Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
9,300
9,300
15,837,752
2,476
A network apparatus comprising a trunk end point associated with an Ethernet-tree (E-Tree) service in a network domain and configured to forward a frame that comprises a tag according to the tag in the frame, wherein the tag in the frame is a root tag that indicates a root source of the frame or a leaf tag that indicates a leaf source of the frame, and wherein the trunk end point is coupled to a second end point associated with the E-tree service outside the network domain.
1. A method for forwarding an egress frame, the method comprising: receiving, by a trunk end point, a frame from a network domain, the frame comprising a first attribute value or a second attribute value, wherein the trunk end point is associated with an Ethernet-tree (E-Tree) service across the network domain and a separate network domain, wherein the network domain and the separate network domain are coupled via a network to network interface (NNI) including the trunk end point, the first attribute value indicating that the frame originates from an end point having a root attribute of the E-Tree service, the second attribute value indicating that the frame originates from an end point having a leaf attribute of the E-Tree service; determining, by the trunk end point, a third attribute value to be included in a second frame or a fourth attribute value to be included in the second frame, the third and fourth attribute values are associated with the NNI, wherein the third attribute value indicates that the second frame originates from an end point having the root attribute of the E-Tree service, the fourth attribute value indicates that the second frame originates from an end point having the leaf attribute of the E-Tree service, the third attribute value is determined according the first attribute value, and the fourth attribute value is determined according to second attribute value; and transmitting, by the trunk end point subsequent to the determination, the second frame to a second endpoint associated with the E-tree service in the separate network domain. 2. The method of claim 1, wherein the first attribute value differs from the third attribute value, the method further comprising: mapping, by the trunk end point, the first attribute value to the second attribute value. 3. The method of claim 1, wherein the second attribute value differs from the fourth attribute value, the method further comprising: mapping, by the trunk end point, the second attribute value to the fourth attribute value. 4. The method of claim 1, wherein the first attribute value is same as the third attribute value. 5. The method of claim 1, wherein the second attribute value is same as the fourth attribute value. 6. The method of claim 1, wherein the third attribute value or the fourth attribute value are carried in a virtual local area network (VLAN) field in the second frame. 7. The method of claim 1, wherein the third attribute value or the fourth attribute value are carried in a path attributed value field in the second frame. 8. The method of claim 1, wherein the third attribute value is independent from a fifth attribute value which is used to indicate the root attribute in the separate network domain. 9. The method of claim 1, wherein the second end point is another truck end point included by the NNI. 10. The method of claim 1, wherein the first attribute value, the second attribute value, the third attribute value, the forth attribute value are exchanged between the network domain and the separate network domain based on Label Distribution Protocol (LDP) signaling or Border Gateway Protocol (BGP) signaling. 11. A network apparatus comprising: a trunk end point associated with an Ethernet-tree (E-Tree) service across a network domain and a separate network domain, wherein the network domain and the separate network domain are coupled via a network to network interface (NNI) including the trunk end point, and wherein the trunk end point is configured to: receive a frame from the network domain, the frame comprising a first attribute value or a second attribute value, the first attribute value indicating that the frame originates from an end point having a root attribute of the E-Tree service, the second attribute value indicating that the frame originates from an end point having a leaf attribute of the E-Tree service; determine, a third attribute value to be included in a second frame or a fourth attribute value to be included in the second frame, the third and fourth attribute values are associated with the NNI, wherein the third attribute value indicates that the second frame originates from an end point having the root attribute of the E-Tree service, the fourth attribute value indicates that the second frame originates from an end point having the leaf attribute of the E-Tree service, the third attribute value is determined according the first attribute value, and the fourth attribute value is determined according to second attribute value; and transmit, subsequent to the determination, the second frame to a second endpoint associated with the E-tree service in the separate network domain. 12. The network apparatus of claim 11, wherein the first attribute value differs from the third attribute value, the trunk end point is further configured to: map the first attribute value to the second attribute value. 13. The network apparatus of claim 11, wherein the second attribute value differs from the fourth attribute value, the trunk end point is further configured to: map the second attribute value to the fourth attribute value. 14. The method of claim 11, wherein the first attribute value is same as the third attribute value. 15. The method of claim 11, wherein the second attribute value is same as the fourth attribute value. 16. The method of claim 11, wherein the third attribute value or the fourth attribute value are carried in a virtual local area network (VLAN) field in the second frame. 17. The method of claim 11, wherein the third attribute value or the fourth attribute value are carried in a path attributed value field in the second frame. 18. The method of claim 11, wherein the third attribute value is independent from a fifth attribute value which is used to indicate the root attribute in the separate network domain. 19. The method of claim 11, wherein the second end point is another truck end point included by the NNI. 20. The method of claim 11, wherein the first attribute value, the second attribute value, the third attribute value, the forth attribute value are exchanged between the network domain and the separate network domain based on Label Distribution Protocol (LDP) signaling or Border Gateway Protocol (BGP) signaling. 21. A network apparatus comprising: a trunk end point associated with an Ethernet-tree (E-Tree) service across a network domain and a separate network domain, wherein the network domain and the separate network domain are coupled via a network to network interface (NNI) including the trunk end point, and wherein the trunk end point is configured to: receive a frame from the network domain; tag the frame with a first attribute value when the received frame originates from an end point having a root attribute of the E-Tree service, wherein the first attribute value is used outside the network domain to indicate the tagged frame originates from an end point having the root attribute; tag the frame with a second attribute value when the received frame originates from an end point having a leaf attribute of the E-Tree service, wherein the second attribute value is used outside the network domain to indicate the updated frame originates from an end point having the leaf attribute; and transmit the tagged frame to a second endpoint associated with the E-tree service in the separate network domain. 22. The network apparatus of claim 21, wherein the first attribute value is carried in a virtual local area network (VLAN) field in the tagged frame. 23. The network apparatus of claim 21, wherein the second attribute value is carried in a virtual local area network (VLAN) field in the tagged frame. 24. The network apparatus of claim 21, wherein the first attribute value in the tagged frame is independent from an attribute value which is used to indicate the root attribute in the separate network domain. 25. The network apparatus of claim 21, wherein the second attribute value in the tagged frame is independent from an attribute value which is used to indicate the leaf attribute in the separate network domain.
A network apparatus comprising a trunk end point associated with an Ethernet-tree (E-Tree) service in a network domain and configured to forward a frame that comprises a tag according to the tag in the frame, wherein the tag in the frame is a root tag that indicates a root source of the frame or a leaf tag that indicates a leaf source of the frame, and wherein the trunk end point is coupled to a second end point associated with the E-tree service outside the network domain.1. A method for forwarding an egress frame, the method comprising: receiving, by a trunk end point, a frame from a network domain, the frame comprising a first attribute value or a second attribute value, wherein the trunk end point is associated with an Ethernet-tree (E-Tree) service across the network domain and a separate network domain, wherein the network domain and the separate network domain are coupled via a network to network interface (NNI) including the trunk end point, the first attribute value indicating that the frame originates from an end point having a root attribute of the E-Tree service, the second attribute value indicating that the frame originates from an end point having a leaf attribute of the E-Tree service; determining, by the trunk end point, a third attribute value to be included in a second frame or a fourth attribute value to be included in the second frame, the third and fourth attribute values are associated with the NNI, wherein the third attribute value indicates that the second frame originates from an end point having the root attribute of the E-Tree service, the fourth attribute value indicates that the second frame originates from an end point having the leaf attribute of the E-Tree service, the third attribute value is determined according the first attribute value, and the fourth attribute value is determined according to second attribute value; and transmitting, by the trunk end point subsequent to the determination, the second frame to a second endpoint associated with the E-tree service in the separate network domain. 2. The method of claim 1, wherein the first attribute value differs from the third attribute value, the method further comprising: mapping, by the trunk end point, the first attribute value to the second attribute value. 3. The method of claim 1, wherein the second attribute value differs from the fourth attribute value, the method further comprising: mapping, by the trunk end point, the second attribute value to the fourth attribute value. 4. The method of claim 1, wherein the first attribute value is same as the third attribute value. 5. The method of claim 1, wherein the second attribute value is same as the fourth attribute value. 6. The method of claim 1, wherein the third attribute value or the fourth attribute value are carried in a virtual local area network (VLAN) field in the second frame. 7. The method of claim 1, wherein the third attribute value or the fourth attribute value are carried in a path attributed value field in the second frame. 8. The method of claim 1, wherein the third attribute value is independent from a fifth attribute value which is used to indicate the root attribute in the separate network domain. 9. The method of claim 1, wherein the second end point is another truck end point included by the NNI. 10. The method of claim 1, wherein the first attribute value, the second attribute value, the third attribute value, the forth attribute value are exchanged between the network domain and the separate network domain based on Label Distribution Protocol (LDP) signaling or Border Gateway Protocol (BGP) signaling. 11. A network apparatus comprising: a trunk end point associated with an Ethernet-tree (E-Tree) service across a network domain and a separate network domain, wherein the network domain and the separate network domain are coupled via a network to network interface (NNI) including the trunk end point, and wherein the trunk end point is configured to: receive a frame from the network domain, the frame comprising a first attribute value or a second attribute value, the first attribute value indicating that the frame originates from an end point having a root attribute of the E-Tree service, the second attribute value indicating that the frame originates from an end point having a leaf attribute of the E-Tree service; determine, a third attribute value to be included in a second frame or a fourth attribute value to be included in the second frame, the third and fourth attribute values are associated with the NNI, wherein the third attribute value indicates that the second frame originates from an end point having the root attribute of the E-Tree service, the fourth attribute value indicates that the second frame originates from an end point having the leaf attribute of the E-Tree service, the third attribute value is determined according the first attribute value, and the fourth attribute value is determined according to second attribute value; and transmit, subsequent to the determination, the second frame to a second endpoint associated with the E-tree service in the separate network domain. 12. The network apparatus of claim 11, wherein the first attribute value differs from the third attribute value, the trunk end point is further configured to: map the first attribute value to the second attribute value. 13. The network apparatus of claim 11, wherein the second attribute value differs from the fourth attribute value, the trunk end point is further configured to: map the second attribute value to the fourth attribute value. 14. The method of claim 11, wherein the first attribute value is same as the third attribute value. 15. The method of claim 11, wherein the second attribute value is same as the fourth attribute value. 16. The method of claim 11, wherein the third attribute value or the fourth attribute value are carried in a virtual local area network (VLAN) field in the second frame. 17. The method of claim 11, wherein the third attribute value or the fourth attribute value are carried in a path attributed value field in the second frame. 18. The method of claim 11, wherein the third attribute value is independent from a fifth attribute value which is used to indicate the root attribute in the separate network domain. 19. The method of claim 11, wherein the second end point is another truck end point included by the NNI. 20. The method of claim 11, wherein the first attribute value, the second attribute value, the third attribute value, the forth attribute value are exchanged between the network domain and the separate network domain based on Label Distribution Protocol (LDP) signaling or Border Gateway Protocol (BGP) signaling. 21. A network apparatus comprising: a trunk end point associated with an Ethernet-tree (E-Tree) service across a network domain and a separate network domain, wherein the network domain and the separate network domain are coupled via a network to network interface (NNI) including the trunk end point, and wherein the trunk end point is configured to: receive a frame from the network domain; tag the frame with a first attribute value when the received frame originates from an end point having a root attribute of the E-Tree service, wherein the first attribute value is used outside the network domain to indicate the tagged frame originates from an end point having the root attribute; tag the frame with a second attribute value when the received frame originates from an end point having a leaf attribute of the E-Tree service, wherein the second attribute value is used outside the network domain to indicate the updated frame originates from an end point having the leaf attribute; and transmit the tagged frame to a second endpoint associated with the E-tree service in the separate network domain. 22. The network apparatus of claim 21, wherein the first attribute value is carried in a virtual local area network (VLAN) field in the tagged frame. 23. The network apparatus of claim 21, wherein the second attribute value is carried in a virtual local area network (VLAN) field in the tagged frame. 24. The network apparatus of claim 21, wherein the first attribute value in the tagged frame is independent from an attribute value which is used to indicate the root attribute in the separate network domain. 25. The network apparatus of claim 21, wherein the second attribute value in the tagged frame is independent from an attribute value which is used to indicate the leaf attribute in the separate network domain.
2,400
9,301
9,301
12,202,673
2,426
A system and method for updating a settop box (STB) architecture that can be used to immediately update a device without requiring the device to be reset/restarted. The device may be any type of device that simultaneously supports multiple applications. The architecture may be used to update one of the applications with new functionality in a seamless manner that allows the applications including the one application to continue to operate without interruption.
1. A method of updating a settop box (STB) programmed to execute established functionality according to instructions associated with a core STB system, the method comprising: loading the STB with a plurality of filters that include instructions for implementing functionality updates; and immediately implementing the functionality updates. 2. The method of claim 1 wherein a first application that is already in use is different from a second application that implements the functionality updates. 3. The method of claim 2 wherein the second application implements the functionality updates without requiring the first application to be restarted. 4. The method of claim 1 wherein a first application that is already in use is the same application that implements the functionality updates. 5. The method of claim 4 wherein the first application implements the functionality updates without restarting. 6. A method of updating a settop box (STB), the STB including established functionality and operating conditions, the method comprising: loading the STB with at least one filter, the at least one filter specifying a functionality update for the STB and STB operating conditions necessary to implement the functionality update; operating the STB according to the established functionality and periodically checking if the established STB operating conditions match the filter specified STB operating conditions; and if the specified functionality update and operating conditions match the current STB operating conditions, immediately implementing the functionality update. 7. The method of claim 6 wherein implementing the functionality update includes operating the STB according to instructions specified in one of the filters instead of according to instructions associated with the established functionality. 8. The method of claim 7 wherein the instructions associated with the established functionality are stored within a core STB system. 9. The method of claim 6 wherein implementing the functionality update includes operating the STB to execute an operation according to the functionality update that would otherwise be processed according to the established functionality 10. The method of claim 6 further comprising checking for functionality updates upon receipt of an incoming message and processing the incoming message according to the functionality updates if one of the loaded filters corresponds to the incoming message, otherwise processing the incoming message according to established functionality. 11. The method of claim 10 further comprising storing the filters that are applicable to the incoming message within an internal message filter holding area of the STB. 12. The method of claim 6 further comprising checking for functionality updates prior to transmitting an outgoing message and transmitting the outgoing message according to the functionality updates if one of the loaded filters corresponds to the outgoing message, otherwise transmitting the outgoing message according to established functionality. 13. The method of claim 12 further comprising storing the filters that are applicable to the outgoing message within an outgoing message filter holding area of the STB. 14. The method of claim 6 further comprising checking for functionality updates upon occurrence of an event internal to the STB and implementing functionality updates if one of the loaded filters corresponds to the event, otherwise continuing STB processing according to established functionality. 15. A settop box (STB) configured to output signals to a display comprising: a core STB system having a plurality of applications that support operations of the STB; and at least one filter that includes instructions for updating functionality to one or more of the plurality of applications, wherein the filters add the functionality update to the one or more applications without interrupting the one or more applications that are running at a time when the functionality update is implemented. 16. The STB of claim 15 wherein the filters add the functionality update without requiring the one or more applications that are already running to be restarted. 17. The STB of claim 15 wherein the filters are comprised of non-compiling code. 18. The STB of claim 15 wherein the STB checks for the functionality update upon receipt of an incoming message and processes the incoming message according to the functionality update if one of the filters corresponds to the incoming message, otherwise the STB processes the incoming message according to established functionality associated with the core STB system. 19. The STB of claim 15 wherein the STB checks for the functionality update prior to transmitting an outgoing message and transmits the outgoing message according to the functionality update if one of the filters is applicable, otherwise the STB transmits the outgoing message according to established functionality associated with the core STB system. 20. The STB of claim 15 wherein the STB checks for the functionality update upon occurrence of an event internal to the STB and implements the functionality update if one of the filters is applicable to the event, otherwise the STB continues processing according to established functionality associated with the core STB system.
A system and method for updating a settop box (STB) architecture that can be used to immediately update a device without requiring the device to be reset/restarted. The device may be any type of device that simultaneously supports multiple applications. The architecture may be used to update one of the applications with new functionality in a seamless manner that allows the applications including the one application to continue to operate without interruption.1. A method of updating a settop box (STB) programmed to execute established functionality according to instructions associated with a core STB system, the method comprising: loading the STB with a plurality of filters that include instructions for implementing functionality updates; and immediately implementing the functionality updates. 2. The method of claim 1 wherein a first application that is already in use is different from a second application that implements the functionality updates. 3. The method of claim 2 wherein the second application implements the functionality updates without requiring the first application to be restarted. 4. The method of claim 1 wherein a first application that is already in use is the same application that implements the functionality updates. 5. The method of claim 4 wherein the first application implements the functionality updates without restarting. 6. A method of updating a settop box (STB), the STB including established functionality and operating conditions, the method comprising: loading the STB with at least one filter, the at least one filter specifying a functionality update for the STB and STB operating conditions necessary to implement the functionality update; operating the STB according to the established functionality and periodically checking if the established STB operating conditions match the filter specified STB operating conditions; and if the specified functionality update and operating conditions match the current STB operating conditions, immediately implementing the functionality update. 7. The method of claim 6 wherein implementing the functionality update includes operating the STB according to instructions specified in one of the filters instead of according to instructions associated with the established functionality. 8. The method of claim 7 wherein the instructions associated with the established functionality are stored within a core STB system. 9. The method of claim 6 wherein implementing the functionality update includes operating the STB to execute an operation according to the functionality update that would otherwise be processed according to the established functionality 10. The method of claim 6 further comprising checking for functionality updates upon receipt of an incoming message and processing the incoming message according to the functionality updates if one of the loaded filters corresponds to the incoming message, otherwise processing the incoming message according to established functionality. 11. The method of claim 10 further comprising storing the filters that are applicable to the incoming message within an internal message filter holding area of the STB. 12. The method of claim 6 further comprising checking for functionality updates prior to transmitting an outgoing message and transmitting the outgoing message according to the functionality updates if one of the loaded filters corresponds to the outgoing message, otherwise transmitting the outgoing message according to established functionality. 13. The method of claim 12 further comprising storing the filters that are applicable to the outgoing message within an outgoing message filter holding area of the STB. 14. The method of claim 6 further comprising checking for functionality updates upon occurrence of an event internal to the STB and implementing functionality updates if one of the loaded filters corresponds to the event, otherwise continuing STB processing according to established functionality. 15. A settop box (STB) configured to output signals to a display comprising: a core STB system having a plurality of applications that support operations of the STB; and at least one filter that includes instructions for updating functionality to one or more of the plurality of applications, wherein the filters add the functionality update to the one or more applications without interrupting the one or more applications that are running at a time when the functionality update is implemented. 16. The STB of claim 15 wherein the filters add the functionality update without requiring the one or more applications that are already running to be restarted. 17. The STB of claim 15 wherein the filters are comprised of non-compiling code. 18. The STB of claim 15 wherein the STB checks for the functionality update upon receipt of an incoming message and processes the incoming message according to the functionality update if one of the filters corresponds to the incoming message, otherwise the STB processes the incoming message according to established functionality associated with the core STB system. 19. The STB of claim 15 wherein the STB checks for the functionality update prior to transmitting an outgoing message and transmits the outgoing message according to the functionality update if one of the filters is applicable, otherwise the STB transmits the outgoing message according to established functionality associated with the core STB system. 20. The STB of claim 15 wherein the STB checks for the functionality update upon occurrence of an event internal to the STB and implements the functionality update if one of the filters is applicable to the event, otherwise the STB continues processing according to established functionality associated with the core STB system.
2,400
9,302
9,302
15,250,860
2,474
The subject technology relates to the management of a shared buffer memory in a network switch. Systems, methods, and machine readable media are provided for receiving a data packet at a first network queue from among a plurality of network queues, determining if a fill level of a queue in a shared buffer of the network switch exceeds a dynamic queue threshold, and in an event that the fill level of the shared buffer exceeds the dynamic queue threshold, determining if a fill level of the first network queue is less than a static queue minimum threshold.
1. A method of managing memory in a network switch, the method comprising: receiving a data packet at a first network queue from among a plurality of network queues; determining if a fill level of the first network queue in a shared buffer of the network switch exceeds a dynamic queue threshold; and in an event that the fill level of the first network queue exceeds the dynamic queue threshold, determining if the fill level of the first network queue is less than a static queue minimum threshold. 2. The method of claim 1, further comprising: enqueuing the data packet in the shared buffer memory if the fill level of the first network queue is less than the static queue minimum threshold. 3. The method of claim 1, further comprising: dropping the data packet if the fill level of the first network queue is greater than the static queue minimum threshold. 4. The method of claim 1, further comprising: dropping the data packet if the fill level of the first network queue exceeds the dynamic queue threshold and the static minimum threshold. 5. The method of claim 1, wherein the dynamic queue threshold is based on an amount of unallocated memory in the shared buffer. 6. The method of claim 1, wherein the dynamic queue threshold is a function of a fill level for each respective one of the plurality of network queues. 7. The method of claim 1, wherein the static queue minimum threshold is a user defined value. 8. A shared memory network switch comprising: at least one processor; a shared buffer memory, the shared buffer memory comprising a dynamic memory allocation and a reserve memory allocation; and a memory device storing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations comprising: receiving a data packet at a first network queue from among a plurality of network queues; determining if a fill level of the first network queue in the shared buffer of the network switch exceeds a dynamic queue threshold; and in an event that the fill level of the first network queue in the shared buffer exceeds the dynamic queue threshold, determining if the fill level of the first network queue is less than a static queue minimum threshold. 9. The shared memory network switch of claim 8, further comprising: enqueuing the data packet in the shared buffer if the fill level of the first network queue is less than the static queue minimum threshold. 10. The shared memory network switch of claim 8, further comprising: dropping the data packet if the fill level of the first network queue is greater than the static queue minimum threshold. 11. The shared memory network switch of claim 8, further comprising: dropping the data packet if the fill level of the first network queue exceeds the dynamic queue threshold and the static minimum threshold. 12. The shared memory network switch of claim 8, wherein the dynamic queue threshold is based on an amount of unallocated memory in the shared buffer. 13. The shared memory network switch of claim 8, wherein the dynamic queue threshold is a function of a fill level for each respective one of the plurality of network queues. 14. The shared memory network switch of claim 8, wherein the static queue minimum threshold is a user defined value. 15. A non-transitory computer-readable storage medium comprising instructions stored therein, which when executed by one or more processors, cause the processors to perform operations comprising: receiving a data packet at a first network queue from among a plurality of network queues; determining if a fill level of the first network queue in a shared buffer of the network switch exceeds a dynamic queue threshold; and in an event that the fill level of the first network queue in the shared buffer exceeds the dynamic queue threshold, determining if the fill level of the first network queue is less than a static queue minimum threshold. 16. The non-transitory computer-readable storage medium of claim 15, further comprising: enqueuing the data packet in the shared buffer if the fill level of the first network queue is less than the static queue minimum threshold. 17. The non-transitory computer-readable storage medium of claim 15, further comprising: dropping the data packet if the fill level of the first network queue is greater than the static queue minimum threshold. 18. The non-transitory computer-readable storage medium of claim 15, further comprising: dropping the data packet if the fill level of the fill level of the first network queue exceeds the dynamic queue threshold and the static minimum threshold. 19. The non-transitory computer-readable storage medium of claim 15, wherein the dynamic queue threshold is based on an amount of unallocated memory in the shared buffer. 20. The non-transitory computer-readable storage medium of claim 15, wherein the dynamic queue threshold is a function of a fill level for each respective one of the plurality of network queues.
The subject technology relates to the management of a shared buffer memory in a network switch. Systems, methods, and machine readable media are provided for receiving a data packet at a first network queue from among a plurality of network queues, determining if a fill level of a queue in a shared buffer of the network switch exceeds a dynamic queue threshold, and in an event that the fill level of the shared buffer exceeds the dynamic queue threshold, determining if a fill level of the first network queue is less than a static queue minimum threshold.1. A method of managing memory in a network switch, the method comprising: receiving a data packet at a first network queue from among a plurality of network queues; determining if a fill level of the first network queue in a shared buffer of the network switch exceeds a dynamic queue threshold; and in an event that the fill level of the first network queue exceeds the dynamic queue threshold, determining if the fill level of the first network queue is less than a static queue minimum threshold. 2. The method of claim 1, further comprising: enqueuing the data packet in the shared buffer memory if the fill level of the first network queue is less than the static queue minimum threshold. 3. The method of claim 1, further comprising: dropping the data packet if the fill level of the first network queue is greater than the static queue minimum threshold. 4. The method of claim 1, further comprising: dropping the data packet if the fill level of the first network queue exceeds the dynamic queue threshold and the static minimum threshold. 5. The method of claim 1, wherein the dynamic queue threshold is based on an amount of unallocated memory in the shared buffer. 6. The method of claim 1, wherein the dynamic queue threshold is a function of a fill level for each respective one of the plurality of network queues. 7. The method of claim 1, wherein the static queue minimum threshold is a user defined value. 8. A shared memory network switch comprising: at least one processor; a shared buffer memory, the shared buffer memory comprising a dynamic memory allocation and a reserve memory allocation; and a memory device storing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations comprising: receiving a data packet at a first network queue from among a plurality of network queues; determining if a fill level of the first network queue in the shared buffer of the network switch exceeds a dynamic queue threshold; and in an event that the fill level of the first network queue in the shared buffer exceeds the dynamic queue threshold, determining if the fill level of the first network queue is less than a static queue minimum threshold. 9. The shared memory network switch of claim 8, further comprising: enqueuing the data packet in the shared buffer if the fill level of the first network queue is less than the static queue minimum threshold. 10. The shared memory network switch of claim 8, further comprising: dropping the data packet if the fill level of the first network queue is greater than the static queue minimum threshold. 11. The shared memory network switch of claim 8, further comprising: dropping the data packet if the fill level of the first network queue exceeds the dynamic queue threshold and the static minimum threshold. 12. The shared memory network switch of claim 8, wherein the dynamic queue threshold is based on an amount of unallocated memory in the shared buffer. 13. The shared memory network switch of claim 8, wherein the dynamic queue threshold is a function of a fill level for each respective one of the plurality of network queues. 14. The shared memory network switch of claim 8, wherein the static queue minimum threshold is a user defined value. 15. A non-transitory computer-readable storage medium comprising instructions stored therein, which when executed by one or more processors, cause the processors to perform operations comprising: receiving a data packet at a first network queue from among a plurality of network queues; determining if a fill level of the first network queue in a shared buffer of the network switch exceeds a dynamic queue threshold; and in an event that the fill level of the first network queue in the shared buffer exceeds the dynamic queue threshold, determining if the fill level of the first network queue is less than a static queue minimum threshold. 16. The non-transitory computer-readable storage medium of claim 15, further comprising: enqueuing the data packet in the shared buffer if the fill level of the first network queue is less than the static queue minimum threshold. 17. The non-transitory computer-readable storage medium of claim 15, further comprising: dropping the data packet if the fill level of the first network queue is greater than the static queue minimum threshold. 18. The non-transitory computer-readable storage medium of claim 15, further comprising: dropping the data packet if the fill level of the fill level of the first network queue exceeds the dynamic queue threshold and the static minimum threshold. 19. The non-transitory computer-readable storage medium of claim 15, wherein the dynamic queue threshold is based on an amount of unallocated memory in the shared buffer. 20. The non-transitory computer-readable storage medium of claim 15, wherein the dynamic queue threshold is a function of a fill level for each respective one of the plurality of network queues.
2,400
9,303
9,303
15,988,950
2,436
Disclosed herein are systems and methods for determining learned associations between authentication credentials and network contextual data, such as may be utilized in a network that supports network roving. A mobile device attempts to rove to a visited network using authentication credentials associated with another network, based at least in part on first contextual information associated with the other network and second contextual information associated with the visited network indicating that the visited network is part of a common association of networks that supports roving internetworking between the networks of the common association.
1. A method comprising: determining that a client device lacks access to authentication credentials that are indicated as definitely usable to authenticate to a visited network; determining that first contextual information associated with other authentication credentials available to the client device at least partly corresponds to second contextual information associated with the visited network; and sending, based at least in part on the determining that the first contextual information at least partly corresponds to the second contextual information, a request to the visited network to authenticate using the other authentication credentials. 2. The method of claim 1, wherein the first contextual information is also associated with another network, the method further comprising associating, based at least on a successful authentication to the other network using the other authentication credentials, the other authentication credentials with the first contextual information. 3. The method of claim 1, further comprising: providing at least the first contextual information to a profile service; and receiving from the profile service information regarding modifications to be made to the first contextual information. 4. The method of claim 3, wherein the modifications correspond to at least one of: priority information usable to prioritize the other authentication credentials; de-associating the other authentication credentials from one or more portions of the first contextual information; and associating the other authentication credentials with additional contextual information. 5. The method of claim 1, wherein the first contextual information and the second contextual information both include one or more of a homogeneous extended service set identifier (HESSID), a roaming consortium organization identifier (OI) a domain name, a network address identifier (NAI) realm list, cellular information, and an access network query protocol (ANQP) vendor-specific list. 6. The method of claim 1, wherein the first contextual information includes first physical location information associated with another network for which the other authentication credentials are indicated as usable to authenticate, and the second contextual information includes second physical location information associated with the visited network. 7. The method of claim 1, further comprising modifying an association between the first contextual information and the other authentication credentials based at least on whether an attempt to authenticate to the visited network using the other authentication credentials is successful. 8. The method of claim 1, further comprising: determining that authenticating to the visited network using the other authentication credentials is successful; and updating the other authentication credentials based in part on one or more portions of the first contextual information that do not match the second contextual information. 9. The method of claim 1, further comprising: determining that authenticating to the visited network using the other authentication credentials is unsuccessful; and updating the other authentication credentials based in part on one or more portions of the first contextual information that match the second contextual information. 10. The method of claim 1, wherein the other authentication credentials are first authentication credentials, and the method further comprises: determining that a plurality of authentication credentials, including the first authentication credentials, are associated with contextual information that at least partially matches the second contextual information associated with the visited network; and prioritizing the plurality of authentication credentials for authenticating to the visited network based at least on one or more of: degrees of similarity between the contextual information associated with the plurality of authentication credentials and the second contextual information of the visited network; specificity of the contextual information associated with of the plurality of authentication credentials; and information regarding previous attempts to authenticate using individual ones of the plurality of authentication credentials. 11. A client device, comprising: one or more processors; memory; and one or more program modules stored on the memory and executable by the one or more processors, the one or more program modules configured to: detect a visited network, wherein the client device lacks access to available authentication credentials indicated as definitely usable to authenticate to the visited network; determine that there is at least partial agreement between first contextual information associated with other authentication credentials and second contextual information associated with the visited network; and attempt, based at least on the determining, to authenticate to the visited network using the other authentication credentials. 12. The client device of claim 11, wherein the first contextual information corresponds to another network, and the acts further comprise associating the other authentication credentials with the first contextual information based at least partly on a successful authentication to the other network using the other authentication credentials. 13. The client device of claim 12, wherein the first contextual information includes first network association information that indicates one or more other networks for which authentication credentials are usable to rove to the other network, and the acts further comprise sending the authentication request to the visited network based at least on the second contextual information of the visited network including second network association information that at least partly overlaps with the first network association information. 14. The client device of claim 11, wherein the first contextual information includes first physical location information corresponding to another network for which the other authentication credentials are usable to authenticate, the second contextual information includes second physical location information corresponding to the visited network, and the acts further comprise determining that there is at least partial agreement between the first contextual information and the second contextual information based at least in part on the first physical location information being associated with the second physical location information. 15. The client device of claim 11, wherein the one or more program modules are further configured to: transmit to a profile service the first contextual information; and receive from the profile service priority information to be used to prioritize the other authentication credentials from amongst a plurality of authentication credentials for authenticating to the visited network. 16. The client device of claim 11, wherein the acts further comprise, based at least in part on the other authentication credentials having been successfully used to rove to one or more networks a predetermined number of times due to an association between the other authentication credentials and the first contextual information, preventing further modification of the association between the other authentication credentials and the first contextual information. 17. A method comprising: determining that there is at least partial agreement between first contextual information associated with a mobile device and second contextual information associated with a network; and providing, by a profile service, based at least in part on there being at least partial agreement between the first contextual information and the second contextual information, the mobile device with authentication credentials for the network. 18. The method of claim 17, further comprising receiving the first contextual information from the mobile device. 19. The method of claim 17, further comprising, based at least in part on successful authentication by the mobile device to the network using the authentication credentials, de-associating the authentication credentials from one or more portions of the first contextual information that do not correspond to the second contextual information. 20. The method of claim 17, further comprising: based at least on successful authentication to the network by the mobile device, adjusting a priority metric associated with the first contextual information, the priority metric usable to determine whether to cause the mobile device to attempt to authenticate to a third network based at least in part on the third network being associated with third contextual information that at least partly agrees with the first contextual information.
Disclosed herein are systems and methods for determining learned associations between authentication credentials and network contextual data, such as may be utilized in a network that supports network roving. A mobile device attempts to rove to a visited network using authentication credentials associated with another network, based at least in part on first contextual information associated with the other network and second contextual information associated with the visited network indicating that the visited network is part of a common association of networks that supports roving internetworking between the networks of the common association.1. A method comprising: determining that a client device lacks access to authentication credentials that are indicated as definitely usable to authenticate to a visited network; determining that first contextual information associated with other authentication credentials available to the client device at least partly corresponds to second contextual information associated with the visited network; and sending, based at least in part on the determining that the first contextual information at least partly corresponds to the second contextual information, a request to the visited network to authenticate using the other authentication credentials. 2. The method of claim 1, wherein the first contextual information is also associated with another network, the method further comprising associating, based at least on a successful authentication to the other network using the other authentication credentials, the other authentication credentials with the first contextual information. 3. The method of claim 1, further comprising: providing at least the first contextual information to a profile service; and receiving from the profile service information regarding modifications to be made to the first contextual information. 4. The method of claim 3, wherein the modifications correspond to at least one of: priority information usable to prioritize the other authentication credentials; de-associating the other authentication credentials from one or more portions of the first contextual information; and associating the other authentication credentials with additional contextual information. 5. The method of claim 1, wherein the first contextual information and the second contextual information both include one or more of a homogeneous extended service set identifier (HESSID), a roaming consortium organization identifier (OI) a domain name, a network address identifier (NAI) realm list, cellular information, and an access network query protocol (ANQP) vendor-specific list. 6. The method of claim 1, wherein the first contextual information includes first physical location information associated with another network for which the other authentication credentials are indicated as usable to authenticate, and the second contextual information includes second physical location information associated with the visited network. 7. The method of claim 1, further comprising modifying an association between the first contextual information and the other authentication credentials based at least on whether an attempt to authenticate to the visited network using the other authentication credentials is successful. 8. The method of claim 1, further comprising: determining that authenticating to the visited network using the other authentication credentials is successful; and updating the other authentication credentials based in part on one or more portions of the first contextual information that do not match the second contextual information. 9. The method of claim 1, further comprising: determining that authenticating to the visited network using the other authentication credentials is unsuccessful; and updating the other authentication credentials based in part on one or more portions of the first contextual information that match the second contextual information. 10. The method of claim 1, wherein the other authentication credentials are first authentication credentials, and the method further comprises: determining that a plurality of authentication credentials, including the first authentication credentials, are associated with contextual information that at least partially matches the second contextual information associated with the visited network; and prioritizing the plurality of authentication credentials for authenticating to the visited network based at least on one or more of: degrees of similarity between the contextual information associated with the plurality of authentication credentials and the second contextual information of the visited network; specificity of the contextual information associated with of the plurality of authentication credentials; and information regarding previous attempts to authenticate using individual ones of the plurality of authentication credentials. 11. A client device, comprising: one or more processors; memory; and one or more program modules stored on the memory and executable by the one or more processors, the one or more program modules configured to: detect a visited network, wherein the client device lacks access to available authentication credentials indicated as definitely usable to authenticate to the visited network; determine that there is at least partial agreement between first contextual information associated with other authentication credentials and second contextual information associated with the visited network; and attempt, based at least on the determining, to authenticate to the visited network using the other authentication credentials. 12. The client device of claim 11, wherein the first contextual information corresponds to another network, and the acts further comprise associating the other authentication credentials with the first contextual information based at least partly on a successful authentication to the other network using the other authentication credentials. 13. The client device of claim 12, wherein the first contextual information includes first network association information that indicates one or more other networks for which authentication credentials are usable to rove to the other network, and the acts further comprise sending the authentication request to the visited network based at least on the second contextual information of the visited network including second network association information that at least partly overlaps with the first network association information. 14. The client device of claim 11, wherein the first contextual information includes first physical location information corresponding to another network for which the other authentication credentials are usable to authenticate, the second contextual information includes second physical location information corresponding to the visited network, and the acts further comprise determining that there is at least partial agreement between the first contextual information and the second contextual information based at least in part on the first physical location information being associated with the second physical location information. 15. The client device of claim 11, wherein the one or more program modules are further configured to: transmit to a profile service the first contextual information; and receive from the profile service priority information to be used to prioritize the other authentication credentials from amongst a plurality of authentication credentials for authenticating to the visited network. 16. The client device of claim 11, wherein the acts further comprise, based at least in part on the other authentication credentials having been successfully used to rove to one or more networks a predetermined number of times due to an association between the other authentication credentials and the first contextual information, preventing further modification of the association between the other authentication credentials and the first contextual information. 17. A method comprising: determining that there is at least partial agreement between first contextual information associated with a mobile device and second contextual information associated with a network; and providing, by a profile service, based at least in part on there being at least partial agreement between the first contextual information and the second contextual information, the mobile device with authentication credentials for the network. 18. The method of claim 17, further comprising receiving the first contextual information from the mobile device. 19. The method of claim 17, further comprising, based at least in part on successful authentication by the mobile device to the network using the authentication credentials, de-associating the authentication credentials from one or more portions of the first contextual information that do not correspond to the second contextual information. 20. The method of claim 17, further comprising: based at least on successful authentication to the network by the mobile device, adjusting a priority metric associated with the first contextual information, the priority metric usable to determine whether to cause the mobile device to attempt to authenticate to a third network based at least in part on the third network being associated with third contextual information that at least partly agrees with the first contextual information.
2,400
9,304
9,304
16,048,270
2,477
A device can receive a proximity message comprising a base station identifier and a network address. The device can determine that the device is within a particular distance of a base station associated with the base station identifier based, at least in part, on the proximity message. In response to a determination that the device is within the particular distance of the base station, the device can display an actionable notification. The device can further determine that an action associated with the actionable notification has been performed. In response to a determination that the action has been performed, the device can send a proximity notification to a server identified by the network address, wherein the proximity notification comprises the base station identifier.
1. One or more machine-readable media having program code stored therein, the program code comprising instructions to: receive a proximity message comprising a base station identifier and a network address; determine that a mobile device is within a particular distance of a base station associated with the base station identifier based, at least in part, on the proximity message; in response to a determination that the mobile device is within the particular distance of the base station, display an actionable notification; determine that an action associated with the actionable notification has been performed; and in response to a determination that the action associated with the actionable notification has been performed, send a proximity notification to a server identified by the network address, wherein the proximity notification comprises the base station identifier. 2. The one or more machine-readable media of claim 1, the program code further comprising instructions to: receive the proximity notification; in response to reception of the proximity notification, send a request for user credentials to the mobile device; receive the request for user credentials; and in response to reception of the request for user credentials, send the user credentials to the server. 3. The one or more machine-readable media of claim 1, the program code further comprising instructions to: receive the proximity notification; in response to reception of the proximity notification, determine user metadata associated with the mobile device; and determine computing system metadata based, at least in part, on the base station identifier; and send the user metadata to a computing system specified by the computing system metadata. 4. The one or more machine-readable media of claim 3, the program code further comprising instructions to: receive the user metadata; and perform at least one operation associated with the user metadata. 5. The one or more machine-readable media of claim 4, wherein the program code to perform at least one operation associated with the user metadata comprises instructions to display at least a subset of the user metadata. 6. The one or more machine-readable media of claim 3, the program code further comprising instructions to: in response to reception of the proximity notification, determine base station metadata based, at least in part, on the base station identifier; and send the base station metadata to the mobile device. 7. The one or more machine-readable media of claim 6, wherein the base station metadata comprises a webpage. 8. A system comprising a mobile device, the mobile device comprising: a first processor; and a first machine-readable medium having first instructions stored thereon which, when executed by the first processor, cause the mobile device to, receive a proximity message comprising a base station identifier and a network address; determine that the mobile device is within a particular distance of a base station associated with the base station identifier based, at least in part, on the proximity message; in response to a determination that the mobile device is within the particular distance of the base station, display an actionable notification; determine that an action associated with the actionable notification has been performed; and in response to a determination that the action associated with the actionable notification has been performed, send a proximity notification to a server identified by the network address, wherein the proximity notification comprises the base station identifier. 9. The system of claim 8 further comprising the server, the server comprising: a second processor; and a second machine-readable medium having second instructions stored thereon which, when executed by the second processor, cause the server to, receive the proximity notification; in response to reception of the proximity notification, determine user metadata associated with the mobile device; and determine computing system metadata based, at least in part, on the base station identifier; and send the user metadata to a computing system specified by the computing system metadata. 10. The system of claim 9, wherein the second instructions, when executed by the second processor, further cause the server to send a request for user credentials to the mobile device in response to reception of the proximity notification; wherein the first instructions, when executed by the first processor, further cause the mobile device to: receive the request for user credentials; and in response to reception of the request for user credentials, send the user credentials to the server. 11. The system of claim 9, wherein the second instructions, when executed by the second processor, further cause the server to, in response to reception of the proximity notification, determine base station metadata based, at least in part, on the base station identifier; and send the base station metadata to the mobile device. 12. The system of claim 9 further comprising the computing system, the computing system comprising: a third processor; and a third machine-readable medium having third instructions stored thereon which, when executed by the third processor, cause the computing system to, receive the user metadata; and perform at least one operation associated with the user metadata. 13. The system of claim 12, wherein the third instructions which, when executed by the third processor, cause the computing system to perform at least one operation associated with the user metadata comprise fourth instructions which, when executed by the third processor, cause the computing system to determine price data associated with one or more goods or one or more services. 14. A method comprising: receiving, by a mobile device, a proximity message comprising a base station identifier and a network address; determining, by the mobile device, that the mobile device is within a particular distance of a base station based, at least in part, on the proximity message; in response to determining that the mobile device is within the particular distance of the base station, sending, by the mobile device, a proximity notification to a server identified by the network address, wherein the proximity notification comprises the base station identifier and a user identifier; in response to receiving the proximity notification, determining, by the server, user metadata associated with the user identifier; and determining, by the server, computing system metadata associated with the base station based, at least in part, on the base station identifier; and sending the user metadata to a computing system specified by the computing system metadata. 15. The method of claim 14, further comprising: in response to receiving the proximity notification, determining, by the server, base station metadata based, at least in part, on the base station identifier; and sending the base station metadata to the mobile device. 16. The method of claim 15, wherein the proximity notification comprises a request for a webpage and the base station metadata comprises the webpage. 17. The method of claim 14, further comprising: receiving, by the computing system, the user metadata; and performing, by the computing system, at least one operation associated with the user metadata. 18. The method of claim 17, wherein the at least one operation associated with the user metadata comprises determining whether a user associated with the user metadata is authorized to access a particular location, one or more goods, or one or more services. 19. The method of claim 14, further comprising: receiving, by the mobile device, a response to the proximity notification; and in response to receiving the response to the proximity notification, sending, by the mobile device, user credentials to the server. 20. The method of claim 14, further comprising: displaying, by the mobile device, an actionable notification; and determining, by the mobile device, that an action associated with the actionable notification has been performed; wherein said sending the proximity notification to the server is in response to determining that the action associated with the actionable notification has been performed.
