The method of claim 11, wherein the rules comprise at least one of a decision tree, a support vector machine, a logistic regression model, and classification rules. 15. A system, comprising: a storage to store rules derived from a supervised learning model, the rules associating HTTP parameters with a particular logic flow; and a processor to: receive a back end call comprising unclassified HTTP parameters; at runtime and using the rules, associate the unclassified HTTP parameters with the particular logic flow to generate classified HTTP parameters; and output the classified HTTP parameters to an application performance management tool.
2,400
9,296
9,296
15,217,799
2,447
Systems, methods, and computer-readable media for service aware label address resolution or neighbor discovery protocol switched path instantiation for large-scale cloud networks. The system including a gateway server configured to receive from a first client, a request to communicate with a second client, the request including a destination and one or more attributes. The gateway server configured to determine a label based on the destination and the one or more attributes, the label corresponding to a pre-existing tunnel, and transmit a reply to the first client, including the destination, the one or more attributes, and the label.
1. A computer-implemented method comprising: receiving, at a gateway server from a first client, a request to communicate with a second client, the request including a destination and one or more attributes; determining a label based on the destination and the one or more attributes, the label corresponding to a pre-existing tunnel; and transmitting a reply, to the first client, including the destination, the one or more attributes, and the label. 2. The method of claim 1, wherein the request is received from a virtual forwarder executed by the first client executing a plurality of virtual machines. 3. The method of claim 1, wherein the destination is the second client executing a second plurality of virtual machines and a second virtual forwarder. 4. The method of claim 1, wherein the determining further comprising: a look-up table, comprising a plurality of labels, based on the destination and the one or more attributes. 5. The method of claim 1, further comprising: determining the label corresponding to the pre-existing tunnel does not exist; transmitting, to a path computation element server, the destination and the one or more attributes; receiving, from the path computation element server, a new label including a tunnel to the second client; storing, in a look-up table, the destination, the one or more attributes, and the new label; and transmitting, to the first client, a reply including the destination, the one or more attributes, and the new label. 6. The method of claim 5, wherein the new label is identified by a path calculation algorithm based on the destination and the one or more attributes. 7. The method of claim 1, wherein the attributes are selected from two of the following: bandwidth, differentiated services coded point, latency, L2/L3/L4 header values, number of hops, or packet loss. 8. A provider edge device comprising: a processor; and a computer-readable storage medium having stored therein instructions which, when executed by the processor, cause the processor to: receive from a first client, a request to communicate with a second client, the request including a destination and one or more attributes; determine a label based on the destination and the one or more attributes, the label corresponding to a pre-existing tunnel; and transmit a reply to the first client, including the destination, the one or more attributes, and the label. 9. The provider edge device of claim 8, wherein the request is received from a virtual forwarder executed by the first client executing a plurality of virtual machines. 10. The provider edge device of claim 8, wherein the destination is the second client executing a second plurality of virtual machines and a second virtual forwarder. 11. The provider edge device of claim 8, wherein the determination further causing the processor to: search a look-up table, comprising a plurality of labels, based on the destination and the one or more attributes. 12. The provider edge device of claim 8, comprising further instructions which, when executed by the processor, cause the processor to: determine the label corresponding to the pre-existing tunnel does not exist; transmit, to a path computation element server, the destination and the one or more attributes; receive, from the path computation element server, a new label including a tunnel to the second client; store, in a look-up table, the destination, the one or more attributes, and the new label; and transmit, to the first client, a reply including the destination, the one or more attributes, and the new label. 13. The provider edge device of claim 12, wherein the new label is identified by a path calculation algorithm based on the destination and the one or more attributes. 14. The provider edge device of claim 8, wherein the attributes are selected from two of the following: bandwidth, differentiated services coded point, latency, L2/L3/L4 header values, number of hops, or packet loss. 15. A non-transitory computer-readable storage medium having stored therein instructions which, when executed by a processor, cause the processor to: receive from a first client, a request to communicate with a second client, the request including a destination and one or more attributes; determine a label based on the destination and the one or more attributes, the label corresponding to a pre-existing tunnel; and transmit a reply to the first client, including the destination, the one or more attributes, and the label. 16. The non-transitory computer-readable storage medium of claim 15, wherein the request is received from a virtual forwarder executed by the first client executing a plurality of virtual machines. 17. The non-transitory computer-readable storage medium of claim 15, wherein the determination further causing the processor to: search a look-up table, comprising a plurality of labels, based on the destination and the one or more attributes. 18. The non-transitory computer-readable storage medium of claim 15, comprising further instructions which, when executed by the processor, cause the processor to: determine the label corresponding to the pre-existing tunnel does not exist; transmit, to a path computation element server, the destination and the one or more attributes; receive, from the path computation element server, a new label including a tunnel to the second client; store, in a look-up table, the destination, the one or more attributes, and the new label; and transmit, to the first client, a reply including the destination, the one or more attributes, and the new label. 19. The non-transitory computer-readable storage medium of claim 18, wherein the new label is identified by a path calculation algorithm based on the destination and the one or more attributes. 20. The non-transitory computer-readable storage medium of claim 15, wherein the attributes are selected from two of the following: bandwidth, differentiated services coded point, latency, L2/L3/L4 header values, number of hops, or packet loss.