A device can receive a proximity message comprising a base station identifier and a network address. The device can determine that the device is within a particular distance of a base station associated with the base station identifier based, at least in part, on the proximity message. In response to a determination that the device is within the particular distance of the base station, the device can display an actionable notification. The device can further determine that an action associated with the actionable notification has been performed. In response to a determination that the action has been performed, the device can send a proximity notification to a server identified by the network address, wherein the proximity notification comprises the base station identifier.1. One or more machine-readable media having program code stored therein, the program code comprising instructions to: receive a proximity message comprising a base station identifier and a network address; determine that a mobile device is within a particular distance of a base station associated with the base station identifier based, at least in part, on the proximity message; in response to a determination that the mobile device is within the particular distance of the base station, display an actionable notification; determine that an action associated with the actionable notification has been performed; and in response to a determination that the action associated with the actionable notification has been performed, send a proximity notification to a server identified by the network address, wherein the proximity notification comprises the base station identifier. 2. The one or more machine-readable media of claim 1, the program code further comprising instructions to: receive the proximity notification; in response to reception of the proximity notification, send a request for user credentials to the mobile device; receive the request for user credentials; and in response to reception of the request for user credentials, send the user credentials to the server. 3. The one or more machine-readable media of claim 1, the program code further comprising instructions to: receive the proximity notification; in response to reception of the proximity notification, determine user metadata associated with the mobile device; and determine computing system metadata based, at least in part, on the base station identifier; and send the user metadata to a computing system specified by the computing system metadata. 4. The one or more machine-readable media of claim 3, the program code further comprising instructions to: receive the user metadata; and perform at least one operation associated with the user metadata. 5. The one or more machine-readable media of claim 4, wherein the program code to perform at least one operation associated with the user metadata comprises instructions to display at least a subset of the user metadata. 6. The one or more machine-readable media of claim 3, the program code further comprising instructions to: in response to reception of the proximity notification, determine base station metadata based, at least in part, on the base station identifier; and send the base station metadata to the mobile device. 7. The one or more machine-readable media of claim 6, wherein the base station metadata comprises a webpage. 8. A system comprising a mobile device, the mobile device comprising: a first processor; and a first machine-readable medium having first instructions stored thereon which, when executed by the first processor, cause the mobile device to, receive a proximity message comprising a base station identifier and a network address; determine that the mobile device is within a particular distance of a base station associated with the base station identifier based, at least in part, on the proximity message; in response to a determination that the mobile device is within the particular distance of the base station, display an actionable notification; determine that an action associated with the actionable notification has been performed; and in response to a determination that the action associated with the actionable notification has been performed, send a proximity notification to a server identified by the network address, wherein the proximity notification comprises the base station identifier. 9. The system of claim 8 further comprising the server, the server comprising: a second processor; and a second machine-readable medium having second instructions stored thereon which, when executed by the second processor, cause the server to, receive the proximity notification; in response to reception of the proximity notification, determine user metadata associated with the mobile device; and determine computing system metadata based, at least in part, on the base station identifier; and send the user metadata to a computing system specified by the computing system metadata. 10. The system of claim 9, wherein the second instructions, when executed by the second processor, further cause the server to send a request for user credentials to the mobile device in response to reception of the proximity notification; wherein the first instructions, when executed by the first processor, further cause the mobile device to: receive the request for user credentials; and in response to reception of the request for user credentials, send the user credentials to the server. 11. The system of claim 9, wherein the second instructions, when executed by the second processor, further cause the server to, in response to reception of the proximity notification, determine base station metadata based, at least in part, on the base station identifier; and send the base station metadata to the mobile device. 12. The system of claim 9 further comprising the computing system, the computing system comprising: a third processor; and a third machine-readable medium having third instructions stored thereon which, when executed by the third processor, cause the computing system to, receive the user metadata; and perform at least one operation associated with the user metadata. 13. The system of claim 12, wherein the third instructions which, when executed by the third processor, cause the computing system to perform at least one operation associated with the user metadata comprise fourth instructions which, when executed by the third processor, cause the computing system to determine price data associated with one or more goods or one or more services. 14. A method comprising: receiving, by a mobile device, a proximity message comprising a base station identifier and a network address; determining, by the mobile device, that the mobile device is within a particular distance of a base station based, at least in part, on the proximity message; in response to determining that the mobile device is within the particular distance of the base station, sending, by the mobile device, a proximity notification to a server identified by the network address, wherein the proximity notification comprises the base station identifier and a user identifier; in response to receiving the proximity notification, determining, by the server, user metadata associated with the user identifier; and determining, by the server, computing system metadata associated with the base station based, at least in part, on the base station identifier; and sending the user metadata to a computing system specified by the computing system metadata. 15. The method of claim 14, further comprising: in response to receiving the proximity notification, determining, by the server, base station metadata based, at least in part, on the base station identifier; and sending the base station metadata to the mobile device. 16. The method of claim 15, wherein the proximity notification comprises a request for a webpage and the base station metadata comprises the webpage. 17. The method of claim 14, further comprising: receiving, by the computing system, the user metadata; and performing, by the computing system, at least one operation associated with the user metadata. 18. The method of claim 17, wherein the at least one operation associated with the user metadata comprises determining whether a user associated with the user metadata is authorized to access a particular location, one or more goods, or one or more services. 19. The method of claim 14, further comprising: receiving, by the mobile device, a response to the proximity notification; and in response to receiving the response to the proximity notification, sending, by the mobile device, user credentials to the server. 20. The method of claim 14, further comprising: displaying, by the mobile device, an actionable notification; and determining, by the mobile device, that an action associated with the actionable notification has been performed; wherein said sending the proximity notification to the server is in response to determining that the action associated with the actionable notification has been performed.
2,400
9,305
9,305
16,177,556
2,488
A vehicular vision system includes a plurality of cameras disposed at a vehicle and having respective exterior fields of view. Each camera includes an image sensor and a microcontroller having memory, and each camera is in communication with a vehicle controller. Image data captured by the image sensor of each camera is communicated to the vehicle controller. The vehicle controller communicates control data to each camera, and the communicated control data is stored in memory of each camera. With the communicated control data stored in the memory of each camera, the vehicle controller communicates a trigger signal to each camera during operation of the vehicle and vision system. Responsive to the communicated trigger signal, the microcontroller of each camera loads parameters of the control data stored in the respective memory into the respective image sensor so that the parameters of the image sensors of all of the cameras are synchronized.
1. A vehicular vision system, said vehicular vision system comprising: a plurality of cameras disposed at a vehicle and having respective fields of view exterior of the vehicle; wherein each of said cameras comprises an image sensor and a microcontroller having memory, and wherein each of said cameras is in communication with a vehicle controller; wherein said vehicle controller communicates control data to each of said cameras, and wherein the communicated control data is stored in memory of each of said cameras; wherein, with the communicated control data stored in memory of each of said cameras, said vehicle controller, during operation of said vehicular vision system as the vehicle is being operated, communicates a trigger signal to each of said cameras; wherein, responsive to the communicated trigger signal, the microcontroller of each of said cameras loads operational parameters of the control data stored in memory of the respective camera into that camera's image sensor so that the operational parameters of the image sensors of said plurality of cameras are synchronized; and wherein, with the operational parameters of the image sensors of said plurality of cameras synchronized, image data is captured by the image sensor of each of said cameras and is communicated to said vehicle controller. 2. The vehicular vision system of claim 1, wherein said vehicle controller communicates control data to a serializer of each of said cameras. 3. The vehicular vision system of claim 1, wherein said vehicle controller communicates control data to each of said cameras via low voltage differential signaling. 4. The vehicular vision system of claim 1, wherein each of said cameras communicates captured image data to said vehicle controller via low voltage differential signaling. 5. The vehicular vision system of claim 1, wherein the control data comprises auto white balance and auto exposure data. 6. The vehicular vision system of claim 5, wherein said vehicle controller communicates multiple auto white balance parameters and auto exposure parameters to each of said cameras, and wherein the communicated parameters are stored in the memory of each camera. 7. The vehicular vision system of claim 6, wherein, after the parameters are communicated to each of said cameras and stored in memory of the respective camera, said vehicle controller communicates a selected one of a plurality of trigger signals to said plurality of cameras, and wherein each trigger signal of the plurality of trigger signals is associated with a respective set of parameters. 8. The vehicular vision system of claim 7, wherein, responsive to the communicated selected trigger signal, the microcontroller of each of said cameras loads the respective parameters for that trigger signal into the that camera's image sensor so that the image sensors of said plurality of cameras are synchronized. 9. The vehicular vision system of claim 1, wherein image data captured by the image sensor of at least some of said cameras is processed at said vehicle controller for object detection. 10. The vehicular vision system of claim 1, wherein said vehicle controller generates an output based on the communicated captured image data. 11. The vehicular vision system of claim 10, comprising a display device that displays video images derived from the output of said vehicle controller. 12. A method for synchronizing a plurality of cameras of a vehicular vision system, said method comprising: providing a plurality of cameras disposed at a vehicle so as to have respective fields of view exterior of the vehicle, wherein each of the cameras comprises an image sensor and a microcontroller having memory, and wherein each of the cameras is in communication with a vehicle controller; communicating, via the vehicle controller, a plurality of sets of operational parameters to each of the cameras; storing the communicated sets of operational parameters in memory of each of the cameras; determining a driving condition; during operation of the vehicular vision system, and with the communicated sets of operational parameters stored in memory of each of the cameras, communicating a trigger signal to each of the cameras responsive to the determined driving condition; wherein the communicated trigger signal is associated with a respective set of operational parameters stored in memory of each of the cameras; loading, via the microcontroller of each of the cameras, and responsive to the communicated trigger signal, the set of operational parameters stored in memory of the respective camera and associated with the communicated trigger signal into that camera's image sensor so that the operational parameters of the image sensors of the plurality of cameras are synchronized; capturing, with the operational parameters of the image sensors of the plurality of cameras synchronized, image data via the image sensors of the plurality of cameras; and communicating, with the operational parameters of the image sensors of the plurality of cameras synchronized, image data captured by the image sensor of the plurality of cameras to the vehicle controller. 13. The method of claim 12, wherein each set of operational parameters stored in memory of the respective camera comprises an auto white balance parameter and an auto exposure parameter. 14. The method of claim 12, wherein determining a driving condition comprises determining an ambient lighting condition at the vehicle. 15. The method of claim 12, comprising processing, at the vehicle controller, image data captured by the image sensor of at least some cameras of the plurality of cameras for object detection. 16. The method of claim 12, comprising generating, via the vehicle controller, an output based on the communicated captured image data, and displaying, at a display device of the vehicle, video images derived from the output of the vehicle controller. 17. A vehicular vision system, said vehicular vision system comprising: a plurality of cameras disposed at a vehicle and having respective fields of view exterior of the vehicle; wherein each of said cameras comprises an image sensor and a microcontroller having memory, and wherein each of said cameras is in communication with a vehicle controller; wherein said vehicle controller communicates multiple sets of operational parameters to each of said cameras, and wherein the communicated sets of operational parameters are stored in memory of each of said cameras, and wherein each set of operational parameters stored in memory of each of said cameras is associated with a respective ambient lighting condition; wherein said vehicle controller, during operation of said vehicular vision system as the vehicle is being operated, determines a lighting condition at the vehicle; wherein, with the communicated sets of operational parameters stored in memory of each of said cameras, said vehicle controller, during operation of said vehicular vision system as the vehicle is being operated, and responsive to the determined lighting condition, communicates a trigger signal to each of said cameras; wherein, responsive to the communicated trigger signal, the microcontroller of each of said cameras loads a respective set of operational parameters stored in memory of the respective camera into that camera's image sensor so that the operational parameters of image sensors of said plurality of cameras are synchronized; and wherein, with the operational parameters of the image sensors of said plurality of cameras synchronized, image data is captured by the image sensor of each of said cameras and is communicated to said vehicle controller. 18. The vehicular vision system of claim 17, wherein each set of operational parameters comprises an auto white balance parameter and an auto exposure parameter. 19. The vehicular vision system of claim 17, wherein image data captured by the image sensor of at least some of said cameras is processed at said vehicle controller for object detection. 20. The vehicular vision system of claim 17, wherein said vehicle controller generates an output based on the communicated captured image data, and wherein, responsive to the generated output, a display device of the vehicle displays video images derived from the output of said vehicle controller.
A vehicular vision system includes a plurality of cameras disposed at a vehicle and having respective exterior fields of view. Each camera includes an image sensor and a microcontroller having memory, and each camera is in communication with a vehicle controller. Image data captured by the image sensor of each camera is communicated to the vehicle controller. The vehicle controller communicates control data to each camera, and the communicated control data is stored in memory of each camera. With the communicated control data stored in the memory of each camera, the vehicle controller communicates a trigger signal to each camera during operation of the vehicle and vision system. Responsive to the communicated trigger signal, the microcontroller of each camera loads parameters of the control data stored in the respective memory into the respective image sensor so that the parameters of the image sensors of all of the cameras are synchronized.1. A vehicular vision system, said vehicular vision system comprising: a plurality of cameras disposed at a vehicle and having respective fields of view exterior of the vehicle; wherein each of said cameras comprises an image sensor and a microcontroller having memory, and wherein each of said cameras is in communication with a vehicle controller; wherein said vehicle controller communicates control data to each of said cameras, and wherein the communicated control data is stored in memory of each of said cameras; wherein, with the communicated control data stored in memory of each of said cameras, said vehicle controller, during operation of said vehicular vision system as the vehicle is being operated, communicates a trigger signal to each of said cameras; wherein, responsive to the communicated trigger signal, the microcontroller of each of said cameras loads operational parameters of the control data stored in memory of the respective camera into that camera's image sensor so that the operational parameters of the image sensors of said plurality of cameras are synchronized; and wherein, with the operational parameters of the image sensors of said plurality of cameras synchronized, image data is captured by the image sensor of each of said cameras and is communicated to said vehicle controller. 2. The vehicular vision system of claim 1, wherein said vehicle controller communicates control data to a serializer of each of said cameras. 3. The vehicular vision system of claim 1, wherein said vehicle controller communicates control data to each of said cameras via low voltage differential signaling. 4. The vehicular vision system of claim 1, wherein each of said cameras communicates captured image data to said vehicle controller via low voltage differential signaling. 5. The vehicular vision system of claim 1, wherein the control data comprises auto white balance and auto exposure data. 6. The vehicular vision system of claim 5, wherein said vehicle controller communicates multiple auto white balance parameters and auto exposure parameters to each of said cameras, and wherein the communicated parameters are stored in the memory of each camera. 7. The vehicular vision system of claim 6, wherein, after the parameters are communicated to each of said cameras and stored in memory of the respective camera, said vehicle controller communicates a selected one of a plurality of trigger signals to said plurality of cameras, and wherein each trigger signal of the plurality of trigger signals is associated with a respective set of parameters. 8. The vehicular vision system of claim 7, wherein, responsive to the communicated selected trigger signal, the microcontroller of each of said cameras loads the respective parameters for that trigger signal into the that camera's image sensor so that the image sensors of said plurality of cameras are synchronized. 9. The vehicular vision system of claim 1, wherein image data captured by the image sensor of at least some of said cameras is processed at said vehicle controller for object detection. 10. The vehicular vision system of claim 1, wherein said vehicle controller generates an output based on the communicated captured image data. 11. The vehicular vision system of claim 10, comprising a display device that displays video images derived from the output of said vehicle controller. 12. A method for synchronizing a plurality of cameras of a vehicular vision system, said method comprising: providing a plurality of cameras disposed at a vehicle so as to have respective fields of view exterior of the vehicle, wherein each of the cameras comprises an image sensor and a microcontroller having memory, and wherein each of the cameras is in communication with a vehicle controller; communicating, via the vehicle controller, a plurality of sets of operational parameters to each of the cameras; storing the communicated sets of operational parameters in memory of each of the cameras; determining a driving condition; during operation of the vehicular vision system, and with the communicated sets of operational parameters stored in memory of each of the cameras, communicating a trigger signal to each of the cameras responsive to the determined driving condition; wherein the communicated trigger signal is associated with a respective set of operational parameters stored in memory of each of the cameras; loading, via the microcontroller of each of the cameras, and responsive to the communicated trigger signal, the set of operational parameters stored in memory of the respective camera and associated with the communicated trigger signal into that camera's image sensor so that the operational parameters of the image sensors of the plurality of cameras are synchronized; capturing, with the operational parameters of the image sensors of the plurality of cameras synchronized, image data via the image sensors of the plurality of cameras; and communicating, with the operational parameters of the image sensors of the plurality of cameras synchronized, image data captured by the image sensor of the plurality of cameras to the vehicle controller. 13. The method of claim 12, wherein each set of operational parameters stored in memory of the respective camera comprises an auto white balance parameter and an auto exposure parameter. 14. The method of claim 12, wherein determining a driving condition comprises determining an ambient lighting condition at the vehicle. 15. The method of claim 12, comprising processing, at the vehicle controller, image data captured by the image sensor of at least some cameras of the plurality of cameras for object detection. 16. The method of claim 12, comprising generating, via the vehicle controller, an output based on the communicated captured image data, and displaying, at a display device of the vehicle, video images derived from the output of the vehicle controller. 17. A vehicular vision system, said vehicular vision system comprising: a plurality of cameras disposed at a vehicle and having respective fields of view exterior of the vehicle; wherein each of said cameras comprises an image sensor and a microcontroller having memory, and wherein each of said cameras is in communication with a vehicle controller; wherein said vehicle controller communicates multiple sets of operational parameters to each of said cameras, and wherein the communicated sets of operational parameters are stored in memory of each of said cameras, and wherein each set of operational parameters stored in memory of each of said cameras is associated with a respective ambient lighting condition; wherein said vehicle controller, during operation of said vehicular vision system as the vehicle is being operated, determines a lighting condition at the vehicle; wherein, with the communicated sets of operational parameters stored in memory of each of said cameras, said vehicle controller, during operation of said vehicular vision system as the vehicle is being operated, and responsive to the determined lighting condition, communicates a trigger signal to each of said cameras; wherein, responsive to the communicated trigger signal, the microcontroller of each of said cameras loads a respective set of operational parameters stored in memory of the respective camera into that camera's image sensor so that the operational parameters of image sensors of said plurality of cameras are synchronized; and wherein, with the operational parameters of the image sensors of said plurality of cameras synchronized, image data is captured by the image sensor of each of said cameras and is communicated to said vehicle controller. 18. The vehicular vision system of claim 17, wherein each set of operational parameters comprises an auto white balance parameter and an auto exposure parameter. 19. The vehicular vision system of claim 17, wherein image data captured by the image sensor of at least some of said cameras is processed at said vehicle controller for object detection. 20. The vehicular vision system of claim 17, wherein said vehicle controller generates an output based on the communicated captured image data, and wherein, responsive to the generated output, a display device of the vehicle displays video images derived from the output of said vehicle controller.
2,400
9,306
9,306
15,830,843
2,451
Systems and methods for sending content are provided. One embodiment of a method includes identifying content provided to a user, receiving an indication that the user desires to share the content to a recipient, and determining a content provider that provided the content to the user and a preferred content provider of the recipient. Some embodiments are configured for determining an address associated with the recipient and providing instructions for the preferred content provider to provide the content to the recipient.
1. A method for sharing content comprising: identifying, by a computing device, content provided to a user; receiving, by the computing device, an indication that the user desires to share the content to a recipient; determining, by the computing device, a content provider that provided the content to the user and a preferred content provider of the recipient; determining, by the computing device, an address associated with the recipient; and providing, by the computing device, instructions for the preferred content provider to provide the content to the recipient. 2. The method of claim 1, further comprising providing a message that includes a link to the content to be provided by the preferred content provider. 3. The method of claim 1, further comprising providing an option to the user to select a message format. 4. The method of claim 3, wherein the option includes at least of the following message formats: a text message, an electronic mail message, a voice message, or a social media message. 5. The method of claim 1, further comprising receiving the content, wherein the content is received via at least one of the following formats: over-the-air radio, satellite radio, over-the-air television, cable television, satellite television, internet radio, or internet video. 6. The method of claim 1, further comprising communicating with the preferred content provider to grant the recipient with access to the content via a platform provided by the preferred content provider. 7. The method of claim 1, wherein the instructions include an option for the recipient to select to access the content and wherein the instructions are provided to a user device operated by the recipient and indicate to the user device how to access the content on a platform provided by the preferred content provider when the recipient selects the option. 8. A vehicle for sharing content comprising: a receiver for receiving content; a transmitter for communicating data related to the content; and a vehicle computing device that is communicatively coupled to the receiver and the transmitter and includes a processor and a memory component, wherein the memory component stores logic that, when executed by the processor, causes the vehicle computing device to perform at least the following: receive, via the receiver, the content from a first content provider; identify content that was received from the first content provider; provide an option to a user to share the content with a recipient; receive a user selection of the option to share the content to the recipient; determine a preferred content provider for sharing the content with the recipient; determine an address associated with the recipient; generate a message to a user device of the recipient that includes instructions for the user device to access the content via a platform of the preferred content provider; and send, via the transmitter, the message to the user device of the recipient via a desired message format. 9. The vehicle of claim 8, further comprising a head unit that includes a display for providing the option to share the content with the recipient. 10. The vehicle of claim 8, wherein the logic further causes the vehicle computing device to determine the desired message format, and wherein the desired message format includes at least one of the following: a text message, an electronic mail message, a voice message, or a social media message. 11. The vehicle of claim 8, wherein the message includes an option for the recipient to select to access the content, wherein in response to the user selecting the option, the user device communicates with a remote computing device associated with the preferred content provider to provide the content to the user device. 12. The vehicle of claim 8, wherein the logic further causes the vehicle computing device to provide an option for the user to determine the preferred content provider. 13. The vehicle of claim 8, wherein the preferred content provider is determined from a setting on the user device, and wherein the logic further causes the vehicle computing device to communicate with the user device to determine the preferred content provider. 14. The vehicle of claim 8, wherein the logic further causes the vehicle computing device to receive a custom message to send with to the recipient in the message. 15. A system for sharing content comprising: a computing device that includes a processor and a memory component, wherein the memory component stores logic that, when executed by the processor, causes the system to perform at least the following: receive the content from a first content provider; provide the content to a user; identify content that was received from the first content provider; determine a preferred content provider for sharing the content with a recipient; determine an address associated with the recipient; generate a message to a user device of the recipient that includes instructions for the user device to access the content via a platform of the preferred content provider; and send the message to the user device of the recipient via a desired message format that was determined by the user. 16. The system of claim 15, further comprising a remote computing device associated with the preferred content provider, wherein the logic further causes the system to communicate with the remote computing device to retrieve the instructions for the recipient to access the content via the platform of the preferred content provider. 17. The system of claim 15, wherein the logic further causes the system to determine the desired message format, and wherein the desired message format includes at least one of the following: a text message, an electronic mail message, a voice message, or a social media message. 18. The system of claim 15, wherein the logic further causes the system to receive a custom message to send with to the recipient in the message. 19. The system of claim 15, wherein the logic further causes the system to provide an option for the user to determine the preferred content provider. 20. The system of claim 15, wherein the preferred content provider is determined from a setting on the user device, and wherein the logic further causes the system to communicate with the user device to determine the preferred content provider.
Systems and methods for sending content are provided. One embodiment of a method includes identifying content provided to a user, receiving an indication that the user desires to share the content to a recipient, and determining a content provider that provided the content to the user and a preferred content provider of the recipient. Some embodiments are configured for determining an address associated with the recipient and providing instructions for the preferred content provider to provide the content to the recipient.1. A method for sharing content comprising: identifying, by a computing device, content provided to a user; receiving, by the computing device, an indication that the user desires to share the content to a recipient; determining, by the computing device, a content provider that provided the content to the user and a preferred content provider of the recipient; determining, by the computing device, an address associated with the recipient; and providing, by the computing device, instructions for the preferred content provider to provide the content to the recipient. 2. The method of claim 1, further comprising providing a message that includes a link to the content to be provided by the preferred content provider. 3. The method of claim 1, further comprising providing an option to the user to select a message format. 4. The method of claim 3, wherein the option includes at least of the following message formats: a text message, an electronic mail message, a voice message, or a social media message. 5. The method of claim 1, further comprising receiving the content, wherein the content is received via at least one of the following formats: over-the-air radio, satellite radio, over-the-air television, cable television, satellite television, internet radio, or internet video. 6. The method of claim 1, further comprising communicating with the preferred content provider to grant the recipient with access to the content via a platform provided by the preferred content provider. 7. The method of claim 1, wherein the instructions include an option for the recipient to select to access the content and wherein the instructions are provided to a user device operated by the recipient and indicate to the user device how to access the content on a platform provided by the preferred content provider when the recipient selects the option. 8. A vehicle for sharing content comprising: a receiver for receiving content; a transmitter for communicating data related to the content; and a vehicle computing device that is communicatively coupled to the receiver and the transmitter and includes a processor and a memory component, wherein the memory component stores logic that, when executed by the processor, causes the vehicle computing device to perform at least the following: receive, via the receiver, the content from a first content provider; identify content that was received from the first content provider; provide an option to a user to share the content with a recipient; receive a user selection of the option to share the content to the recipient; determine a preferred content provider for sharing the content with the recipient; determine an address associated with the recipient; generate a message to a user device of the recipient that includes instructions for the user device to access the content via a platform of the preferred content provider; and send, via the transmitter, the message to the user device of the recipient via a desired message format. 9. The vehicle of claim 8, further comprising a head unit that includes a display for providing the option to share the content with the recipient. 10. The vehicle of claim 8, wherein the logic further causes the vehicle computing device to determine the desired message format, and wherein the desired message format includes at least one of the following: a text message, an electronic mail message, a voice message, or a social media message. 11. The vehicle of claim 8, wherein the message includes an option for the recipient to select to access the content, wherein in response to the user selecting the option, the user device communicates with a remote computing device associated with the preferred content provider to provide the content to the user device. 12. The vehicle of claim 8, wherein the logic further causes the vehicle computing device to provide an option for the user to determine the preferred content provider. 13. The vehicle of claim 8, wherein the preferred content provider is determined from a setting on the user device, and wherein the logic further causes the vehicle computing device to communicate with the user device to determine the preferred content provider. 14. The vehicle of claim 8, wherein the logic further causes the vehicle computing device to receive a custom message to send with to the recipient in the message. 15. A system for sharing content comprising: a computing device that includes a processor and a memory component, wherein the memory component stores logic that, when executed by the processor, causes the system to perform at least the following: receive the content from a first content provider; provide the content to a user; identify content that was received from the first content provider; determine a preferred content provider for sharing the content with a recipient; determine an address associated with the recipient; generate a message to a user device of the recipient that includes instructions for the user device to access the content via a platform of the preferred content provider; and send the message to the user device of the recipient via a desired message format that was determined by the user. 16. The system of claim 15, further comprising a remote computing device associated with the preferred content provider, wherein the logic further causes the system to communicate with the remote computing device to retrieve the instructions for the recipient to access the content via the platform of the preferred content provider. 17. The system of claim 15, wherein the logic further causes the system to determine the desired message format, and wherein the desired message format includes at least one of the following: a text message, an electronic mail message, a voice message, or a social media message. 18. The system of claim 15, wherein the logic further causes the system to receive a custom message to send with to the recipient in the message. 19. The system of claim 15, wherein the logic further causes the system to provide an option for the user to determine the preferred content provider. 20. The system of claim 15, wherein the preferred content provider is determined from a setting on the user device, and wherein the logic further causes the system to communicate with the user device to determine the preferred content provider.
2,400
9,307
9,307
16,102,558
2,443
Managing devices in an IoT environment. A method includes, as a result of a device being provisioned by a special-purpose solution, storing at a central unified registry a correlation of the device and the given special purpose solution. The method further includes correlating the device to a different special-purpose solution at the unified registry. As a result, the method further includes causing subsequent configuration of the device to be performed by the different special-purpose solution.
1. A computer system comprising: one or more processors; and one or more computer-readable media having stored thereon instructions that are executable by the one or more processors to configure the computer system to manage devices in an IoT environment, including instructions that are executable to configure the computer system to perform at least the following: as a result of a device being provisioned by a special-purpose solution, store at a central unified registry a correlation of the device and the given special purpose solution; correlate the device to a different special-purpose solution at the unified registry; and as a result, cause subsequent configuration of the device to be performed by the different special-purpose solution. 2. The computer system of claim 1, wherein the unified registry allows devices in different locations to be managed by local special-purpose solutions to meet a predetermined latency threshold, while still providing a central location where entities can query for information about the devices. 3. The method of claim 1, wherein the unified registry allows devices for different tenants to be managed by tenant-specific special-purpose solutions to meet a predetermined tenant data isolation threshold, while still providing a central location where entities can query for information about the devices. 4. The computer system of claim 1, wherein the unified registry allows devices subject to different service-level agreements to be managed by service level agreement specific special-purpose solutions to meet a predetermined service level agreement threshold, while still providing a central location where entities can query for information about the devices. 5. The computer system of claim 1, wherein the one or more computer-readable media further have stored thereon instructions that are executable by the one or more processors to configure the computer system to store metadata for the device at the unified registry, the metadata comprising at least one of model number or firmware version of the device. 6. The computer system of claim 1, wherein the one or more computer-readable media further have stored thereon instructions that are executable by the one or more processors to configure the computer system to provide from the unified registry, a shadow copy of the unified registry to the different special-purpose solution. 7. The computer system of claim 1, wherein the one or more computer-readable media further have stored thereon instructions that are executable by the one or more processors to configure the computer system to receive a request from the device for an identification of a special-purpose solution for the device, and as a result, identify the different special-purpose solution to the device so that the subsequent configuration of the device can be performed by the different special-purpose solution. 8. In an IoT environment, a method of managing devices in the IoT environment, the method comprising: as a result of a device being provisioned by a special-purpose solution, storing at a central unified registry a correlation of the device and the given special purpose solution; correlating the device to a different special-purpose solution at the unified registry; and as a result, causing subsequent configuration of the device to be performed by the different special-purpose solution. 9. The method of claim 8, wherein the unified registry allows devices in different locations to be managed by local special-purpose solutions to meet a predetermined latency threshold, while still providing a central location where entities can query for information about the devices. 10. The method of claim 8, wherein the unified registry allows devices for different tenants to be managed by tenant-specific special-purpose solutions to meet a predetermined tenant data isolation threshold, while still providing a central location where entities can query for information about the devices. 11. The method of claim 8, wherein the unified registry allows devices subject to different service-level agreements to be managed by service level agreement specific special-purpose solutions to meet a predetermined service level agreement threshold, while still providing a central location where entities can query for information about the devices. 12. The method of claim 8, further comprising storing metadata for the device at the unified registry, the metadata comprising at least one of model number or firmware version of the device. 13. The method of claim 8, further comprising providing from the unified registry, a shadow copy of the unified registry to the different special-purpose solution. 14. The method of claim 8, further comprising receiving a request from the device for an identification of a special-purpose solution for the device, and as a result, identifying the different special-purpose solution to the device so that the subsequent configuration of the device can be performed by the different special-purpose solution. 15. A device management service: one or more processors; one or more computer-readable media having stored thereon instructions that are executable by the one or more processors; wherein the device management service is configured to update a central unified registry as a result of devices being provisioned by special-purpose solutions, to store at the central unified registry a correlation of the devices and the given special purpose solution; and wherein the device management service is configured to move devices to different special-purpose solutions by updating the correlations at the unified registry to cause subsequent configuration of the devices to be performed by the different special-purpose solutions. 16. The device management service of claim 15, wherein the unified registry allows devices in different locations to be managed by local special-purpose solutions to meet a predetermined latency threshold, while still providing a central location where entities can query for information about the devices. 17. The device management service of claim 15, wherein the unified registry allows devices for different tenants to be managed by tenant-specific special-purpose solutions to meet a predetermined tenant data isolation threshold, while still providing a central location where entities can query for information about the devices. 18. The device management service of claim 15, wherein the unified registry allows devices subject to different service-level agreements to be managed by service level agreement specific special-purpose solutions to meet a predetermined service level agreement threshold, while still providing a central location where entities can query for information about the devices. 19. The device management service of claim 15, wherein the device management service is configured to search metadata on the unified registry correlated to devices at the unified registry, the metadata comprising at least one of model number or firmware version of the devices. 20. The device management service of claim 15, wherein the device management service is configured to provide from the unified registry, a shadow copy of the unified registry to the special-purpose solutions.
Managing devices in an IoT environment. A method includes, as a result of a device being provisioned by a special-purpose solution, storing at a central unified registry a correlation of the device and the given special purpose solution. The method further includes correlating the device to a different special-purpose solution at the unified registry. As a result, the method further includes causing subsequent configuration of the device to be performed by the different special-purpose solution.1. A computer system comprising: one or more processors; and one or more computer-readable media having stored thereon instructions that are executable by the one or more processors to configure the computer system to manage devices in an IoT environment, including instructions that are executable to configure the computer system to perform at least the following: as a result of a device being provisioned by a special-purpose solution, store at a central unified registry a correlation of the device and the given special purpose solution; correlate the device to a different special-purpose solution at the unified registry; and as a result, cause subsequent configuration of the device to be performed by the different special-purpose solution. 2. The computer system of claim 1, wherein the unified registry allows devices in different locations to be managed by local special-purpose solutions to meet a predetermined latency threshold, while still providing a central location where entities can query for information about the devices. 3. The method of claim 1, wherein the unified registry allows devices for different tenants to be managed by tenant-specific special-purpose solutions to meet a predetermined tenant data isolation threshold, while still providing a central location where entities can query for information about the devices. 4. The computer system of claim 1, wherein the unified registry allows devices subject to different service-level agreements to be managed by service level agreement specific special-purpose solutions to meet a predetermined service level agreement threshold, while still providing a central location where entities can query for information about the devices. 5. The computer system of claim 1, wherein the one or more computer-readable media further have stored thereon instructions that are executable by the one or more processors to configure the computer system to store metadata for the device at the unified registry, the metadata comprising at least one of model number or firmware version of the device. 6. The computer system of claim 1, wherein the one or more computer-readable media further have stored thereon instructions that are executable by the one or more processors to configure the computer system to provide from the unified registry, a shadow copy of the unified registry to the different special-purpose solution. 7. The computer system of claim 1, wherein the one or more computer-readable media further have stored thereon instructions that are executable by the one or more processors to configure the computer system to receive a request from the device for an identification of a special-purpose solution for the device, and as a result, identify the different special-purpose solution to the device so that the subsequent configuration of the device can be performed by the different special-purpose solution. 8. In an IoT environment, a method of managing devices in the IoT environment, the method comprising: as a result of a device being provisioned by a special-purpose solution, storing at a central unified registry a correlation of the device and the given special purpose solution; correlating the device to a different special-purpose solution at the unified registry; and as a result, causing subsequent configuration of the device to be performed by the different special-purpose solution. 9. The method of claim 8, wherein the unified registry allows devices in different locations to be managed by local special-purpose solutions to meet a predetermined latency threshold, while still providing a central location where entities can query for information about the devices. 10. The method of claim 8, wherein the unified registry allows devices for different tenants to be managed by tenant-specific special-purpose solutions to meet a predetermined tenant data isolation threshold, while still providing a central location where entities can query for information about the devices. 11. The method of claim 8, wherein the unified registry allows devices subject to different service-level agreements to be managed by service level agreement specific special-purpose solutions to meet a predetermined service level agreement threshold, while still providing a central location where entities can query for information about the devices. 12. The method of claim 8, further comprising storing metadata for the device at the unified registry, the metadata comprising at least one of model number or firmware version of the device. 13. The method of claim 8, further comprising providing from the unified registry, a shadow copy of the unified registry to the different special-purpose solution. 14. The method of claim 8, further comprising receiving a request from the device for an identification of a special-purpose solution for the device, and as a result, identifying the different special-purpose solution to the device so that the subsequent configuration of the device can be performed by the different special-purpose solution. 15. A device management service: one or more processors; one or more computer-readable media having stored thereon instructions that are executable by the one or more processors; wherein the device management service is configured to update a central unified registry as a result of devices being provisioned by special-purpose solutions, to store at the central unified registry a correlation of the devices and the given special purpose solution; and wherein the device management service is configured to move devices to different special-purpose solutions by updating the correlations at the unified registry to cause subsequent configuration of the devices to be performed by the different special-purpose solutions. 16. The device management service of claim 15, wherein the unified registry allows devices in different locations to be managed by local special-purpose solutions to meet a predetermined latency threshold, while still providing a central location where entities can query for information about the devices. 17. The device management service of claim 15, wherein the unified registry allows devices for different tenants to be managed by tenant-specific special-purpose solutions to meet a predetermined tenant data isolation threshold, while still providing a central location where entities can query for information about the devices. 18. The device management service of claim 15, wherein the unified registry allows devices subject to different service-level agreements to be managed by service level agreement specific special-purpose solutions to meet a predetermined service level agreement threshold, while still providing a central location where entities can query for information about the devices. 19. The device management service of claim 15, wherein the device management service is configured to search metadata on the unified registry correlated to devices at the unified registry, the metadata comprising at least one of model number or firmware version of the devices. 20. The device management service of claim 15, wherein the device management service is configured to provide from the unified registry, a shadow copy of the unified registry to the special-purpose solutions.
2,400
9,308
9,308
15,709,591
2,482
Implementations of the present disclosure provide a method and apparatus for failover in a video surveillance system. The video surveillance system includes a plurality of cameras hosted by a plurality of machines. At a first machine, a message indicating that a second machine has failure is received, the first machine and the second machine hosting a first set of cameras and a second set of cameras among the plurality of cameras, respectively; available resources of the first machine and loads of the first and second machines are determined; based on the available resources and the loads, parameters of at least one set of the first and second sets of cameras are configured, to enable the second set of cameras to be taken over by the first machine.