Systems, methods, and computer-readable media for service aware label address resolution or neighbor discovery protocol switched path instantiation for large-scale cloud networks. The system including a gateway server configured to receive from a first client, a request to communicate with a second client, the request including a destination and one or more attributes. The gateway server configured to determine a label based on the destination and the one or more attributes, the label corresponding to a pre-existing tunnel, and transmit a reply to the first client, including the destination, the one or more attributes, and the label.1. A computer-implemented method comprising: receiving, at a gateway server from a first client, a request to communicate with a second client, the request including a destination and one or more attributes; determining a label based on the destination and the one or more attributes, the label corresponding to a pre-existing tunnel; and transmitting a reply, to the first client, including the destination, the one or more attributes, and the label. 2. The method of claim 1, wherein the request is received from a virtual forwarder executed by the first client executing a plurality of virtual machines. 3. The method of claim 1, wherein the destination is the second client executing a second plurality of virtual machines and a second virtual forwarder. 4. The method of claim 1, wherein the determining further comprising: a look-up table, comprising a plurality of labels, based on the destination and the one or more attributes. 5. The method of claim 1, further comprising: determining the label corresponding to the pre-existing tunnel does not exist; transmitting, to a path computation element server, the destination and the one or more attributes; receiving, from the path computation element server, a new label including a tunnel to the second client; storing, in a look-up table, the destination, the one or more attributes, and the new label; and transmitting, to the first client, a reply including the destination, the one or more attributes, and the new label. 6. The method of claim 5, wherein the new label is identified by a path calculation algorithm based on the destination and the one or more attributes. 7. The method of claim 1, wherein the attributes are selected from two of the following: bandwidth, differentiated services coded point, latency, L2/L3/L4 header values, number of hops, or packet loss. 8. A provider edge device comprising: a processor; and a computer-readable storage medium having stored therein instructions which, when executed by the processor, cause the processor to: receive from a first client, a request to communicate with a second client, the request including a destination and one or more attributes; determine a label based on the destination and the one or more attributes, the label corresponding to a pre-existing tunnel; and transmit a reply to the first client, including the destination, the one or more attributes, and the label. 9. The provider edge device of claim 8, wherein the request is received from a virtual forwarder executed by the first client executing a plurality of virtual machines. 10. The provider edge device of claim 8, wherein the destination is the second client executing a second plurality of virtual machines and a second virtual forwarder. 11. The provider edge device of claim 8, wherein the determination further causing the processor to: search a look-up table, comprising a plurality of labels, based on the destination and the one or more attributes. 12. The provider edge device of claim 8, comprising further instructions which, when executed by the processor, cause the processor to: determine the label corresponding to the pre-existing tunnel does not exist; transmit, to a path computation element server, the destination and the one or more attributes; receive, from the path computation element server, a new label including a tunnel to the second client; store, in a look-up table, the destination, the one or more attributes, and the new label; and transmit, to the first client, a reply including the destination, the one or more attributes, and the new label. 13. The provider edge device of claim 12, wherein the new label is identified by a path calculation algorithm based on the destination and the one or more attributes. 14. The provider edge device of claim 8, wherein the attributes are selected from two of the following: bandwidth, differentiated services coded point, latency, L2/L3/L4 header values, number of hops, or packet loss. 15. A non-transitory computer-readable storage medium having stored therein instructions which, when executed by a processor, cause the processor to: receive from a first client, a request to communicate with a second client, the request including a destination and one or more attributes; determine a label based on the destination and the one or more attributes, the label corresponding to a pre-existing tunnel; and transmit a reply to the first client, including the destination, the one or more attributes, and the label. 16. The non-transitory computer-readable storage medium of claim 15, wherein the request is received from a virtual forwarder executed by the first client executing a plurality of virtual machines. 17. The non-transitory computer-readable storage medium of claim 15, wherein the determination further causing the processor to: search a look-up table, comprising a plurality of labels, based on the destination and the one or more attributes. 18. The non-transitory computer-readable storage medium of claim 15, comprising further instructions which, when executed by the processor, cause the processor to: determine the label corresponding to the pre-existing tunnel does not exist; transmit, to a path computation element server, the destination and the one or more attributes; receive, from the path computation element server, a new label including a tunnel to the second client; store, in a look-up table, the destination, the one or more attributes, and the new label; and transmit, to the first client, a reply including the destination, the one or more attributes, and the new label. 19. The non-transitory computer-readable storage medium of claim 18, wherein the new label is identified by a path calculation algorithm based on the destination and the one or more attributes. 20. The non-transitory computer-readable storage medium of claim 15, wherein the attributes are selected from two of the following: bandwidth, differentiated services coded point, latency, L2/L3/L4 header values, number of hops, or packet loss.