1. A method of failover in a video surveillance system, the video surveillance system including a plurality of cameras hosted by a plurality of machines, the method comprising: receiving, at a first machine, a message indicating that a second machine has a failure, the first and second machines hosting a first set of cameras and a second set of cameras among the plurality of cameras, respectively; determining available resources of the first machine and loads of the first and second machines; and configuring, based on the available resources and the loads, parameters of at least one set of the first and second sets of cameras to enable the first machine to take over the second set of cameras. 2. The method according to claim 1, further comprising: receiving, from the second machine, a message indicating that the failure has been eliminated; and handing over the second set of cameras to the second machine for hosting. 3. The method according to claim 1, wherein determining available resources of the first machine comprises determining at least one of the following: a processor resource of the first machine, a memory capacity of the first machine, and network bandwidth of the first machine. 4. The method according to claim 1, wherein determining the loads comprises: determining a first number of the first set of cameras; and determining a second number of the second set of cameras. 5. The method according to claim 1, wherein configuring the parameters comprises: in response to the available resources of the first machine being insufficient to support the loads of the first and second machines, reducing configuration of the parameters based on the available resources. 6. The method according to claim 5, wherein reducing the configuration of the parameters comprises at last one of the following: reducing an image resolution; reducing a frame rate; and changing a video format. 7. The method according to claim 1, wherein at least one of the first and second machines is a virtual machine. 8. An apparatus for failover in a video surveillance system, the video surveillance system including a plurality of cameras hosted by a plurality of machines, the apparatus comprising: a message receiving module configured to receive, at a first machine, a message indicating that the second machine has a failure, the first and second machines hosting a first set of cameras and a second set of cameras among the plurality of cameras, respectively; a control module configured to: determine available resources of the first machine and loads of the first and second machines; configure, based on the available resources and the loads, parameters of at least one set of the first and second sets of cameras to enable the first machine to take over the second set of cameras. 9. The apparatus according to claim 8, wherein the control module is further configured to: receive, from the second machine, a message indicating that the failure has been eliminated; and hand over the second set of cameras to the second machine for hosting 10. The apparatus according to claim 8, wherein the control module is configured to determine at least one of the following: a processor resource of the first machine, a memory capacity of the first machine, and network bandwidth of the first machine. 11. The apparatus according to claim 8, wherein the control module is configured to determine the loads by: determining a first number of the first set of cameras; and determining a second number of the second set of cameras. 12. The apparatus according to claim 8, wherein the control module is configured to configure the parameters by: in response to the available resources of the first machine being insufficient to support the loads of the first and second machines, reducing configuration of the parameters based on the available resources. 13. The apparatus according to claim 8, wherein the control module is configured to reduce the configuration of the parameters by at least one of: reducing an image resolution; reducing a frame rate; and changing a video format. 14. The apparatus according to claim 8, wherein at least one of the first and second machines is a virtual machine. 15. The apparatus according to claim 8, wherein the video surveillance system further includes a storage server with at least one of the first and second machines installed therein. 16. The apparatus according to claim 8, wherein the first machine and the second machine have video management software installed therein, respectively, for communication with each other, wherein the video management system software includes a replay module, a recording module, and a distributing module. 17. The apparatus according to claim 8, wherein the video surveillance system further includes a management server for managing the video surveillance system. A method of failover in a video surveillance system, the video surveillance system including a plurality of cameras hosted by a plurality of machines, the method comprising: 18. A computer program product for failover in a video surveillance system, the video surveillance system including a plurality of cameras hosted by a plurality of machines, the computer program product comprising: a non-transitory computer readable medium encoded with computer-executable code, the code configured to enable the execution of: receiving, at a first machine, a message indicating that a second machine has a failure, the first and second machines hosting a first set of cameras and a second set of cameras among the plurality of cameras, respectively; determining available resources of the first machine and loads of the first and second machines; and configuring, based on the available resources and the loads, parameters of at least one set of the first and second sets of cameras to enable the first machine to take over the second set of cameras.
Implementations of the present disclosure provide a method and apparatus for failover in a video surveillance system. The video surveillance system includes a plurality of cameras hosted by a plurality of machines. At a first machine, a message indicating that a second machine has failure is received, the first machine and the second machine hosting a first set of cameras and a second set of cameras among the plurality of cameras, respectively; available resources of the first machine and loads of the first and second machines are determined; based on the available resources and the loads, parameters of at least one set of the first and second sets of cameras are configured, to enable the second set of cameras to be taken over by the first machine.1. A method of failover in a video surveillance system, the video surveillance system including a plurality of cameras hosted by a plurality of machines, the method comprising: receiving, at a first machine, a message indicating that a second machine has a failure, the first and second machines hosting a first set of cameras and a second set of cameras among the plurality of cameras, respectively; determining available resources of the first machine and loads of the first and second machines; and configuring, based on the available resources and the loads, parameters of at least one set of the first and second sets of cameras to enable the first machine to take over the second set of cameras. 2. The method according to claim 1, further comprising: receiving, from the second machine, a message indicating that the failure has been eliminated; and handing over the second set of cameras to the second machine for hosting. 3. The method according to claim 1, wherein determining available resources of the first machine comprises determining at least one of the following: a processor resource of the first machine, a memory capacity of the first machine, and network bandwidth of the first machine. 4. The method according to claim 1, wherein determining the loads comprises: determining a first number of the first set of cameras; and determining a second number of the second set of cameras. 5. The method according to claim 1, wherein configuring the parameters comprises: in response to the available resources of the first machine being insufficient to support the loads of the first and second machines, reducing configuration of the parameters based on the available resources. 6. The method according to claim 5, wherein reducing the configuration of the parameters comprises at last one of the following: reducing an image resolution; reducing a frame rate; and changing a video format. 7. The method according to claim 1, wherein at least one of the first and second machines is a virtual machine. 8. An apparatus for failover in a video surveillance system, the video surveillance system including a plurality of cameras hosted by a plurality of machines, the apparatus comprising: a message receiving module configured to receive, at a first machine, a message indicating that the second machine has a failure, the first and second machines hosting a first set of cameras and a second set of cameras among the plurality of cameras, respectively; a control module configured to: determine available resources of the first machine and loads of the first and second machines; configure, based on the available resources and the loads, parameters of at least one set of the first and second sets of cameras to enable the first machine to take over the second set of cameras. 9. The apparatus according to claim 8, wherein the control module is further configured to: receive, from the second machine, a message indicating that the failure has been eliminated; and hand over the second set of cameras to the second machine for hosting 10. The apparatus according to claim 8, wherein the control module is configured to determine at least one of the following: a processor resource of the first machine, a memory capacity of the first machine, and network bandwidth of the first machine. 11. The apparatus according to claim 8, wherein the control module is configured to determine the loads by: determining a first number of the first set of cameras; and determining a second number of the second set of cameras. 12. The apparatus according to claim 8, wherein the control module is configured to configure the parameters by: in response to the available resources of the first machine being insufficient to support the loads of the first and second machines, reducing configuration of the parameters based on the available resources. 13. The apparatus according to claim 8, wherein the control module is configured to reduce the configuration of the parameters by at least one of: reducing an image resolution; reducing a frame rate; and changing a video format. 14. The apparatus according to claim 8, wherein at least one of the first and second machines is a virtual machine. 15. The apparatus according to claim 8, wherein the video surveillance system further includes a storage server with at least one of the first and second machines installed therein. 16. The apparatus according to claim 8, wherein the first machine and the second machine have video management software installed therein, respectively, for communication with each other, wherein the video management system software includes a replay module, a recording module, and a distributing module. 17. The apparatus according to claim 8, wherein the video surveillance system further includes a management server for managing the video surveillance system. A method of failover in a video surveillance system, the video surveillance system including a plurality of cameras hosted by a plurality of machines, the method comprising: 18. A computer program product for failover in a video surveillance system, the video surveillance system including a plurality of cameras hosted by a plurality of machines, the computer program product comprising: a non-transitory computer readable medium encoded with computer-executable code, the code configured to enable the execution of: receiving, at a first machine, a message indicating that a second machine has a failure, the first and second machines hosting a first set of cameras and a second set of cameras among the plurality of cameras, respectively; determining available resources of the first machine and loads of the first and second machines; and configuring, based on the available resources and the loads, parameters of at least one set of the first and second sets of cameras to enable the first machine to take over the second set of cameras.
2,400
9,309
9,309
15,942,936
2,483
An endoscope includes a housing with a distal end insertable into a cavity; an image capture device at the distal end to obtain 3D images, and process them to form a video signal; and a folded substrate folded into a U-shape having first and second legs. The image capture device includes a detector and a lens system with right and left multi-band pass filters having right pass bands that are complements of left pass bands. The lens system receives the 3D images including right and left images. The detector faces the lens system to obtain the right and left images. A processing circuit faces the proximal end behind the detector to process signals from the detector. The folded substrate includes the detector at an outer side of the first leg facing the lens system and the processing circuit at an outer side of the second leg facing the proximal end.
1. An endoscope for providing a stereoscopic three dimensional image of a region of interest inside a body, the endoscope comprising: a housing having a distal end and a proximal end, the distal end being insertable into a cavity of the body; an image capture device at the distal end configured to obtain the stereoscopic three dimensional image of the region of interest, and process the stereoscopic three dimensional image to form a video signal; and a folded substrate folded into a U-shape having first and second legs; the image capture device comprising: a lens system including a right multi-band pass filter having right pass bands and a left multi-band pass filter having left pass bands, the right pass bands being complements of the left pass bands, the lens system receiving the stereoscopic three dimensional image including right and left images; and a detector facing the lens system and configured to obtain the right and left images, and processing circuit facing the proximal end behind the detector and configured to process signals from the detector; wherein the folded substrate includes the detector at an outer side of the first leg facing the lens system and the processing circuit at an outer side of the second leg facing the proximal end. 2. The endoscope of claim 1, further comprising an illuminator configured to illuminate the region of interest through an illumination multi-band pass filter having the right pass bands and the left pass bands. 3. The endoscope of claim 1, further comprising a connecting device between the image capture device and the proximal end, the connecting device being configured to connect the image capture device to an illumination source and a display, and to provide the video signals to the display for display of the optical images of the region of interest on the display. 4. The endoscope of claim 3, wherein the illumination source is configured to provide white light and the connecting device comprises light guides having illumination right and left multi-band pass filters, the light guides being configured to receive the white light and output right and left illuminations having colors that correspond to the right and left pass bands of the right and left multi-band pass filters. 5. The endoscope of claim 4, wherein the illumination right and left multi-band pass filters are located at one of entrance sides and exit sides of the light guides. 6. The endoscope of claim 1, wherein the lens system comprises a lens configured to image the right image and the left image, one at a time, on substantially an entire area of the detector. 7. The endoscope of claim 1, wherein the lens system comprises two lenses configured to simultaneously image the right image on a first portion of the detector, and image the left image on a second portion of the detector. 8. An endoscope system for providing a stereoscopic three dimensional image of a region of interest inside a body, the endoscope comprising: an illuminator configured to illuminate the region of interest; a housing having a distal end and a proximal end, the distal end being insertable into a cavity of the body; an image capture device at the distal end configured to obtain the stereoscopic three dimensional image of the region of interest illuminated by the illuminator, and process the stereoscopic three dimensional image to form a video signal; and a folded substrate folded into a U-shape having first and second legs; the image capture device comprising: a lens system including a right multi-band pass filter having right pass bands and a left multi-band pass filter having left pass bands, the right pass bands being complements of the left pass bands, the lens system receiving the stereoscopic three dimensional image including right and left images; and a detector facing the lens system and configured to obtain the right and left images, and processing circuit facing the proximal end behind the detector and configured to process signals from the detector; wherein the folded substrate includes the detector at an outer side of the first leg facing the lens system and the processing circuit at an outer side of the second leg facing the proximal end. 9. The endoscope system of claim 8, wherein the illuminator includes an illumination multi-band pass filter having the right pass bands and the left pass bands. 10. The endoscope system of claim 8, further comprising a display and a connecting device between the image capture device and the proximal end, the connecting device being configured to connect the image capture device to the illuminator and the display, and to provide the video signals to the display for display of the optical images of the region of interest on the display. 11. The endoscope system of claim 10, wherein the illuminator comprises a white light source for providing white light and the connecting device comprises light guides having illumination right and left multi-band pass filters, the light guides being configured to receive the white light and output right and left illuminations having colors that correspond to the right and left pass bands of the right and left multi-band pass filters. 12. The endoscope system of claim 11, wherein the illumination right and left multi-band pass filters are located at one of entrance sides and exit sides of the light guides. 13. The endoscope system of claim 8, wherein the lens system comprises a lens configured to image the right image and the left image, one at a time, on substantially an entire area of the detector. 14. The endoscope system of claim 8, wherein the lens system comprises two lenses configured to simultaneously image the right image on a first portion of the detector, and image the left image on a second portion of the detector. 15. A method for obtaining a stereoscopic three dimensional image of a region of interest inside a body from an endoscope, the method comprising acts of: illuminating the region of interest with an illuminator of the endoscope, the illuminator including an illumination right multi-band pass filter having right pass bands and an illumination left multi-band pass filter having left pass bands, the right pass bands being complements of the left pass bands; capturing, by an image capture device located on a folded substrate at a distal end of the endoscope, the stereoscopic three dimensional image including right and left images, the image capture device comprising a lens system including a right multi-band pass filter having the right pass bands and a left multi-band pass filter having the left pass bands, and a detector end facing the lens system and configured to obtain the right and left images, the folded substrate being folded into a U-shape having first and second legs; and processing the captured the right and left images by a processing circuit facing a proximal end of the endoscope behind the detector, wherein the folded substrate includes the detector at an outer side of the first leg facing the lens system and the processing circuit at an outer side of the second leg facing the proximal end. 16. The method of claim 15, wherein the illuminating act includes an act of receiving white light from a white light source configured to illuminate light guides from the proximal end of the endoscope. 17. The method of claim 15, wherein the capturing act includes an act of imaging the right image and the left image, one at a time, on substantially an entire area of the detector. 18. The method of claim 15, wherein the capturing act includes an act of simultaneously imaging the right image on a first portion of the detector and the left image on a second portion of the detector. 19. The method of claim 15, wherein the processing act includes providing video signals by the processing circuit to a display. 20. The method of claim 15, further comprising an act of displaying the processed right and left images a display.
An endoscope includes a housing with a distal end insertable into a cavity; an image capture device at the distal end to obtain 3D images, and process them to form a video signal; and a folded substrate folded into a U-shape having first and second legs. The image capture device includes a detector and a lens system with right and left multi-band pass filters having right pass bands that are complements of left pass bands. The lens system receives the 3D images including right and left images. The detector faces the lens system to obtain the right and left images. A processing circuit faces the proximal end behind the detector to process signals from the detector. The folded substrate includes the detector at an outer side of the first leg facing the lens system and the processing circuit at an outer side of the second leg facing the proximal end.1. An endoscope for providing a stereoscopic three dimensional image of a region of interest inside a body, the endoscope comprising: a housing having a distal end and a proximal end, the distal end being insertable into a cavity of the body; an image capture device at the distal end configured to obtain the stereoscopic three dimensional image of the region of interest, and process the stereoscopic three dimensional image to form a video signal; and a folded substrate folded into a U-shape having first and second legs; the image capture device comprising: a lens system including a right multi-band pass filter having right pass bands and a left multi-band pass filter having left pass bands, the right pass bands being complements of the left pass bands, the lens system receiving the stereoscopic three dimensional image including right and left images; and a detector facing the lens system and configured to obtain the right and left images, and processing circuit facing the proximal end behind the detector and configured to process signals from the detector; wherein the folded substrate includes the detector at an outer side of the first leg facing the lens system and the processing circuit at an outer side of the second leg facing the proximal end. 2. The endoscope of claim 1, further comprising an illuminator configured to illuminate the region of interest through an illumination multi-band pass filter having the right pass bands and the left pass bands. 3. The endoscope of claim 1, further comprising a connecting device between the image capture device and the proximal end, the connecting device being configured to connect the image capture device to an illumination source and a display, and to provide the video signals to the display for display of the optical images of the region of interest on the display. 4. The endoscope of claim 3, wherein the illumination source is configured to provide white light and the connecting device comprises light guides having illumination right and left multi-band pass filters, the light guides being configured to receive the white light and output right and left illuminations having colors that correspond to the right and left pass bands of the right and left multi-band pass filters. 5. The endoscope of claim 4, wherein the illumination right and left multi-band pass filters are located at one of entrance sides and exit sides of the light guides. 6. The endoscope of claim 1, wherein the lens system comprises a lens configured to image the right image and the left image, one at a time, on substantially an entire area of the detector. 7. The endoscope of claim 1, wherein the lens system comprises two lenses configured to simultaneously image the right image on a first portion of the detector, and image the left image on a second portion of the detector. 8. An endoscope system for providing a stereoscopic three dimensional image of a region of interest inside a body, the endoscope comprising: an illuminator configured to illuminate the region of interest; a housing having a distal end and a proximal end, the distal end being insertable into a cavity of the body; an image capture device at the distal end configured to obtain the stereoscopic three dimensional image of the region of interest illuminated by the illuminator, and process the stereoscopic three dimensional image to form a video signal; and a folded substrate folded into a U-shape having first and second legs; the image capture device comprising: a lens system including a right multi-band pass filter having right pass bands and a left multi-band pass filter having left pass bands, the right pass bands being complements of the left pass bands, the lens system receiving the stereoscopic three dimensional image including right and left images; and a detector facing the lens system and configured to obtain the right and left images, and processing circuit facing the proximal end behind the detector and configured to process signals from the detector; wherein the folded substrate includes the detector at an outer side of the first leg facing the lens system and the processing circuit at an outer side of the second leg facing the proximal end. 9. The endoscope system of claim 8, wherein the illuminator includes an illumination multi-band pass filter having the right pass bands and the left pass bands. 10. The endoscope system of claim 8, further comprising a display and a connecting device between the image capture device and the proximal end, the connecting device being configured to connect the image capture device to the illuminator and the display, and to provide the video signals to the display for display of the optical images of the region of interest on the display. 11. The endoscope system of claim 10, wherein the illuminator comprises a white light source for providing white light and the connecting device comprises light guides having illumination right and left multi-band pass filters, the light guides being configured to receive the white light and output right and left illuminations having colors that correspond to the right and left pass bands of the right and left multi-band pass filters. 12. The endoscope system of claim 11, wherein the illumination right and left multi-band pass filters are located at one of entrance sides and exit sides of the light guides. 13. The endoscope system of claim 8, wherein the lens system comprises a lens configured to image the right image and the left image, one at a time, on substantially an entire area of the detector. 14. The endoscope system of claim 8, wherein the lens system comprises two lenses configured to simultaneously image the right image on a first portion of the detector, and image the left image on a second portion of the detector. 15. A method for obtaining a stereoscopic three dimensional image of a region of interest inside a body from an endoscope, the method comprising acts of: illuminating the region of interest with an illuminator of the endoscope, the illuminator including an illumination right multi-band pass filter having right pass bands and an illumination left multi-band pass filter having left pass bands, the right pass bands being complements of the left pass bands; capturing, by an image capture device located on a folded substrate at a distal end of the endoscope, the stereoscopic three dimensional image including right and left images, the image capture device comprising a lens system including a right multi-band pass filter having the right pass bands and a left multi-band pass filter having the left pass bands, and a detector end facing the lens system and configured to obtain the right and left images, the folded substrate being folded into a U-shape having first and second legs; and processing the captured the right and left images by a processing circuit facing a proximal end of the endoscope behind the detector, wherein the folded substrate includes the detector at an outer side of the first leg facing the lens system and the processing circuit at an outer side of the second leg facing the proximal end. 16. The method of claim 15, wherein the illuminating act includes an act of receiving white light from a white light source configured to illuminate light guides from the proximal end of the endoscope. 17. The method of claim 15, wherein the capturing act includes an act of imaging the right image and the left image, one at a time, on substantially an entire area of the detector. 18. The method of claim 15, wherein the capturing act includes an act of simultaneously imaging the right image on a first portion of the detector and the left image on a second portion of the detector. 19. The method of claim 15, wherein the processing act includes providing video signals by the processing circuit to a display. 20. The method of claim 15, further comprising an act of displaying the processed right and left images a display.
2,400
9,310
9,310
16,209,774
2,495
A method and apparatus for analyzing a URL included in contents and displaying the analyzed result is provided. The method includes detecting a URL from contents, analyzing the URL, and displaying the analyzed result.
1. A mobile communication terminal, comprising: a touch screen; and at least one processor configured to: display, in a sender information display region of a user interface for a messenger application executable within the mobile communication terminal, information regarding other mobile communication terminal, display, in a contents input region of the user interface for the messenger application, a message input box for displaying at least some of user inputs, identify a uniform resource locator in a received message, display a first object associated with the uniform resource locator in the received message in a message display area of the user interface for the messenger application, wherein the first object is user-selectable, receive a user selection, on the touch screen, of the first object associated with the uniform resource locator, and in response to receiving the user selection of the first object associated with the uniform resource locator, control the messenger application to receive information relating to the identified uniform resource locator from a server that serves the identified uniform resource locator, to identify text information indicating the identified uniform resource locator based on the received information, and to display a second object comprising the identified text information in the message display area of the user interface for the messenger application. 2. The mobile communication terminal of claim 1, wherein the at least one processor is configured to verify whether at least one of “http://”, “https://”, “ftp://”, “irc://”, “gopher://”, “telnet://”, “nntp://”, and “worldwind://” is included in the uniform resource locator to identify the uniform resource locator in the received message. 3. The mobile communication terminal of claim 1, wherein the at least one processor is further configured to check for the identified uniform resource locator in a harmful site database stored in a memory or a server. 4. The mobile communication terminal of claim 1, wherein the at least one processor is further configured to display a user selection input for the uniform resource locator in the message display area. 5. The mobile communication terminal of claim 1, wherein the at least one processor is configured to: verify whether the identified uniform resource locator has been redirected based on an acknowledgement message received in response to a connection request; and when the identified uniform resource locator has been redirected, receive information relating to a final uniform resource location associated with the redirected identified uniform resource locator. 6. The mobile communication terminal of claim 1, wherein the at least one processer is configured to: verify whether a downloadable file is linked to the identified uniform resource locator; temporarily download the downloadable file to a partial area of a memory and verify at least one property of the downloaded file; and display a result comprising at least one verified property of the downloaded file. 7. The mobile communication terminal of claim 6, wherein the at least one property of the downloaded file comprises at least one of a name, a type, a capacity, a made date, or a corrected date of the downloaded file. 8. The mobile communication terminal of claim 6, wherein the at least one processor is configured to: verify whether the downloaded file is an installable file; verify a requested authority when installing the downloaded file; and display a result comprising the requested authority. 9. The mobile communication terminal of claim 8, wherein the at least one processor is configured to temporarily install the downloaded file and verify the requested authority when installing the downloaded file. 10. The mobile communication terminal of claim 1, wherein the at least one processor is further configured to receive the information relating to the uniform resource locator from the server corresponding to the uniform resource locator by receiving information on a provider of the uniform resource locator. 11. The mobile communication terminal of claim 1, wherein the receiving information relating to the identified uniform resource locator from the server that serves the identified uniform resource locator comprises identifying a redirected uniform resource locator that is redirected from the identified uniform resource locator and receiving information from a server that serves the redirected uniform resource locator. 12. The mobile communication terminal of claim 1, wherein the first object is displayed in a first message bubble, and wherein, when the second object is displayed in a second message bubble adjacent to the first message bubble, the at least one processor is configured to display a third message bubble into which the first message bubble is, in a shape, changed. 13. The mobile communication terminal of claim 12, wherein the second message bubble in which the second object is displayed is a message bubble that points to the identified uniform resource locator. 14. The mobile communication terminal of claim 1, wherein, in receiving the information relating to the identified uniform resource locator, the at least one processor is configured to access a web page associated with the identified uniform resource locator, and acquire information of the identified uniform resource locator included in a header of the accessed web page. 15. The mobile communication terminal of claim 1, wherein the at least one processor is configured to display, as the first object, an object capable of receiving a user input regarding the identified uniform resource locator. 16. The mobile communication terminal of claim 1, wherein the at least one processor is configured to receive information relating to the uniform resource locator by receiving information from a server specified by the identified uniform resource locator. 17. The mobile communication terminal of claim 1, wherein the at least one processor is configured to: identify the received uniform resource locator in the received message, wherein the received uniform resource locator is redirected to a final uniform resource locator, display the first object associated with the received, redirected uniform resource locator in the received message, in response to identifying the user selection of the first object associated with the uniform resource locator, receive information relating to a final uniform resource locator for the received, redirected uniform resource locator from a server corresponding to the final uniform resource locator, and display the second object based on the received information relating to the final uniform resource locator. 18. A method, comprising: displaying, in a sender information display region of a user interface for a messenger application executable within a mobile communication terminal, information regarding other mobile communication terminal; displaying, in a content input region of the user interface for the messenger application, a message input box for displaying at least some of user inputs; identifying a uniform resource locator in a received message; displaying a first object associated with the uniform resource locator in the received message in a message display area of the user interface for the messenger application, wherein the first object is user-selectable; receiving a user selection of the first object associated with the uniform resource locator; and in response to receiving the user selection of the first object associated with the uniform resource locator, controlling the messenger application to receive information relating to the identified uniform resource locator from a server that serves the identified uniform resource locator, identifying text information indicating the identified uniform resource locator based on the received information, and displaying a second object comprising the identified text information in the message display area of the user interface for the messenger application. 19. The method of claim 18, wherein receiving the information relating to the uniform resource locator from the server that serves the uniform resource locator further comprises receiving information on a provider of the uniform resource locator. 20. The method of claim 18, wherein receiving information relating to the uniform resource locator comprises receiving information from a server specified by the identified uniform resource locator.
A method and apparatus for analyzing a URL included in contents and displaying the analyzed result is provided. The method includes detecting a URL from contents, analyzing the URL, and displaying the analyzed result.1. A mobile communication terminal, comprising: a touch screen; and at least one processor configured to: display, in a sender information display region of a user interface for a messenger application executable within the mobile communication terminal, information regarding other mobile communication terminal, display, in a contents input region of the user interface for the messenger application, a message input box for displaying at least some of user inputs, identify a uniform resource locator in a received message, display a first object associated with the uniform resource locator in the received message in a message display area of the user interface for the messenger application, wherein the first object is user-selectable, receive a user selection, on the touch screen, of the first object associated with the uniform resource locator, and in response to receiving the user selection of the first object associated with the uniform resource locator, control the messenger application to receive information relating to the identified uniform resource locator from a server that serves the identified uniform resource locator, to identify text information indicating the identified uniform resource locator based on the received information, and to display a second object comprising the identified text information in the message display area of the user interface for the messenger application. 2. The mobile communication terminal of claim 1, wherein the at least one processor is configured to verify whether at least one of “http://”, “https://”, “ftp://”, “irc://”, “gopher://”, “telnet://”, “nntp://”, and “worldwind://” is included in the uniform resource locator to identify the uniform resource locator in the received message. 3. The mobile communication terminal of claim 1, wherein the at least one processor is further configured to check for the identified uniform resource locator in a harmful site database stored in a memory or a server. 4. The mobile communication terminal of claim 1, wherein the at least one processor is further configured to display a user selection input for the uniform resource locator in the message display area. 5. The mobile communication terminal of claim 1, wherein the at least one processor is configured to: verify whether the identified uniform resource locator has been redirected based on an acknowledgement message received in response to a connection request; and when the identified uniform resource locator has been redirected, receive information relating to a final uniform resource location associated with the redirected identified uniform resource locator. 6. The mobile communication terminal of claim 1, wherein the at least one processer is configured to: verify whether a downloadable file is linked to the identified uniform resource locator; temporarily download the downloadable file to a partial area of a memory and verify at least one property of the downloaded file; and display a result comprising at least one verified property of the downloaded file. 7. The mobile communication terminal of claim 6, wherein the at least one property of the downloaded file comprises at least one of a name, a type, a capacity, a made date, or a corrected date of the downloaded file. 8. The mobile communication terminal of claim 6, wherein the at least one processor is configured to: verify whether the downloaded file is an installable file; verify a requested authority when installing the downloaded file; and display a result comprising the requested authority. 9. The mobile communication terminal of claim 8, wherein the at least one processor is configured to temporarily install the downloaded file and verify the requested authority when installing the downloaded file. 10. The mobile communication terminal of claim 1, wherein the at least one processor is further configured to receive the information relating to the uniform resource locator from the server corresponding to the uniform resource locator by receiving information on a provider of the uniform resource locator. 11. The mobile communication terminal of claim 1, wherein the receiving information relating to the identified uniform resource locator from the server that serves the identified uniform resource locator comprises identifying a redirected uniform resource locator that is redirected from the identified uniform resource locator and receiving information from a server that serves the redirected uniform resource locator. 12. The mobile communication terminal of claim 1, wherein the first object is displayed in a first message bubble, and wherein, when the second object is displayed in a second message bubble adjacent to the first message bubble, the at least one processor is configured to display a third message bubble into which the first message bubble is, in a shape, changed. 13. The mobile communication terminal of claim 12, wherein the second message bubble in which the second object is displayed is a message bubble that points to the identified uniform resource locator. 14. The mobile communication terminal of claim 1, wherein, in receiving the information relating to the identified uniform resource locator, the at least one processor is configured to access a web page associated with the identified uniform resource locator, and acquire information of the identified uniform resource locator included in a header of the accessed web page. 15. The mobile communication terminal of claim 1, wherein the at least one processor is configured to display, as the first object, an object capable of receiving a user input regarding the identified uniform resource locator. 16. The mobile communication terminal of claim 1, wherein the at least one processor is configured to receive information relating to the uniform resource locator by receiving information from a server specified by the identified uniform resource locator. 17. The mobile communication terminal of claim 1, wherein the at least one processor is configured to: identify the received uniform resource locator in the received message, wherein the received uniform resource locator is redirected to a final uniform resource locator, display the first object associated with the received, redirected uniform resource locator in the received message, in response to identifying the user selection of the first object associated with the uniform resource locator, receive information relating to a final uniform resource locator for the received, redirected uniform resource locator from a server corresponding to the final uniform resource locator, and display the second object based on the received information relating to the final uniform resource locator. 18. A method, comprising: displaying, in a sender information display region of a user interface for a messenger application executable within a mobile communication terminal, information regarding other mobile communication terminal; displaying, in a content input region of the user interface for the messenger application, a message input box for displaying at least some of user inputs; identifying a uniform resource locator in a received message; displaying a first object associated with the uniform resource locator in the received message in a message display area of the user interface for the messenger application, wherein the first object is user-selectable; receiving a user selection of the first object associated with the uniform resource locator; and in response to receiving the user selection of the first object associated with the uniform resource locator, controlling the messenger application to receive information relating to the identified uniform resource locator from a server that serves the identified uniform resource locator, identifying text information indicating the identified uniform resource locator based on the received information, and displaying a second object comprising the identified text information in the message display area of the user interface for the messenger application. 19. The method of claim 18, wherein receiving the information relating to the uniform resource locator from the server that serves the uniform resource locator further comprises receiving information on a provider of the uniform resource locator. 20. The method of claim 18, wherein receiving information relating to the uniform resource locator comprises receiving information from a server specified by the identified uniform resource locator.
2,400
9,311
9,311
15,665,111
2,449
For a managed network, some embodiments provide a method for a set of service nodes in an active-active service node cluster in conjunction with a host computer hosting a destination data compute node (DCN) to improve the efficiency of directing a data message to a service node storing state information for the flow to which the data message belongs. a first service node receives a data message in a particular data message flow for which it does not maintain state information. The first service node then identifies a second service node to process the data message and forwards the data message to the second service node. The second service node sends state information for the particular data message flow to the first service node, for the first service node to use to process subsequent data messages in the particular data message flow.
1. For a cluster of service nodes that perform a service for different message flows, a method comprising: at a first service node, receiving a data message for a particular data message flow for which the first service node does not maintain state information; identifying a second service node to process the received data message; and forwarding the data message to the second service node, wherein the second service node processes the data message and sends state information for the particular data message flow to the first service node for the first service node to use to process subsequent data messages in the particular data message flow. 2. The method of claim 1, wherein the second service node forwards the data message along with information identifying a primary service node to a host computer on which the destination compute node executes, wherein return data messages are forwarded to the primary service node using the information identifying the primary service node. 3. The method of claim 2, wherein the primary service node is the first service node. 4. The method of claim 2, wherein the primary service node is the second service node. 5. The method of claim 1, wherein the data message is a first data message and the method further comprises: receiving a second data message in the particular data message flow after the first service node receives the state information; processing the second data message using the received state information; and forwarding the data message along with information identifying the first service node to a host computer on which the destination compute node executes for the host to use to forward return data messages to the first service node. 6. The method of claim 5, wherein the host computer replaces an entry in a reverse forwarding table that identified another service node in the service node cluster for return data messages in the particular data message flow with a new entry that identifies the first service node as the service node to which return data messages in the particular data message are forwarded. 7. The method of claim 1, wherein the data message is a particular data message, and a third service node in the service node cluster previously received a set of data messages in the particular data message flow, wherein the third service node maintained state information for the particular data message flow and processed data messages in the particular data message flow. 8. The method of claim 7, wherein the third service node received the set of data messages based on a first membership of the service node cluster; and the first service node received the particular data message based on a second, different membership of the service node cluster. 9. The method of claim 8, wherein identifying the second service node comprises identifying the second service node based on the first membership of the service node cluster, wherein the first membership of the service node cluster is the immediately previous membership to the second, different membership of the service node cluster. 10. The method of claim 8, wherein at least one of the second and third service node identifies a fourth service node in the service node cluster based on a consistent hash over the second, different service node cluster membership to which to replicate the state information for the particular data message flow. 11. A non-transitory machine readable medium storing a program for execution by a set of processing units of a first service node in a cluster of service nodes that perform a service for different message flows, the program comprising sets of instructions for: receiving a data message for a particular data message flow for which the first service node does not maintain state information; identifying a second service node to process the received data message; and forwarding the data message to the second service node, wherein the second service node processes the data message and sends state information for the particular data message flow to the first service node for the first service node to use to process subsequent data messages in the particular data message flow. 12. The non-transitory machine readable medium of claim 11, wherein the second service node forwards the data message along with information identifying a primary service node to a host computer on which the destination compute node executes, wherein return data messages are forwarded to the primary service node using the information identifying the primary service node. 13. The non-transitory machine readable medium of claim 12, wherein the primary service node is the first service node. 14. The non-transitory machine readable medium of claim 12, wherein the primary service node is the second service node. 15. The non-transitory machine readable medium of claim 11, wherein the data message is a first data message and the program further comprising sets of instructions for: receiving a second data message in the particular data message flow after the first service node receives the state information; processing the second data message using the received state information; and forwarding the data message along with information identifying the first service node to a host computer on which the destination compute node executes for the host to use to forward return data messages to the first service node. 16. The non-transitory machine readable medium of claim 15, wherein the host computer replaces an entry in a reverse forwarding table that identified another service node in the service node cluster for return data messages in the particular data message flow with a new entry that identifies the first service node as the service node to which return data messages in the particular data message are forwarded. 17. The non-transitory machine readable medium of claim 11, wherein the data message is a particular data message, and a third service node in the service node cluster previously received a set of data messages in the particular data message flow, wherein the third service node maintained state information for the particular data message flow and processed data messages in the particular data message flow. 18. The non-transitory machine readable medium of claim 17, wherein the third service node received the set of data messages based on a first membership of the service node cluster; and the first service node received the particular data message based on a second, different membership of the service node cluster. 19. The non-transitory machine readable medium of claim 18, wherein the set of instructions for identifying the second service node comprises a set of instructions for identifying the second service node based on the first membership of the service node cluster, wherein the first membership of the service node cluster is the immediately previous membership to the second, different membership of the service node cluster. 20. The non-transitory machine readable medium of claim 18, wherein at least one of the second and third service node identifies a fourth service node in the service node cluster based on a consistent hash over the second, different service node cluster membership to which to replicate the state information for the particular data message flow.
For a managed network, some embodiments provide a method for a set of service nodes in an active-active service node cluster in conjunction with a host computer hosting a destination data compute node (DCN) to improve the efficiency of directing a data message to a service node storing state information for the flow to which the data message belongs. a first service node receives a data message in a particular data message flow for which it does not maintain state information. The first service node then identifies a second service node to process the data message and forwards the data message to the second service node. The second service node sends state information for the particular data message flow to the first service node, for the first service node to use to process subsequent data messages in the particular data message flow.1. For a cluster of service nodes that perform a service for different message flows, a method comprising: at a first service node, receiving a data message for a particular data message flow for which the first service node does not maintain state information; identifying a second service node to process the received data message; and forwarding the data message to the second service node, wherein the second service node processes the data message and sends state information for the particular data message flow to the first service node for the first service node to use to process subsequent data messages in the particular data message flow. 2. The method of claim 1, wherein the second service node forwards the data message along with information identifying a primary service node to a host computer on which the destination compute node executes, wherein return data messages are forwarded to the primary service node using the information identifying the primary service node. 3. The method of claim 2, wherein the primary service node is the first service node. 4. The method of claim 2, wherein the primary service node is the second service node. 5. The method of claim 1, wherein the data message is a first data message and the method further comprises: receiving a second data message in the particular data message flow after the first service node receives the state information; processing the second data message using the received state information; and forwarding the data message along with information identifying the first service node to a host computer on which the destination compute node executes for the host to use to forward return data messages to the first service node. 6. The method of claim 5, wherein the host computer replaces an entry in a reverse forwarding table that identified another service node in the service node cluster for return data messages in the particular data message flow with a new entry that identifies the first service node as the service node to which return data messages in the particular data message are forwarded. 7. The method of claim 1, wherein the data message is a particular data message, and a third service node in the service node cluster previously received a set of data messages in the particular data message flow, wherein the third service node maintained state information for the particular data message flow and processed data messages in the particular data message flow. 8. The method of claim 7, wherein the third service node received the set of data messages based on a first membership of the service node cluster; and the first service node received the particular data message based on a second, different membership of the service node cluster. 9. The method of claim 8, wherein identifying the second service node comprises identifying the second service node based on the first membership of the service node cluster, wherein the first membership of the service node cluster is the immediately previous membership to the second, different membership of the service node cluster. 10. The method of claim 8, wherein at least one of the second and third service node identifies a fourth service node in the service node cluster based on a consistent hash over the second, different service node cluster membership to which to replicate the state information for the particular data message flow. 11. A non-transitory machine readable medium storing a program for execution by a set of processing units of a first service node in a cluster of service nodes that perform a service for different message flows, the program comprising sets of instructions for: receiving a data message for a particular data message flow for which the first service node does not maintain state information; identifying a second service node to process the received data message; and forwarding the data message to the second service node, wherein the second service node processes the data message and sends state information for the particular data message flow to the first service node for the first service node to use to process subsequent data messages in the particular data message flow. 12. The non-transitory machine readable medium of claim 11, wherein the second service node forwards the data message along with information identifying a primary service node to a host computer on which the destination compute node executes, wherein return data messages are forwarded to the primary service node using the information identifying the primary service node. 13. The non-transitory machine readable medium of claim 12, wherein the primary service node is the first service node. 14. The non-transitory machine readable medium of claim 12, wherein the primary service node is the second service node. 15. The non-transitory machine readable medium of claim 11, wherein the data message is a first data message and the program further comprising sets of instructions for: receiving a second data message in the particular data message flow after the first service node receives the state information; processing the second data message using the received state information; and forwarding the data message along with information identifying the first service node to a host computer on which the destination compute node executes for the host to use to forward return data messages to the first service node. 16. The non-transitory machine readable medium of claim 15, wherein the host computer replaces an entry in a reverse forwarding table that identified another service node in the service node cluster for return data messages in the particular data message flow with a new entry that identifies the first service node as the service node to which return data messages in the particular data message are forwarded. 17. The non-transitory machine readable medium of claim 11, wherein the data message is a particular data message, and a third service node in the service node cluster previously received a set of data messages in the particular data message flow, wherein the third service node maintained state information for the particular data message flow and processed data messages in the particular data message flow. 18. The non-transitory machine readable medium of claim 17, wherein the third service node received the set of data messages based on a first membership of the service node cluster; and the first service node received the particular data message based on a second, different membership of the service node cluster. 19. The non-transitory machine readable medium of claim 18, wherein the set of instructions for identifying the second service node comprises a set of instructions for identifying the second service node based on the first membership of the service node cluster, wherein the first membership of the service node cluster is the immediately previous membership to the second, different membership of the service node cluster. 20. The non-transitory machine readable medium of claim 18, wherein at least one of the second and third service node identifies a fourth service node in the service node cluster based on a consistent hash over the second, different service node cluster membership to which to replicate the state information for the particular data message flow.
2,400
9,312
9,312
15,917,997
2,483
An assembly includes a housing having a chamber. A sensor window is defined by the housing. The sensor window has a field of view. A pressure source is in fluid communication with the chamber. An object-detection sensor is in the chamber and is adjacent the sensor window. The housing has a port in fluid communication with the chamber and the port faces the field of view.
1. An assembly, comprising; a housing having a chamber; a sensor window defined by the housing and having a field of view; a pressure source in fluid communication with the chamber; an object-detection sensor in the chamber adjacent the sensor window; and the housing including a port in fluid communication with the chamber and facing the field of view. 2. The assembly as set forth in claim 1, wherein the housing includes an air inlet and a flow path extending from the air inlet to the port and across the object-detection sensor. 3. The assembly as set forth in claim 2, wherein the object-detection sensor includes a heat sink in the flow path. 4. The assembly as set forth in claim 1, wherein the housing includes a shield extending outwardly relative to the chamber, the shield being adjacent the sensor window. 5. The assembly as set forth in claim 4, wherein the shield and the sensor window are disposed in a horizontal plane. 6. The assembly as set forth in claim 4, wherein the port is in the shield. 7. The assembly as set forth in claim 1, further comprising a second sensor window having a field of view, a second object-detection sensor in the chamber adjacent the second sensor window, and a second port in fluid communication with the chamber and facing the field of view of the second sensor window. 8. The assembly as set forth in claim 7, wherein the housing includes an air inlet and a flow path from the air inlet to the port and the second port, the flow path extending across the object-detection sensor and the second object-detection sensor. 9. The assembly as set forth in claim 7, wherein the housing includes dividers that separate the object-detection sensor and the second object-detection sensor. 10. The assembly as set forth in claim 9, wherein the dividers separate the chamber into a cavity and a second cavity, the object-detection sensor being in the cavity, and the second object-detection sensor being in the second cavity. 11. The assembly as set forth in claim 10, wherein the housing includes an air inlet and a flow path from the air inlet to the port and the second port, the flow path extending into the cavity and the second cavity and across the object-detection sensor and the second object-detection sensor. 12. The assembly as set forth in claim 1, wherein the pressure source is in the chamber. 13. The assembly as set forth in claim 1, wherein the pressure source is in the chamber, and the object-detection sensor is between the pressure source and the port. 14. The assembly as set forth in claim 13, wherein the housing includes an air inlet, and the pressure source is between the air inlet and the object-detection sensor. 15. The assembly as set forth in claim 1, wherein the object-detection sensor is supported by the housing. 16. The assembly as set forth in claim 1, wherein the object-detection sensor is a camera. 17. The assembly as set forth in claim 1, wherein the object-detection sensor is a lidar system.