2,400
9,297
9,297
16,043,441
2,439
A system is described for authenticating a user on a client device using the user's mobile device and utilizing the audio channel. An authentication server receives a request from the client to initiate a session for the user, creates the session, and sends a session token back to the client along with a request for authentication. The client broadcasts an audio transmission containing the token to the mobile device over an audio channel using data-over-sound transmission. The mobile device receives the transmission via a microphone, obtains the token and the server identity from the transmission, and sends user credentials that are stored on the mobile device along with the token identifying the session directly to the authentication server. The server verifies the received credentials, confirms the token, and logs the user into the session.
1. A method for authenticating a user on a client device using a mobile device, comprising: receiving, at an authentication server, a login request from the client device; on the authentication server, generating a token including a session identifier for a corresponding session and conveying the token to the client device; encoding the token into an audio message and broadcasting the audio message on a speaker of the client device, wherein the mobile device receives the audio message over an audio channel using a microphone and decodes the audio message to obtain the token; at the authentication server, receiving from the mobile device an authentication request comprising user credentials and the token decoded by the mobile device from the audio message; verifying that the user credentials are accurate; and in response to verifying that the user credentials are accurate, authenticating the user for the session on the client device. 2. The method of claim 1, wherein the encoded token is repeated multiple times throughout the duration of the audio message. 3. The method of claim 1, wherein the encoding the token into the audio message comprises using an audio watermark algorithm to embed the token as an audio watermark in the audio message. 4. The method of claim 1, further comprising: in response to the received audio message containing the token at the mobile device, retrieving the user credentials from storage on the mobile device; and conveying the user credentials and the token to the authentication server. 5. The method of claim 1, further comprising generating an output by the client device indicating to a user of the client device to bring the mobile device in proximity of the client device. 6. The method of claim 1, wherein the client device is a headless system. 7. The method of claim 1, wherein the client implements screen reader software for assisting visually impaired individuals. 8. The method of claim 1, wherein the generated token includes an expiration time, wherein the authentication server verifies that the authentication request is received from the mobile device within the expiration time. 9. The method of claim 1, wherein the authentication request to the authentication server further includes a mobile device ID corresponding to the mobile device, wherein the authentication server verifies that the mobile device is authorized based on the mobile device ID. 10. A computing device for authenticating a user on a client device using a mobile device, comprising: at least one processor; and memory including instructions that, when executed by the at least one processor, cause the computing device to perform the steps of: receiving, at an authentication server, a login request from the client device; on the authentication server, generating a token including a session identifier for a corresponding session and conveying the token to the client device; encoding the token into an audio message and broadcasting the audio message on a speaker of the client device, wherein the mobile device receives the audio message over an audio channel using a microphone and decodes the audio message to obtain the token; at the authentication server, receiving from the mobile device an authentication request comprising user credentials and the token decoded by the mobile device from the audio message; verifying that the user credentials are accurate; and in response to verifying that the user credentials are accurate, authenticating the user for the session on the client device. 11. The computing device of claim 10, wherein, wherein the encoded token is repeated multiple times throughout the duration of the audio message. 12. The computing device of claim 10, wherein the encoding the token into the audio message comprises using an audio watermark algorithm to embed the token as an audio watermark in the audio message. 13. The computing device of claim 10, wherein the memory further includes instructions that when executed by the at least one processor, cause the computing device to perform the steps of: in response to the received audio message containing the token at the mobile device, retrieving the user credentials from storage on the mobile device; and conveying the user credentials and the token to the authentication server. 14. The computing device of claim 10, wherein the memory further includes instructions that when executed by the at least one processor, cause the computing device to perform the steps of: generating an output by the client device indicating to a user of the client device to bring the mobile device in proximity of the client device. 15. The computing device of claim 10, wherein the client device is a headless system. 16. The computing device of claim 10, wherein the generated token includes an expiration time, wherein the authentication server verifies that the authentication request is received from the mobile device within the expiration time. 17. A non-transitory computer readable storage medium comprising one or more sequences of instructions, the instructions when executed by one or more processors causing the one or more processors to execute the operations of: receiving, at an authentication server, a login request from the client device; on the authentication server, generating a token including a session identifier for a corresponding session and conveying the token to the client device; encoding the token into an audio message and broadcasting the audio message on a speaker of the client device, wherein the mobile device receives the audio message over an audio channel using a microphone and decodes the audio message to obtain the token; at the authentication server, receiving from the mobile device an authentication request comprising user credentials and the token decoded by the mobile device from the audio message; verifying that the user credentials are accurate; and in response to verifying that the user credentials are accurate, authenticating the user for the session on the client device. 18. The non-transitory computer readable storage medium of claim 17, wherein the encoded token is repeated multiple times throughout the duration of the audio message. 19. The non-transitory computer readable storage medium of claim 17, wherein the encoding the token into the audio message comprises using an audio watermark algorithm to embed the token as an audio watermark in the audio message. 20. The non-transitory computer readable storage medium of claim 17, further comprising instructions that when executed by the one or more processors cause the one or more processors to execute the operations of: in response to the received audio message containing the token at the mobile device, retrieving the user credentials from storage on the mobile device; and conveying the user credentials and the token to the authentication server.