An assembly includes a housing having a chamber. A sensor window is defined by the housing. The sensor window has a field of view. A pressure source is in fluid communication with the chamber. An object-detection sensor is in the chamber and is adjacent the sensor window. The housing has a port in fluid communication with the chamber and the port faces the field of view.1. An assembly, comprising; a housing having a chamber; a sensor window defined by the housing and having a field of view; a pressure source in fluid communication with the chamber; an object-detection sensor in the chamber adjacent the sensor window; and the housing including a port in fluid communication with the chamber and facing the field of view. 2. The assembly as set forth in claim 1, wherein the housing includes an air inlet and a flow path extending from the air inlet to the port and across the object-detection sensor. 3. The assembly as set forth in claim 2, wherein the object-detection sensor includes a heat sink in the flow path. 4. The assembly as set forth in claim 1, wherein the housing includes a shield extending outwardly relative to the chamber, the shield being adjacent the sensor window. 5. The assembly as set forth in claim 4, wherein the shield and the sensor window are disposed in a horizontal plane. 6. The assembly as set forth in claim 4, wherein the port is in the shield. 7. The assembly as set forth in claim 1, further comprising a second sensor window having a field of view, a second object-detection sensor in the chamber adjacent the second sensor window, and a second port in fluid communication with the chamber and facing the field of view of the second sensor window. 8. The assembly as set forth in claim 7, wherein the housing includes an air inlet and a flow path from the air inlet to the port and the second port, the flow path extending across the object-detection sensor and the second object-detection sensor. 9. The assembly as set forth in claim 7, wherein the housing includes dividers that separate the object-detection sensor and the second object-detection sensor. 10. The assembly as set forth in claim 9, wherein the dividers separate the chamber into a cavity and a second cavity, the object-detection sensor being in the cavity, and the second object-detection sensor being in the second cavity. 11. The assembly as set forth in claim 10, wherein the housing includes an air inlet and a flow path from the air inlet to the port and the second port, the flow path extending into the cavity and the second cavity and across the object-detection sensor and the second object-detection sensor. 12. The assembly as set forth in claim 1, wherein the pressure source is in the chamber. 13. The assembly as set forth in claim 1, wherein the pressure source is in the chamber, and the object-detection sensor is between the pressure source and the port. 14. The assembly as set forth in claim 13, wherein the housing includes an air inlet, and the pressure source is between the air inlet and the object-detection sensor. 15. The assembly as set forth in claim 1, wherein the object-detection sensor is supported by the housing. 16. The assembly as set forth in claim 1, wherein the object-detection sensor is a camera. 17. The assembly as set forth in claim 1, wherein the object-detection sensor is a lidar system.
2,400
9,313
9,313
15,495,608
2,421
Viewing a program and seamlessly transitioning between devices in multiple locations while enabling movement between the multiple locations, including: determining a parameter to be monitored to provide seamless transitions between a first device and a second device; monitoring the parameter against a preset threshold; receiving the program from a content provider; and routing the program to one of: the first device when the parameter is below the preset threshold; or the second device when the parameter is above the preset threshold.
1. A method for viewing a program and seamlessly transitioning between devices in multiple locations, the method comprising: determining a parameter to be monitored to provide seamless transitions between a first device and a second device; monitoring the parameter against a preset threshold; receiving the program from a content provider; and routing the program to one of: the first device when the parameter is below the preset threshold; or the second device when the parameter is above the preset threshold. 2. The method of claim 1, wherein the parameter includes a distance measure between the first device and the second device. 3. The method of claim 1, further comprising setting the preset threshold to a fixed distance. 4. The method of claim 1, further comprising pausing the program on the second device when the parameter is below the preset threshold. 5. The method of claim 1, further comprising pausing the program on the first device when the parameter is above the preset threshold. 6. The method of claim 1, wherein receiving the program from the content provider comprises streaming the program from the content provider to the first or second device. 7. The method of claim 1, wherein routing the program to the first device comprises pausing the program on the second device and starting the program on the first device from a point in the program where the program was paused on the second device. 8. The method of claim 1, wherein routing the program to the second device comprises pausing the program on the first device and starting the program on the second device from a point in the program where the program was paused on the first device. 9. A system for viewing a program and seamlessly transitioning between devices while enabling movement between multiple locations, the system comprising: a plurality of devices including a first device and a second device, the plurality of devices configured to be located within at least one of the multiple locations; and a parameter monitor configured to determine and monitor a parameter to be monitored to provide seamless transitions between the first device and the second device against a preset threshold, to receive the program from a content provider, and to route the program to one of: the first device when the parameter is below the preset threshold; or the second device when the parameter is above the preset threshold. 10. The system of claim 9, wherein the parameter includes a distance measure between the first device and the second device. 11. The system of claim 9, wherein the parameter monitor is a stand-alone device. 12. The system of claim 9, wherein the parameter monitor is partially or wholly included within the first or second device. 13. The system of claim 9, wherein the parameter monitor is wirelessly coupled to the first device and the second device. 14. The system of claim 9, wherein the first device is a fixed device including a television set and the second device is a mobile device. 15. An apparatus for viewing a program and seamlessly transitioning between devices in multiple locations while enabling movement between the multiple locations, the apparatus comprising: means for determining a parameter to be monitored to provide seamless transitions between a first device and a second device; means for monitoring the parameter against a preset threshold; means for receiving the program from a content provider; and means for routing the program to one of: the first device when the parameter is below the preset threshold; or the second device when the parameter is above the preset threshold. 16. The apparatus of claim 15, wherein the means for routing the program to the first device comprises means for pausing the program on the second device and starting the program on the first device from a point in the program where the program was paused on the second device. 17. The apparatus of claim 15, wherein the means for routing the program to the second device comprises means for pausing the program on the first device and starting the program on the second device from a point in the program where the program was paused on the first device. 18. The apparatus of claim 15, wherein the means for determining a parameter used to provide seamless transitions comprises means for determining a need for transitioning the viewing of the program from the first device to the second device. 19. The apparatus of claim 15, wherein the means for monitoring the parameter against a preset threshold comprises means for monitoring a relative distance between the first device and the second device. 20. The apparatus of claim 15, wherein the means for monitoring the parameter against a preset threshold comprises means for monitoring an absolute position of the viewer.
Viewing a program and seamlessly transitioning between devices in multiple locations while enabling movement between the multiple locations, including: determining a parameter to be monitored to provide seamless transitions between a first device and a second device; monitoring the parameter against a preset threshold; receiving the program from a content provider; and routing the program to one of: the first device when the parameter is below the preset threshold; or the second device when the parameter is above the preset threshold.1. A method for viewing a program and seamlessly transitioning between devices in multiple locations, the method comprising: determining a parameter to be monitored to provide seamless transitions between a first device and a second device; monitoring the parameter against a preset threshold; receiving the program from a content provider; and routing the program to one of: the first device when the parameter is below the preset threshold; or the second device when the parameter is above the preset threshold. 2. The method of claim 1, wherein the parameter includes a distance measure between the first device and the second device. 3. The method of claim 1, further comprising setting the preset threshold to a fixed distance. 4. The method of claim 1, further comprising pausing the program on the second device when the parameter is below the preset threshold. 5. The method of claim 1, further comprising pausing the program on the first device when the parameter is above the preset threshold. 6. The method of claim 1, wherein receiving the program from the content provider comprises streaming the program from the content provider to the first or second device. 7. The method of claim 1, wherein routing the program to the first device comprises pausing the program on the second device and starting the program on the first device from a point in the program where the program was paused on the second device. 8. The method of claim 1, wherein routing the program to the second device comprises pausing the program on the first device and starting the program on the second device from a point in the program where the program was paused on the first device. 9. A system for viewing a program and seamlessly transitioning between devices while enabling movement between multiple locations, the system comprising: a plurality of devices including a first device and a second device, the plurality of devices configured to be located within at least one of the multiple locations; and a parameter monitor configured to determine and monitor a parameter to be monitored to provide seamless transitions between the first device and the second device against a preset threshold, to receive the program from a content provider, and to route the program to one of: the first device when the parameter is below the preset threshold; or the second device when the parameter is above the preset threshold. 10. The system of claim 9, wherein the parameter includes a distance measure between the first device and the second device. 11. The system of claim 9, wherein the parameter monitor is a stand-alone device. 12. The system of claim 9, wherein the parameter monitor is partially or wholly included within the first or second device. 13. The system of claim 9, wherein the parameter monitor is wirelessly coupled to the first device and the second device. 14. The system of claim 9, wherein the first device is a fixed device including a television set and the second device is a mobile device. 15. An apparatus for viewing a program and seamlessly transitioning between devices in multiple locations while enabling movement between the multiple locations, the apparatus comprising: means for determining a parameter to be monitored to provide seamless transitions between a first device and a second device; means for monitoring the parameter against a preset threshold; means for receiving the program from a content provider; and means for routing the program to one of: the first device when the parameter is below the preset threshold; or the second device when the parameter is above the preset threshold. 16. The apparatus of claim 15, wherein the means for routing the program to the first device comprises means for pausing the program on the second device and starting the program on the first device from a point in the program where the program was paused on the second device. 17. The apparatus of claim 15, wherein the means for routing the program to the second device comprises means for pausing the program on the first device and starting the program on the second device from a point in the program where the program was paused on the first device. 18. The apparatus of claim 15, wherein the means for determining a parameter used to provide seamless transitions comprises means for determining a need for transitioning the viewing of the program from the first device to the second device. 19. The apparatus of claim 15, wherein the means for monitoring the parameter against a preset threshold comprises means for monitoring a relative distance between the first device and the second device. 20. The apparatus of claim 15, wherein the means for monitoring the parameter against a preset threshold comprises means for monitoring an absolute position of the viewer.
2,400
9,314
9,314
16,206,237
2,444
Examples of services described herein expose an application programming interface (API) which may return the run-time configuration information. In this manner, software external to the service (e.g., an orchestrator) may query the service to determine the run-time configuration information, then provide both the initial configuration information known to the external software and the run-time configuration information to an Internet-facing gateway. Examples described herein may accordingly avoid or reduce instances of an upgrade dependency. When the service is upgraded, the run-time configuration information may be obtained by calling the API without a need to also upgrade the software external to the service.
1. A system comprising: a service-providing entity hosted by a computing system, wherein the service-providing entity is configured to expose a configuration application programming interface (API), and wherein the service-providing entity is configured to provide run-time configuration information generated at a time the service-providing entity is setup, upgraded, or combinations thereof; and an orchestrator system configured to administer the service-providing entity, the orchestrator system configured to query the configuration API and provide a first set of configuration information for the service-providing entity and the run-time configuration information to an Internet-facing gateway to allow connections to the service-providing entity from an Internet through the Internet-facing gateway. 2. The system of claim 1, wherein the orchestrator system is within a trusted network, the service-providing entity is outside the trusted network, and wherein the Internet-facing gateway is configured to communicate with the trusted network. 3. The system of claim 1, wherein the orchestrator system comprises a data center manager, the data center manager configured to administer multiple service providing entities from multiple tenants of a data center. 4. The system of claim 3, wherein the service-providing entity is associated with a single tenant of the data center. 5. The system of claim 1, wherein the run-time configuration information comprises a domain name, and IP address, or combinations thereof. 6. The system of claim 1, wherein the first set of configuration information comprises an amount of allocated storage, software versions associated with the service-providing entity, or combinations thereof. 7. The system of claim 1, wherein the service-providing entity comprises a controller virtual machine, the controller virtual machine in a cluster with other controller virtual machines hosted by other nodes of the cluster, the controller virtual machine mediating requests to a storage pool shared among the cluster. 8. A method comprising: determining, at an orchestrator, a first set of configuration information for a service-providing entity created by the orchestrator; determining, responsive to the request of the orchestrator, run-time configuration information at the service-providing entity; querying, by the orchestrator, a configuration application programming interface (API) exposed by the service-providing entity, to obtain the run-time configuration information; providing, by the orchestrator, the first set of configuration information and the run-time configuration information to an Internet-facing gateway; and establishing a tunnel between the service-providing entity and the Internet-facing gateway for communication of data between the service-providing entity and the Internet-facing gateway. 9. The method of claim 8, further comprising, allowing user access to the service-providing entity through the Internet-facing gateway. 10. The method of claim 8, further comprising querying the configuration API to obtain updated run-time configuration information, wherein the service-providing entity is upgraded responsive to a command from the orchestrator including, at the service-providing entity, generating updated run-time configuration information. 11. The method of claim 8, further comprising removing, at the request of the orchestrator, the tunnel responsive to a received notification of elimination of the service-providing entity received at the orchestrator. 12. The method of claim 11, wherein said receiving notification of elimination of the service-providing entity comprises receiving notification of elimination of a tenant of a data center, the tenant associated with the service-providing entity. 13. The method of claim 11, wherein said removing comprises removing the run-time configuration information from the Internet-facing gateway. 14. The method of claim 8, wherein the service-providing entity comprises a controller virtual machine, the controller virtual machine forming a cluster with other controller virtual machines hosted by other nodes of the cluster, the controller virtual machine mediating requests to a storage pool shared among the cluster. 15. A node of a cluster in a data center, the node comprising: at least one processor; memory encoded with executable instructions which, when executed by the at least one processor cause the node to provide a service including a configuration application programming interface (API), wherein: the configuration API is configured to provide run-time configuration information responsive to a query from an orchestrator of the data center; and the service is configured to communicate data to an Internet-facing gateway specified by the orchestrator through a tunnel established by the orchestrator using the run-time configuration information and additional configuration information determined by the orchestrator. 16. The node of claim 15, wherein the orchestrator is a multi-tenant orchestrator configured to service multiple tenants of the data center. 17. The node of claim 15, wherein the node is a tenant-specific node, associated with a single tenant of the data center. 18. The node of claim 15, wherein the API is configured to provide a j son template including the run-time configuration information. 19. The node of claim 18, wherein the orchestrator is configured to call the Internet-facing gateway with an extended payload including the run-time configuration information. 20. The node of claim 18, wherein the run-time configuration information includes information used in providing a DNS mapping for the service. 21. At least one non-transitory computer readable media encoded with instructions for implementing an orchestrator, the instructions comprising instructions for: determining a first set of configuration information for a service-providing entity created by the orchestrator; requesting run-time configuration information from an application programming interface (API) exposed by the service-providing entity; providing the first set of configuration information and the run-time configuration information to an Internet-facing gateway; and establishing a tunnel between the service-providing entity and the Internet-facing gateway for communication of data between the service-providing entity and the Internet-facing gateway. 22. The at least one non-transitory computer readable media of claim 21, further encoded with instructions for allowing user access to the service-providing entity through the Internet-facing gateway. 23. The at least one non-transitory computer readable media of claim 21, wherein the run-time configuration information comprises a domain name, and IP address, or combinations thereof.
Examples of services described herein expose an application programming interface (API) which may return the run-time configuration information. In this manner, software external to the service (e.g., an orchestrator) may query the service to determine the run-time configuration information, then provide both the initial configuration information known to the external software and the run-time configuration information to an Internet-facing gateway. Examples described herein may accordingly avoid or reduce instances of an upgrade dependency. When the service is upgraded, the run-time configuration information may be obtained by calling the API without a need to also upgrade the software external to the service.1. A system comprising: a service-providing entity hosted by a computing system, wherein the service-providing entity is configured to expose a configuration application programming interface (API), and wherein the service-providing entity is configured to provide run-time configuration information generated at a time the service-providing entity is setup, upgraded, or combinations thereof; and an orchestrator system configured to administer the service-providing entity, the orchestrator system configured to query the configuration API and provide a first set of configuration information for the service-providing entity and the run-time configuration information to an Internet-facing gateway to allow connections to the service-providing entity from an Internet through the Internet-facing gateway. 2. The system of claim 1, wherein the orchestrator system is within a trusted network, the service-providing entity is outside the trusted network, and wherein the Internet-facing gateway is configured to communicate with the trusted network. 3. The system of claim 1, wherein the orchestrator system comprises a data center manager, the data center manager configured to administer multiple service providing entities from multiple tenants of a data center. 4. The system of claim 3, wherein the service-providing entity is associated with a single tenant of the data center. 5. The system of claim 1, wherein the run-time configuration information comprises a domain name, and IP address, or combinations thereof. 6. The system of claim 1, wherein the first set of configuration information comprises an amount of allocated storage, software versions associated with the service-providing entity, or combinations thereof. 7. The system of claim 1, wherein the service-providing entity comprises a controller virtual machine, the controller virtual machine in a cluster with other controller virtual machines hosted by other nodes of the cluster, the controller virtual machine mediating requests to a storage pool shared among the cluster. 8. A method comprising: determining, at an orchestrator, a first set of configuration information for a service-providing entity created by the orchestrator; determining, responsive to the request of the orchestrator, run-time configuration information at the service-providing entity; querying, by the orchestrator, a configuration application programming interface (API) exposed by the service-providing entity, to obtain the run-time configuration information; providing, by the orchestrator, the first set of configuration information and the run-time configuration information to an Internet-facing gateway; and establishing a tunnel between the service-providing entity and the Internet-facing gateway for communication of data between the service-providing entity and the Internet-facing gateway. 9. The method of claim 8, further comprising, allowing user access to the service-providing entity through the Internet-facing gateway. 10. The method of claim 8, further comprising querying the configuration API to obtain updated run-time configuration information, wherein the service-providing entity is upgraded responsive to a command from the orchestrator including, at the service-providing entity, generating updated run-time configuration information. 11. The method of claim 8, further comprising removing, at the request of the orchestrator, the tunnel responsive to a received notification of elimination of the service-providing entity received at the orchestrator. 12. The method of claim 11, wherein said receiving notification of elimination of the service-providing entity comprises receiving notification of elimination of a tenant of a data center, the tenant associated with the service-providing entity. 13. The method of claim 11, wherein said removing comprises removing the run-time configuration information from the Internet-facing gateway. 14. The method of claim 8, wherein the service-providing entity comprises a controller virtual machine, the controller virtual machine forming a cluster with other controller virtual machines hosted by other nodes of the cluster, the controller virtual machine mediating requests to a storage pool shared among the cluster. 15. A node of a cluster in a data center, the node comprising: at least one processor; memory encoded with executable instructions which, when executed by the at least one processor cause the node to provide a service including a configuration application programming interface (API), wherein: the configuration API is configured to provide run-time configuration information responsive to a query from an orchestrator of the data center; and the service is configured to communicate data to an Internet-facing gateway specified by the orchestrator through a tunnel established by the orchestrator using the run-time configuration information and additional configuration information determined by the orchestrator. 16. The node of claim 15, wherein the orchestrator is a multi-tenant orchestrator configured to service multiple tenants of the data center. 17. The node of claim 15, wherein the node is a tenant-specific node, associated with a single tenant of the data center. 18. The node of claim 15, wherein the API is configured to provide a j son template including the run-time configuration information. 19. The node of claim 18, wherein the orchestrator is configured to call the Internet-facing gateway with an extended payload including the run-time configuration information. 20. The node of claim 18, wherein the run-time configuration information includes information used in providing a DNS mapping for the service. 21. At least one non-transitory computer readable media encoded with instructions for implementing an orchestrator, the instructions comprising instructions for: determining a first set of configuration information for a service-providing entity created by the orchestrator; requesting run-time configuration information from an application programming interface (API) exposed by the service-providing entity; providing the first set of configuration information and the run-time configuration information to an Internet-facing gateway; and establishing a tunnel between the service-providing entity and the Internet-facing gateway for communication of data between the service-providing entity and the Internet-facing gateway. 22. The at least one non-transitory computer readable media of claim 21, further encoded with instructions for allowing user access to the service-providing entity through the Internet-facing gateway. 23. The at least one non-transitory computer readable media of claim 21, wherein the run-time configuration information comprises a domain name, and IP address, or combinations thereof.
2,400
9,315
9,315
16,390,801
2,495
Disclosed herein is a method for detection of a cyber-threat to a computer system. The method is arranged to be performed by a processing apparatus. The method comprises receiving input data associated with a first entity associated with the computer system, deriving metrics from the input data, the metrics representative of characteristics of the received input data, analysing the metrics using one or more models, and determining, in accordance with the analysed metrics and a model of normal behavior of the first entity, a cyber-threat risk parameter indicative of a likelihood of a cyber-threat. A computer readable medium, a computer program and a threat detection system are also disclosed.
1-22. (canceled) 23. A method for detection of a cyber-threat to a computer system, the method arranged to be performed by one or more processing apparatuses, the method comprising: receiving input data associated with a first entity associated with the computer system and a second entity associated with the computer system; deriving from the received input data metrics representative of characteristics of the received input data; analyzing the derived metrics using a first self-learning model trained on a normal behavior of at least the first entity; analyzing one or more causal links between data associated with the first entity and data associated with the second entity; comparing the analyzed metrics to parameters that correspond to the normal behavior of at least the first entity; determining, in accordance with the analyzed derived metrics and the causal link, a cyber-threat risk parameter indicative of a likelihood of a cyber-threat. 24. The method according to claim 1, further comprising: identifying behavior deviating from a normal behavior of at least the first entity, where the first self-learning model trained on the normal behavior at least uses unsupervised learning; and building a chain of behavior including two or more causal links between data identifying the behavior deviating from the normal behavior associated with the first entity and data associated with the second entity to detect the cyber-threat. 25. The method according to claim 1, further comprising: where the modelled behavior in the first model of the first entity includes at least one of detecting a change in a pattern in any of 1) information, 2) activity, or a 3) combination of both in the computer system in order to be able to detect both a change in behavior of a user using the computing system as well as a change in behavior of a device in the computing system, where the first entity is the device in the computing system and the device's behavior is compared to the normal behavior of at least the first entity, and the second entity is the user of the computing system and the user's activities are compared to a normal behavior of at least the second entity. 26. The method according to claim 1, further comprising: predicting an expected behavior of the first entity of the computing system based on the first self-learning model trained on normal behavior; and wherein determining the cyber-threat risk parameter comprises comparing the analyzed, derived metrics with the predicted expected behavior and comparing whether parameters of the analyzed, derived metrics fall outside the parameters set by a threat parameter benchmark. 27. The method according to claim 1, where a normal behavior threshold is used by the first model as a moving benchmark of parameters that correspond to a normal pattern of life for the computing system. 28. The method according to claim 27, where the first self-learning model of normal behavior is updated when new input data is received that is deemed within the limits of normal behavior, where a normal behavior threshold is used by the first self-learning model as a moving benchmark of parameters that correspond to a normal pattern of life for the first entity, and the normal behavior threshold is varied according to the updated changes in the computer system allowing the model to spot behavior on the computing system that falls outside the parameters set by the moving benchmark. 29. The method according to claim 1, further comprising: using a second self-learning model trained on a normal behavior of at least the second entity to determine what is normal behavior for at least the second entity, using a third model trained to analyze data for detecting a first type of threat, and using a fourth model trained to analyze data for detecting a second type of threat. 30. The method according to claim 1, wherein the cyber-threat risk parameter is a probability of the likelihood of a threat determined using a recursive Bayesian estimation. 31. The method according to claim 30, further comprising: dynamically assigning recurring time cycles to a normal behavior threshold. 32. A non-transitory computer readable medium comprising computer readable code operable, when executed by one or more processing apparatuses in the computer system to instruct a computing device to perform the method of claim 1. 33. A threat detection system, comprising: at least one or more ports configured to receive input data associated with a first entity associated with a computer system and a second entity associated with the computer system; a non-transitory memory configured to store a first self-learning model trained on a normal behavior of at least the first entity and a computer readable code; and one or more processors configured to execute the computer readable code to derive from the received input data metrics representative of characteristics of the received input data, to analyze the derived metrics using a first self-learning model trained on a normal behavior of at least the first entity, to analyze one or more causal links between data associated with the first entity and data associated with the second entity, to comparing the analyzed metrics to parameters that correspond to the normal behavior of at least the first entity, and to determine, in accordance with the analyzed derived metrics and the causal link, a cyber-threat risk parameter indicative of a likelihood of a cyber-threat. 34. The threat detection system to claim 11, wherein the processor is further configured to execute the computer readable code to identify behavior deviating from the normal behavior of at least the first entity and to build a chain of behavior applying at least two or more causal links to detect the cyber-threat. 35. The threat detection system to claim 11, wherein the processor is further configured to execute the computer readable code to analyze the derived metrics using a second self-learning model trained on a normal behavior of at least the second entity, to use a third self-learning model trained on a first type of threat, and to use a third self-learning model trained on a second type of threat. 36. The threat detection system to claim 11, wherein the processor is further configured to execute the computer readable code to predict an expected behavior of the first entity of the computing system based on the first self-learning model trained on normal behavior; and wherein determining the cyber-threat risk parameter comprises comparing the analyzed, derived metrics with the predicted expected behavior and comparing whether parameters of the analyzed, derived metrics fall outside the parameters set by a threat parameter benchmark. 37. The threat detection system to claim 11, wherein a normal behavior threshold is used by the first model as a moving benchmark of parameters that correspond to a normal pattern of life for the computing system, where the first self-learning model of normal behavior is updated when new input data is received that is deemed within the limits of normal behavior. 38. The threat detection system to claim 11, where the modelled behavior in the first model of the first entity includes at least one of detecting a change in a pattern in any of 1) information, 2) activity, or a 3) combination of both in the computer system in order to be able to detect both a change in behavior of a user using the computing system as well as a change in behavior of a device in the computing system, where the first entity is the device in the computing system and the device's behavior is compared to the normal behavior of at least the first entity, and the second entity is the user of the computing system and the user's activities are compared to a normal behavior of at least the second entity. 39. The threat detection system to claim 11, wherein the derived metrics are network traffic related metrics associated with activity of the first entity on the computer system reflecting a usage of the computer system by the first entity over a period of time. 40. The threat detection system to claim 11, wherein the cyber-threat risk parameter is a probability of the likelihood of a threat determined using a recursive Bayesian estimation, and where the processor is further configured to execute the computer readable code to dynamically assign recurring time cycles to a normal behavior threshold. 41. The threat detection system to claim 11, wherein results of the cyber-threat risk parameter are projected on a 3D graphical user interface that conveys cyber threats across a packet flow and connection topology corresponding to the computing system. 42. A network, comprising: at least one network switch; multiple computing devices operable by users of the network; a threat detection system that includes at least one or more ports configured to receive input data associated with a first entity associated with a computer system and a second entity associated with the computer system; a non-transitory memory configured to store a first self-learning model trained on a normal behavior of at least the first entity and a computer readable code; and a processor configured to execute the computer readable code to derive from the received input data metrics representative of characteristics of the received input data, to analyze the derived metrics using a first self-learning model trained on a normal behavior of at least the first entity, to analyze one or more causal links between data associated with the first entity and data associated with the second entity, and to determine, in accordance with the analyzed derived metrics and the causal link, a cyber-threat risk parameter indicative of a likelihood of a cyber-threat; and wherein the threat detection system leverages an improvement in the device by identifying cyber-threats to improve performance by the target device by containing the detected threat and minimizing an amount of CPU cycles, memory space, and power consumed by that detected threat in the network entity when the detected threat is contained by the initiated actions.
Disclosed herein is a method for detection of a cyber-threat to a computer system. The method is arranged to be performed by a processing apparatus. The method comprises receiving input data associated with a first entity associated with the computer system, deriving metrics from the input data, the metrics representative of characteristics of the received input data, analysing the metrics using one or more models, and determining, in accordance with the analysed metrics and a model of normal behavior of the first entity, a cyber-threat risk parameter indicative of a likelihood of a cyber-threat. A computer readable medium, a computer program and a threat detection system are also disclosed.1-22. (canceled) 23. A method for detection of a cyber-threat to a computer system, the method arranged to be performed by one or more processing apparatuses, the method comprising: receiving input data associated with a first entity associated with the computer system and a second entity associated with the computer system; deriving from the received input data metrics representative of characteristics of the received input data; analyzing the derived metrics using a first self-learning model trained on a normal behavior of at least the first entity; analyzing one or more causal links between data associated with the first entity and data associated with the second entity; comparing the analyzed metrics to parameters that correspond to the normal behavior of at least the first entity; determining, in accordance with the analyzed derived metrics and the causal link, a cyber-threat risk parameter indicative of a likelihood of a cyber-threat. 24. The method according to claim 1, further comprising: identifying behavior deviating from a normal behavior of at least the first entity, where the first self-learning model trained on the normal behavior at least uses unsupervised learning; and building a chain of behavior including two or more causal links between data identifying the behavior deviating from the normal behavior associated with the first entity and data associated with the second entity to detect the cyber-threat. 25. The method according to claim 1, further comprising: where the modelled behavior in the first model of the first entity includes at least one of detecting a change in a pattern in any of 1) information, 2) activity, or a 3) combination of both in the computer system in order to be able to detect both a change in behavior of a user using the computing system as well as a change in behavior of a device in the computing system, where the first entity is the device in the computing system and the device's behavior is compared to the normal behavior of at least the first entity, and the second entity is the user of the computing system and the user's activities are compared to a normal behavior of at least the second entity. 26. The method according to claim 1, further comprising: predicting an expected behavior of the first entity of the computing system based on the first self-learning model trained on normal behavior; and wherein determining the cyber-threat risk parameter comprises comparing the analyzed, derived metrics with the predicted expected behavior and comparing whether parameters of the analyzed, derived metrics fall outside the parameters set by a threat parameter benchmark. 27. The method according to claim 1, where a normal behavior threshold is used by the first model as a moving benchmark of parameters that correspond to a normal pattern of life for the computing system. 28. The method according to claim 27, where the first self-learning model of normal behavior is updated when new input data is received that is deemed within the limits of normal behavior, where a normal behavior threshold is used by the first self-learning model as a moving benchmark of parameters that correspond to a normal pattern of life for the first entity, and the normal behavior threshold is varied according to the updated changes in the computer system allowing the model to spot behavior on the computing system that falls outside the parameters set by the moving benchmark. 29. The method according to claim 1, further comprising: using a second self-learning model trained on a normal behavior of at least the second entity to determine what is normal behavior for at least the second entity, using a third model trained to analyze data for detecting a first type of threat, and using a fourth model trained to analyze data for detecting a second type of threat. 30. The method according to claim 1, wherein the cyber-threat risk parameter is a probability of the likelihood of a threat determined using a recursive Bayesian estimation. 31. The method according to claim 30, further comprising: dynamically assigning recurring time cycles to a normal behavior threshold. 32. A non-transitory computer readable medium comprising computer readable code operable, when executed by one or more processing apparatuses in the computer system to instruct a computing device to perform the method of claim 1. 33. A threat detection system, comprising: at least one or more ports configured to receive input data associated with a first entity associated with a computer system and a second entity associated with the computer system; a non-transitory memory configured to store a first self-learning model trained on a normal behavior of at least the first entity and a computer readable code; and one or more processors configured to execute the computer readable code to derive from the received input data metrics representative of characteristics of the received input data, to analyze the derived metrics using a first self-learning model trained on a normal behavior of at least the first entity, to analyze one or more causal links between data associated with the first entity and data associated with the second entity, to comparing the analyzed metrics to parameters that correspond to the normal behavior of at least the first entity, and to determine, in accordance with the analyzed derived metrics and the causal link, a cyber-threat risk parameter indicative of a likelihood of a cyber-threat. 34. The threat detection system to claim 11, wherein the processor is further configured to execute the computer readable code to identify behavior deviating from the normal behavior of at least the first entity and to build a chain of behavior applying at least two or more causal links to detect the cyber-threat. 35. The threat detection system to claim 11, wherein the processor is further configured to execute the computer readable code to analyze the derived metrics using a second self-learning model trained on a normal behavior of at least the second entity, to use a third self-learning model trained on a first type of threat, and to use a third self-learning model trained on a second type of threat. 36. The threat detection system to claim 11, wherein the processor is further configured to execute the computer readable code to predict an expected behavior of the first entity of the computing system based on the first self-learning model trained on normal behavior; and wherein determining the cyber-threat risk parameter comprises comparing the analyzed, derived metrics with the predicted expected behavior and comparing whether parameters of the analyzed, derived metrics fall outside the parameters set by a threat parameter benchmark. 37. The threat detection system to claim 11, wherein a normal behavior threshold is used by the first model as a moving benchmark of parameters that correspond to a normal pattern of life for the computing system, where the first self-learning model of normal behavior is updated when new input data is received that is deemed within the limits of normal behavior. 38. The threat detection system to claim 11, where the modelled behavior in the first model of the first entity includes at least one of detecting a change in a pattern in any of 1) information, 2) activity, or a 3) combination of both in the computer system in order to be able to detect both a change in behavior of a user using the computing system as well as a change in behavior of a device in the computing system, where the first entity is the device in the computing system and the device's behavior is compared to the normal behavior of at least the first entity, and the second entity is the user of the computing system and the user's activities are compared to a normal behavior of at least the second entity. 39. The threat detection system to claim 11, wherein the derived metrics are network traffic related metrics associated with activity of the first entity on the computer system reflecting a usage of the computer system by the first entity over a period of time. 40. The threat detection system to claim 11, wherein the cyber-threat risk parameter is a probability of the likelihood of a threat determined using a recursive Bayesian estimation, and where the processor is further configured to execute the computer readable code to dynamically assign recurring time cycles to a normal behavior threshold. 41. The threat detection system to claim 11, wherein results of the cyber-threat risk parameter are projected on a 3D graphical user interface that conveys cyber threats across a packet flow and connection topology corresponding to the computing system. 42. A network, comprising: at least one network switch; multiple computing devices operable by users of the network; a threat detection system that includes at least one or more ports configured to receive input data associated with a first entity associated with a computer system and a second entity associated with the computer system; a non-transitory memory configured to store a first self-learning model trained on a normal behavior of at least the first entity and a computer readable code; and a processor configured to execute the computer readable code to derive from the received input data metrics representative of characteristics of the received input data, to analyze the derived metrics using a first self-learning model trained on a normal behavior of at least the first entity, to analyze one or more causal links between data associated with the first entity and data associated with the second entity, and to determine, in accordance with the analyzed derived metrics and the causal link, a cyber-threat risk parameter indicative of a likelihood of a cyber-threat; and wherein the threat detection system leverages an improvement in the device by identifying cyber-threats to improve performance by the target device by containing the detected threat and minimizing an amount of CPU cycles, memory space, and power consumed by that detected threat in the network entity when the detected threat is contained by the initiated actions.
2,400
9,316
9,316
15,972,678
2,468
The present disclosure relates to a method in a mobile station for base station change from a source base station to a target base station in a cellular radio network. The base station transfers packet switched communications between the mobile station and the network, and the method comprises receiving a handover command message from the source base station at the mobile station. The method further comprises transmitting in a target cell a message to the network providing a downlink sequence number status for a packet flow subject to lossless packet switched handover implicitly acknowledging downlink packets received by the mobile station.
1. A method in a mobile station (MS) for base station change from a source base station to a target base station in a cellular radio network, wherein a base station transfers packet switched communications between the mobile station and the network, the method comprising: receiving a handover command message from the source base station at the mobile station; and transmitting in a target cell a message to the network providing a downlink sequence number status for a packet flow subject to lossless packet switched handover implicitly acknowledging downlink packets received by the mobile station. 2. The method according to claim 1, further comprising receiving a transfer of radio link control data blocks in an acknowledged mode. 3. The method according to claim 1, wherein the downlink sequence number status message includes the next expected Protocol Data Unit (PDU) to be received. 4. A method in a radio base station (Target BSS) acting as a target base station for base station change from a source base station to a target base station in a cellular radio network, wherein a source base station (Source BSS) transfers packet switched communications between a mobile station (MS) and the network, the method comprising: receiving a message from the mobile station providing, after reception of a handover command message from the source base station at the mobile station, a downlink sequence number status for a packet flow subject to lossless packet switched handover implicitly acknowledging downlink packets received by the mobile station; and begin sending packets to the mobile station from the packet implicitly acknowledged by the mobile station. 5. The method according to claim 4, further comprising transmitting radio link control data blocks in an acknowledged mode to the mobile station. 6. The method according to claim 4, wherein the downlink sequence number status message includes the next expected Protocol Data Unit (PDU) to be received. 7. A mobile station (MS) adapted for base station change from a source base station to a target base station in a cellular radio network, wherein a base station transfers packet switched communications between the mobile station and the network, the mobile station comprising: a receiver; a transmitter; and processing circuitry coupled to the receiver and the transmitter, whereby the processing circuitry is configured to: receive, using the receiver, a handover command message from the source base station at the mobile station; and transmit in a target cell, using the transmitter, a message to the network providing a downlink sequence number status for a packet flow subject to lossless packet switched handover, implicitly acknowledging downlink packets received by the mobile station. 8. The mobile station according to claim 7, wherein the mobile station is adapted to receive a transfer of radio link control data blocks in an acknowledged mode. 9. The mobile station according to claim 7, wherein the mobile station is adapted to include the next expected Protocol Data Unit (PDU) to be received in the sequence number status message. 10. A radio base station (target BSS) adapted to act as a target base station for base station change from a source base station to a target base station in a cellular radio network, wherein a source base station (Source BSS) transfers packet switched communications between a mobile station (MS) and the network, the radio base station comprising: a receiver; a transmitter; and processing circuitry coupled to the receiver and transmitter, whereby the processing circuitry is configured to: receive, using the receiver, a message from the mobile station providing, after reception of a handover command message from the source base station at the mobile station, a downlink sequence number status for a packet flow subject to lossless packet switched handover implicitly acknowledging downlink packets received by the mobile station; and begin sending packets, using the transmitter, to the mobile station from the packet implicitly acknowledged by the mobile station. 11. The radio base station according to claim 10, wherein the processing circuitry is further configured to transmit, using the transmitter, radio link control data blocks in an acknowledged mode to the mobile station. 12. The radio base station according to claim 10, wherein the processing circuitry is further configured to include the next expected Protocol Data Unit (PDU) to be received in the sequence number status message.
The present disclosure relates to a method in a mobile station for base station change from a source base station to a target base station in a cellular radio network. The base station transfers packet switched communications between the mobile station and the network, and the method comprises receiving a handover command message from the source base station at the mobile station. The method further comprises transmitting in a target cell a message to the network providing a downlink sequence number status for a packet flow subject to lossless packet switched handover implicitly acknowledging downlink packets received by the mobile station.1. A method in a mobile station (MS) for base station change from a source base station to a target base station in a cellular radio network, wherein a base station transfers packet switched communications between the mobile station and the network, the method comprising: receiving a handover command message from the source base station at the mobile station; and transmitting in a target cell a message to the network providing a downlink sequence number status for a packet flow subject to lossless packet switched handover implicitly acknowledging downlink packets received by the mobile station. 2. The method according to claim 1, further comprising receiving a transfer of radio link control data blocks in an acknowledged mode. 3. The method according to claim 1, wherein the downlink sequence number status message includes the next expected Protocol Data Unit (PDU) to be received. 4. A method in a radio base station (Target BSS) acting as a target base station for base station change from a source base station to a target base station in a cellular radio network, wherein a source base station (Source BSS) transfers packet switched communications between a mobile station (MS) and the network, the method comprising: receiving a message from the mobile station providing, after reception of a handover command message from the source base station at the mobile station, a downlink sequence number status for a packet flow subject to lossless packet switched handover implicitly acknowledging downlink packets received by the mobile station; and begin sending packets to the mobile station from the packet implicitly acknowledged by the mobile station. 5. The method according to claim 4, further comprising transmitting radio link control data blocks in an acknowledged mode to the mobile station. 6. The method according to claim 4, wherein the downlink sequence number status message includes the next expected Protocol Data Unit (PDU) to be received. 7. A mobile station (MS) adapted for base station change from a source base station to a target base station in a cellular radio network, wherein a base station transfers packet switched communications between the mobile station and the network, the mobile station comprising: a receiver; a transmitter; and processing circuitry coupled to the receiver and the transmitter, whereby the processing circuitry is configured to: receive, using the receiver, a handover command message from the source base station at the mobile station; and transmit in a target cell, using the transmitter, a message to the network providing a downlink sequence number status for a packet flow subject to lossless packet switched handover, implicitly acknowledging downlink packets received by the mobile station. 8. The mobile station according to claim 7, wherein the mobile station is adapted to receive a transfer of radio link control data blocks in an acknowledged mode. 9. The mobile station according to claim 7, wherein the mobile station is adapted to include the next expected Protocol Data Unit (PDU) to be received in the sequence number status message. 10. A radio base station (target BSS) adapted to act as a target base station for base station change from a source base station to a target base station in a cellular radio network, wherein a source base station (Source BSS) transfers packet switched communications between a mobile station (MS) and the network, the radio base station comprising: a receiver; a transmitter; and processing circuitry coupled to the receiver and transmitter, whereby the processing circuitry is configured to: receive, using the receiver, a message from the mobile station providing, after reception of a handover command message from the source base station at the mobile station, a downlink sequence number status for a packet flow subject to lossless packet switched handover implicitly acknowledging downlink packets received by the mobile station; and begin sending packets, using the transmitter, to the mobile station from the packet implicitly acknowledged by the mobile station. 11. The radio base station according to claim 10, wherein the processing circuitry is further configured to transmit, using the transmitter, radio link control data blocks in an acknowledged mode to the mobile station. 12. The radio base station according to claim 10, wherein the processing circuitry is further configured to include the next expected Protocol Data Unit (PDU) to be received in the sequence number status message.
2,400
9,317
9,317
14,869,028
2,415
Techniques for multiplexing pilots in a wireless transmission are described. In one aspect, a transmitter station generates multiple pilot sequences for multiple transmit antennas, with each pilot sequence comprising pilot symbols sent in the time domain on a different set of subcarriers. The transmitter station further generates multiple pilot transmissions for the transmit antennas based on the pilot sequences. In another aspect, a transmitter station generates multiple pilot sequences for multiple transmit antennas based on frequency-domain code division multiplexing (FD-CDM) of a Chu sequence defined by a transmitter-specific value. The transmitter station further generates multiple pilot transmissions for the transmit antennas based on the pilot sequences. In yet another aspect, a transmitter station generates multiple pilot transmissions for multiple transmit antennas based on a first multiplexing scheme and generates multiple data transmissions based on a second multiplexing scheme that is different from the first multiplexing scheme.
1. An apparatus comprising: at least one processor configured to generate a plurality of pilot transmissions for a plurality of transmit antennas based on a first multiplexing scheme, and to generate a plurality of data transmissions for the plurality of transmit antennas based on a second multiplexing scheme different from the first multiplexing scheme; and a memory coupled to the at least one processor. 2. The apparatus of claim 1, wherein the first multiplexing scheme is orthogonal frequency division multiplexing (OFDM) and the second multiplexing scheme is single-carrier frequency division multiplexing (SC-FDM) or code division multiplexing (CDM). 3. The apparatus of claim 1, wherein the first multiplexing scheme is single-carrier frequency division multiplexing (SC-FDM) and the second multiplexing scheme is orthogonal frequency division multiplexing (OFDM) or code division multiplexing (CDM). 4. The apparatus of claim 1, wherein the first multiplexing scheme is frequency-domain code division multiplexing (FD-CDM) and the second multiplexing scheme is orthogonal frequency division multiplexing (OFDM) or single-carrier frequency division multiplexing (SC-FDM). 5. The apparatus of claim 1, wherein the first multiplexing scheme is interleaved frequency division multiplexing (IFDM) and the second multiplexing scheme is localized frequency division multiplexing (LFDM). 6. The apparatus of claim 1, wherein the at least one processor sends the plurality of pilot transmissions in a first time interval and sends the plurality of data transmissions in a second time interval with time division multiplexing (TDM). 7. The apparatus of claim 1, wherein the at least one processor sends the plurality of pilot transmissions on a first set of subcarriers and sends the plurality of data transmissions on a second set of subcarriers with frequency division multiplexing (FDM). 8. A method comprising: generating a plurality of pilot transmissions for a plurality of transmit antennas based on a first multiplexing scheme; and generating a plurality of data transmissions for the plurality of transmit antennas based on a second multiplexing scheme different from the first multiplexing scheme. 9. The method of claim 8, further comprising: sending the plurality of pilot transmissions in a first time interval; and sending the plurality of data transmissions in a second time interval with time division multiplexing (TDM). 10. An apparatus comprising: means for generating a plurality of pilot transmissions for a plurality of transmit antennas based on a first multiplexing scheme; and means for generating a plurality of data transmissions for the plurality of transmit antennas based on a second multiplexing scheme different from the first multiplexing scheme. 11. The apparatus of claim 10, further comprising: means for sending the plurality of pilot transmissions in a first time interval; and sending the plurality of data transmissions in a second time interval with time division multiplexing (TDM). 12. A computer program product comprising: a computer-readable medium storing instructions for performing a method comprising: generating a plurality of pilot transmissions for a plurality of transmit antennas based on a first multiplexing scheme; and generating a plurality of data transmissions for the plurality of transmit antennas based on a second multiplexing scheme different from the first multiplexing scheme. 13. The computer program product of claim 12, further comprising instructions for: sending the plurality of pilot transmissions in a first time interval; and sending the plurality of data transmissions in a second time interval with time division multiplexing (TDM). 14. An apparatus comprising: at least one processor configured to receive a plurality of pilot transmissions generated based on a first multiplexing scheme, and to receive a plurality of data transmissions generated based on a second multiplexing scheme different from the first multiplexing scheme, the plurality of pilot transmissions and the plurality of data transmissions being for a multiple-input multiple-output (MIMO) transmission sent from a plurality of transmit antennas to a plurality of receive antennas; and a memory coupled to the at least one processor. 15. The apparatus of claim 14, wherein the at least one processor derives channel estimates for the plurality of transmit antennas and the plurality of receive antennas based on the plurality of received pilot transmissions, and performs data detection for the plurality of received data transmissions based on the channel estimates. 16. A method comprising: receiving a plurality of pilot transmissions generated based on a first multiplexing scheme; and receiving a plurality of data transmissions generated based on a second multiplexing scheme different from the first multiplexing scheme, the plurality of pilot transmissions and the plurality of data transmissions being for a multiple-input multiple-output (MIMO) transmission sent from a plurality of transmit antennas to a plurality of receive antennas. 17. The method of claim 16, further comprising: deriving channel estimates for the plurality of transmit antennas and the plurality of receive antennas based on the plurality of received pilot transmissions; and performing data detection for the plurality of received data transmissions based on the channel estimates. 18. An apparatus comprising: means for receiving a plurality of pilot transmissions generated based on a first multiplexing scheme; and means for receiving a plurality of data transmissions generated based on a second multiplexing scheme different from the first multiplexing scheme, the plurality of pilot transmissions and the plurality of data transmissions being for a multiple-input multiple-output (MIMO) transmission sent from a plurality of transmit antennas to a plurality of receive antennas. 19. The apparatus of claim 18, further comprising: means for deriving channel estimates for the plurality of transmit antennas and the plurality of receive antennas based on the plurality of received pilot transmissions; and means for performing data detection for the plurality of received data transmissions based on the channel estimates. 20. A computer program product comprising a computer-readable medium storing instructions for performing a method comprising: receiving a plurality of pilot transmissions generated based on a first multiplexing scheme; and receiving a plurality of data transmissions generated based on a second multiplexing scheme different from the first multiplexing scheme, the plurality of pilot transmissions and the plurality of data transmissions being for a multiple-input multiple-output (MIMO) transmission sent from a plurality of transmit antennas to a plurality of receive antennas. 21. The computer program product of claim 20, further comprising instructions for: deriving channel estimates for the plurality of transmit antennas and the plurality of receive antennas based on the plurality of received pilot transmissions; and performing data detection for the plurality of received data transmissions based on the channel estimates.
Techniques for multiplexing pilots in a wireless transmission are described. In one aspect, a transmitter station generates multiple pilot sequences for multiple transmit antennas, with each pilot sequence comprising pilot symbols sent in the time domain on a different set of subcarriers. The transmitter station further generates multiple pilot transmissions for the transmit antennas based on the pilot sequences. In another aspect, a transmitter station generates multiple pilot sequences for multiple transmit antennas based on frequency-domain code division multiplexing (FD-CDM) of a Chu sequence defined by a transmitter-specific value. The transmitter station further generates multiple pilot transmissions for the transmit antennas based on the pilot sequences. In yet another aspect, a transmitter station generates multiple pilot transmissions for multiple transmit antennas based on a first multiplexing scheme and generates multiple data transmissions based on a second multiplexing scheme that is different from the first multiplexing scheme.1. An apparatus comprising: at least one processor configured to generate a plurality of pilot transmissions for a plurality of transmit antennas based on a first multiplexing scheme, and to generate a plurality of data transmissions for the plurality of transmit antennas based on a second multiplexing scheme different from the first multiplexing scheme; and a memory coupled to the at least one processor. 2. The apparatus of claim 1, wherein the first multiplexing scheme is orthogonal frequency division multiplexing (OFDM) and the second multiplexing scheme is single-carrier frequency division multiplexing (SC-FDM) or code division multiplexing (CDM). 3. The apparatus of claim 1, wherein the first multiplexing scheme is single-carrier frequency division multiplexing (SC-FDM) and the second multiplexing scheme is orthogonal frequency division multiplexing (OFDM) or code division multiplexing (CDM). 4. The apparatus of claim 1, wherein the first multiplexing scheme is frequency-domain code division multiplexing (FD-CDM) and the second multiplexing scheme is orthogonal frequency division multiplexing (OFDM) or single-carrier frequency division multiplexing (SC-FDM). 5. The apparatus of claim 1, wherein the first multiplexing scheme is interleaved frequency division multiplexing (IFDM) and the second multiplexing scheme is localized frequency division multiplexing (LFDM). 6. The apparatus of claim 1, wherein the at least one processor sends the plurality of pilot transmissions in a first time interval and sends the plurality of data transmissions in a second time interval with time division multiplexing (TDM). 7. The apparatus of claim 1, wherein the at least one processor sends the plurality of pilot transmissions on a first set of subcarriers and sends the plurality of data transmissions on a second set of subcarriers with frequency division multiplexing (FDM). 8. A method comprising: generating a plurality of pilot transmissions for a plurality of transmit antennas based on a first multiplexing scheme; and generating a plurality of data transmissions for the plurality of transmit antennas based on a second multiplexing scheme different from the first multiplexing scheme. 9. The method of claim 8, further comprising: sending the plurality of pilot transmissions in a first time interval; and sending the plurality of data transmissions in a second time interval with time division multiplexing (TDM). 10. An apparatus comprising: means for generating a plurality of pilot transmissions for a plurality of transmit antennas based on a first multiplexing scheme; and means for generating a plurality of data transmissions for the plurality of transmit antennas based on a second multiplexing scheme different from the first multiplexing scheme. 11. The apparatus of claim 10, further comprising: means for sending the plurality of pilot transmissions in a first time interval; and sending the plurality of data transmissions in a second time interval with time division multiplexing (TDM). 12. A computer program product comprising: a computer-readable medium storing instructions for performing a method comprising: generating a plurality of pilot transmissions for a plurality of transmit antennas based on a first multiplexing scheme; and generating a plurality of data transmissions for the plurality of transmit antennas based on a second multiplexing scheme different from the first multiplexing scheme. 13. The computer program product of claim 12, further comprising instructions for: sending the plurality of pilot transmissions in a first time interval; and sending the plurality of data transmissions in a second time interval with time division multiplexing (TDM). 14. An apparatus comprising: at least one processor configured to receive a plurality of pilot transmissions generated based on a first multiplexing scheme, and to receive a plurality of data transmissions generated based on a second multiplexing scheme different from the first multiplexing scheme, the plurality of pilot transmissions and the plurality of data transmissions being for a multiple-input multiple-output (MIMO) transmission sent from a plurality of transmit antennas to a plurality of receive antennas; and a memory coupled to the at least one processor. 15. The apparatus of claim 14, wherein the at least one processor derives channel estimates for the plurality of transmit antennas and the plurality of receive antennas based on the plurality of received pilot transmissions, and performs data detection for the plurality of received data transmissions based on the channel estimates. 16. A method comprising: receiving a plurality of pilot transmissions generated based on a first multiplexing scheme; and receiving a plurality of data transmissions generated based on a second multiplexing scheme different from the first multiplexing scheme, the plurality of pilot transmissions and the plurality of data transmissions being for a multiple-input multiple-output (MIMO) transmission sent from a plurality of transmit antennas to a plurality of receive antennas. 17. The method of claim 16, further comprising: deriving channel estimates for the plurality of transmit antennas and the plurality of receive antennas based on the plurality of received pilot transmissions; and performing data detection for the plurality of received data transmissions based on the channel estimates. 18. An apparatus comprising: means for receiving a plurality of pilot transmissions generated based on a first multiplexing scheme; and means for receiving a plurality of data transmissions generated based on a second multiplexing scheme different from the first multiplexing scheme, the plurality of pilot transmissions and the plurality of data transmissions being for a multiple-input multiple-output (MIMO) transmission sent from a plurality of transmit antennas to a plurality of receive antennas. 19. The apparatus of claim 18, further comprising: means for deriving channel estimates for the plurality of transmit antennas and the plurality of receive antennas based on the plurality of received pilot transmissions; and means for performing data detection for the plurality of received data transmissions based on the channel estimates. 20. A computer program product comprising a computer-readable medium storing instructions for performing a method comprising: receiving a plurality of pilot transmissions generated based on a first multiplexing scheme; and receiving a plurality of data transmissions generated based on a second multiplexing scheme different from the first multiplexing scheme, the plurality of pilot transmissions and the plurality of data transmissions being for a multiple-input multiple-output (MIMO) transmission sent from a plurality of transmit antennas to a plurality of receive antennas. 21. The computer program product of claim 20, further comprising instructions for: deriving channel estimates for the plurality of transmit antennas and the plurality of receive antennas based on the plurality of received pilot transmissions; and performing data detection for the plurality of received data transmissions based on the channel estimates.
2,400
9,318
9,318
13,481,620
2,481
This disclosure concerns a typical inspection device of the invention. In some embodiments, the inspection device functions in a storage vessel, such as a underground fuel tank, including storage vessels that comprise an explosive mixture of gases. Also, this disclosure concerns a process for inspecting the inside of the storage vessel, in some cases creating a record of the image of the inside of the storage vessel. Invention processes do not require a step of inerting the vessel. Invention devices can operate in a vessel that has not been subjected to an inerting step.
1. A process for viewing a vessel, wherein the vessel comprises a fill pipe or other access fitting and has a volume including a liquid and a headspace wherein the process comprises supplying a device comprising a head unit, wherein the head unit includes a video camera, manipulating the head unit into the headspace through the vessel fill pipe or other access fitting and supplying electrical power to the head unit wherein the vessel contains at least one region comprising a mixture of vapor and oxygen. 2. The process of claim 1 wherein the mixture of vapor and oxygen is flammable or explosive. 3. The process of claim 2 wherein the vessel liquid volume is zero. 4. The process of claim 2 wherein the vessel headspace volume is zero. 5. The process of claim 2 wherein the vessel headspace volume is non-zero and the vessel liquid volume is non-zero. 6. The process of claim 2 wherein the device further comprises an optional gas pressure sensor or an optional gas flow sensor and a control unit situated outside of the vessel wherein the control unit and the head unit communicate using a signal pathway that is wired or wireless. 7. The process of claim 2 wherein the control unit provides electrical power to the head unit through power cables or the head unit further comprises a battery that provides electrical power to the head unit. 8. The process of claim 6 wherein the device further comprises a gas source and the optional gas flow sensor or the optional gas pressure sensor is configured to cut power to the head unit or cut power within the head unit upon either sensor registering insufficient gas pressure or gas flow. 9. The process of claim 8 wherein both the control unit and head unit comprise a gas flow sensor or a gas pressure sensor. 10. The process of claim 8 wherein the gas source is internal to the head unit. 11. The process of claim 8 wherein the gas source is external to the head unit and connects to the head unit through a gas line. 12. The process of claim 8 wherein the gas source is external to the head unit the gas source connects to the control unit through a first gas line and the control unit connects to the head unit through a second gas line. 13. The process of claim 12 wherein the power cables and the signal pathway run through the inside of the second gas line, which connects between the control unit and the head unit. 14. The process of claim 13 wherein the video camera comprises zoom and focus controls communicating with the control unit through the signal pathway. 15. The process of claim 14 wherein optics of the video camera have a depth of field such that the video camera can view substantially all of the interior surface of the vessel while being located near the fill pipe or other access fitting through which the inspection is conducted. 16. The process of claim 15 wherein the head unit further comprises lights mounted in or on the head unit to adequately illuminate the interior surface of the vessel at least as far as the video camera optics can view and wherein the control unit sends signals to or receives signals from the lights through the signal pathway. 17. The process of claim 16 further comprising starting a gas flow from the gas source through the first gas line into the control unit through an optional gas pressure sensor, an optional gas flow sensor, or both out of the control unit through the second gas line into the head unit through an optional gas pressure sensor, an optional gas flow sensor, or both wherein at least one gas pressure sensor or gas flow sensor is present in the device and wherein at least one sensor present in the device is calibrated to prevent electrical power flow to the head unit until at least one of gas flow or gas pressure is sufficient to cause the internal components of the head unit to be surrounded by an atmosphere of the gas as opposed to an atmosphere of a mixture containing oxygen within the mixture's flammable or explosive range. 18. The process of claim 17 further comprising, after starting the gas flow, supplying electrical power to the head unit receiving from the video camera an image signal and automatically or manually manipulating the tip of the head unit and the video camera focus and zoom to record the image signal creating an image of the interior surface of the vessel. 19. The process of claim 18 wherein the vessel is an underground storage tank or underground fuel tank. 20. An inspection device comprising a control unit situated outside of a vessel a head unit adapted to pass through a fill pipe or other access fitting into the vessel an umbilical cord connecting the control unit to the head unit and a handle configured to control the direction that the head unit's video camera points wherein the control unit comprises an optional gas pressure sensor or an optional gas flow sensor control circuitry a power supply and a video recording device wherein the head unit comprises a video camera comprising zoom and focus controls communicating with the control unit through the signal pathway and optics that have a depth of field such that the video camera can view substantially all of the interior surface of the vessel while being located near the fill pipe or other access fitting lights mounted in or on the head unit to adequately illuminate the interior surface of the vessel at least as far as the video camera optics can view wherein the umbilical cord comprises a gas line power cables passing through the lumen of the gas line routing power between the head unit and the control unit and signal wires passing through the lumen of the gas line routing signals between the head unit and the control unit and adapted to transmit video signals to the head unit wherein the inspection device comprises at least one of a gas pressure sensor or a gas flow sensor configured to cut power to the head unit or to cut power within the head unit.
This disclosure concerns a typical inspection device of the invention. In some embodiments, the inspection device functions in a storage vessel, such as a underground fuel tank, including storage vessels that comprise an explosive mixture of gases. Also, this disclosure concerns a process for inspecting the inside of the storage vessel, in some cases creating a record of the image of the inside of the storage vessel. Invention processes do not require a step of inerting the vessel. Invention devices can operate in a vessel that has not been subjected to an inerting step.1. A process for viewing a vessel, wherein the vessel comprises a fill pipe or other access fitting and has a volume including a liquid and a headspace wherein the process comprises supplying a device comprising a head unit, wherein the head unit includes a video camera, manipulating the head unit into the headspace through the vessel fill pipe or other access fitting and supplying electrical power to the head unit wherein the vessel contains at least one region comprising a mixture of vapor and oxygen. 2. The process of claim 1 wherein the mixture of vapor and oxygen is flammable or explosive. 3. The process of claim 2 wherein the vessel liquid volume is zero. 4. The process of claim 2 wherein the vessel headspace volume is zero. 5. The process of claim 2 wherein the vessel headspace volume is non-zero and the vessel liquid volume is non-zero. 6. The process of claim 2 wherein the device further comprises an optional gas pressure sensor or an optional gas flow sensor and a control unit situated outside of the vessel wherein the control unit and the head unit communicate using a signal pathway that is wired or wireless. 7. The process of claim 2 wherein the control unit provides electrical power to the head unit through power cables or the head unit further comprises a battery that provides electrical power to the head unit. 8. The process of claim 6 wherein the device further comprises a gas source and the optional gas flow sensor or the optional gas pressure sensor is configured to cut power to the head unit or cut power within the head unit upon either sensor registering insufficient gas pressure or gas flow. 9. The process of claim 8 wherein both the control unit and head unit comprise a gas flow sensor or a gas pressure sensor. 10. The process of claim 8 wherein the gas source is internal to the head unit. 11. The process of claim 8 wherein the gas source is external to the head unit and connects to the head unit through a gas line. 12. The process of claim 8 wherein the gas source is external to the head unit the gas source connects to the control unit through a first gas line and the control unit connects to the head unit through a second gas line. 13. The process of claim 12 wherein the power cables and the signal pathway run through the inside of the second gas line, which connects between the control unit and the head unit. 14. The process of claim 13 wherein the video camera comprises zoom and focus controls communicating with the control unit through the signal pathway. 15. The process of claim 14 wherein optics of the video camera have a depth of field such that the video camera can view substantially all of the interior surface of the vessel while being located near the fill pipe or other access fitting through which the inspection is conducted. 16. The process of claim 15 wherein the head unit further comprises lights mounted in or on the head unit to adequately illuminate the interior surface of the vessel at least as far as the video camera optics can view and wherein the control unit sends signals to or receives signals from the lights through the signal pathway. 17. The process of claim 16 further comprising starting a gas flow from the gas source through the first gas line into the control unit through an optional gas pressure sensor, an optional gas flow sensor, or both out of the control unit through the second gas line into the head unit through an optional gas pressure sensor, an optional gas flow sensor, or both wherein at least one gas pressure sensor or gas flow sensor is present in the device and wherein at least one sensor present in the device is calibrated to prevent electrical power flow to the head unit until at least one of gas flow or gas pressure is sufficient to cause the internal components of the head unit to be surrounded by an atmosphere of the gas as opposed to an atmosphere of a mixture containing oxygen within the mixture's flammable or explosive range. 18. The process of claim 17 further comprising, after starting the gas flow, supplying electrical power to the head unit receiving from the video camera an image signal and automatically or manually manipulating the tip of the head unit and the video camera focus and zoom to record the image signal creating an image of the interior surface of the vessel. 19. The process of claim 18 wherein the vessel is an underground storage tank or underground fuel tank. 20. An inspection device comprising a control unit situated outside of a vessel a head unit adapted to pass through a fill pipe or other access fitting into the vessel an umbilical cord connecting the control unit to the head unit and a handle configured to control the direction that the head unit's video camera points wherein the control unit comprises an optional gas pressure sensor or an optional gas flow sensor control circuitry a power supply and a video recording device wherein the head unit comprises a video camera comprising zoom and focus controls communicating with the control unit through the signal pathway and optics that have a depth of field such that the video camera can view substantially all of the interior surface of the vessel while being located near the fill pipe or other access fitting lights mounted in or on the head unit to adequately illuminate the interior surface of the vessel at least as far as the video camera optics can view wherein the umbilical cord comprises a gas line power cables passing through the lumen of the gas line routing power between the head unit and the control unit and signal wires passing through the lumen of the gas line routing signals between the head unit and the control unit and adapted to transmit video signals to the head unit wherein the inspection device comprises at least one of a gas pressure sensor or a gas flow sensor configured to cut power to the head unit or to cut power within the head unit.
2,400
9,319
9,319
15,398,205
2,447
A method of managing a network performed by a first terminal, the method including: broadcasting a first packet to a network; receiving at least one second packet transmitted by at least one second terminal on the network, in response to the first packet; updating a master terminal in the network and the first packet based on the at least one second packet; and broadcasting the updated first packet to the network.
1. A method of managing a network performed by a first terminal, the method comprising: broadcasting a first packet to a network; receiving at least one second packet transmitted by at least one second terminal in the network, in response to the first packet; updating, based on the at least one second packet, a master terminal in the network and the first packet; and broadcasting the updated first packet to the network. 2. The method of claim 1, wherein, in response to the at least one second packet not being received within a pre-set time interval from a point of time when the first packet was broadcast, the updating of the master terminal and the first packet comprises: setting the first terminal as the master terminal; and initializing the first packet based on information of the first terminal. 3. The method of claim 1, wherein, in response to the at least one second packet being received, the updating of the master terminal and the first packet comprises: setting the first terminal as the master terminal; and updating the first packet based on at least one of information of the first terminal and the at least one second packet. 4. The method of claim 3, wherein: the first terminal and the at least one second terminal each comprise an image obtaining apparatus; the first packet comprises a channel of the first terminal, a channel of each of the at least one second terminal, and a time slot; and the updating of the first packet comprises: determining the channel of each of the at least one second terminal based on the at least one second packet; assigning the channel of the first terminal based on the at least one second packet; and updating the time slot, in which an image transmitting point of time of the at least one second terminal that transmitted the at least one second packet and an image transmitting point of time of the first terminal are assigned according to a pre-set method, based on the at least one second packet. 5. The method of claim 4, wherein the pre-set method comprises setting the image transmitting points of time such that time intervals of transmitting I-frames of images obtained by the first terminal and the at least one second terminal are largest. 6. The method of claim 1, wherein, after broadcasting of the updated first packet to the network, the method further comprises: receiving at least one third packet transmitted from the at least one second terminal on the network in response to the updated first packet; and determining a malfunction of the at least one second terminal based on the at least one third packet. 7. The method of claim 1, wherein the first packet comprises at least one of: a channel of the first terminal; a channel of each of the at least one second terminal; a time slot in which an image transmitting point of time of the at least one second terminal and an image transmitting point of time of the first terminal are assigned according to a pre-set method; and a point of time when the master terminal is updated to the first terminal. 8. The method of claim 1, wherein the at least one second packet comprises a channel of each of the at least one second terminal and a time slot in which an image transmitting point of time of the at least one second terminal and an image transmitting point of time of the first terminal are assigned according to a pre-set method. 9. A method of managing a network performed by a second terminal, the method comprising: receiving a first packet broadcast by a first terminal through a network; updating a time slot based on the received first packet; and transmitting, to the first terminal, a second packet comprising at least one of the updated time slot and a channel of the second terminal. 10. The method of claim 9, wherein, in response to a time slot included in the first packet being different from a current time slot of the second terminal, the updating of the time slot comprises updating the current time slot of the second terminal to the time slot included in the first packet. 11. The method of claim 9, further comprising: determining whether a master terminal satisfies a master terminal changing condition; transmitting a fourth packet to the master terminal in response to a determination that the master terminal satisfies the master terminal changing condition; updating the master terminal to the second terminal; updating the first packet based on information of the second terminal; and broadcasting the updated first packet to the network. 12. A first image obtaining apparatus comprising a controller configured to: broadcast a first packet to a network; receive at least one second packet transmitted by at least one second image obtaining apparatus in the network in response to the first packet; update a master terminal in the network and the first packet based on the at least one second packet; and broadcast the updated first packet to the network. 13. The first image obtaining apparatus of claim 12, wherein, in response to the at least one second packet not being received within a pre-set time interval after the first packet was broadcast, the controller is further configured to: set the first image obtaining apparatus as the master terminal; and initialize the first packet based on information of the first image obtaining apparatus. 14. The first image obtaining apparatus of claim 12, wherein, in response to the at least one second packet being received, the controller is further configured to: set the first image obtaining apparatus as the master terminal; and update the first packet based on at least one of information of the first image obtaining apparatus and the at least one second packet. 15. The first image obtaining apparatus of claim 14, wherein the first packet comprises a channel of the first image obtaining apparatus, a channel of each of the at least one second image obtaining apparatus, and a time slot, and the controller is further configured to: determine a channel of each of the at least one second image obtaining apparatus based on the at least one second packet; assign the channel of the first image obtaining apparatus based on the at least one second packet; and update the time slot in which an image transmitting point of time of the at least one second image obtaining apparatus that transmitted the at least one second packet and an image transmitting point of time of the first image obtaining apparatus are assigned according to a pre-set method, based on the at least one second packet. 16. The first image obtaining apparatus of claim 15, wherein the pre-set method comprises assigning the image transmitting points of time such that time intervals of transmitting I-frames of images obtained by the first image obtaining apparatus and the at least one second image obtaining apparatus are largest. 17. The first image obtaining apparatus of claim 12, wherein the controller is further configured to: receive at least one third packet transmitted by the at least one second image obtaining apparatus on the network in response to the updated first packet; and determine a malfunction of the at least one second image obtaining apparatus based on the at least one third packet. 18. A second image obtaining apparatus comprising a controller configured to: receive a first packet broadcast by a first image obtaining apparatus through a network; update a time slot based on the received first packet; and transmit a second packet comprising at least one of the updated time slot and a channel of the second image obtaining apparatus to the first image obtaining apparatus. 19. The second image obtaining apparatus of claim 18, wherein, in response to a time slot included in the first packet being different from a current time slot of the second image obtaining apparatus, the controller is further configured to update the current time slot of the second image obtaining apparatus to the time slot included in the first packet. 20. The second image obtaining apparatus of claim 18, wherein the controller is further configured to: transmit a fourth packet to the master terminal in response to a determination that the master terminal satisfies the master terminal changing condition; update the master terminal to the second image obtaining apparatus; update the first packet based on information of the second image obtaining apparatus; and broadcast the updated first packet to the network.
A method of managing a network performed by a first terminal, the method including: broadcasting a first packet to a network; receiving at least one second packet transmitted by at least one second terminal on the network, in response to the first packet; updating a master terminal in the network and the first packet based on the at least one second packet; and broadcasting the updated first packet to the network.1. A method of managing a network performed by a first terminal, the method comprising: broadcasting a first packet to a network; receiving at least one second packet transmitted by at least one second terminal in the network, in response to the first packet; updating, based on the at least one second packet, a master terminal in the network and the first packet; and broadcasting the updated first packet to the network. 2. The method of claim 1, wherein, in response to the at least one second packet not being received within a pre-set time interval from a point of time when the first packet was broadcast, the updating of the master terminal and the first packet comprises: setting the first terminal as the master terminal; and initializing the first packet based on information of the first terminal. 3. The method of claim 1, wherein, in response to the at least one second packet being received, the updating of the master terminal and the first packet comprises: setting the first terminal as the master terminal; and updating the first packet based on at least one of information of the first terminal and the at least one second packet. 4. The method of claim 3, wherein: the first terminal and the at least one second terminal each comprise an image obtaining apparatus; the first packet comprises a channel of the first terminal, a channel of each of the at least one second terminal, and a time slot; and the updating of the first packet comprises: determining the channel of each of the at least one second terminal based on the at least one second packet; assigning the channel of the first terminal based on the at least one second packet; and updating the time slot, in which an image transmitting point of time of the at least one second terminal that transmitted the at least one second packet and an image transmitting point of time of the first terminal are assigned according to a pre-set method, based on the at least one second packet. 5. The method of claim 4, wherein the pre-set method comprises setting the image transmitting points of time such that time intervals of transmitting I-frames of images obtained by the first terminal and the at least one second terminal are largest. 6. The method of claim 1, wherein, after broadcasting of the updated first packet to the network, the method further comprises: receiving at least one third packet transmitted from the at least one second terminal on the network in response to the updated first packet; and determining a malfunction of the at least one second terminal based on the at least one third packet. 7. The method of claim 1, wherein the first packet comprises at least one of: a channel of the first terminal; a channel of each of the at least one second terminal; a time slot in which an image transmitting point of time of the at least one second terminal and an image transmitting point of time of the first terminal are assigned according to a pre-set method; and a point of time when the master terminal is updated to the first terminal. 8. The method of claim 1, wherein the at least one second packet comprises a channel of each of the at least one second terminal and a time slot in which an image transmitting point of time of the at least one second terminal and an image transmitting point of time of the first terminal are assigned according to a pre-set method. 9. A method of managing a network performed by a second terminal, the method comprising: receiving a first packet broadcast by a first terminal through a network; updating a time slot based on the received first packet; and transmitting, to the first terminal, a second packet comprising at least one of the updated time slot and a channel of the second terminal. 10. The method of claim 9, wherein, in response to a time slot included in the first packet being different from a current time slot of the second terminal, the updating of the time slot comprises updating the current time slot of the second terminal to the time slot included in the first packet. 11. The method of claim 9, further comprising: determining whether a master terminal satisfies a master terminal changing condition; transmitting a fourth packet to the master terminal in response to a determination that the master terminal satisfies the master terminal changing condition; updating the master terminal to the second terminal; updating the first packet based on information of the second terminal; and broadcasting the updated first packet to the network. 12. A first image obtaining apparatus comprising a controller configured to: broadcast a first packet to a network; receive at least one second packet transmitted by at least one second image obtaining apparatus in the network in response to the first packet; update a master terminal in the network and the first packet based on the at least one second packet; and broadcast the updated first packet to the network. 13. The first image obtaining apparatus of claim 12, wherein, in response to the at least one second packet not being received within a pre-set time interval after the first packet was broadcast, the controller is further configured to: set the first image obtaining apparatus as the master terminal; and initialize the first packet based on information of the first image obtaining apparatus. 14. The first image obtaining apparatus of claim 12, wherein, in response to the at least one second packet being received, the controller is further configured to: set the first image obtaining apparatus as the master terminal; and update the first packet based on at least one of information of the first image obtaining apparatus and the at least one second packet. 15. The first image obtaining apparatus of claim 14, wherein the first packet comprises a channel of the first image obtaining apparatus, a channel of each of the at least one second image obtaining apparatus, and a time slot, and the controller is further configured to: determine a channel of each of the at least one second image obtaining apparatus based on the at least one second packet; assign the channel of the first image obtaining apparatus based on the at least one second packet; and update the time slot in which an image transmitting point of time of the at least one second image obtaining apparatus that transmitted the at least one second packet and an image transmitting point of time of the first image obtaining apparatus are assigned according to a pre-set method, based on the at least one second packet. 16. The first image obtaining apparatus of claim 15, wherein the pre-set method comprises assigning the image transmitting points of time such that time intervals of transmitting I-frames of images obtained by the first image obtaining apparatus and the at least one second image obtaining apparatus are largest. 17. The first image obtaining apparatus of claim 12, wherein the controller is further configured to: receive at least one third packet transmitted by the at least one second image obtaining apparatus on the network in response to the updated first packet; and determine a malfunction of the at least one second image obtaining apparatus based on the at least one third packet. 18. A second image obtaining apparatus comprising a controller configured to: receive a first packet broadcast by a first image obtaining apparatus through a network; update a time slot based on the received first packet; and transmit a second packet comprising at least one of the updated time slot and a channel of the second image obtaining apparatus to the first image obtaining apparatus. 19. The second image obtaining apparatus of claim 18, wherein, in response to a time slot included in the first packet being different from a current time slot of the second image obtaining apparatus, the controller is further configured to update the current time slot of the second image obtaining apparatus to the time slot included in the first packet. 20. The second image obtaining apparatus of claim 18, wherein the controller is further configured to: transmit a fourth packet to the master terminal in response to a determination that the master terminal satisfies the master terminal changing condition; update the master terminal to the second image obtaining apparatus; update the first packet based on information of the second image obtaining apparatus; and broadcast the updated first packet to the network.
2,400
9,320
9,320
15,809,817
2,459
Generating a user unavailability alert in a collaborative environment. An embodiment can include receiving a user input from a user indicating an unavailability of the user. Responsive to the user input, activity of the user in the collaborative environment can be analyzed to identify whether any pending actions are allocated to the user which relate to other people identified by the user's participation in the collaborative environment. Responsive to determining at least one pending action is allocated to the user which relates to at least one other person identified by the user's participation in the collaborative environment, a first message can be generated to be communicated to the at least one other person indicating the unavailability of the user, and the first message can be communicated to the at least one other person.
1-25. (canceled) 26. A computer hardware system configured to generate a user unavailability alert in a collaborative environment, comprising: a hardware processor configured to initiate the following executable operations: receiving, from a user, a user input indicating an unavailability of the user; identifying, responsive to the user input, a collaborative session in which the user participated; identifying a pending action to be performed by the user within the identified collaborative session; determining a completion time for the identified pending action and a second participant of the collaborative session; and sending, based upon the user input indicating the unavailability of the user and the completion time, a first message to the second participant. 27. The system of claim 26, wherein in response to the collaborative session being identified, collaboration media associated with the collaborative session is retrieved, and the pending action is identified based upon an analysis of the collaboration media. 28. The system of claim 26, wherein the sending is based upon an analysis that concludes that the unavailability of the user impacts the second participant. 29. The system of claim 26, wherein the determining the completion time includes an amount of work already performed by the user on the identified pending action. 30. The system of claim 26, wherein the first message indicates that the completion time of the identified pending action will be affected by the unavailability of the user. 31. The system of claim 30, wherein a new completion time is estimated for the identified pending action, and the first message includes the new completion time for the identified pending action. 32. The system of claim 26, wherein the identified pending action is automatically rescheduled. 33. The system of claim 26, wherein in response to determining a user input indicating an availability of the user is not received within a specified period of time subsequent to the user input, a second message is sent to the second participant indicating continued unavailability of the user. 34. The system of claim 33, wherein a new completion time is estimated for the identified pending action, the first message includes the new completion time for the identified pending action, a second new completion time is estimated for the identified pending action, and the second message includes the second new completion time for the identified pending action. 35. The system of claim 26, wherein the determining the completion time includes determining a probability percentage that the user will be able to complete the pending action within a period of time. 36. A computer program product, comprising: a hardware storage device having stored therein computer program code for generating a user unavailability alert in a collaborative environment, the computer program code, which when executed by a computer hardware system, causes the computer hardware system to perform: receiving, from a user, a user input indicating an unavailability of the user; identifying, responsive to the user input, a collaborative session in which the user participated; identifying a pending action to be performed by the user within the identified collaborative session; determining a completion time for the identified pending action and a second participant of the collaborative session; and sending, based upon the user input indicating the unavailability of the user and the completion time, a first message to the second participant. 37. The computer program product of claim 36, wherein in response to the collaborative session being identified, collaboration media associated with the collaborative session is retrieved, and the pending action is identified based upon an analysis of the collaboration media. 38. The computer program product of claim 36, wherein the sending is based upon an analysis that concludes that the unavailability of the user impacts the second participant. 39. The computer program product of claim 36, wherein the determining the completion time includes an amount of work already performed by the user on the identified pending action. 40. The computer program product of claim 36, wherein the first message indicates that the completion time of the identified pending action will be affected by the unavailability of the user. 41. The computer program product of claim 40, wherein a new completion time is estimated for the identified pending action, and the first message includes the new completion time for the identified pending action. 42. The computer program product of claim 36, wherein the identified pending action is automatically rescheduled. 43. The computer program product of claim 36, wherein in response to determining a user input indicating an availability of the user is not received within a specified period of time subsequent to the user input, a second message is sent to the second participant indicating continued unavailability of the user. 44. The computer program product of claim 43, wherein a new completion time is estimated for the identified pending action, the first message includes the new completion time for the identified pending action, a second new completion time is estimated for the identified pending action, and the second message includes the second new completion time for the identified pending action. 45. The computer program product of claim 36, wherein the determining the completion time includes determining a probability percentage that the user will be able to complete the pending action within a period of time.
Generating a user unavailability alert in a collaborative environment. An embodiment can include receiving a user input from a user indicating an unavailability of the user. Responsive to the user input, activity of the user in the collaborative environment can be analyzed to identify whether any pending actions are allocated to the user which relate to other people identified by the user's participation in the collaborative environment. Responsive to determining at least one pending action is allocated to the user which relates to at least one other person identified by the user's participation in the collaborative environment, a first message can be generated to be communicated to the at least one other person indicating the unavailability of the user, and the first message can be communicated to the at least one other person.1-25. (canceled) 26. A computer hardware system configured to generate a user unavailability alert in a collaborative environment, comprising: a hardware processor configured to initiate the following executable operations: receiving, from a user, a user input indicating an unavailability of the user; identifying, responsive to the user input, a collaborative session in which the user participated; identifying a pending action to be performed by the user within the identified collaborative session; determining a completion time for the identified pending action and a second participant of the collaborative session; and sending, based upon the user input indicating the unavailability of the user and the completion time, a first message to the second participant. 27. The system of claim 26, wherein in response to the collaborative session being identified, collaboration media associated with the collaborative session is retrieved, and the pending action is identified based upon an analysis of the collaboration media. 28. The system of claim 26, wherein the sending is based upon an analysis that concludes that the unavailability of the user impacts the second participant. 29. The system of claim 26, wherein the determining the completion time includes an amount of work already performed by the user on the identified pending action. 30. The system of claim 26, wherein the first message indicates that the completion time of the identified pending action will be affected by the unavailability of the user. 31. The system of claim 30, wherein a new completion time is estimated for the identified pending action, and the first message includes the new completion time for the identified pending action. 32. The system of claim 26, wherein the identified pending action is automatically rescheduled. 33. The system of claim 26, wherein in response to determining a user input indicating an availability of the user is not received within a specified period of time subsequent to the user input, a second message is sent to the second participant indicating continued unavailability of the user. 34. The system of claim 33, wherein a new completion time is estimated for the identified pending action, the first message includes the new completion time for the identified pending action, a second new completion time is estimated for the identified pending action, and the second message includes the second new completion time for the identified pending action. 35. The system of claim 26, wherein the determining the completion time includes determining a probability percentage that the user will be able to complete the pending action within a period of time. 36. A computer program product, comprising: a hardware storage device having stored therein computer program code for generating a user unavailability alert in a collaborative environment, the computer program code, which when executed by a computer hardware system, causes the computer hardware system to perform: receiving, from a user, a user input indicating an unavailability of the user; identifying, responsive to the user input, a collaborative session in which the user participated; identifying a pending action to be performed by the user within the identified collaborative session; determining a completion time for the identified pending action and a second participant of the collaborative session; and sending, based upon the user input indicating the unavailability of the user and the completion time, a first message to the second participant. 37. The computer program product of claim 36, wherein in response to the collaborative session being identified, collaboration media associated with the collaborative session is retrieved, and the pending action is identified based upon an analysis of the collaboration media. 38. The computer program product of claim 36, wherein the sending is based upon an analysis that concludes that the unavailability of the user impacts the second participant. 39. The computer program product of claim 36, wherein the determining the completion time includes an amount of work already performed by the user on the identified pending action. 40. The computer program product of claim 36, wherein the first message indicates that the completion time of the identified pending action will be affected by the unavailability of the user. 41. The computer program product of claim 40, wherein a new completion time is estimated for the identified pending action, and the first message includes the new completion time for the identified pending action. 42. The computer program product of claim 36, wherein the identified pending action is automatically rescheduled. 43. The computer program product of claim 36, wherein in response to determining a user input indicating an availability of the user is not received within a specified period of time subsequent to the user input, a second message is sent to the second participant indicating continued unavailability of the user. 44. The computer program product of claim 43, wherein a new completion time is estimated for the identified pending action, the first message includes the new completion time for the identified pending action, a second new completion time is estimated for the identified pending action, and the second message includes the second new completion time for the identified pending action. 45. The computer program product of claim 36, wherein the determining the completion time includes determining a probability percentage that the user will be able to complete the pending action within a period of time.