A system is described for authenticating a user on a client device using the user's mobile device and utilizing the audio channel. An authentication server receives a request from the client to initiate a session for the user, creates the session, and sends a session token back to the client along with a request for authentication. The client broadcasts an audio transmission containing the token to the mobile device over an audio channel using data-over-sound transmission. The mobile device receives the transmission via a microphone, obtains the token and the server identity from the transmission, and sends user credentials that are stored on the mobile device along with the token identifying the session directly to the authentication server. The server verifies the received credentials, confirms the token, and logs the user into the session.1. A method for authenticating a user on a client device using a mobile device, comprising: receiving, at an authentication server, a login request from the client device; on the authentication server, generating a token including a session identifier for a corresponding session and conveying the token to the client device; encoding the token into an audio message and broadcasting the audio message on a speaker of the client device, wherein the mobile device receives the audio message over an audio channel using a microphone and decodes the audio message to obtain the token; at the authentication server, receiving from the mobile device an authentication request comprising user credentials and the token decoded by the mobile device from the audio message; verifying that the user credentials are accurate; and in response to verifying that the user credentials are accurate, authenticating the user for the session on the client device. 2. The method of claim 1, wherein the encoded token is repeated multiple times throughout the duration of the audio message. 3. The method of claim 1, wherein the encoding the token into the audio message comprises using an audio watermark algorithm to embed the token as an audio watermark in the audio message. 4. The method of claim 1, further comprising: in response to the received audio message containing the token at the mobile device, retrieving the user credentials from storage on the mobile device; and conveying the user credentials and the token to the authentication server. 5. The method of claim 1, further comprising generating an output by the client device indicating to a user of the client device to bring the mobile device in proximity of the client device. 6. The method of claim 1, wherein the client device is a headless system. 7. The method of claim 1, wherein the client implements screen reader software for assisting visually impaired individuals. 8. The method of claim 1, wherein the generated token includes an expiration time, wherein the authentication server verifies that the authentication request is received from the mobile device within the expiration time. 9. The method of claim 1, wherein the authentication request to the authentication server further includes a mobile device ID corresponding to the mobile device, wherein the authentication server verifies that the mobile device is authorized based on the mobile device ID. 10. A computing device for authenticating a user on a client device using a mobile device, comprising: at least one processor; and memory including instructions that, when executed by the at least one processor, cause the computing device to perform the steps of: receiving, at an authentication server, a login request from the client device; on the authentication server, generating a token including a session identifier for a corresponding session and conveying the token to the client device; encoding the token into an audio message and broadcasting the audio message on a speaker of the client device, wherein the mobile device receives the audio message over an audio channel using a microphone and decodes the audio message to obtain the token; at the authentication server, receiving from the mobile device an authentication request comprising user credentials and the token decoded by the mobile device from the audio message; verifying that the user credentials are accurate; and in response to verifying that the user credentials are accurate, authenticating the user for the session on the client device. 11. The computing device of claim 10, wherein, wherein the encoded token is repeated multiple times throughout the duration of the audio message. 12. The computing device of claim 10, wherein the encoding the token into the audio message comprises using an audio watermark algorithm to embed the token as an audio watermark in the audio message. 13. The computing device of claim 10, wherein the memory further includes instructions that when executed by the at least one processor, cause the computing device to perform the steps of: in response to the received audio message containing the token at the mobile device, retrieving the user credentials from storage on the mobile device; and conveying the user credentials and the token to the authentication server. 14. The computing device of claim 10, wherein the memory further includes instructions that when executed by the at least one processor, cause the computing device to perform the steps of: generating an output by the client device indicating to a user of the client device to bring the mobile device in proximity of the client device. 15. The computing device of claim 10, wherein the client device is a headless system. 16. The computing device of claim 10, wherein the generated token includes an expiration time, wherein the authentication server verifies that the authentication request is received from the mobile device within the expiration time. 17. A non-transitory computer readable storage medium comprising one or more sequences of instructions, the instructions when executed by one or more processors causing the one or more processors to execute the operations of: receiving, at an authentication server, a login request from the client device; on the authentication server, generating a token including a session identifier for a corresponding session and conveying the token to the client device; encoding the token into an audio message and broadcasting the audio message on a speaker of the client device, wherein the mobile device receives the audio message over an audio channel using a microphone and decodes the audio message to obtain the token; at the authentication server, receiving from the mobile device an authentication request comprising user credentials and the token decoded by the mobile device from the audio message; verifying that the user credentials are accurate; and in response to verifying that the user credentials are accurate, authenticating the user for the session on the client device. 