2,400
9,321
9,321
15,778,261
2,465
There is provided mechanisms for quality evaluation of an MBMS bearer. A method is performed by a wireless device. The method comprises determining a measurement of signal quality of a reference signal received separate from the MBMS bearer, the reference signal being from at least one radio access network node, to obtain a quality measure for the MBMS bearer. The method comprises estimating an expected BLER of the MBMS bearer from the measurement and from an MCS used for a MCH of the MBMS bearer.
1-21. (canceled) 22. A method for quality evaluation of a Multimedia Broadcast Multicast Services (MBMS) bearer, the method comprising a wireless device: determining a measurement of signal quality of a reference signal separate from the MBMS bearer to obtain a quality measure for the MBMS bearer, the reference signal being received from at least one radio access network node; and estimating an expected block error rate (BLER) of the MBMS bearer from the measurement and from a modulation and coding scheme (MCS) used for a Multicast Channel (MCH) of the MBMS bearer. 23. The method of claim 22, wherein the quality measure is at least one of: Reference Signal Received Quality (RSRQ) for the MBMS bearer or Signal to Interference and Noise Ratio (SINR) for the MBMS bearer. 24. The method of claim 22, wherein the BLER is estimated as if data were sent on the MBMS bearer. 25. The method of claim 22, wherein the reference signal is transmitted on a data-less MBMS bearer. 26. The method of claim 22: wherein the reference signal is an MBMS Single Frequency Network (MBSFN) reference signal; and wherein the MBSFN reference signal is used by the wireless device to determine an MBSFN Reference Signal Received Quality (RSRQ) from which the BLER of the MBMS bearer is estimated. 27. The method of claim 22: wherein the reference signal is a cell specific reference signal (CSRS); and wherein the CSRS is used by the wireless device to determine the quality measure for the MBMS bearer. 28. The method of claim 22: further comprising estimating a speed at which the wireless device is moving: and wherein the expected BLER is estimated also from the speed or Doppler effect resulting from movement of the wireless device. 29. The method of claim 22, further comprising comparing the expected BLER with a quality measurement of at least one potential or existing additional bearer. 30. The method of claim 29, wherein each of the at least one additional bearer is a unicast bearer, another MBMS bearer, or a bearer for relay transmission. 31. The method of claim 30, wherein the another MBMS bearer uses MBMS Single Frequency Network (MBSFN) transmission mode or Single Cell Point to Multipoint (SC-PTM) transmission mode. 32. The method of claim 29, further comprising sending a report comprising the expected BLER and the quality measurement to a control node of the MBMS bearer. 33. The method of claim 32, wherein the report indicates that the expected BLER is above a first threshold. 34. The method of claim 32, wherein the report indicates an expected BLER of the at least one additional bearer. 35. The method of claim 32, wherein the sending only is performed when the expected BLER of the MBMS bearer is above a second threshold. 36. The method of claim 22, further comprising receiving, from the at least one radio access network node, system information indicating activation of the MBMS bearer by a control node. 37. The method of claim 36: further comprising receiving control information about the MBMS bearer from the at least one radio access network node; wherein the control information comprises the MCS. 38. A wireless device configured for quality evaluation of a Multimedia Broadcast Multicast Services (MBMS) bearer, the wireless device comprising: processing circuitry; memory containing instructions executable by the processing circuitry whereby the wireless device is operative to: determine a measurement of signal quality of a reference signal separate from the MBMS bearer to obtain a quality measure for the MBMS bearer, the reference signal being received from at least one radio access network node; and estimate an expected block error rate (BLER) of the MBMS bearer from the measurement and from a modulation and coding scheme (MCS) used for a Multicast Channel (MCH) of the MBMS bearer. 39. A non-transitory computer readable recording medium storing a computer program product for controlling a wireless device for quality evaluation of a Multimedia Broadcast Multicast Services (MBMS) bearer, the computer program product comprising software instructions which, when run on processing circuitry of the wireless device, causes the wireless device to: determine a measurement of signal quality of a reference signal separate from the MBMS bearer to obtain a quality measure for the MBMS bearer, the reference signal being received from at least one radio access network node; and estimate an expected block error rate (BLER) of the MBMS bearer from the measurement and from a modulation and coding scheme (MCS) used for a Multicast Channel (MCH) of the MBMS bearer.
There is provided mechanisms for quality evaluation of an MBMS bearer. A method is performed by a wireless device. The method comprises determining a measurement of signal quality of a reference signal received separate from the MBMS bearer, the reference signal being from at least one radio access network node, to obtain a quality measure for the MBMS bearer. The method comprises estimating an expected BLER of the MBMS bearer from the measurement and from an MCS used for a MCH of the MBMS bearer.1-21. (canceled) 22. A method for quality evaluation of a Multimedia Broadcast Multicast Services (MBMS) bearer, the method comprising a wireless device: determining a measurement of signal quality of a reference signal separate from the MBMS bearer to obtain a quality measure for the MBMS bearer, the reference signal being received from at least one radio access network node; and estimating an expected block error rate (BLER) of the MBMS bearer from the measurement and from a modulation and coding scheme (MCS) used for a Multicast Channel (MCH) of the MBMS bearer. 23. The method of claim 22, wherein the quality measure is at least one of: Reference Signal Received Quality (RSRQ) for the MBMS bearer or Signal to Interference and Noise Ratio (SINR) for the MBMS bearer. 24. The method of claim 22, wherein the BLER is estimated as if data were sent on the MBMS bearer. 25. The method of claim 22, wherein the reference signal is transmitted on a data-less MBMS bearer. 26. The method of claim 22: wherein the reference signal is an MBMS Single Frequency Network (MBSFN) reference signal; and wherein the MBSFN reference signal is used by the wireless device to determine an MBSFN Reference Signal Received Quality (RSRQ) from which the BLER of the MBMS bearer is estimated. 27. The method of claim 22: wherein the reference signal is a cell specific reference signal (CSRS); and wherein the CSRS is used by the wireless device to determine the quality measure for the MBMS bearer. 28. The method of claim 22: further comprising estimating a speed at which the wireless device is moving: and wherein the expected BLER is estimated also from the speed or Doppler effect resulting from movement of the wireless device. 29. The method of claim 22, further comprising comparing the expected BLER with a quality measurement of at least one potential or existing additional bearer. 30. The method of claim 29, wherein each of the at least one additional bearer is a unicast bearer, another MBMS bearer, or a bearer for relay transmission. 31. The method of claim 30, wherein the another MBMS bearer uses MBMS Single Frequency Network (MBSFN) transmission mode or Single Cell Point to Multipoint (SC-PTM) transmission mode. 32. The method of claim 29, further comprising sending a report comprising the expected BLER and the quality measurement to a control node of the MBMS bearer. 33. The method of claim 32, wherein the report indicates that the expected BLER is above a first threshold. 34. The method of claim 32, wherein the report indicates an expected BLER of the at least one additional bearer. 35. The method of claim 32, wherein the sending only is performed when the expected BLER of the MBMS bearer is above a second threshold. 36. The method of claim 22, further comprising receiving, from the at least one radio access network node, system information indicating activation of the MBMS bearer by a control node. 37. The method of claim 36: further comprising receiving control information about the MBMS bearer from the at least one radio access network node; wherein the control information comprises the MCS. 38. A wireless device configured for quality evaluation of a Multimedia Broadcast Multicast Services (MBMS) bearer, the wireless device comprising: processing circuitry; memory containing instructions executable by the processing circuitry whereby the wireless device is operative to: determine a measurement of signal quality of a reference signal separate from the MBMS bearer to obtain a quality measure for the MBMS bearer, the reference signal being received from at least one radio access network node; and estimate an expected block error rate (BLER) of the MBMS bearer from the measurement and from a modulation and coding scheme (MCS) used for a Multicast Channel (MCH) of the MBMS bearer. 39. A non-transitory computer readable recording medium storing a computer program product for controlling a wireless device for quality evaluation of a Multimedia Broadcast Multicast Services (MBMS) bearer, the computer program product comprising software instructions which, when run on processing circuitry of the wireless device, causes the wireless device to: determine a measurement of signal quality of a reference signal separate from the MBMS bearer to obtain a quality measure for the MBMS bearer, the reference signal being received from at least one radio access network node; and estimate an expected block error rate (BLER) of the MBMS bearer from the measurement and from a modulation and coding scheme (MCS) used for a Multicast Channel (MCH) of the MBMS bearer.
2,400
9,322
9,322
16,675,803
2,463
Certain aspects of the present disclosure relate to methods and apparatus for providing broadcast information on supported and non-supported slices using communications systems operating according to new radio (NR) technologies. For example, a method for wireless communication by a user equipment (UE) may generally include receiving signaling of at least one of: a first list of network slices indicated as available in a first cell or a second list of network slices indicated as unavailable in the first cell, and performing at least one of cell reselection or cell selection taking into account the network slices listed in the at least one of the first list or the second list.
1. A method for wireless communications by a user equipment (UE), comprising: receiving signaling of at least one of: a first list of one or more first features indicated as available in a first cell, or a second list of one or more second features indicated as unavailable in the first cell; and performing at least one of cell reselection or cell selection based at least in part on at least one of: the one or more first features listed in the first list, or the one or more second features listed in the second list. 2. The method of claim 1, wherein at least one of the one or more first features or the one or more second features is identified by one or more network slices. 3. The method of claim 1, wherein: only signaling of the first list is received; and the performing is based at least in part on considering that the first cell lacks support for features other than the one or more first features. 4. The method of claim 3, further comprising receiving signaling indicating that the first cell lacks support for features other than the one or more first features. 5. The method of claim 1, wherein: only signaling of the first list is received; and the performing is based at least in part on prioritizing one or more cells that indicate availability of a feature of interest to the UE over one or more cells that lack availability of the feature of interest to the UE as determined based on the first list. 6. The method of claim 1, wherein: only signaling of the first list is received; and the performing is based at least in part on considering that the first cell may support or lack support for features other than the one or more first features. 7. The method of claim 6, further comprising receiving signaling indicating that the first cell may support or lack support for features other than the one or more first features. 8. The method of claim 1, wherein: only signaling of the second list is received; and the performing is based at least in part on considering that the first cell supports features other than the one or more second features. 9. The method of claim 8, further comprising receiving signaling indicating that the first cell supports features other than the one or more second features. 10. The method of claim 1, wherein: only signaling of the second list is received; and the performing is based at least in part on prioritizing one or more cells that have availability of a feature of interest to the UE over one or more cells that lack availability of the feature of interest to the UE as determined based on the second list. 11. The method of claim 1, wherein: only signaling of the second list is received; and the performing is based at least in part on considering that the first cell may support or lack support for features other than the one or more second features. 12. The method of claim 1, further comprising receiving signaling indicating that the first cell may support or lack support for features other than the one or more second features. 13. The method of claim 1, wherein: signaling of the first list and second list is received; and the performing is based at least in part on prioritizing one or more cells that have availability of a feature of interest to the UE over one or more cells that lack availability of the feature of interest to the UE as determined based on the first list and the second list. 14. The method of claim 1, further comprising: maintaining, based on a history of one or more cells the UE has camped on, one or more lists indicating availability or unavailability of one or more features for each of the one or more cells; and wherein the performing is based at least in part on the one or more features listed in the one or more lists. 15. The method of claim 1, further comprising: receiving information regarding availability or unavailability of one or more features in each of one or more neighboring cells of the first cell; and wherein the performing is based at least in part on the information. 16. A method for wireless communications by a network entity, comprising: storing information regarding at least one of: a first list of one or more first features available in a first cell, or a second list of one or more second features unavailable in the first cell; and providing the at least one of the first list or the second list to one or more user equipments (UEs). 17. The method of claim 16, wherein at least one of the one or more first features or the one or more second features is identified by one or more network slices. 18. The method of claim 16, further comprising deciding whether to provide the first list, the second list, or the first list and the second list. 19. The method of claim 18, wherein the deciding is based on at least one of: the one or more features available in the first cell, a configuration of the first cell, a configuration of the one or more UEs, or network congestion. 20. The method of claim 16, wherein the providing comprises providing only the first list, and further comprising providing an indication that that the first cell lacks support for features other than the one or more first features. 21. The method of claim 16, wherein the providing comprises providing only the first list, and further comprising providing an indication of that the first cell may support or lack support for features other than the one or more first features. 22. The method of claim 16, wherein the providing comprises providing only the second list, and further comprising providing an indication that the first cell supports features other than the one or more second features. 23. The method of claim 16, wherein the providing comprises providing only the second list, and further comprising providing an indication that the first cell may support or lack support for features other than the one or more second features. 24. The method of claim 16, further comprising providing information regarding availability or unavailability of one or more features in each of one or more neighboring cells of the first cell. 25. A method for wireless communications by a user equipment (UE), comprising: receiving signaling of at least one of: a first list of one or more first services indicated as available in a first cell, or a second list of one or more second services indicated as unavailable in the first cell; and performing at least one of cell reselection or cell selection based at least in part on at least one of: the one or more first services listed in the first list, or the one or more second services listed in the second list. 26. The method of claim 25, wherein: only signaling of the first list is received; and the performing is based at least in part on considering that the first cell lacks support for features other than the one or more first features. 27. The method of claim 25, wherein: the performing is based at least in part on prioritizing one or more cells that indicate availability of a service of interest to the UE over one or more cells that lack availability of the service of interest to the UE as determined based on the at least one of the first list or the second list. 28. A method for wireless communications by a network entity, comprising: storing information regarding at least one of: a first list of one or more first services available in a first cell, or a second list of one or more second services unavailable in the first cell; and providing the at least one of the first list or the second list to one or more user equipments (UEs). 29. The method of claim 28, wherein the providing comprises providing only the first list, and further comprising providing an indication that that the first cell lacks support for services other than the one or more first services. 30. The method of claim 28, wherein the providing comprises providing only the second list, and further comprising providing an indication that the first cell supports services other than the one or more second services.
Certain aspects of the present disclosure relate to methods and apparatus for providing broadcast information on supported and non-supported slices using communications systems operating according to new radio (NR) technologies. For example, a method for wireless communication by a user equipment (UE) may generally include receiving signaling of at least one of: a first list of network slices indicated as available in a first cell or a second list of network slices indicated as unavailable in the first cell, and performing at least one of cell reselection or cell selection taking into account the network slices listed in the at least one of the first list or the second list.1. A method for wireless communications by a user equipment (UE), comprising: receiving signaling of at least one of: a first list of one or more first features indicated as available in a first cell, or a second list of one or more second features indicated as unavailable in the first cell; and performing at least one of cell reselection or cell selection based at least in part on at least one of: the one or more first features listed in the first list, or the one or more second features listed in the second list. 2. The method of claim 1, wherein at least one of the one or more first features or the one or more second features is identified by one or more network slices. 3. The method of claim 1, wherein: only signaling of the first list is received; and the performing is based at least in part on considering that the first cell lacks support for features other than the one or more first features. 4. The method of claim 3, further comprising receiving signaling indicating that the first cell lacks support for features other than the one or more first features. 5. The method of claim 1, wherein: only signaling of the first list is received; and the performing is based at least in part on prioritizing one or more cells that indicate availability of a feature of interest to the UE over one or more cells that lack availability of the feature of interest to the UE as determined based on the first list. 6. The method of claim 1, wherein: only signaling of the first list is received; and the performing is based at least in part on considering that the first cell may support or lack support for features other than the one or more first features. 7. The method of claim 6, further comprising receiving signaling indicating that the first cell may support or lack support for features other than the one or more first features. 8. The method of claim 1, wherein: only signaling of the second list is received; and the performing is based at least in part on considering that the first cell supports features other than the one or more second features. 9. The method of claim 8, further comprising receiving signaling indicating that the first cell supports features other than the one or more second features. 10. The method of claim 1, wherein: only signaling of the second list is received; and the performing is based at least in part on prioritizing one or more cells that have availability of a feature of interest to the UE over one or more cells that lack availability of the feature of interest to the UE as determined based on the second list. 11. The method of claim 1, wherein: only signaling of the second list is received; and the performing is based at least in part on considering that the first cell may support or lack support for features other than the one or more second features. 12. The method of claim 1, further comprising receiving signaling indicating that the first cell may support or lack support for features other than the one or more second features. 13. The method of claim 1, wherein: signaling of the first list and second list is received; and the performing is based at least in part on prioritizing one or more cells that have availability of a feature of interest to the UE over one or more cells that lack availability of the feature of interest to the UE as determined based on the first list and the second list. 14. The method of claim 1, further comprising: maintaining, based on a history of one or more cells the UE has camped on, one or more lists indicating availability or unavailability of one or more features for each of the one or more cells; and wherein the performing is based at least in part on the one or more features listed in the one or more lists. 15. The method of claim 1, further comprising: receiving information regarding availability or unavailability of one or more features in each of one or more neighboring cells of the first cell; and wherein the performing is based at least in part on the information. 16. A method for wireless communications by a network entity, comprising: storing information regarding at least one of: a first list of one or more first features available in a first cell, or a second list of one or more second features unavailable in the first cell; and providing the at least one of the first list or the second list to one or more user equipments (UEs). 17. The method of claim 16, wherein at least one of the one or more first features or the one or more second features is identified by one or more network slices. 18. The method of claim 16, further comprising deciding whether to provide the first list, the second list, or the first list and the second list. 19. The method of claim 18, wherein the deciding is based on at least one of: the one or more features available in the first cell, a configuration of the first cell, a configuration of the one or more UEs, or network congestion. 20. The method of claim 16, wherein the providing comprises providing only the first list, and further comprising providing an indication that that the first cell lacks support for features other than the one or more first features. 21. The method of claim 16, wherein the providing comprises providing only the first list, and further comprising providing an indication of that the first cell may support or lack support for features other than the one or more first features. 22. The method of claim 16, wherein the providing comprises providing only the second list, and further comprising providing an indication that the first cell supports features other than the one or more second features. 23. The method of claim 16, wherein the providing comprises providing only the second list, and further comprising providing an indication that the first cell may support or lack support for features other than the one or more second features. 24. The method of claim 16, further comprising providing information regarding availability or unavailability of one or more features in each of one or more neighboring cells of the first cell. 25. A method for wireless communications by a user equipment (UE), comprising: receiving signaling of at least one of: a first list of one or more first services indicated as available in a first cell, or a second list of one or more second services indicated as unavailable in the first cell; and performing at least one of cell reselection or cell selection based at least in part on at least one of: the one or more first services listed in the first list, or the one or more second services listed in the second list. 26. The method of claim 25, wherein: only signaling of the first list is received; and the performing is based at least in part on considering that the first cell lacks support for features other than the one or more first features. 27. The method of claim 25, wherein: the performing is based at least in part on prioritizing one or more cells that indicate availability of a service of interest to the UE over one or more cells that lack availability of the service of interest to the UE as determined based on the at least one of the first list or the second list. 28. A method for wireless communications by a network entity, comprising: storing information regarding at least one of: a first list of one or more first services available in a first cell, or a second list of one or more second services unavailable in the first cell; and providing the at least one of the first list or the second list to one or more user equipments (UEs). 29. The method of claim 28, wherein the providing comprises providing only the first list, and further comprising providing an indication that that the first cell lacks support for services other than the one or more first services. 30. The method of claim 28, wherein the providing comprises providing only the second list, and further comprising providing an indication that the first cell supports services other than the one or more second services.
2,400
9,323
9,323
15,786,192
2,482
The present invention relates in general to microscopy systems. In particular, the present invention relates to microscopes rendering digital images of samples, with the capability to digitally control the focus of the microscope system, and the software used to control the operation of the digital microscope system. Further, the present invention relates to a microscope structure that allows for compact and multi-functional use of a microscope, providing for light shielding and control with samples that require specific light wavelength characteristics, such as fluorescence, for detection and imaging. The microscope is adjustable, with a structure that can move along range(s) of motion and degree(s) of freedom to allow for ease of access to samples, shielding of samples, and manipulation of a display apparatus.
1. A digital image display apparatus, comprising: a digital imaging source, configured to obtain digital images from a focal plane; a display screen, electrically connected to the digital imaging source, and configured to receive digital images from the digital imaging source and to display the digital images; and a control mechanism, operably connected to the digital imaging source, and configured to move the focal plane of the digital imaging source. 2. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, the digital imaging source being configured to move the focal plane in response to rotation of the rotatable dial, and a mode button that changes the granularity of movement in response to rotation of the rotatable dial. 3. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a first focusing button, a second focusing button, the digital imaging source being configured to move the focal plane in response to operation of the first and second focusing buttons, and a mode button that changes the granularity of movement in response to operation of the first and second focusing buttons. 4. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, a first focusing button, and a second focusing button, the rotatable dial operating to cause the focal plane of the digital imaging source to change with a first degree of movement granularity, and the first and second focusing buttons operating to cause the focal plane of the digital imaging source to change with a second degree of movement granularity which is different than the first degree of movement granularity. 5. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, the rotatable dial being capable of operation in a primary position and a secondary position, such that operation of the rotatable dial in the primary position causes the focal plane of the digital imaging source to change with a first degree of movement granularity, and operation of the rotatable dial in the secondary position causes the focal plane of the digital imaging source to change with a second degree of movement granularity which is different than the first degree of movement granularity. 6. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, the rotatable dial being capable of operation in a primary position, a secondary position, and a tertiary position, such that operation of the rotatable dial in the primary position causes the focal plane of the digital imaging source to change with a first degree of movement granularity, operation of the rotatable dial in the secondary position causes the focal plane of the digital imaging source to change with a second degree of movement granularity which is different than the first degree of movement granularity, and operation of the rotatable dial in the tertiary position causes the focal plane of the digital imaging source to change with a third degree of movement granularity which is different than both the first degree of movement granularity and the second degree of movement granularity. 7. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, the rotatable dial being capable of operation at any position in between and including a primary position and a secondary position, such that operation of the rotatable dial causes the focal plane of the digital imaging source to change with a degree of movement granularity related to the position of the focusing dial relative to the primary and secondary positions. 8. The digital image display apparatus of claim 1, wherein the display screen provides a user control interface operable to receive user control inputs configured to adjust the focal plane of the digital imaging source. 9. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, a first focusing button, a second focusing button, and a user control interface operable provided on the display screen to receive user control inputs configured to adjust the focal plane of the digital imaging source. 10. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a first focusing button, a second focusing button, a mode button, and a rotatable dial, wherein the digital imaging source is configured to move the focal plane in response to operation of the first and second focusing buttons, wherein the mode button is configured to change the granularity of movement in response to operation of the first and second focusing buttons with a first degree of movement granularity, and wherein the rotatable dial is configured to change the granularity of movement in response to operation of the first and second focusing buttons with a second degree of movement granularity which is different than the first degree of movement granularity. 11. A digital microscope display system, comprising: a first camera and a second camera, configured to obtain digital images from a target region; a display screen, electrically connected to both the first camera and the second camera, configured to receive digital images from the both the first camera and the second camera and to concurrently display the digital images; a first set of focusing controls, operably connected to the first camera and configured to move the focal plane of the first camera; a second set of focusing controls, operably connected to the first set of focusing controls and configured to change the degree of movement by which the first set of controls move the focal plane of the first camera. 12. The digital microscope display system of claim 11, wherein the first set of focusing controls comprise a first focusing button configured to move the focal plan of the first camera in an upward direction and a second focusing button configured to move the focal plan of the first camera in an downward direction. 13. The digital microscope display system of claim 11, wherein the first set of focusing controls comprise a rotatable dial configured to adjust the height of the focal plan of the first camera. 14. The digital microscope display system of claim 11, wherein the second set of focusing controls comprise a mode button configured to switch the first set of focusing controls between a fine degree of focus control and a coarse degree of focus control. 15. The digital microscope display system of claim 14, wherein when configured to move with the fine degree of focus control the first set of focusing controls are configured move the focal plane of the first camera by less than one micron, and wherein when configured to move with the coarse degree of focus control the first set of focusing controls are configured to move the focal plane of the first camera by no less than ten microns. 16. The digital microscope display system of claim 11, wherein the display screen is configured to display digital images received from the first camera with digital images received from the second camera within a thumbnail region partially overlying the digital images received from the first camera. 17. The digital microscope display system of claim 16, wherein the display screen is configured to superimpose a pointer over the digital images received from the second camera within the thumbnail region, indicating a location being viewed or magnified by the first camera. 18. The digital microscope display system of claim 16, wherein the thumbnail region displays an illustrated representation of the digital images received from the second camera. 19. The digital microscope display system of claim 16, wherein the thumbnail region displays a hybrid combination of the digital images received from the second camera and an illustrated representation of the digital images received from the second camera. 20. The digital microscope display system of claim 11, wherein both the first set of focusing controls and the second set of focusing controls are operable by touch on the display screen.
The present invention relates in general to microscopy systems. In particular, the present invention relates to microscopes rendering digital images of samples, with the capability to digitally control the focus of the microscope system, and the software used to control the operation of the digital microscope system. Further, the present invention relates to a microscope structure that allows for compact and multi-functional use of a microscope, providing for light shielding and control with samples that require specific light wavelength characteristics, such as fluorescence, for detection and imaging. The microscope is adjustable, with a structure that can move along range(s) of motion and degree(s) of freedom to allow for ease of access to samples, shielding of samples, and manipulation of a display apparatus.1. A digital image display apparatus, comprising: a digital imaging source, configured to obtain digital images from a focal plane; a display screen, electrically connected to the digital imaging source, and configured to receive digital images from the digital imaging source and to display the digital images; and a control mechanism, operably connected to the digital imaging source, and configured to move the focal plane of the digital imaging source. 2. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, the digital imaging source being configured to move the focal plane in response to rotation of the rotatable dial, and a mode button that changes the granularity of movement in response to rotation of the rotatable dial. 3. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a first focusing button, a second focusing button, the digital imaging source being configured to move the focal plane in response to operation of the first and second focusing buttons, and a mode button that changes the granularity of movement in response to operation of the first and second focusing buttons. 4. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, a first focusing button, and a second focusing button, the rotatable dial operating to cause the focal plane of the digital imaging source to change with a first degree of movement granularity, and the first and second focusing buttons operating to cause the focal plane of the digital imaging source to change with a second degree of movement granularity which is different than the first degree of movement granularity. 5. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, the rotatable dial being capable of operation in a primary position and a secondary position, such that operation of the rotatable dial in the primary position causes the focal plane of the digital imaging source to change with a first degree of movement granularity, and operation of the rotatable dial in the secondary position causes the focal plane of the digital imaging source to change with a second degree of movement granularity which is different than the first degree of movement granularity. 6. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, the rotatable dial being capable of operation in a primary position, a secondary position, and a tertiary position, such that operation of the rotatable dial in the primary position causes the focal plane of the digital imaging source to change with a first degree of movement granularity, operation of the rotatable dial in the secondary position causes the focal plane of the digital imaging source to change with a second degree of movement granularity which is different than the first degree of movement granularity, and operation of the rotatable dial in the tertiary position causes the focal plane of the digital imaging source to change with a third degree of movement granularity which is different than both the first degree of movement granularity and the second degree of movement granularity. 7. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, the rotatable dial being capable of operation at any position in between and including a primary position and a secondary position, such that operation of the rotatable dial causes the focal plane of the digital imaging source to change with a degree of movement granularity related to the position of the focusing dial relative to the primary and secondary positions. 8. The digital image display apparatus of claim 1, wherein the display screen provides a user control interface operable to receive user control inputs configured to adjust the focal plane of the digital imaging source. 9. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a rotatable dial, a first focusing button, a second focusing button, and a user control interface operable provided on the display screen to receive user control inputs configured to adjust the focal plane of the digital imaging source. 10. The digital image display apparatus of claim 1, wherein the control mechanism for moving the focal plane of the digital imaging source comprises a first focusing button, a second focusing button, a mode button, and a rotatable dial, wherein the digital imaging source is configured to move the focal plane in response to operation of the first and second focusing buttons, wherein the mode button is configured to change the granularity of movement in response to operation of the first and second focusing buttons with a first degree of movement granularity, and wherein the rotatable dial is configured to change the granularity of movement in response to operation of the first and second focusing buttons with a second degree of movement granularity which is different than the first degree of movement granularity. 11. A digital microscope display system, comprising: a first camera and a second camera, configured to obtain digital images from a target region; a display screen, electrically connected to both the first camera and the second camera, configured to receive digital images from the both the first camera and the second camera and to concurrently display the digital images; a first set of focusing controls, operably connected to the first camera and configured to move the focal plane of the first camera; a second set of focusing controls, operably connected to the first set of focusing controls and configured to change the degree of movement by which the first set of controls move the focal plane of the first camera. 12. The digital microscope display system of claim 11, wherein the first set of focusing controls comprise a first focusing button configured to move the focal plan of the first camera in an upward direction and a second focusing button configured to move the focal plan of the first camera in an downward direction. 13. The digital microscope display system of claim 11, wherein the first set of focusing controls comprise a rotatable dial configured to adjust the height of the focal plan of the first camera. 14. The digital microscope display system of claim 11, wherein the second set of focusing controls comprise a mode button configured to switch the first set of focusing controls between a fine degree of focus control and a coarse degree of focus control. 15. The digital microscope display system of claim 14, wherein when configured to move with the fine degree of focus control the first set of focusing controls are configured move the focal plane of the first camera by less than one micron, and wherein when configured to move with the coarse degree of focus control the first set of focusing controls are configured to move the focal plane of the first camera by no less than ten microns. 16. The digital microscope display system of claim 11, wherein the display screen is configured to display digital images received from the first camera with digital images received from the second camera within a thumbnail region partially overlying the digital images received from the first camera. 17. The digital microscope display system of claim 16, wherein the display screen is configured to superimpose a pointer over the digital images received from the second camera within the thumbnail region, indicating a location being viewed or magnified by the first camera. 18. The digital microscope display system of claim 16, wherein the thumbnail region displays an illustrated representation of the digital images received from the second camera. 19. The digital microscope display system of claim 16, wherein the thumbnail region displays a hybrid combination of the digital images received from the second camera and an illustrated representation of the digital images received from the second camera. 20. The digital microscope display system of claim 11, wherein both the first set of focusing controls and the second set of focusing controls are operable by touch on the display screen.
2,400
9,324
9,324
15,855,028
2,482
A rearview display system is provided for a vehicle having: a rear camera generating a rearward video stream, a right-side camera generating a right-side stream, and a left-side camera generating a left-side stream. The system includes a processing circuit for generating a composite video stream from: (a) the rearward stream and the right-side stream, (b) the rearward stream and the left-side stream, and (c) at least the rearward stream. When the composite stream is formed from the rearward stream and the right-side stream, the rearward stream extends across the whole composite stream with the exception of a right corner where the right-side stream is superimposed over the rearward stream. When the composite stream is formed from the rearward stream and the left-side stream, the rearward stream extends across the whole composite stream with the exception of a left corner where the left-side stream is superimposed over the rearward stream.
1. A rearview display system for a vehicle equipped with: a rear camera for generating a rearward video stream of a scene to a rear of the vehicle, a right-side camera for generating a right-side video stream of a scene to a right side of the vehicle, and a left-side camera for generating a left-side video stream of a scene to a left side of the vehicle, the rearview display system comprising: a processing circuit for receiving the rearward video stream, the right-side video stream, the left-side video stream, and an active spotter signal, wherein the processing circuit generates a composite video stream in response to the active spotter signal, the processing circuit forming the composite video stream from: (a) the rearward video stream and the right-side video stream, (b) the rearward video stream and the left-side video stream, and (c) at least the rearward video stream; and a display for displaying the composite video stream, wherein, when the composite video stream is formed from the rearward video stream and the right-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper right corner of the composite video stream where the right-side video stream is superimposed over the rearward video stream, and wherein, when the composite video stream is formed from the rearward video stream and the left-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper left corner of the composite video stream where the left-side video stream is superimposed over the rearward video stream. 2. The rearview display system of claim 1, wherein the processing circuit forms the composite video stream from the rearward video stream, the right-side video stream and the left-side video stream when the active spotter signal is not received. 3. The rearview display system of claim 2, wherein, when the active spotter signal is not received, the processing circuit forms the composite video stream from the rearward video stream, the right-side video stream, and the left-side video stream by seamlessly stitching the video streams together to appear as one contiguous video stream. 4. The rearview display system of claim 1, wherein the active spotter signal is selected from at least one of a turn signal, a side blind zone signal, a rear cross path signal, an object detection signal, and a speed signal. 5. The rearview display system of claim 1, wherein the active spotter signal is received from a turn signal of the vehicle and that includes a right turn signal and a left turn signal, wherein the processing circuit receives the right turn signal and the left turn signal, wherein the processing circuit forms the composite video stream from: (a) the rearward video stream and the right-side video stream in response to the right turn signal, (b) the rearward video stream and the left-side video stream in response to the left turn signal, and (c) at least the rearward video stream when neither the right turn signal nor the left turn signal is received. 6. The rearview display system of claim 1, wherein the active spotter signal is received from left and right blind spot detectors of the vehicle that detect when a vehicle is present in one of a left blind spot or a right blind spot and the active spotter signal includes a right blind zone signal and a left blind zone signal, wherein the processing circuit receives the right blind zone signal and the left blind zone signal, wherein the processing circuit forms the composite video stream from: (a) the rearward video stream and the right-side video stream in response to the right blind zone signal, (b) the rearward video stream and the left-side video stream in response to the left blind zone signal, and (c) at least the rearward video stream when neither the right blind zone signal nor the left blind zone signal is received. 7. A rearview display system for a vehicle equipped with: a rear camera for generating a rearward video stream of a scene to a rear of the vehicle, a right-side camera for generating a right-side video stream of a scene to a right side of the vehicle, and a left-side camera for generating a left-side video stream of a scene to a left side of the vehicle, the rearview display system comprising: a processing circuit for receiving the rearward video stream, the right-side video stream, and the left-side video stream, wherein the processing circuit generates a composite video stream, the processing circuit forming the composite video stream from one of: (a) the rearward video stream and the right-side video stream, (b) the rearward video stream and the left-side video stream, and (c) at least the rearward video stream; and a display for displaying the composite video stream, wherein, when the composite video stream is formed from the rearward video stream and the right-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper right corner of the composite video stream where the right-side video stream is superimposed over the rearward video stream, and wherein, when the composite video stream is formed from the rearward video stream and the left-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper left corner of the composite video stream where the left-side video stream is superimposed over the rearward video stream. 8. The rearview display system of claim 7, wherein the processing circuit generates the composite video stream from selected combinations of the rearward video stream, the right-side video stream, and the left-side video stream in response to an active spotter signal. 9. The rearview display system of claim 8, wherein the processing circuit forms the composite video stream from the rearward video stream, the right-side video stream and the left-side video stream when the active spotter signal is not received. 10. The rearview display system of claim 9, wherein, when the active spotter signal is not received, the processing circuit forms the composite video stream from the rearward video stream, the right-side video stream, and the left-side video stream by seamlessly stitching the video streams together to appear as one contiguous video stream. 11. The rearview display system of claim 8, wherein the active spotter signal is selected from at least one of a turn signal, a side blind zone signal, a rear cross path signal, an object detection signal, and a speed signal. 12. The rearview display system of claim 8, wherein the active spotter signal is received from a turn signal of the vehicle and that includes a right turn signal and a left turn signal, wherein the processing circuit receives the right turn signal and the left turn signal, wherein the processing circuit forms the composite video stream from: (a) the rearward video stream and the right-side video stream in response to the right turn signal, (b) the rearward video stream and the left-side video stream in response to the left turn signal, and (c) at least the rearward video stream when neither the right turn signal nor the left turn signal is received. 13. The rearview display system of claim 8, wherein the active spotter signal is received from left and right blind spot detectors of the vehicle that detect when a vehicle is present in one of a left blind spot or a right blind spot and the active spotter signal includes a right blind zone signal and a left blind zone signal, wherein the processing circuit receives the right blind zone signal and the left blind zone signal, wherein the processing circuit forms the composite video stream from: (a) the rearward video stream and the right-side video stream in response to the right blind zone signal, (b) the rearward video stream and the left-side video stream in response to the left blind zone signal, and (c) at least the rearward video stream when neither the right blind zone signal nor the left blind zone signal is received. 14. The rearview display system of claim 7, wherein the processing circuit generates the composite video stream from selected combinations of the rearward video stream, the right-side video stream, and the left-side video stream in response to user input. 15. A method of displaying rearward images on a rearview display for a vehicle equipped with: a rear camera for generating a rearward video stream of a scene to a rear of the vehicle, a right-side camera for generating a right-side video stream of a scene to a right side of the vehicle, and a left-side camera for generating a left-side video stream of a scene to a left side of the vehicle, the method comprising: generating a composite video stream in response to an active spotter signal from: (a) the rearward video stream and the right-side video stream, (b) the rearward video stream and the left-side video stream, and (c) at least the rearward video stream; and displaying the composite video stream, wherein, when the composite video stream is formed from the rearward video stream and the right-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper right corner of the composite video stream where the right-side video stream is superimposed over the rearward video stream, and wherein, when the composite video stream is formed from the rearward video stream and the left-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper left corner of the composite video stream where the left-side video stream is superimposed over the rearward video stream. 16. The method of claim 15, wherein the composite video stream is formed from the rearward video stream, the right-side video stream and the left-side video stream when the active spotter signal is not received. 17. The method of claim 16, wherein, when the active spotter signal is not received, the composite video stream is formed from the rearward video stream, the right-side video stream, and the left-side video stream by seamlessly stitching the video streams together to appear as one contiguous video stream. 18. The method of claim 15, wherein the active spotter signal is selected from at least one of a turn signal, a side blind zone signal, a rear cross path signal, an object detection signal, and a speed signal. 19. The method of claim 15, wherein the active spotter signal is received from a turn signal of the vehicle and that includes a right turn signal and a left turn signal, wherein the composite video stream is formed from: (a) the rearward video stream and the right-side video stream in response to the right turn signal, (b) the rearward video stream and the left-side video stream in response to the left turn signal, and (c) at least the rearward video stream when neither the right turn signal nor the left turn signal is received. 20. The method of claim 15, wherein the active spotter signal is received from left and right blind spot detectors of the vehicle that detect when a vehicle is present in one of a left blind spot or a right blind spot and the active spotter signal includes a right blind zone signal and a left blind zone signal, wherein the composite video stream is formed from: (a) the rearward video stream and the right-side video stream in response to the right blind zone signal, (b) the rearward video stream and the left-side video stream in response to the left blind zone signal, and (c) at least the rearward video stream when neither the right blind zone signal nor the left blind zone signal is received.