18. The non-transitory computer readable storage medium of claim 17, wherein the encoded token is repeated multiple times throughout the duration of the audio message. 19. The non-transitory computer readable storage medium of claim 17, wherein the encoding the token into the audio message comprises using an audio watermark algorithm to embed the token as an audio watermark in the audio message. 20. The non-transitory computer readable storage medium of claim 17, further comprising instructions that when executed by the one or more processors cause the one or more processors to execute the operations of: in response to the received audio message containing the token at the mobile device, retrieving the user credentials from storage on the mobile device; and conveying the user credentials and the token to the authentication server.
2,400
9,298
9,298
15,076,717
2,487
A system and method for controlling surveillance cameras is enclosed. In the system, a surveillance camera system includes surveillance cameras configured as VoIP server endpoints. The surveillance cameras receive messages from client devices such as mobile user devices and computer workstations functioning as VoIP client endpoints. The client devices establish a voice communications channel with the surveillance cameras for receiving and controlling one or more streams of image data sent by the surveillance camera over the voice communications channel to the client device. In a preferred embodiment, the voice communications channel includes a control session based on Session Information Protocol (SIP) and a data channel that is based on Real time transfer protocol (RTP). The data channel preferably operates in half duplex mode, which limits the potential for collisions on the data channel when the surveillance cameras are transmitting their image data to the client devices.
1. A system delivering image data from a surveillance camera, the system comprising: a client device that establishes a voice communications channel for receiving and controlling one or more streams of image data generated by the surveillance camera. 2. The system of claim 1, wherein the voice communications channel comprises a control session that the client device establishes with the surveillance camera, local image data storage system and/or cloud image data storage system. 3. The system of claim 2, wherein the client device controls the one or more streams of image data via the control session. 4. The system of claim 2, wherein the control session authorizes the client device. 5. The system of claim 2, wherein the control session is based upon the Session Initiation Protocol (SIP). 6. The system of claim 1, wherein the voice communications channel further comprises a data channel over which the client device receives the one or more streams of image data from the surveillance camera. 7. The system of claim 6, wherein the data channel is based upon the Real time Transfer Protocol (RTP). 8. The system of claim 6, wherein the data channel is a half duplex data channel. 9. The system of claim 1, wherein the surveillance camera is an IP surveillance camera including an application server that establishes the voice communications channel with the client device. 10. The system of claim 1, wherein the image data of the one or more streams of image data are stored within the surveillance camera. 11. The system of claim 1, further comprising an application server of the surveillance camera that includes: a SIP layer based on an implementation of the Session Initiation Protocol (SIP) for establishing a control session of the voice communications channel, for controlling the one or more streams of image data sent by the surveillance camera to the client device; and an RTP layer based on an implementation of the Real Time Protocol (RTP) for establishing a half duplex data channel of the voice communications channel, for sending the one or more streams of image data to the client device. 12. A method for delivering image data from a surveillance camera, the method comprising: a client device establishing a voice communications channel; and receiving and controlling one or more streams of image data originating from the surveillance camera over the voice communications channel. 13. The method of claim 12, wherein the client device establishing the voice communications channel comprises the client device establishing a control session and a data channel with the surveillance camera, local image data storage system and/or cloud image data storage system. 14. The method of claim 13, further comprising the data channel referencing a session ID of the control session. 15. The method of claim 13, further comprising the control session authorizing the client device. 16. The method of claim 13, further comprising implementing the control session based upon the Session Initiation Protocol (SIP). 17. The method of claim 12, wherein controlling the one or more streams of image data comprises the client device sending control messages to the surveillance camera via an IP based control session of the voice communications channel. 18. The method of claim 12, wherein receiving the one or more streams of image data sent by the surveillance camera comprises the client device receiving the streams of image data from the surveillance camera over a data channel of the voice communications channel. 19. The method of claim 18, further comprising operating the data channel in half duplex mode. 20. The method of claim 18, further comprising implementing the data channel based upon the Real time Transfer Protocol (RTP).
A system and method for controlling surveillance cameras is enclosed. In the system, a surveillance camera system includes surveillance cameras configured as VoIP server endpoints. The surveillance cameras receive messages from client devices such as mobile user devices and computer workstations functioning as VoIP client endpoints. The client devices establish a voice communications channel with the surveillance cameras for receiving and controlling one or more streams of image data sent by the surveillance camera over the voice communications channel to the client device. In a preferred embodiment, the voice communications channel includes a control session based on Session Information Protocol (SIP) and a data channel that is based on Real time transfer protocol (RTP). The data channel preferably operates in half duplex mode, which limits the potential for collisions on the data channel when the surveillance cameras are transmitting their image data to the client devices.1. A system delivering image data from a surveillance camera, the system comprising: a client device that establishes a voice communications channel for receiving and controlling one or more streams of image data generated by the surveillance camera. 2. The system of claim 1, wherein the voice communications channel comprises a control session that the client device establishes with the surveillance camera, local image data storage system and/or cloud image data storage system. 3. The system of claim 2, wherein the client device controls the one or more streams of image data via the control session. 4. The system of claim 2, wherein the control session authorizes the client device. 5. The system of claim 2, wherein the control session is based upon the Session Initiation Protocol (SIP). 6. The system of claim 1, wherein the voice communications channel further comprises a data channel over which the client device receives the one or more streams of image data from the surveillance camera. 7. The system of claim 6, wherein the data channel is based upon the Real time Transfer Protocol (RTP). 8. The system of claim 6, wherein the data channel is a half duplex data channel. 9. The system of claim 1, wherein the surveillance camera is an IP surveillance camera including an application server that establishes the voice communications channel with the client device. 10. The system of claim 1, wherein the image data of the one or more streams of image data are stored within the surveillance camera. 11. The system of claim 1, further comprising an application server of the surveillance camera that includes: a SIP layer based on an implementation of the Session Initiation Protocol (SIP) for establishing a control session of the voice communications channel, for controlling the one or more streams of image data sent by the surveillance camera to the client device; and an RTP layer based on an implementation of the Real Time Protocol (RTP) for establishing a half duplex data channel of the voice communications channel, for sending the one or more streams of image data to the client device. 12. A method for delivering image data from a surveillance camera, the method comprising: a client device establishing a voice communications channel; and receiving and controlling one or more streams of image data originating from the surveillance camera over the voice communications channel. 13. The method of claim 12, wherein the client device establishing the voice communications channel comprises the client device establishing a control session and a data channel with the surveillance camera, local image data storage system and/or cloud image data storage system. 14. The method of claim 13, further comprising the data channel referencing a session ID of the control session. 15. The method of claim 13, further comprising the control session authorizing the client device. 16. The method of claim 13, further comprising implementing the control session based upon the Session Initiation Protocol (SIP). 17. The method of claim 12, wherein controlling the one or more streams of image data comprises the client device sending control messages to the surveillance camera via an IP based control session of the voice communications channel. 18. The method of claim 12, wherein receiving the one or more streams of image data sent by the surveillance camera comprises the client device receiving the streams of image data from the surveillance camera over a data channel of the voice communications channel. 19. The method of claim 18, further comprising operating the data channel in half duplex mode. 20. The method of claim 18, further comprising implementing the data channel based upon the Real time Transfer Protocol (RTP).
2,400
9,299
9,299
16,366,957
2,444
Novel tools and techniques are provided for implementing an automation platform for an application programming interface, and, more particularly, to methods, systems, and apparatuses for implementing an automation platform for designing, building, and executing application programming interfaces. In an embodiment, a computing system might receive a request to set up an application programming interface (“API”) in communication with a first application and at least one second application; and might receive one or more first input parameters associated with the first application. The computing system might autonomously generate the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application.