A rearview display system is provided for a vehicle having: a rear camera generating a rearward video stream, a right-side camera generating a right-side stream, and a left-side camera generating a left-side stream. The system includes a processing circuit for generating a composite video stream from: (a) the rearward stream and the right-side stream, (b) the rearward stream and the left-side stream, and (c) at least the rearward stream. When the composite stream is formed from the rearward stream and the right-side stream, the rearward stream extends across the whole composite stream with the exception of a right corner where the right-side stream is superimposed over the rearward stream. When the composite stream is formed from the rearward stream and the left-side stream, the rearward stream extends across the whole composite stream with the exception of a left corner where the left-side stream is superimposed over the rearward stream.1. A rearview display system for a vehicle equipped with: a rear camera for generating a rearward video stream of a scene to a rear of the vehicle, a right-side camera for generating a right-side video stream of a scene to a right side of the vehicle, and a left-side camera for generating a left-side video stream of a scene to a left side of the vehicle, the rearview display system comprising: a processing circuit for receiving the rearward video stream, the right-side video stream, the left-side video stream, and an active spotter signal, wherein the processing circuit generates a composite video stream in response to the active spotter signal, the processing circuit forming the composite video stream from: (a) the rearward video stream and the right-side video stream, (b) the rearward video stream and the left-side video stream, and (c) at least the rearward video stream; and a display for displaying the composite video stream, wherein, when the composite video stream is formed from the rearward video stream and the right-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper right corner of the composite video stream where the right-side video stream is superimposed over the rearward video stream, and wherein, when the composite video stream is formed from the rearward video stream and the left-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper left corner of the composite video stream where the left-side video stream is superimposed over the rearward video stream. 2. The rearview display system of claim 1, wherein the processing circuit forms the composite video stream from the rearward video stream, the right-side video stream and the left-side video stream when the active spotter signal is not received. 3. The rearview display system of claim 2, wherein, when the active spotter signal is not received, the processing circuit forms the composite video stream from the rearward video stream, the right-side video stream, and the left-side video stream by seamlessly stitching the video streams together to appear as one contiguous video stream. 4. The rearview display system of claim 1, wherein the active spotter signal is selected from at least one of a turn signal, a side blind zone signal, a rear cross path signal, an object detection signal, and a speed signal. 5. The rearview display system of claim 1, wherein the active spotter signal is received from a turn signal of the vehicle and that includes a right turn signal and a left turn signal, wherein the processing circuit receives the right turn signal and the left turn signal, wherein the processing circuit forms the composite video stream from: (a) the rearward video stream and the right-side video stream in response to the right turn signal, (b) the rearward video stream and the left-side video stream in response to the left turn signal, and (c) at least the rearward video stream when neither the right turn signal nor the left turn signal is received. 6. The rearview display system of claim 1, wherein the active spotter signal is received from left and right blind spot detectors of the vehicle that detect when a vehicle is present in one of a left blind spot or a right blind spot and the active spotter signal includes a right blind zone signal and a left blind zone signal, wherein the processing circuit receives the right blind zone signal and the left blind zone signal, wherein the processing circuit forms the composite video stream from: (a) the rearward video stream and the right-side video stream in response to the right blind zone signal, (b) the rearward video stream and the left-side video stream in response to the left blind zone signal, and (c) at least the rearward video stream when neither the right blind zone signal nor the left blind zone signal is received. 7. A rearview display system for a vehicle equipped with: a rear camera for generating a rearward video stream of a scene to a rear of the vehicle, a right-side camera for generating a right-side video stream of a scene to a right side of the vehicle, and a left-side camera for generating a left-side video stream of a scene to a left side of the vehicle, the rearview display system comprising: a processing circuit for receiving the rearward video stream, the right-side video stream, and the left-side video stream, wherein the processing circuit generates a composite video stream, the processing circuit forming the composite video stream from one of: (a) the rearward video stream and the right-side video stream, (b) the rearward video stream and the left-side video stream, and (c) at least the rearward video stream; and a display for displaying the composite video stream, wherein, when the composite video stream is formed from the rearward video stream and the right-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper right corner of the composite video stream where the right-side video stream is superimposed over the rearward video stream, and wherein, when the composite video stream is formed from the rearward video stream and the left-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper left corner of the composite video stream where the left-side video stream is superimposed over the rearward video stream. 8. The rearview display system of claim 7, wherein the processing circuit generates the composite video stream from selected combinations of the rearward video stream, the right-side video stream, and the left-side video stream in response to an active spotter signal. 9. The rearview display system of claim 8, wherein the processing circuit forms the composite video stream from the rearward video stream, the right-side video stream and the left-side video stream when the active spotter signal is not received. 10. The rearview display system of claim 9, wherein, when the active spotter signal is not received, the processing circuit forms the composite video stream from the rearward video stream, the right-side video stream, and the left-side video stream by seamlessly stitching the video streams together to appear as one contiguous video stream. 11. The rearview display system of claim 8, wherein the active spotter signal is selected from at least one of a turn signal, a side blind zone signal, a rear cross path signal, an object detection signal, and a speed signal. 12. The rearview display system of claim 8, wherein the active spotter signal is received from a turn signal of the vehicle and that includes a right turn signal and a left turn signal, wherein the processing circuit receives the right turn signal and the left turn signal, wherein the processing circuit forms the composite video stream from: (a) the rearward video stream and the right-side video stream in response to the right turn signal, (b) the rearward video stream and the left-side video stream in response to the left turn signal, and (c) at least the rearward video stream when neither the right turn signal nor the left turn signal is received. 13. The rearview display system of claim 8, wherein the active spotter signal is received from left and right blind spot detectors of the vehicle that detect when a vehicle is present in one of a left blind spot or a right blind spot and the active spotter signal includes a right blind zone signal and a left blind zone signal, wherein the processing circuit receives the right blind zone signal and the left blind zone signal, wherein the processing circuit forms the composite video stream from: (a) the rearward video stream and the right-side video stream in response to the right blind zone signal, (b) the rearward video stream and the left-side video stream in response to the left blind zone signal, and (c) at least the rearward video stream when neither the right blind zone signal nor the left blind zone signal is received. 14. The rearview display system of claim 7, wherein the processing circuit generates the composite video stream from selected combinations of the rearward video stream, the right-side video stream, and the left-side video stream in response to user input. 15. A method of displaying rearward images on a rearview display for a vehicle equipped with: a rear camera for generating a rearward video stream of a scene to a rear of the vehicle, a right-side camera for generating a right-side video stream of a scene to a right side of the vehicle, and a left-side camera for generating a left-side video stream of a scene to a left side of the vehicle, the method comprising: generating a composite video stream in response to an active spotter signal from: (a) the rearward video stream and the right-side video stream, (b) the rearward video stream and the left-side video stream, and (c) at least the rearward video stream; and displaying the composite video stream, wherein, when the composite video stream is formed from the rearward video stream and the right-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper right corner of the composite video stream where the right-side video stream is superimposed over the rearward video stream, and wherein, when the composite video stream is formed from the rearward video stream and the left-side video stream, the rearward video stream extends across the whole composite video stream with the exception of an upper left corner of the composite video stream where the left-side video stream is superimposed over the rearward video stream. 16. The method of claim 15, wherein the composite video stream is formed from the rearward video stream, the right-side video stream and the left-side video stream when the active spotter signal is not received. 17. The method of claim 16, wherein, when the active spotter signal is not received, the composite video stream is formed from the rearward video stream, the right-side video stream, and the left-side video stream by seamlessly stitching the video streams together to appear as one contiguous video stream. 18. The method of claim 15, wherein the active spotter signal is selected from at least one of a turn signal, a side blind zone signal, a rear cross path signal, an object detection signal, and a speed signal. 19. The method of claim 15, wherein the active spotter signal is received from a turn signal of the vehicle and that includes a right turn signal and a left turn signal, wherein the composite video stream is formed from: (a) the rearward video stream and the right-side video stream in response to the right turn signal, (b) the rearward video stream and the left-side video stream in response to the left turn signal, and (c) at least the rearward video stream when neither the right turn signal nor the left turn signal is received. 20. The method of claim 15, wherein the active spotter signal is received from left and right blind spot detectors of the vehicle that detect when a vehicle is present in one of a left blind spot or a right blind spot and the active spotter signal includes a right blind zone signal and a left blind zone signal, wherein the composite video stream is formed from: (a) the rearward video stream and the right-side video stream in response to the right blind zone signal, (b) the rearward video stream and the left-side video stream in response to the left blind zone signal, and (c) at least the rearward video stream when neither the right blind zone signal nor the left blind zone signal is received.
2,400
9,325
9,325
14,053,319
2,494
There is provided a system for automating processes, the system comprising at least one computer configured to provide at least one virtual user which interacts with applications and/or documents to run at least one automated process. There is also provided a method of running automated processes, the method comprising the steps of providing at least one computer and providing at least one virtual user on the at least one computer which interacts with applications and/or documents to execute at least one automated process.
1. A system for running automated processes comprising: at least one computer configured to provide at least one virtual user which interacts with applications and/or documents to run at least one automated process. 2. The system of claim 1, further comprising a database accessible by the at least one automated process, wherein the at least one virtual user is configured to execute the at least one automated process utilising data stored in the database. 3. The system of claim 2, wherein the at least one computer is configured to host at least one virtual machine and wherein the at least one virtual machine is configured to provide the at least one virtual user to execute the at least one automated process utilising data stored in the database. 4. The system for running automated processes of claim 1, wherein the at least one computer is configured to host at least one virtual machine and further comprising at least one database server and at least one application server and wherein: the at least one virtual machine is communicatively coupled with the at least one database server and the at least one application server; the at least one application server is configured to provide instructions to the at least one virtual machine to execute the at least one automated process; and the at least one virtual machine is configured to provide the at least one virtual user to execute the at least one automated process according to the provided instructions utilising data stored in the database. 5. The system of claim 4, wherein the at least one database server, at least one application server and at least one computer form a first set, the system further comprising a second set of at least one database server, at least one application server and at least one computer, wherein: the first and second sets are communicatively coupled such that the at least one application server of each set and the at least one database of each set may communicate with each other; at least one application server of one of the sets is configured to provide instructions to the at least one virtual machine of at least one of the first and second sets; and the at least one database server of the second set is a mirror of the at least one database server of the first set. 6. The system of claim 5, wherein the at least one application server of at least one set is configured to manage the connection of the at least one virtual machine of the at least one set to the one or more database servers of the at least one set. 7. The system of claim 5, wherein the at least one application server of the at least one set contains database server credentials for securely accessing the at least one database server of the at least one set. 8. The system of claim 4, wherein the at least one virtual machine/virtual user comprises more than one virtual machine/virtual user, and the virtual machines/virtual users are grouped into at least one resource pool. 9. The system of claim 5, wherein the second set is inactive until activated upon failure of the first set. 10. The system of claim 4, wherein the at least one virtual machine is configured such that remote access is limited to providing instructions to execute automated processes, shutdown the at least one virtual machine, restart the at least one virtual machine and start up the at least one virtual machine. 11. The system of claim 4, wherein the at least one virtual machine is further configured to carry out the automated processes by interacting with one or more of: an accessibility interface, an exposed API and the presentation technology of an operating system. 12. The system of claim 4, wherein the at least one virtual machines is further configured to carry out the automated processes by interpreting HTML elements within a HTML document. 13. The system of claim 4, wherein the at least one virtual machine is configured to carry out the at least one automated process by identifying the font used by the text in a defined region of the user interface and identifying the characters of the text in the defined region of the user interface using the identified font. 14. The system of claim 4, wherein the automated processes are defined by a user and configured to be carried out on data from one or more of software systems, databases or stored files or documents. 15. The system of claim 4, wherein at least one password required to access specific software applications is stored within an encrypted credential store on the at least one database server. 16. The system of claim 15, wherein the at least one virtual machine is configured to update the at least one password stored within the encrypted credential store to a random password not known outside the system. 17. A method of running automated processes comprising the steps: providing at least one computer; providing at least one virtual user on the at least one computer which interacts with applications and/or documents to execute at least one automated process. 18. The method of claim 17, further comprising the step of providing a database accessible by the at least one automated process and wherein the at least one virtual user is configured to execute the at least one automated process utilising data stored in the database. 19. The method of claim 18, further comprising the step of hosting at least one virtual machine on the least one computer and wherein the at least one virtual machine is configured to provide the at least one virtual user to execute the at least one automated process utilising data stored in the database. 20. The method of running automated processes of to claim 17, further comprising the steps: hosting at least one virtual machine on the at least one computer; providing at least one database server and at least one application server; providing, with the application server, instructions to the at least one virtual machine to execute the at least one automated process; providing the at least one virtual user by the at least one virtual machine; and executing the at least one automated process on the at least one virtual user according to the provided instructions utilising data stored in the database; wherein the at least one virtual machine is communicatively coupled with the at least one database server and the at least one application server. 21. The method of claim 20, wherein the at least one database server, at least one application server and at least one computer form a first set and further comprising the steps of: providing a second set of at least one database server, at least one application server and at least one computer, wherein the first and second sets are communicatively coupled such that the at least one application server of each set and the at least one database of each set may communicate with each other; configuring at least one application server of one of the sets to provide instructions to the at least one virtual machine of at least one of the first and second sets; and mirroring the at least one database server of the first set on the at least one database server of the second set. 22. The method of claim 21, wherein the at least one application server of at least one set manages the connection of the at least one virtual machine of the at least one set to the one or more database servers of the at least one set. 23. The method of claim 21, wherein the at least one application server of the at least one set contains database server credentials for securely accessing the at least one database server of the at least one set. 24. The method of any of claim 21, wherein the at least one virtual machine/virtual user comprises more than one virtual machine/virtual user, and the virtual machines/virtual users are grouped into at least one resource pool. 25. The method of any of claim 21, wherein the second set is inactive until activated upon failure of the first set. 26. The method of claim 21, wherein remote access to the at least one virtual machine is limited to providing instructions to execute automated processes, shutdown the at least one virtual machine, restart the at least one virtual machine and start up the at least one virtual machine. 27. The method of any of claim 21 wherein the at least one virtual machine comprises a standard end-user desktop operating system. 28. A method of running automated processes, comprising the steps: providing a first computer communicatively coupled to a database, the database stored on one of the first computer, a second computer, and a database server; configuring the first computer to execute an automated process; executing the automated process using data stored in the database.
There is provided a system for automating processes, the system comprising at least one computer configured to provide at least one virtual user which interacts with applications and/or documents to run at least one automated process. There is also provided a method of running automated processes, the method comprising the steps of providing at least one computer and providing at least one virtual user on the at least one computer which interacts with applications and/or documents to execute at least one automated process.1. A system for running automated processes comprising: at least one computer configured to provide at least one virtual user which interacts with applications and/or documents to run at least one automated process. 2. The system of claim 1, further comprising a database accessible by the at least one automated process, wherein the at least one virtual user is configured to execute the at least one automated process utilising data stored in the database. 3. The system of claim 2, wherein the at least one computer is configured to host at least one virtual machine and wherein the at least one virtual machine is configured to provide the at least one virtual user to execute the at least one automated process utilising data stored in the database. 4. The system for running automated processes of claim 1, wherein the at least one computer is configured to host at least one virtual machine and further comprising at least one database server and at least one application server and wherein: the at least one virtual machine is communicatively coupled with the at least one database server and the at least one application server; the at least one application server is configured to provide instructions to the at least one virtual machine to execute the at least one automated process; and the at least one virtual machine is configured to provide the at least one virtual user to execute the at least one automated process according to the provided instructions utilising data stored in the database. 5. The system of claim 4, wherein the at least one database server, at least one application server and at least one computer form a first set, the system further comprising a second set of at least one database server, at least one application server and at least one computer, wherein: the first and second sets are communicatively coupled such that the at least one application server of each set and the at least one database of each set may communicate with each other; at least one application server of one of the sets is configured to provide instructions to the at least one virtual machine of at least one of the first and second sets; and the at least one database server of the second set is a mirror of the at least one database server of the first set. 6. The system of claim 5, wherein the at least one application server of at least one set is configured to manage the connection of the at least one virtual machine of the at least one set to the one or more database servers of the at least one set. 7. The system of claim 5, wherein the at least one application server of the at least one set contains database server credentials for securely accessing the at least one database server of the at least one set. 8. The system of claim 4, wherein the at least one virtual machine/virtual user comprises more than one virtual machine/virtual user, and the virtual machines/virtual users are grouped into at least one resource pool. 9. The system of claim 5, wherein the second set is inactive until activated upon failure of the first set. 10. The system of claim 4, wherein the at least one virtual machine is configured such that remote access is limited to providing instructions to execute automated processes, shutdown the at least one virtual machine, restart the at least one virtual machine and start up the at least one virtual machine. 11. The system of claim 4, wherein the at least one virtual machine is further configured to carry out the automated processes by interacting with one or more of: an accessibility interface, an exposed API and the presentation technology of an operating system. 12. The system of claim 4, wherein the at least one virtual machines is further configured to carry out the automated processes by interpreting HTML elements within a HTML document. 13. The system of claim 4, wherein the at least one virtual machine is configured to carry out the at least one automated process by identifying the font used by the text in a defined region of the user interface and identifying the characters of the text in the defined region of the user interface using the identified font. 14. The system of claim 4, wherein the automated processes are defined by a user and configured to be carried out on data from one or more of software systems, databases or stored files or documents. 15. The system of claim 4, wherein at least one password required to access specific software applications is stored within an encrypted credential store on the at least one database server. 16. The system of claim 15, wherein the at least one virtual machine is configured to update the at least one password stored within the encrypted credential store to a random password not known outside the system. 17. A method of running automated processes comprising the steps: providing at least one computer; providing at least one virtual user on the at least one computer which interacts with applications and/or documents to execute at least one automated process. 18. The method of claim 17, further comprising the step of providing a database accessible by the at least one automated process and wherein the at least one virtual user is configured to execute the at least one automated process utilising data stored in the database. 19. The method of claim 18, further comprising the step of hosting at least one virtual machine on the least one computer and wherein the at least one virtual machine is configured to provide the at least one virtual user to execute the at least one automated process utilising data stored in the database. 20. The method of running automated processes of to claim 17, further comprising the steps: hosting at least one virtual machine on the at least one computer; providing at least one database server and at least one application server; providing, with the application server, instructions to the at least one virtual machine to execute the at least one automated process; providing the at least one virtual user by the at least one virtual machine; and executing the at least one automated process on the at least one virtual user according to the provided instructions utilising data stored in the database; wherein the at least one virtual machine is communicatively coupled with the at least one database server and the at least one application server. 21. The method of claim 20, wherein the at least one database server, at least one application server and at least one computer form a first set and further comprising the steps of: providing a second set of at least one database server, at least one application server and at least one computer, wherein the first and second sets are communicatively coupled such that the at least one application server of each set and the at least one database of each set may communicate with each other; configuring at least one application server of one of the sets to provide instructions to the at least one virtual machine of at least one of the first and second sets; and mirroring the at least one database server of the first set on the at least one database server of the second set. 22. The method of claim 21, wherein the at least one application server of at least one set manages the connection of the at least one virtual machine of the at least one set to the one or more database servers of the at least one set. 23. The method of claim 21, wherein the at least one application server of the at least one set contains database server credentials for securely accessing the at least one database server of the at least one set. 24. The method of any of claim 21, wherein the at least one virtual machine/virtual user comprises more than one virtual machine/virtual user, and the virtual machines/virtual users are grouped into at least one resource pool. 25. The method of any of claim 21, wherein the second set is inactive until activated upon failure of the first set. 26. The method of claim 21, wherein remote access to the at least one virtual machine is limited to providing instructions to execute automated processes, shutdown the at least one virtual machine, restart the at least one virtual machine and start up the at least one virtual machine. 27. The method of any of claim 21 wherein the at least one virtual machine comprises a standard end-user desktop operating system. 28. A method of running automated processes, comprising the steps: providing a first computer communicatively coupled to a database, the database stored on one of the first computer, a second computer, and a database server; configuring the first computer to execute an automated process; executing the automated process using data stored in the database.
2,400
9,326
9,326
16,145,200
2,463
According to various examples, a processing system is described comprising a plurality of hardware circuit components, each hardware circuit component configured to provide a processing functionality, a data path leading through the plurality of hardware circuit components, at least one programmable circuit and a controller configured to select one of the hardware circuit components to be replaced by the at least one programmable circuit, program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component and configure the data path to lead through the programmable circuit instead of the selected hardware circuit component.
1. A processing system comprising: a plurality of hardware circuit components, each hardware circuit component configured to provide a processing functionality; a data path leading through the plurality of hardware circuit components; at least one programmable circuit; a controller configured to select one of the hardware circuit components to be replaced by the at least one programmable circuit; program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component; and configure the data path to lead through the programmable circuit instead of the selected hardware circuit component. 2. The processing system according to claim 1, wherein the processing system comprises a processing device comprising the hardware circuit components and the at least one programmable circuit and configured to operate as a communication device wherein each hardware circuit component is configured or at least some of the hardware circuit components are configured to provide a communication functionality. 3. The processing system according to claim 1, wherein the processing system comprises a processing device comprising the hardware circuit components and the at least one programmable circuit and configured to operate as a control device configured to control operation of a vehicle and wherein each hardware circuit component is configured or at least some of the hardware circuit components are configured to provide a control processing functionality. 4. The processing system according to claim 1, comprising a communication subsystem comprising the plurality of hardware circuit components and the programmable circuit, wherein the data path connects an input and an output of the communication subsystem. 5. The processing system according to claim 1, comprising a receiver configured to receive an instruction for replacement of a hardware circuit component, wherein the controller is configured to select one of the hardware circuit components to be replaced by the programmable circuit according to the instruction, program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component according to the instruction and configure the data path to lead through the programmable circuit instead of the selected hardware circuit component according to the instruction. 6. The processing system according to claim 5, wherein the receiver is configured to receive the instruction from a server computer. 7. The processing system according to claim 1, wherein the controller is configured to detect whether a predetermined initiation criterion is fulfilled and, when the predetermined initiation criterion is fulfilled, select the one of the hardware circuit components to be replaced by the programmable circuit, program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component and configure the data path to lead through the programmable circuit instead of the selected hardware circuit component. 8. The processing system according to claim 7, comprising a positioning circuit configured to determine a geographical location of the processing system, wherein the predetermined criterion is that the processing system is located in a predetermined geographical area. 9. The processing system according to claim 7, comprising a clock configured to determine a time, wherein the predetermined criterion is that it is a certain time. 10. The processing system according to claim 7, wherein the predetermined criterion is that the processing system is to communicate in a certain frequency band. 11. The processing system according to claim 1, comprising a positioning circuit configured to determine a geographical location of the processing system, wherein the controller is configured to select a version of the processing functionality according to which it programs the programmable circuit to provide the processing functionality provided by the selected hardware circuit component based on the geographical location. 12. The processing system according to claim 11, comprising a receiver configured to receive an indication of the version of the processing functionality. 13. The processing system according to claim 12, wherein the version of the processing functionality is a software version according to which the controller programs the programmable circuit to provide the processing functionality provided by the selected hardware circuit component. 14. The processing system according to claim 1, comprising a receiver configured to receive programming code and the controller is configured to program the programmable circuit by means of the programming code to provide the processing functionality provided by the selected hardware circuit component. 15. An update server comprising an update control circuit configured to select a hardware circuit component of a plurality of hardware circuit components of a processing system, each hardware circuit component configured to provide a processing functionality; a signaling circuit configured to instruct the processing system to program a programmable circuit to provide the processing functionality provided by the selected hardware circuit component; instruct the processing system to configure a data path to lead through the programmable circuit instead of the selected hardware circuit component. 16. The update server of claim 15, wherein the update control circuit is configured to detect whether a predetermined initiation criterion is fulfilled and, when the predetermined initiation criterion is fulfilled, select the hardware circuit component of the plurality of hardware circuit components of a processing system and control the signaling circuit to instruct the processing system to program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component and to instruct the processing system to configure the data path to lead through the programmable circuit instead of the selected hardware circuit component. 17. The update server of claim 16, wherein the predetermined criterion is that the processing system is located in a predetermined geographical area, wherein the predetermined criterion is that it is a certain time or wherein the predetermined criterion is that the processing system is to communicate in a certain frequency band. 18. A method for updating a processing system comprising selecting a hardware circuit component of a plurality of hardware circuit components of a processing system, each hardware circuit component configured to provide a processing functionality; programming a programmable circuit to provide the processing functionality provided by the selected hardware circuit component; and configuring a data path to lead through the programmable circuit instead of the selected hardware circuit component. 19. The method according to claim 18, comprising detecting whether a predetermined initiation criterion is fulfilled and, when the predetermined initiation criterion is fulfilled, selecting the one of the hardware circuit components to be replaced by the programmable circuit, programming the programmable circuit to provide the processing functionality provided by the selected hardware circuit component and configuring the data path to lead through the programmable circuit instead of the selected hardware circuit component. 20. The method of claim 19, wherein the predetermined criterion is that the processing system is located in a predetermined geographical area, wherein the predetermined criterion is that it is a certain time or wherein the predetermined criterion is that the processing system is to communicate in a certain frequency band.
According to various examples, a processing system is described comprising a plurality of hardware circuit components, each hardware circuit component configured to provide a processing functionality, a data path leading through the plurality of hardware circuit components, at least one programmable circuit and a controller configured to select one of the hardware circuit components to be replaced by the at least one programmable circuit, program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component and configure the data path to lead through the programmable circuit instead of the selected hardware circuit component.1. A processing system comprising: a plurality of hardware circuit components, each hardware circuit component configured to provide a processing functionality; a data path leading through the plurality of hardware circuit components; at least one programmable circuit; a controller configured to select one of the hardware circuit components to be replaced by the at least one programmable circuit; program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component; and configure the data path to lead through the programmable circuit instead of the selected hardware circuit component. 2. The processing system according to claim 1, wherein the processing system comprises a processing device comprising the hardware circuit components and the at least one programmable circuit and configured to operate as a communication device wherein each hardware circuit component is configured or at least some of the hardware circuit components are configured to provide a communication functionality. 3. The processing system according to claim 1, wherein the processing system comprises a processing device comprising the hardware circuit components and the at least one programmable circuit and configured to operate as a control device configured to control operation of a vehicle and wherein each hardware circuit component is configured or at least some of the hardware circuit components are configured to provide a control processing functionality. 4. The processing system according to claim 1, comprising a communication subsystem comprising the plurality of hardware circuit components and the programmable circuit, wherein the data path connects an input and an output of the communication subsystem. 5. The processing system according to claim 1, comprising a receiver configured to receive an instruction for replacement of a hardware circuit component, wherein the controller is configured to select one of the hardware circuit components to be replaced by the programmable circuit according to the instruction, program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component according to the instruction and configure the data path to lead through the programmable circuit instead of the selected hardware circuit component according to the instruction. 6. The processing system according to claim 5, wherein the receiver is configured to receive the instruction from a server computer. 7. The processing system according to claim 1, wherein the controller is configured to detect whether a predetermined initiation criterion is fulfilled and, when the predetermined initiation criterion is fulfilled, select the one of the hardware circuit components to be replaced by the programmable circuit, program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component and configure the data path to lead through the programmable circuit instead of the selected hardware circuit component. 8. The processing system according to claim 7, comprising a positioning circuit configured to determine a geographical location of the processing system, wherein the predetermined criterion is that the processing system is located in a predetermined geographical area. 9. The processing system according to claim 7, comprising a clock configured to determine a time, wherein the predetermined criterion is that it is a certain time. 10. The processing system according to claim 7, wherein the predetermined criterion is that the processing system is to communicate in a certain frequency band. 11. The processing system according to claim 1, comprising a positioning circuit configured to determine a geographical location of the processing system, wherein the controller is configured to select a version of the processing functionality according to which it programs the programmable circuit to provide the processing functionality provided by the selected hardware circuit component based on the geographical location. 12. The processing system according to claim 11, comprising a receiver configured to receive an indication of the version of the processing functionality. 13. The processing system according to claim 12, wherein the version of the processing functionality is a software version according to which the controller programs the programmable circuit to provide the processing functionality provided by the selected hardware circuit component. 14. The processing system according to claim 1, comprising a receiver configured to receive programming code and the controller is configured to program the programmable circuit by means of the programming code to provide the processing functionality provided by the selected hardware circuit component. 15. An update server comprising an update control circuit configured to select a hardware circuit component of a plurality of hardware circuit components of a processing system, each hardware circuit component configured to provide a processing functionality; a signaling circuit configured to instruct the processing system to program a programmable circuit to provide the processing functionality provided by the selected hardware circuit component; instruct the processing system to configure a data path to lead through the programmable circuit instead of the selected hardware circuit component. 16. The update server of claim 15, wherein the update control circuit is configured to detect whether a predetermined initiation criterion is fulfilled and, when the predetermined initiation criterion is fulfilled, select the hardware circuit component of the plurality of hardware circuit components of a processing system and control the signaling circuit to instruct the processing system to program the programmable circuit to provide the processing functionality provided by the selected hardware circuit component and to instruct the processing system to configure the data path to lead through the programmable circuit instead of the selected hardware circuit component. 17. The update server of claim 16, wherein the predetermined criterion is that the processing system is located in a predetermined geographical area, wherein the predetermined criterion is that it is a certain time or wherein the predetermined criterion is that the processing system is to communicate in a certain frequency band. 18. A method for updating a processing system comprising selecting a hardware circuit component of a plurality of hardware circuit components of a processing system, each hardware circuit component configured to provide a processing functionality; programming a programmable circuit to provide the processing functionality provided by the selected hardware circuit component; and configuring a data path to lead through the programmable circuit instead of the selected hardware circuit component. 19. The method according to claim 18, comprising detecting whether a predetermined initiation criterion is fulfilled and, when the predetermined initiation criterion is fulfilled, selecting the one of the hardware circuit components to be replaced by the programmable circuit, programming the programmable circuit to provide the processing functionality provided by the selected hardware circuit component and configuring the data path to lead through the programmable circuit instead of the selected hardware circuit component. 20. The method of claim 19, wherein the predetermined criterion is that the processing system is located in a predetermined geographical area, wherein the predetermined criterion is that it is a certain time or wherein the predetermined criterion is that the processing system is to communicate in a certain frequency band.
2,400
9,327
9,327
15,529,539
2,432
According to one aspect is provided a method for establishing a secure connection between a client device and a network gateway. The method is performed by an access point. The method comprises establishing a first secure connection between the access point and the network gateway. The method comprises establishing a second secure connection serving as a virtual private network tunnel between the client device and the network gateway. There is also provided corresponding methods as performed by the client device and the network gateway.
1. A method for establishing a secure connection between a client device and a network gateway, the method being performed by an access point, the method comprising: establishing a first secure connection between the access point and the network gateway; and establishing a second secure connection serving as a virtual private network tunnel between the client device and the network gateway, 2. The method according to claim 1, wherein establishing the first secure connection is based on at least one of certificates, subscriber identity module (SIM) based authentication, policies set by a service provider of the access point, raw public-keys, pre-shared keys, and leap-of-faith. 3. The method according to claim 1, wherein the first secure connection defines a separate control channel between the access point and the network gateway. 4. The method according to claim 3, further comprising: receiving and sending software-defined networking (SDN) control signaling for the access point on the separate control channel. 5. The method according to claim 4, further comprising: selectively allowing or denying traffic of the client device based on said SDN control signaling. 6. The method according to claim 1, wherein establishing the second secure connection comprises: receiving an access request from the client device; and forwarding said access request to the network gateway. 7. The method according to claim 1, wherein establishing the second secure connection comprises: facilitating establishment of an Extensible Authentication Protocol, EAP, access authentication between the client device and the network gateway. 8. The method according to claim 7, wherein the establishment of said EAP access authentication comprises: receiving a shared pairwise master key, PMK, from the network gateway. 9. The method according claim 1, wherein establishing the second secure connection comprises: providing the client device with a network address to the network gateway. 10. The method according to claim 1, wherein establishing the second secure connection comprises: facilitating exchange of a device-to-gateway pairwise master key, DG-PMK, between the client device and the network gateway. 11. The method according to claim 10, wherein the DG-PMK is determined using a key derivation function and a master key. 12. The method according to claim 1, wherein establishing the second secure connection comprises receiving and forwarding messages between the client device and the network gateway. 13. The method according to claim 1, wherein establishing the second secure connection comprises: facilitating a 4-way handshake between e client device and the network gateway. 14. The method according to claim 8, wherein facilitating said 4-way handshake comprises: receiving and forwarding parameters of a pairwise transient key, PTK, or a group temporal key, GTK, from and to the client device and the network gateway, the PTK or GTK being based on the PMK. 15. The method according to claim 1, further comprising, after establishing the second secure connection: receiving and forwarding encrypted packets between the client device and the network gateway over the second secure connection. 16. The method according to claim 1, further comprising, after establishing the second secure connection: blocking reception and forwarding of non-encrypted packets from and to the client device and the network gateway on the second secure connection. 17. The method according to claim 1, wherein establishing the first secure connection is performed prior to establishing the second secure connection. 18. The method according to claim 1, wherein establishing the first secure connection is performed upon power up of the access point. 19. The method according to claim 1, further comprising: establishing a third secure connection between the access point and the client device. 20. The method according to claim 19, wherein establishing the third secure connection is performed prior to establishing the second secure connection. 21. The method according to claim 1, wherein the access point is provided in a customer premises equipment. 22. A method for establishing a secure connection between a client device and a network gateway, the method being performed by the network gateway, the method comprising: establishing a first secure connection between the access point and the network gateway; and establishing a second secure connection with the access point to serve as a private network tunnel between the client device and the network gateway. 23. The method according to claim 22, wherein establishing the second secure connection comprises: exchanging a device-to-gateway pairwise master key, DG-PMK, with the client device via the access point. 24. The method according to claim 23, wherein the DG-PMK is determined using a key derivation function and a master key. 25. The method according to claim 22, wherein establishing the second secure connection comprises: performing access authentication for the client device on behalf of the access point by sending an EAP-Request/Identity message to the client device via the access point. 26. The method according to claim 25, wherein performing said access authentication comprises: encapsulating and decapsulating EAP-Request/Response messages to RADIUS/Diameter Access-Request and Access-Challenge messages on behalf of the access point, and communicating said messages with an authentication server. 27. The method according to claim 26, wherein performing said access authentication comprises: receiving a RADIUS/Diameter Access-Accept message comprising a pairwise master key, PMK, from the authentication server on behalf of the access point. 28. The method according to claim 22, wherein establishing the second secure connection comprises: sending instructions to the access point to add the client device to a white-list and to forward all encrypted packets between the client device and the network gateway. 29. A method for establishing a secure connection between a client device and a network gateway, the method being performed by the client device, the method comprising: establishing a second secure connection with the access point to serve as a virtual private network tunnel between the client device and the network gateway. 30. The method according to claim 29, wherein establishing the second secure connection comprises: exchanging a device-to-gateway pairwise master key, DG-PMK, with the network gateway via the access point. 31. The method according to claim 29, wherein establishing the second secure connection comprises: performing access authentication with the access point by receiving an EAP-Request/Identity message from the access point, wherein said message has been sent from said network gateway. 32. An access point for establishing a secure connection between a client device and a network gateway, the access point comprising a processing unit, the processing unit being configured to: establish a first secure connection between the access point and the network gateway; and establish a second secure connection serving as a virtual private network tunnel between the client device and the network gateway. 33. A network gateway for establishing a secure connection between a client device and the network gateway, the network gateway comprising a processing unit, the processing unit being configured to: establish a first secure connection between the access point and the network gateway; and establish a second secure connection with the access point to serve as a virtual private network tunnel between the client device and the network gateway. 34. A client device establishing a secure connection between the client device and a network gateway, the client device comprising a processing unit, the processing unit being configured to: establish a second secure connection with the access point to serve as a virtual private network tunnel between the client device and the network gateway. 35. A computer program product comprising a non-transitory computer readable medium storing a computer program for establishing a secure connection between a client device (and a network gateway, the computer program comprising computer program code which, when run on a processing unit of a client device causes the processing unit to: establish a first secure connection between the access point and the network gateway; and establish a second secure connection serving as a virtual private network tunnel between the client device and the network gateway. 36. A computer program product comprising a non-transitory computer readable medium storing a computer program for establishing a secure connection between a client device and a network gateway, the computer program comprising computer program code which, when run on a processing unit of the network gateway causes the processing unit to: establish a first secure connection between the access point and the network gateway; and establish a second secure connection with the access point to serve as a virtual private network tunnel between the client device and the network gateway. 37. A computer program product comprising a non-transitory computer readable medium storing a computer program for establishing a secure connection between a client device and a network gateway, the computer program comprising computer program code which, when run on a processing unit of the client device causes the processing unit to: establish a second secure connection with the access point to serve as a virtual private network tunnel between the client device and the network gateway. 38. (canceled).
According to one aspect is provided a method for establishing a secure connection between a client device and a network gateway. The method is performed by an access point. The method comprises establishing a first secure connection between the access point and the network gateway. The method comprises establishing a second secure connection serving as a virtual private network tunnel between the client device and the network gateway. There is also provided corresponding methods as performed by the client device and the network gateway.1. A method for establishing a secure connection between a client device and a network gateway, the method being performed by an access point, the method comprising: establishing a first secure connection between the access point and the network gateway; and establishing a second secure connection serving as a virtual private network tunnel between the client device and the network gateway, 2. The method according to claim 1, wherein establishing the first secure connection is based on at least one of certificates, subscriber identity module (SIM) based authentication, policies set by a service provider of the access point, raw public-keys, pre-shared keys, and leap-of-faith. 3. The method according to claim 1, wherein the first secure connection defines a separate control channel between the access point and the network gateway. 4. The method according to claim 3, further comprising: receiving and sending software-defined networking (SDN) control signaling for the access point on the separate control channel. 5. The method according to claim 4, further comprising: selectively allowing or denying traffic of the client device based on said SDN control signaling. 6. The method according to claim 1, wherein establishing the second secure connection comprises: receiving an access request from the client device; and forwarding said access request to the network gateway. 7. The method according to claim 1, wherein establishing the second secure connection comprises: facilitating establishment of an Extensible Authentication Protocol, EAP, access authentication between the client device and the network gateway. 8. The method according to claim 7, wherein the establishment of said EAP access authentication comprises: receiving a shared pairwise master key, PMK, from the network gateway. 9. The method according claim 1, wherein establishing the second secure connection comprises: providing the client device with a network address to the network gateway. 10. The method according to claim 1, wherein establishing the second secure connection comprises: facilitating exchange of a device-to-gateway pairwise master key, DG-PMK, between the client device and the network gateway. 11. The method according to claim 10, wherein the DG-PMK is determined using a key derivation function and a master key. 12. The method according to claim 1, wherein establishing the second secure connection comprises receiving and forwarding messages between the client device and the network gateway. 13. The method according to claim 1, wherein establishing the second secure connection comprises: facilitating a 4-way handshake between e client device and the network gateway. 14. The method according to claim 8, wherein facilitating said 4-way handshake comprises: receiving and forwarding parameters of a pairwise transient key, PTK, or a group temporal key, GTK, from and to the client device and the network gateway, the PTK or GTK being based on the PMK. 15. The method according to claim 1, further comprising, after establishing the second secure connection: receiving and forwarding encrypted packets between the client device and the network gateway over the second secure connection. 16. The method according to claim 1, further comprising, after establishing the second secure connection: blocking reception and forwarding of non-encrypted packets from and to the client device and the network gateway on the second secure connection. 17. The method according to claim 1, wherein establishing the first secure connection is performed prior to establishing the second secure connection. 18. The method according to claim 1, wherein establishing the first secure connection is performed upon power up of the access point. 19. The method according to claim 1, further comprising: establishing a third secure connection between the access point and the client device. 20. The method according to claim 19, wherein establishing the third secure connection is performed prior to establishing the second secure connection. 21. The method according to claim 1, wherein the access point is provided in a customer premises equipment. 22. A method for establishing a secure connection between a client device and a network gateway, the method being performed by the network gateway, the method comprising: establishing a first secure connection between the access point and the network gateway; and establishing a second secure connection with the access point to serve as a private network tunnel between the client device and the network gateway. 23. The method according to claim 22, wherein establishing the second secure connection comprises: exchanging a device-to-gateway pairwise master key, DG-PMK, with the client device via the access point. 24. The method according to claim 23, wherein the DG-PMK is determined using a key derivation function and a master key. 25. The method according to claim 22, wherein establishing the second secure connection comprises: performing access authentication for the client device on behalf of the access point by sending an EAP-Request/Identity message to the client device via the access point. 26. The method according to claim 25, wherein performing said access authentication comprises: encapsulating and decapsulating EAP-Request/Response messages to RADIUS/Diameter Access-Request and Access-Challenge messages on behalf of the access point, and communicating said messages with an authentication server. 27. The method according to claim 26, wherein performing said access authentication comprises: receiving a RADIUS/Diameter Access-Accept message comprising a pairwise master key, PMK, from the authentication server on behalf of the access point. 28. The method according to claim 22, wherein establishing the second secure connection comprises: sending instructions to the access point to add the client device to a white-list and to forward all encrypted packets between the client device and the network gateway. 29. A method for establishing a secure connection between a client device and a network gateway, the method being performed by the client device, the method comprising: establishing a second secure connection with the access point to serve as a virtual private network tunnel between the client device and the network gateway. 30. The method according to claim 29, wherein establishing the second secure connection comprises: exchanging a device-to-gateway pairwise master key, DG-PMK, with the network gateway via the access point. 31. The method according to claim 29, wherein establishing the second secure connection comprises: performing access authentication with the access point by receiving an EAP-Request/Identity message from the access point, wherein said message has been sent from said network gateway. 32. An access point for establishing a secure connection between a client device and a network gateway, the access point comprising a processing unit, the processing unit being configured to: establish a first secure connection between the access point and the network gateway; and establish a second secure connection serving as a virtual private network tunnel between the client device and the network gateway. 33. A network gateway for establishing a secure connection between a client device and the network gateway, the network gateway comprising a processing unit, the processing unit being configured to: establish a first secure connection between the access point and the network gateway; and establish a second secure connection with the access point to serve as a virtual private network tunnel between the client device and the network gateway. 34. A client device establishing a secure connection between the client device and a network gateway, the client device comprising a processing unit, the processing unit being configured to: establish a second secure connection with the access point to serve as a virtual private network tunnel between the client device and the network gateway. 35. A computer program product comprising a non-transitory computer readable medium storing a computer program for establishing a secure connection between a client device (and a network gateway, the computer program comprising computer program code which, when run on a processing unit of a client device causes the processing unit to: establish a first secure connection between the access point and the network gateway; and establish a second secure connection serving as a virtual private network tunnel between the client device and the network gateway. 36. A computer program product comprising a non-transitory computer readable medium storing a computer program for establishing a secure connection between a client device and a network gateway, the computer program comprising computer program code which, when run on a processing unit of the network gateway causes the processing unit to: establish a first secure connection between the access point and the network gateway; and establish a second secure connection with the access point to serve as a virtual private network tunnel between the client device and the network gateway. 37. A computer program product comprising a non-transitory computer readable medium storing a computer program for establishing a secure connection between a client device and a network gateway, the computer program comprising computer program code which, when run on a processing unit of the client device causes the processing unit to: establish a second secure connection with the access point to serve as a virtual private network tunnel between the client device and the network gateway. 38. (canceled).