1. A method, comprising: receiving, with a computing system, a request to set up an application programming interface (“API”) in communication with a first application and at least one second application; receiving, with the computing system, one or more first input parameters associated with the first application; and autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application. 2. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously generating, with the computing system, code to implement the API in communication with the first application and each of the at least one second application. 3. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously generating, with the computing system, one or more communications paths between the first application and each of the at least one second application via the API. 4. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously provisioning, with the computing system, cloud computing space to at least one of the first application, one or more of the at least one second application, or the API. 5. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously provisioning, with the computing system, one or more microservices to at least one of the first application or one or more of the at least one second application, via the API. 6. The method of claim 5, wherein the one or more microservices include at least one of one or more management microservices, one or more security microservices, one or more streaming microservices, one or more bill payment microservices, or one or more customer microservices. 7. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously generating, with the computing system, performance monitoring between the first application and each of the at least one second application via the API. 8. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously generating, with the computing system, secure access to the at least one of the first application, each of the at least one second application, or the API. 9. The method of claim 1, wherein the first application is associated with a customer of a service provider network and each of the at least one second application is associated with the service provider. 10. The method of claim 1, further comprising: receiving, with the computing system, one or more second input parameters associated with each of the at least one second application; and autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application and based at least in part on the one or more second input parameters associated with each of the at least one second application. 11. The method of claim 10, wherein the one or more first input parameters and the one or more second input parameters comprise at least one of one or more programming languages associated with the at least one of the first application, each of the at least one second application, or the API; one or more microservices associated with at least one of the first application, each of the at least one second application, or the API; cloud computing space associated with at least one of the first application, each of the at least one second application, or the API; performance metrics associated with at least one of the first application, each of the at least one second application, or the API; communication paths associated with at least one of the first application, each of the at least one second application, or the API; or security, authorization, or authentication associated with at least one of the first application, each of the at least one second application, or the API. 12. The method of claim 1, further comprising: receiving, with the computing system, one or more third input parameters associated with the API; and autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application and based at least in part on the one or more third input parameters associated with the API. 13. The method of claim 12, wherein the one or more third input parameters comprise at least one of one or more microservices associated with at least one of the first application, each of the at least one second application, or the API; cloud computing space associated with at least one of the first application, each of the at least one second application, or the API; performance metrics associated with at least one of the first application, each of the at least one second application, or the API; communication paths associated with at least one of the first application, each of the at least one second application, or the API; or security, authorization, or authentication associated with at least one of the first application, each of the at least one second application, or the API. 14. An apparatus, comprising: at least one processor; and a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to: receive a request to set up an application programming interface (“API”) in communication with a first application and at least one second application; receive one or more first input parameters associated with the first application; and autonomously generate the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application. 15. The apparatus of claim 14, wherein the one or more first input parameters comprise at least one of one or more programming languages associated with the at least one of the first application, each of the at least one second application, or the API; one or more microservices associated with at least one of the first application, each of the at least one second application, or the API; cloud computing space associated with at least one of the first application, each of the at least one second application, or the API; performance metrics associated with at least one of the first application, each of the at least one second application, or the API; communication paths associated with at least one of the first application, each of the at least one second application, or the API; or security, authorization, or authentication associated with at least one of the first application, each of the at least one second application, or the API. 16. The apparatus of claim 14, wherein autonomously generating the API in communication with the first application and each of the at least one second application comprises: autonomously generating code to implement the API in communication with the first application and each of the at least one second application. 17. The apparatus of claim 14, wherein autonomously generating the API in communication with the first application and each of the at least one second application comprises: autonomously generating one or more communications paths between the first application and each of the at least one second application via the API. 18. The apparatus of claim 14, wherein autonomously generating the API in communication with the first application and each of the at least one second application comprises: autonomously provisioning cloud computing space to at least one of the first application, one or more of the at least one second application, or the API. 19. The apparatus of claim 14, wherein autonomously generating the API in communication with the first application and each of the at least one second application comprises: autonomously provisioning one or more microservices to at least one of the first application or one or more of the at least one second application, via the API. 20. A system, comprising: a computing system, comprising: at least one first processor; and a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the computing system to: receive a request to set up an application programming interface (“API”) in communication with a first application and at least one second application; receive one or more first input parameters associated with the first application; and autonomously generate the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application.
Novel tools and techniques are provided for implementing an automation platform for an application programming interface, and, more particularly, to methods, systems, and apparatuses for implementing an automation platform for designing, building, and executing application programming interfaces. In an embodiment, a computing system might receive a request to set up an application programming interface (“API”) in communication with a first application and at least one second application; and might receive one or more first input parameters associated with the first application. The computing system might autonomously generate the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application.1. A method, comprising: receiving, with a computing system, a request to set up an application programming interface (“API”) in communication with a first application and at least one second application; receiving, with the computing system, one or more first input parameters associated with the first application; and autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application. 2. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously generating, with the computing system, code to implement the API in communication with the first application and each of the at least one second application. 3. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously generating, with the computing system, one or more communications paths between the first application and each of the at least one second application via the API. 4. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously provisioning, with the computing system, cloud computing space to at least one of the first application, one or more of the at least one second application, or the API. 5. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously provisioning, with the computing system, one or more microservices to at least one of the first application or one or more of the at least one second application, via the API. 6. The method of claim 5, wherein the one or more microservices include at least one of one or more management microservices, one or more security microservices, one or more streaming microservices, one or more bill payment microservices, or one or more customer microservices. 7. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously generating, with the computing system, performance monitoring between the first application and each of the at least one second application via the API. 8. The method of claim 1, wherein autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application comprises: autonomously generating, with the computing system, secure access to the at least one of the first application, each of the at least one second application, or the API. 9. The method of claim 1, wherein the first application is associated with a customer of a service provider network and each of the at least one second application is associated with the service provider. 10. The method of claim 1, further comprising: receiving, with the computing system, one or more second input parameters associated with each of the at least one second application; and autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application and based at least in part on the one or more second input parameters associated with each of the at least one second application. 11. The method of claim 10, wherein the one or more first input parameters and the one or more second input parameters comprise at least one of one or more programming languages associated with the at least one of the first application, each of the at least one second application, or the API; one or more microservices associated with at least one of the first application, each of the at least one second application, or the API; cloud computing space associated with at least one of the first application, each of the at least one second application, or the API; performance metrics associated with at least one of the first application, each of the at least one second application, or the API; communication paths associated with at least one of the first application, each of the at least one second application, or the API; or security, authorization, or authentication associated with at least one of the first application, each of the at least one second application, or the API. 12. The method of claim 1, further comprising: receiving, with the computing system, one or more third input parameters associated with the API; and autonomously generating, with the computing system, the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application and based at least in part on the one or more third input parameters associated with the API. 13. The method of claim 12, wherein the one or more third input parameters comprise at least one of one or more microservices associated with at least one of the first application, each of the at least one second application, or the API; cloud computing space associated with at least one of the first application, each of the at least one second application, or the API; performance metrics associated with at least one of the first application, each of the at least one second application, or the API; communication paths associated with at least one of the first application, each of the at least one second application, or the API; or security, authorization, or authentication associated with at least one of the first application, each of the at least one second application, or the API. 14. An apparatus, comprising: at least one processor; and a non-transitory computer readable medium communicatively coupled to the at least one processor, the non-transitory computer readable medium having stored thereon computer software comprising a set of instructions that, when executed by the at least one processor, causes the apparatus to: receive a request to set up an application programming interface (“API”) in communication with a first application and at least one second application; receive one or more first input parameters associated with the first application; and autonomously generate the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application. 15. The apparatus of claim 14, wherein the one or more first input parameters comprise at least one of one or more programming languages associated with the at least one of the first application, each of the at least one second application, or the API; one or more microservices associated with at least one of the first application, each of the at least one second application, or the API; cloud computing space associated with at least one of the first application, each of the at least one second application, or the API; performance metrics associated with at least one of the first application, each of the at least one second application, or the API; communication paths associated with at least one of the first application, each of the at least one second application, or the API; or security, authorization, or authentication associated with at least one of the first application, each of the at least one second application, or the API. 16. The apparatus of claim 14, wherein autonomously generating the API in communication with the first application and each of the at least one second application comprises: autonomously generating code to implement the API in communication with the first application and each of the at least one second application. 17. The apparatus of claim 14, wherein autonomously generating the API in communication with the first application and each of the at least one second application comprises: autonomously generating one or more communications paths between the first application and each of the at least one second application via the API. 18. The apparatus of claim 14, wherein autonomously generating the API in communication with the first application and each of the at least one second application comprises: autonomously provisioning cloud computing space to at least one of the first application, one or more of the at least one second application, or the API. 19. The apparatus of claim 14, wherein autonomously generating the API in communication with the first application and each of the at least one second application comprises: autonomously provisioning one or more microservices to at least one of the first application or one or more of the at least one second application, via the API. 20. A system, comprising: a computing system, comprising: at least one first processor; and a first non-transitory computer readable medium communicatively coupled to the at least one first processor, the first non-transitory computer readable medium having stored thereon computer software comprising a first set of instructions that, when executed by the at least one first processor, causes the computing system to: receive a request to set up an application programming interface (“API”) in communication with a first application and at least one second application; receive one or more first input parameters associated with the first application; and autonomously generate the API in communication with the first application and each of the at least one second application, based at least in part on the one or more first input parameters associated with the first application.
2,400