2,400
9,328
9,328
15,749,369
2,451
A method of identifying a network condition between a pair of network devices, wherein one of the devices comprises a jitter buffer for storing packets received via a network, the method comprising: monitoring a measure of delay in receiving media packets over the network; monitoring a size of the jitter buffer; and identifying a network condition in dependence on a change in the measure of delay and a variation in the size of the jitter buffer.
1. A method of identifying a network condition between a receiving device and a transmitting device, wherein the receiving device comprises a jitter buffer for storing packets received from the transmitting device via a network, the method comprising: monitoring a measure of delay in receiving media packets over the network; monitoring a size of the jitter buffer; and identifying a network condition in dependence on a change in the measure of delay and a variation in the size of the jitter buffer. 2. The method as claimed in claim 1, wherein the identifying step comprises identifying congestion in the network if the change in the measure of delay indicates an increase in network delay and the size of the jitter buffer decreases below a threshold size. 3. The method as claimed in claim 1, wherein the identifying step comprises identifying a change in a network route between the pair of network devices in dependence on a variation in the size of the jitter buffer about a threshold size. 4. The method as claimed in claim 1, wherein the identifying step comprises identifying an increase in network delay if the change in the measure of delay indicates an increase in network delay and the size of the jitter buffer temporarily decreases below a threshold size. 5. The method as claimed in claim 1, wherein the step of monitoring a measure of delay comprises: determining a first time period between receiving a first-received packet for an initial media frame and receiving a first-received packet for a subsequent media frame, wherein each received packet comprises a timestamp; determining a second time period between the timestamp of the packet for the initial media frame and the timestamp of the packet for the subsequent media frame; and forming the measure of delay in dependence on the difference between the first and second time periods. 6. The method as claimed in claim 1, wherein the step of monitoring a measure of delay comprises: determining a first time period between receiving an initial media frame and receiving a subsequent media frame, wherein each received frame comprises a timestamp; determining a second time period between the timestamp of the initial media frame and the timestamp of the subsequent media frame; and forming the measure of delay in dependence on the difference between the first and second time periods. 7. The method as claimed in claim 1, further comprising: adjusting the measure of delay in dependence on the size of the jitter buffer; at a first one of the network devices, sending an indication of said adjusted measure to the other network device; and at said other network device, receiving said indication and adjusting a bandwidth for transmission of media to said first network device in dependence on said indication. 8. The method as claimed in claim 1, further comprising: at a first one of the network devices, sending an indication of said identified network condition to the other network device; and at said other network device, receiving said indication and adjusting a bandwidth for transmission of media to said first network device in dependence on said indication. 9. The method as claimed in claim 1, further comprising: at a first one of the network devices, sending an indication of the measure of network delay and the size of the jitter buffer to the other network device; and at said other network device, receiving said indication and adjusting a bandwidth for transmission of media to said first network device in dependence on said indication. 10. The method as claimed in claim 1, wherein the packets are Real-time Transport Protocol (RTP) packets. 11. The method as claimed in claim 10, wherein the measure of delay is determined in dependence on RTP timestamps. 12. A data processing device for receiving a stream of media packets via a network, the device comprising: a transceiver configured to receive media packets from another device via the network; a jitter buffer configured to store the received packets; and a controller configured to: monitor a measure of delay in receiving the media packets over the network; monitor a size of the jitter buffer; and identify a network condition in dependence on a change in the measure of delay and a variation in the size of the jitter buffer. 13. The device as claimed in claim 12, wherein the controller is further configured to identify congestion in the network if the change in the measure of delay indicates an increase in network delay and the size of the jitter buffer decreases below a threshold size. 14. The device as claimed in claim 12, wherein controller is further configured to identify a change in a network route between the data processing device and said another device in dependence on a variation in the size of the jitter buffer about a threshold size. 15. The device as claimed in claim 12, wherein controller is further configured to identify an increase in network delay if the change in the measure of delay indicates an increase in network delay and the size of the jitter buffer temporarily decreases below a threshold size. 16. The device as claimed in claim 12, wherein the controller is further configured to: determine a first time period between receiving a first-received packet for an initial media frame and receiving a first-received packet for a subsequent media frame, wherein each received packet comprises a timestamp; determine a second time period between the timestamp of the packet for the initial media frame and the timestamp of the packet for the subsequent media frame; and form the measure of delay in dependence on the difference between the first and second time periods. 17-19. (canceled) 20. The device as claimed in claim 12, wherein: the controller is further configured to adjust the measure of delay in dependence on the size of the jitter buffer; and the transceiver is further configured to send an indication of said adjusted measure to said another device. 21. The device as claimed in claim 12, wherein the transceiver is configured to send an indication of said identified network condition to said another device. 22. The device as claimed in claim 12, wherein the transceiver is configured to send an indication of the measure of network delay and the size of the jitter buffer to said another device. 23-24. (canceled) 25. A machine readable non-transitory storage medium having encoded thereon machine readable code for implementing a method of identifying a network condition between a receiving device and a transmitting device, wherein the receiving device comprises a jitter buffer for storing packets received from the transmitting device via a network, the method comprising: monitoring a measure of delay in receiving media packets over the network; monitoring a size of the jitter buffer; and identifying a network condition in dependence on a change in the measure of delay and a variation in the size of the jitter buffer. 26. (canceled)
A method of identifying a network condition between a pair of network devices, wherein one of the devices comprises a jitter buffer for storing packets received via a network, the method comprising: monitoring a measure of delay in receiving media packets over the network; monitoring a size of the jitter buffer; and identifying a network condition in dependence on a change in the measure of delay and a variation in the size of the jitter buffer.1. A method of identifying a network condition between a receiving device and a transmitting device, wherein the receiving device comprises a jitter buffer for storing packets received from the transmitting device via a network, the method comprising: monitoring a measure of delay in receiving media packets over the network; monitoring a size of the jitter buffer; and identifying a network condition in dependence on a change in the measure of delay and a variation in the size of the jitter buffer. 2. The method as claimed in claim 1, wherein the identifying step comprises identifying congestion in the network if the change in the measure of delay indicates an increase in network delay and the size of the jitter buffer decreases below a threshold size. 3. The method as claimed in claim 1, wherein the identifying step comprises identifying a change in a network route between the pair of network devices in dependence on a variation in the size of the jitter buffer about a threshold size. 4. The method as claimed in claim 1, wherein the identifying step comprises identifying an increase in network delay if the change in the measure of delay indicates an increase in network delay and the size of the jitter buffer temporarily decreases below a threshold size. 5. The method as claimed in claim 1, wherein the step of monitoring a measure of delay comprises: determining a first time period between receiving a first-received packet for an initial media frame and receiving a first-received packet for a subsequent media frame, wherein each received packet comprises a timestamp; determining a second time period between the timestamp of the packet for the initial media frame and the timestamp of the packet for the subsequent media frame; and forming the measure of delay in dependence on the difference between the first and second time periods. 6. The method as claimed in claim 1, wherein the step of monitoring a measure of delay comprises: determining a first time period between receiving an initial media frame and receiving a subsequent media frame, wherein each received frame comprises a timestamp; determining a second time period between the timestamp of the initial media frame and the timestamp of the subsequent media frame; and forming the measure of delay in dependence on the difference between the first and second time periods. 7. The method as claimed in claim 1, further comprising: adjusting the measure of delay in dependence on the size of the jitter buffer; at a first one of the network devices, sending an indication of said adjusted measure to the other network device; and at said other network device, receiving said indication and adjusting a bandwidth for transmission of media to said first network device in dependence on said indication. 8. The method as claimed in claim 1, further comprising: at a first one of the network devices, sending an indication of said identified network condition to the other network device; and at said other network device, receiving said indication and adjusting a bandwidth for transmission of media to said first network device in dependence on said indication. 9. The method as claimed in claim 1, further comprising: at a first one of the network devices, sending an indication of the measure of network delay and the size of the jitter buffer to the other network device; and at said other network device, receiving said indication and adjusting a bandwidth for transmission of media to said first network device in dependence on said indication. 10. The method as claimed in claim 1, wherein the packets are Real-time Transport Protocol (RTP) packets. 11. The method as claimed in claim 10, wherein the measure of delay is determined in dependence on RTP timestamps. 12. A data processing device for receiving a stream of media packets via a network, the device comprising: a transceiver configured to receive media packets from another device via the network; a jitter buffer configured to store the received packets; and a controller configured to: monitor a measure of delay in receiving the media packets over the network; monitor a size of the jitter buffer; and identify a network condition in dependence on a change in the measure of delay and a variation in the size of the jitter buffer. 13. The device as claimed in claim 12, wherein the controller is further configured to identify congestion in the network if the change in the measure of delay indicates an increase in network delay and the size of the jitter buffer decreases below a threshold size. 14. The device as claimed in claim 12, wherein controller is further configured to identify a change in a network route between the data processing device and said another device in dependence on a variation in the size of the jitter buffer about a threshold size. 15. The device as claimed in claim 12, wherein controller is further configured to identify an increase in network delay if the change in the measure of delay indicates an increase in network delay and the size of the jitter buffer temporarily decreases below a threshold size. 16. The device as claimed in claim 12, wherein the controller is further configured to: determine a first time period between receiving a first-received packet for an initial media frame and receiving a first-received packet for a subsequent media frame, wherein each received packet comprises a timestamp; determine a second time period between the timestamp of the packet for the initial media frame and the timestamp of the packet for the subsequent media frame; and form the measure of delay in dependence on the difference between the first and second time periods. 17-19. (canceled) 20. The device as claimed in claim 12, wherein: the controller is further configured to adjust the measure of delay in dependence on the size of the jitter buffer; and the transceiver is further configured to send an indication of said adjusted measure to said another device. 21. The device as claimed in claim 12, wherein the transceiver is configured to send an indication of said identified network condition to said another device. 22. The device as claimed in claim 12, wherein the transceiver is configured to send an indication of the measure of network delay and the size of the jitter buffer to said another device. 23-24. (canceled) 25. A machine readable non-transitory storage medium having encoded thereon machine readable code for implementing a method of identifying a network condition between a receiving device and a transmitting device, wherein the receiving device comprises a jitter buffer for storing packets received from the transmitting device via a network, the method comprising: monitoring a measure of delay in receiving media packets over the network; monitoring a size of the jitter buffer; and identifying a network condition in dependence on a change in the measure of delay and a variation in the size of the jitter buffer. 26. (canceled)
2,400
9,329
9,329
16,397,152
2,413
Methods and systems are provided for allocating resources including VoIP (voice over Internet Protocol) and Non-VoIP resources. In some embodiments, multiplexing schemes are provided for use with OFDMA (orthogonal frequency division multiplexing access) systems, for example for use in transmitting VoIP traffic. In some embodiments, various HARQ (Hybrid Automatic request) techniques are provided for use with OFDMA systems. In various embodiments, there are provided methods and systems for dealing with issues such as Handling non-full rate vocoder frames, VoIP packet jitter handling, VoIP capacity increasing schemes, persistent and non-persistent assignment of resources in OFDMA systems.
1-20. (canceled) 21. A method, comprising: at a base station performing hybrid resource allocation for Hybrid Automatic Request (HARQ) downlink traffic transmissions to a mobile station: scheduling a fixed resource allocation in every N frame; and dynamically scheduling resource allocation for HARQ retransmissions of a packet. 22. The method of claim 21, wherein the scheduling the fixed resource allocation in every N frame is based on an estimated arriving data rate and an average channel quality indication (CQI). 23. The method of claim 21, wherein the fixed resource allocation is for a first HARQ transmission of a packet only. 24. The method of claim 21, wherein an interval for packet retransmissions is not fixed. 25. The method of claim 21, wherein the packet transmission are Voice over Internet Protocol (VoIP) transmissions. 26. The method of claim 21, wherein the base station uses Orthogonal Frequency Division Multiplexing (OFDM). 27. A base station, comprising: a transceiver performing hybrid resource allocation for Hybrid Automatic Request (HARQ) downlink traffic transmissions to a mobile station; and a processor configured to schedule a fixed resource allocation in every N frame and dynamically schedule resource allocation for HARQ retransmissions of a packet. 28. The base station of claim 27, wherein the processor schedules the fixed resource allocation in every N frame based on an estimated arriving data rate and an average channel quality indication (CQI). 29. The base station of claim 27, wherein the fixed resource allocation is for a first HARQ transmission of a packet only. 30. The base station of claim 27, wherein an interval for packet retransmissions is not fixed. 31. The base station of claim 27, wherein the packet transmission are Voice over Internet Protocol (VoIP) transmissions. 32. The base station of claim 27, wherein the base station uses Orthogonal Frequency Division Multiplexing (OFDM). 33. An integrated circuit, comprising: circuitry configured to perform hybrid resource allocation for Hybrid Automatic Request (HARQ) downlink traffic transmissions: circuitry configured to schedule a fixed resource allocation in every N frame; and circuitry configured to dynamically schedule resource allocation for HARQ retransmissions of a packet. 34. The integrated circuit of claim 33, wherein the scheduling a fixed resource allocation in every N frame is based on an estimated arriving data rate and an average channel quality indication (CQI). 35. The integrated circuit of claim 33, wherein the fixed resource allocation is for a first HARQ transmission of a packet only. 36. The integrated circuit of claim 33, wherein an interval for packet retransmissions is not fixed. 37. The integrated circuit of claim 33, wherein the packet transmission are Voice over Internet Protocol (VoIP) transmissions. 38. The integrated circuit of claim 33, wherein the base station uses Orthogonal Frequency Division Multiplexing (OFDM).
Methods and systems are provided for allocating resources including VoIP (voice over Internet Protocol) and Non-VoIP resources. In some embodiments, multiplexing schemes are provided for use with OFDMA (orthogonal frequency division multiplexing access) systems, for example for use in transmitting VoIP traffic. In some embodiments, various HARQ (Hybrid Automatic request) techniques are provided for use with OFDMA systems. In various embodiments, there are provided methods and systems for dealing with issues such as Handling non-full rate vocoder frames, VoIP packet jitter handling, VoIP capacity increasing schemes, persistent and non-persistent assignment of resources in OFDMA systems.1-20. (canceled) 21. A method, comprising: at a base station performing hybrid resource allocation for Hybrid Automatic Request (HARQ) downlink traffic transmissions to a mobile station: scheduling a fixed resource allocation in every N frame; and dynamically scheduling resource allocation for HARQ retransmissions of a packet. 22. The method of claim 21, wherein the scheduling the fixed resource allocation in every N frame is based on an estimated arriving data rate and an average channel quality indication (CQI). 23. The method of claim 21, wherein the fixed resource allocation is for a first HARQ transmission of a packet only. 24. The method of claim 21, wherein an interval for packet retransmissions is not fixed. 25. The method of claim 21, wherein the packet transmission are Voice over Internet Protocol (VoIP) transmissions. 26. The method of claim 21, wherein the base station uses Orthogonal Frequency Division Multiplexing (OFDM). 27. A base station, comprising: a transceiver performing hybrid resource allocation for Hybrid Automatic Request (HARQ) downlink traffic transmissions to a mobile station; and a processor configured to schedule a fixed resource allocation in every N frame and dynamically schedule resource allocation for HARQ retransmissions of a packet. 28. The base station of claim 27, wherein the processor schedules the fixed resource allocation in every N frame based on an estimated arriving data rate and an average channel quality indication (CQI). 29. The base station of claim 27, wherein the fixed resource allocation is for a first HARQ transmission of a packet only. 30. The base station of claim 27, wherein an interval for packet retransmissions is not fixed. 31. The base station of claim 27, wherein the packet transmission are Voice over Internet Protocol (VoIP) transmissions. 32. The base station of claim 27, wherein the base station uses Orthogonal Frequency Division Multiplexing (OFDM). 33. An integrated circuit, comprising: circuitry configured to perform hybrid resource allocation for Hybrid Automatic Request (HARQ) downlink traffic transmissions: circuitry configured to schedule a fixed resource allocation in every N frame; and circuitry configured to dynamically schedule resource allocation for HARQ retransmissions of a packet. 34. The integrated circuit of claim 33, wherein the scheduling a fixed resource allocation in every N frame is based on an estimated arriving data rate and an average channel quality indication (CQI). 35. The integrated circuit of claim 33, wherein the fixed resource allocation is for a first HARQ transmission of a packet only. 36. The integrated circuit of claim 33, wherein an interval for packet retransmissions is not fixed. 37. The integrated circuit of claim 33, wherein the packet transmission are Voice over Internet Protocol (VoIP) transmissions. 38. The integrated circuit of claim 33, wherein the base station uses Orthogonal Frequency Division Multiplexing (OFDM).
2,400
9,330
9,330
16,001,116
2,449
Transferring data between user devices based on a movement of a user is provided. Aspects include monitoring user interaction with a plurality of user devices and detecting movement of the user with sensors of one or more of the plurality of user devices. Aspects also include obtaining user preferences from a user profile and identifying one or more data items to be transferred from a first user device of the plurality of user devices to a second user device of the plurality of user devices based on the user interaction, the detected movement of the user and the user preferences. Aspects further include transferring the one or more data items to be transferred from the first user device of the plurality of user devices to the second user device of the plurality of user devices.
1. A system for transferring data between user devices based on a movement of a user, comprising: a plurality of user devices that each comprise a memory having computer readable instructions and a processor for executing the computer readable instructions, the computer readable instructions including instructions for: monitoring user interaction with a plurality of user devices; detecting movement of the user with sensors of one or more of the plurality of user devices; obtaining user preferences from a user profile; identifying one or more data items to be transferred from a first user device of the plurality of user devices to a second user device of the plurality of user devices based on the user interaction, the detected movement of the user and the user preferences; and transferring the one or more data items to be transferred from the first user device of the plurality of user devices to the second user device of the plurality of user devices. 2. The system of claim 1, wherein the computer readable instructions further include instructions for presenting a notification to the user on the second user device based on the one or more data items. 3. The system of claim 2, wherein a content of the notification is determined based on a type of the second user device and upon the user preferences. 4. The system of claim 2, wherein the computer readable instructions further include instructions for transmitting an indication from the second user device to the first user device that the user read the notification. 5. The system of claim 4, wherein the indication that the user read the notification includes a confidence level that the user read the notification and data used to calculate the confidence level. 6. The system of claim 1, wherein the computer readable instructions further include instructions for deleting the one or more data items from the second user device based on detecting another movement of the user. 7. The system of claim 1, wherein the one or more data items include an unread message for the user received by the first user device. 8. The system of claim 1, wherein the one or more data items include instructions for the second user device to obtain an unread message for the user received by the first user device. 9. A method for transferring data between user devices based on a movement of a user, comprising: monitoring user interaction with a plurality of user devices; detecting movement of the user with sensors of one or more of the plurality of user devices; obtaining user preferences from a user profile; identifying one or more data items to be transferred from a first user device of the plurality of user devices to a second user device of the plurality of user devices based on the user interaction, the detected movement of the user and the user preferences; and transferring the one or more data items to be transferred from the first user device of the plurality of user devices to the second user device of the plurality of user devices. 10. The method of claim 9, further comprising presenting a notification to the user on the second user device based on the one or more data items. 11. The method of claim 10, wherein a content of the notification is determined based on a type of the second user device and upon the user preferences. 12. The method of claim 10, further comprising transmitting an indication from the second user device to the first user device that the user read the notification. 13. The method of claim 12, wherein the indication that the user read the notification includes a confidence level that the user read the notification and data used to calculate the confidence level. 14. The method of claim 9, further comprising deleting the one or more data items from the second user device based on detecting another movement of the user. 15. The method of claim 9, wherein the one or more data items include an unread message for the user received by the first user device. 16. The method of claim 9, wherein the one or more data items include instructions for the second user device to obtain an unread message for the user received by the first user device. 17. A computer program product comprising a computer readable storage medium having program instructions embodied therewith the program instructions executable by a computer processor to cause the computer processor to perform a method, comprising: monitoring user interaction with a plurality of user devices; detecting movement of a user with sensors of one or more of the plurality of user devices; obtaining user preferences from a user profile; identifying one or more data items to be transferred from a first user device of the plurality of user devices to a second user device of the plurality of user devices based on the user interaction, the detected movement of the user and the user preferences; and transferring the one or more data items to be transferred from the first user device of the plurality of user devices to the second user device of the plurality of user devices. 18. The computer program product of claim 17, wherein the method further comprises presenting a notification to the user on the second user device based on the one or more data items. 19. The computer program product of claim 18, wherein a content of the notification is determined based on a type of the second user device and upon the user preferences. 20. The computer program product of claim 18, wherein the method further comprises transmitting an indication from the second user device to the first user device that the user read the notification.
Transferring data between user devices based on a movement of a user is provided. Aspects include monitoring user interaction with a plurality of user devices and detecting movement of the user with sensors of one or more of the plurality of user devices. Aspects also include obtaining user preferences from a user profile and identifying one or more data items to be transferred from a first user device of the plurality of user devices to a second user device of the plurality of user devices based on the user interaction, the detected movement of the user and the user preferences. Aspects further include transferring the one or more data items to be transferred from the first user device of the plurality of user devices to the second user device of the plurality of user devices.1. A system for transferring data between user devices based on a movement of a user, comprising: a plurality of user devices that each comprise a memory having computer readable instructions and a processor for executing the computer readable instructions, the computer readable instructions including instructions for: monitoring user interaction with a plurality of user devices; detecting movement of the user with sensors of one or more of the plurality of user devices; obtaining user preferences from a user profile; identifying one or more data items to be transferred from a first user device of the plurality of user devices to a second user device of the plurality of user devices based on the user interaction, the detected movement of the user and the user preferences; and transferring the one or more data items to be transferred from the first user device of the plurality of user devices to the second user device of the plurality of user devices. 2. The system of claim 1, wherein the computer readable instructions further include instructions for presenting a notification to the user on the second user device based on the one or more data items. 3. The system of claim 2, wherein a content of the notification is determined based on a type of the second user device and upon the user preferences. 4. The system of claim 2, wherein the computer readable instructions further include instructions for transmitting an indication from the second user device to the first user device that the user read the notification. 5. The system of claim 4, wherein the indication that the user read the notification includes a confidence level that the user read the notification and data used to calculate the confidence level. 6. The system of claim 1, wherein the computer readable instructions further include instructions for deleting the one or more data items from the second user device based on detecting another movement of the user. 7. The system of claim 1, wherein the one or more data items include an unread message for the user received by the first user device. 8. The system of claim 1, wherein the one or more data items include instructions for the second user device to obtain an unread message for the user received by the first user device. 9. A method for transferring data between user devices based on a movement of a user, comprising: monitoring user interaction with a plurality of user devices; detecting movement of the user with sensors of one or more of the plurality of user devices; obtaining user preferences from a user profile; identifying one or more data items to be transferred from a first user device of the plurality of user devices to a second user device of the plurality of user devices based on the user interaction, the detected movement of the user and the user preferences; and transferring the one or more data items to be transferred from the first user device of the plurality of user devices to the second user device of the plurality of user devices. 10. The method of claim 9, further comprising presenting a notification to the user on the second user device based on the one or more data items. 11. The method of claim 10, wherein a content of the notification is determined based on a type of the second user device and upon the user preferences. 12. The method of claim 10, further comprising transmitting an indication from the second user device to the first user device that the user read the notification. 13. The method of claim 12, wherein the indication that the user read the notification includes a confidence level that the user read the notification and data used to calculate the confidence level. 14. The method of claim 9, further comprising deleting the one or more data items from the second user device based on detecting another movement of the user. 15. The method of claim 9, wherein the one or more data items include an unread message for the user received by the first user device. 16. The method of claim 9, wherein the one or more data items include instructions for the second user device to obtain an unread message for the user received by the first user device. 17. A computer program product comprising a computer readable storage medium having program instructions embodied therewith the program instructions executable by a computer processor to cause the computer processor to perform a method, comprising: monitoring user interaction with a plurality of user devices; detecting movement of a user with sensors of one or more of the plurality of user devices; obtaining user preferences from a user profile; identifying one or more data items to be transferred from a first user device of the plurality of user devices to a second user device of the plurality of user devices based on the user interaction, the detected movement of the user and the user preferences; and transferring the one or more data items to be transferred from the first user device of the plurality of user devices to the second user device of the plurality of user devices. 18. The computer program product of claim 17, wherein the method further comprises presenting a notification to the user on the second user device based on the one or more data items. 19. The computer program product of claim 18, wherein a content of the notification is determined based on a type of the second user device and upon the user preferences. 20. The computer program product of claim 18, wherein the method further comprises transmitting an indication from the second user device to the first user device that the user read the notification.
2,400
9,331
9,331
15,344,444
2,488
A video encoder includes: a coded data generator configured to receive an original frame and one or more reference frames, and to generate coded data utilizing the original frame and the one or more reference frames; and a reference frame generator configured to receive one or more decoded reference frames, and compressing and decompressing the one or more decoded reference frames to provide the one or more reference frames to the coded data generator.
1. A video encoder comprising: a coded data generator configured to receive an original frame and one or more reference frames, and to generate coded data utilizing the original frame and the one or more reference frames; and a reference frame generator configured to receive one or more decoded frames, and to compress and decompress the one or more decoded frames to provide as the one or more reference frames to the coded data generator. 2. The video encoder of claim 1, wherein the compressing and decompressing the one or more decoded frames comprise intra encoding and intra decoding the one or more decoded frames. 3. The video encoder of claim 1, wherein the reference frame generator comprises an intra encoder configured to encode the one or more decoded frames, and an intra decoder configured to decode the one or more decoded frames encoded by the intra encoder. 4. The video encoder of claim 1, wherein the compressed and decompressed one or more decoded frames is utilized as both a predicted frame and the one or more reference frames. 5. The video encoder of claim 1, wherein the coded data generator comprises a transformation coefficients generator configured to receive the original frame to generate residual coefficients instead of calculating a difference between the original frame and a predicted frame. 6. The video encoder of claim 5, wherein the coded data generator further comprises a quantizer to generate quantized values of the residual coefficients or a bitplane scanner to generate bitplanes of the residual coefficients. 7. The video encoder of claim 1, wherein the coded data generator comprises a transformation coefficients generator to generate transformation coefficients corresponding to the original frame, and at least one of a quantizer to generate quantized values of the transformation coefficients, or a bitplane scanner to generate bitplanes of the transformation coefficients. 8. The video encoder of claim 1, wherein the video encoder is configured to refresh an entire screen with intra-coded blocks periodically. 9. A video decoder comprising: an image frame generator configured to receive coded data, and to generate an image frame using the coded data; and a video compressor configured to receive the image frame, and to compress and decompress the image frame to generate a display frame. 10. The video decoder of claim 9, further comprising a frame buffer memory configured to store compressed frames, wherein size of the frame buffer memory is less than that would be required to store a number of frames that is the same as a number of the compressed frames. 11. The video decoder of claim 9, wherein the video compressor comprises an intra encoder to compress the image frame, and an intra decoder to decompress the compressed image frame. 12. The video decoder of claim 11, further comprising a frame buffer memory configured to store the compressed image frame and a compressed reference frame. 13. The video decoder of claim 9, further comprising a bitplane converter configured to convert residual in bitplanes to residual coefficients. 14. The video decoder of claim 13, further comprising a frame buffer memory configured to receive coded intra coefficients, and to generate a display frame using the coded intra coefficients. 15. The video decoder of claim 14, wherein the frame buffer memory comprises an intra decoder to decode the coded intra coefficients, and an inverse transformer to generate the display frame utilizing the decoded intra coefficients. 16. A video display system comprising: an encoder configured to transform an original pixel frame to generate transform coefficients prior to encoding; and a decoder configured to inverse transform decoded coefficients immediately prior to displaying to generate a display frame. 17. The video display system of claim 16, wherein the encoder comprises a coefficients compressor configured to receive decoded residual coefficients, and to generate decoded coefficients. 18. The video display system of claim 17, wherein the coefficients compressor comprises an intra encoder configured to encode the decoded residual coefficients to generate coded intra coefficients, and an intra decoder to decode the coded intra coefficients to generate the decoded coefficients. 19. The video display system of claim 18, wherein the decoder comprises a memory configured to store the decoded coefficients. 20. The video display system of claim 19, wherein the memory comprises an intra decoder to receive coded intra coefficients and to decode the coded intra coefficients to generate the decoded coefficients, and an inverse transformer to receive the decoded coefficients and to inverse transform the decoded coefficients to generate the display frame.
A video encoder includes: a coded data generator configured to receive an original frame and one or more reference frames, and to generate coded data utilizing the original frame and the one or more reference frames; and a reference frame generator configured to receive one or more decoded reference frames, and compressing and decompressing the one or more decoded reference frames to provide the one or more reference frames to the coded data generator.1. A video encoder comprising: a coded data generator configured to receive an original frame and one or more reference frames, and to generate coded data utilizing the original frame and the one or more reference frames; and a reference frame generator configured to receive one or more decoded frames, and to compress and decompress the one or more decoded frames to provide as the one or more reference frames to the coded data generator. 2. The video encoder of claim 1, wherein the compressing and decompressing the one or more decoded frames comprise intra encoding and intra decoding the one or more decoded frames. 3. The video encoder of claim 1, wherein the reference frame generator comprises an intra encoder configured to encode the one or more decoded frames, and an intra decoder configured to decode the one or more decoded frames encoded by the intra encoder. 4. The video encoder of claim 1, wherein the compressed and decompressed one or more decoded frames is utilized as both a predicted frame and the one or more reference frames. 5. The video encoder of claim 1, wherein the coded data generator comprises a transformation coefficients generator configured to receive the original frame to generate residual coefficients instead of calculating a difference between the original frame and a predicted frame. 6. The video encoder of claim 5, wherein the coded data generator further comprises a quantizer to generate quantized values of the residual coefficients or a bitplane scanner to generate bitplanes of the residual coefficients. 7. The video encoder of claim 1, wherein the coded data generator comprises a transformation coefficients generator to generate transformation coefficients corresponding to the original frame, and at least one of a quantizer to generate quantized values of the transformation coefficients, or a bitplane scanner to generate bitplanes of the transformation coefficients. 8. The video encoder of claim 1, wherein the video encoder is configured to refresh an entire screen with intra-coded blocks periodically. 9. A video decoder comprising: an image frame generator configured to receive coded data, and to generate an image frame using the coded data; and a video compressor configured to receive the image frame, and to compress and decompress the image frame to generate a display frame. 10. The video decoder of claim 9, further comprising a frame buffer memory configured to store compressed frames, wherein size of the frame buffer memory is less than that would be required to store a number of frames that is the same as a number of the compressed frames. 11. The video decoder of claim 9, wherein the video compressor comprises an intra encoder to compress the image frame, and an intra decoder to decompress the compressed image frame. 12. The video decoder of claim 11, further comprising a frame buffer memory configured to store the compressed image frame and a compressed reference frame. 13. The video decoder of claim 9, further comprising a bitplane converter configured to convert residual in bitplanes to residual coefficients. 14. The video decoder of claim 13, further comprising a frame buffer memory configured to receive coded intra coefficients, and to generate a display frame using the coded intra coefficients. 15. The video decoder of claim 14, wherein the frame buffer memory comprises an intra decoder to decode the coded intra coefficients, and an inverse transformer to generate the display frame utilizing the decoded intra coefficients. 16. A video display system comprising: an encoder configured to transform an original pixel frame to generate transform coefficients prior to encoding; and a decoder configured to inverse transform decoded coefficients immediately prior to displaying to generate a display frame. 17. The video display system of claim 16, wherein the encoder comprises a coefficients compressor configured to receive decoded residual coefficients, and to generate decoded coefficients. 18. The video display system of claim 17, wherein the coefficients compressor comprises an intra encoder configured to encode the decoded residual coefficients to generate coded intra coefficients, and an intra decoder to decode the coded intra coefficients to generate the decoded coefficients. 19. The video display system of claim 18, wherein the decoder comprises a memory configured to store the decoded coefficients. 20. The video display system of claim 19, wherein the memory comprises an intra decoder to receive coded intra coefficients and to decode the coded intra coefficients to generate the decoded coefficients, and an inverse transformer to receive the decoded coefficients and to inverse transform the decoded coefficients to generate the display frame.
2,400
9,332
9,332
16,022,367
2,456
A network management system includes a network interface communicatively coupled to one or more network elements in a network for exchanging Operations, Administration, Maintenance, and Provisioning (OAM&P) data; a processor communicatively coupled to the network interface; and memory storing instructions that, when executed, cause the processor to obtain the OAM&P data from the network, provide a Graphical User Interface (GUI) based on the network from the OAM&P data, wherein the GUI includes a network map which provides a topological view and a subway view which provides a detailed device-level view which is more granular than the network map and illustrates individual components at each site, receive a selection from a user of a service in the network, and update the GUI to highlight the service in the network map and illustrate the associated sites in the subway view.
1. A network management system, comprising: a network interface communicatively coupled to one or more network elements in a network for exchanging Operations, Administration, Maintenance, and Provisioning (OAM&P) data; a processor communicatively coupled to the network interface; and memory storing instructions that, when executed, cause the processor to obtain the OAM&P data from the network, provide a Graphical User Interface (GUI) based on the network from the OAM&P data, wherein the GUI comprises a network map which provides a topological view and a subway view which provides a detailed device-level view which is more granular than the network map and illustrates individual components at each site, receive a selection from a user of a service in the network, and update the GUI to highlight the service in the network map and illustrate the associated sites in the subway view. 2. The network management system of claim 1, wherein the service traverses a plurality of sites in the network such that all of the sites cannot be displayed in the subway view, wherein the GUI further comprises a visual scrollbar which visualizes the service in a miniature format for the subway view with a portion shown in the subway view highlighted, and wherein the memory storing instructions that, when executed, further cause the processor to update the subway view based on input from the user through the visual scrollbar. 3. The network management system of claim 2, wherein the memory storing instructions that, when executed, further cause the processor to highlight a portion of the network in the topological view which is currently displayed in the subway view. 4. The network management system of claim 1, wherein the individual components in the subway view comprise any of a multiplexer, an optical transceiver, an optical switch, a multiplexer, a demultiplexer, a Wavelength Selective Switch (WSS), an amplifier, an attenuator, a dispersion compensation module, a C/L band coupler, a Time Division Multiplexing (TDM) switch, and a packet switch. 5. The network management system of claim 1, wherein the memory storing instructions that, when executed, further cause the processor to receive an input from the user from a selection in the GUI, and present correlated objects and data items based on the selection. 6. The network management system of claim 1, wherein the memory storing instructions that, when executed, further cause the processor to receive an input from the user selecting a power graph, and present an optical power readings graph in place of the network map, wherein the optical power readings graph illustrates power readings in both directions along the subway view and has an x-axis of optical power and a y-axis of each of the individual components in the subway view that measure optical power. 7. The network management system of claim 1, wherein the memory storing instructions that, when executed, further cause the processor to receive an input from the user selecting a power graph, and present an optical power readings graph in place of the network map, wherein the optical power readings graph illustrates power readings in both directions along the subway view and has an x-axis of optical power and a y-axis of each of the individual components in the subway view that measure optical power. 8. The network management system of claim 1, wherein the memory storing instructions that, when executed, further cause the processor to receive an input from the user selecting a point in the subway view for viewing an optical spectral analysis graph, and present an optical power readings graph in place of the network map, wherein the optical spectral analysis graph displays power on an x-axis and spectrum on a y-axis. 9. The network management system of claim 1, wherein the memory storing instructions that, when executed, further cause the processor to receive an input from the user selecting spectral use, and present an optical spectral allocation graph in place of the network map, wherein the optical spectral allocation graph displays spectrum on an x-axis and usage of the spectrum on a y-axis across the subway view. 10. A network management method, comprising: in a server comprising a network interface communicatively coupled to one or more network elements in a network for exchanging Operations, Administration, Maintenance, and Provisioning (OAM&P) data, obtaining the OAM&P data from the network; providing a Graphical User Interface (GUI) based on the network from the OAM&P data, wherein the GUI comprises a network map which provides a topological view and a subway view which provides a detailed device-level view which is more granular than the network map and illustrates individual components at each site; receiving a selection from a user of a service in the network; and updating the GUI to highlight the service in the network map and illustrate the associated sites in the subway view. 11. The network management method of claim 10, wherein the service traverses a plurality of sites in the network such that all of the sites cannot be displayed in the subway view, wherein the GUI further comprises a visual scrollbar which visualizes the service in a miniature format for the subway view with a portion shown in the subway view highlighted, and further comprising: updating the subway view based on input from the user through the visual scrollbar. 12. The network management method of claim 10, wherein the individual components in the subway view comprise any of a multiplexer, an optical transceiver, an optical switch, a multiplexer, a demultiplexer, a Wavelength Selective Switch (WSS), an amplifier, an attenuator, a dispersion compensation module, a C/L band coupler, a Time Division Multiplexing (TDM) switch, and a packet switch. 13. The network management method of claim 10, further comprising: receiving an input from the user from a selection in the GUI; and presenting correlated objects and data items based on the selection. 14. The network management method of claim 10, further comprising: receiving an input from the user selecting a power graph, and presenting an optical power readings graph in place of the network map, wherein the optical power readings graph illustrates power readings in both directions along the subway view and has an x-axis of optical power and a y-axis of each of the individual components in the subway view that measure optical power. 15. The network management method of claim 10, further comprising: receiving an input from the user selecting a power graph, and presenting an optical power readings graph in place of the network map, wherein the optical power readings graph illustrates power readings in both directions along the subway view and has an x-axis of optical power and a y-axis of each of the individual components in the subway view that measure optical power. 16. The network management method of claim 10, further comprising: receiving an input from the user selecting a point in the subway view for viewing an optical spectral analysis graph, and presenting an optical power readings graph in place of the network map, wherein the optical spectral analysis graph displays power on an x-axis and spectrum on a y-axis. 17. The network management method of claim 10, further comprising: receiving an input from the user selecting spectral use, and presenting an optical spectral allocation graph in place of the network map, wherein the optical spectral allocation graph displays spectrum on an x-axis and usage of the spectrum on a y-axis across the subway view. 18. A non-transitory computer-readable medium comprising instructions that, when executed, cause a processor to perform steps of: obtaining Operations, Administration, Maintenance, and Provisioning (OAM&P) data from the network via a network interface communicatively coupled to the processor and to one or more network elements; providing a Graphical User Interface (GUI) based on the network from the OAM&P data, wherein the GUI comprises a network map which provides a topological view and a subway view which provides a detailed device-level view which is more granular than the network map and illustrates individual components at each site; receiving a selection from a user of a service in the network; and updating the GUI to highlight the service in the network map and illustrate the associated sites in the subway view. 19. The non-transitory computer-readable medium of claim 18, wherein the service traverses a plurality of sites in the network such that all of the sites cannot be displayed in the subway view, wherein the GUI further comprises a visual scrollbar which visualizes the service in a miniature format for the subway view with a portion shown in the subway view highlighted, and wherein the instructions that, when executed, further cause the processor to perform steps of: updating the subway view based on input from the user through the visual scrollbar. 20. The non-transitory computer-readable medium of claim 18, wherein the individual components in the subway view comprise any of a multiplexer, an optical transceiver, an optical switch, a multiplexer, a demultiplexer, a Wavelength Selective Switch (WSS), an amplifier, an attenuator, a dispersion compensation module, a C/L band coupler, a Time Division Multiplexing (TDM) switch, and a packet switch.
A network management system includes a network interface communicatively coupled to one or more network elements in a network for exchanging Operations, Administration, Maintenance, and Provisioning (OAM&P) data; a processor communicatively coupled to the network interface; and memory storing instructions that, when executed, cause the processor to obtain the OAM&P data from the network, provide a Graphical User Interface (GUI) based on the network from the OAM&P data, wherein the GUI includes a network map which provides a topological view and a subway view which provides a detailed device-level view which is more granular than the network map and illustrates individual components at each site, receive a selection from a user of a service in the network, and update the GUI to highlight the service in the network map and illustrate the associated sites in the subway view.1. A network management system, comprising: a network interface communicatively coupled to one or more network elements in a network for exchanging Operations, Administration, Maintenance, and Provisioning (OAM&P) data; a processor communicatively coupled to the network interface; and memory storing instructions that, when executed, cause the processor to obtain the OAM&P data from the network, provide a Graphical User Interface (GUI) based on the network from the OAM&P data, wherein the GUI comprises a network map which provides a topological view and a subway view which provides a detailed device-level view which is more granular than the network map and illustrates individual components at each site, receive a selection from a user of a service in the network, and update the GUI to highlight the service in the network map and illustrate the associated sites in the subway view. 2. The network management system of claim 1, wherein the service traverses a plurality of sites in the network such that all of the sites cannot be displayed in the subway view, wherein the GUI further comprises a visual scrollbar which visualizes the service in a miniature format for the subway view with a portion shown in the subway view highlighted, and wherein the memory storing instructions that, when executed, further cause the processor to update the subway view based on input from the user through the visual scrollbar. 3. The network management system of claim 2, wherein the memory storing instructions that, when executed, further cause the processor to highlight a portion of the network in the topological view which is currently displayed in the subway view. 4. The network management system of claim 1, wherein the individual components in the subway view comprise any of a multiplexer, an optical transceiver, an optical switch, a multiplexer, a demultiplexer, a Wavelength Selective Switch (WSS), an amplifier, an attenuator, a dispersion compensation module, a C/L band coupler, a Time Division Multiplexing (TDM) switch, and a packet switch. 5. The network management system of claim 1, wherein the memory storing instructions that, when executed, further cause the processor to receive an input from the user from a selection in the GUI, and present correlated objects and data items based on the selection. 6. The network management system of claim 1, wherein the memory storing instructions that, when executed, further cause the processor to receive an input from the user selecting a power graph, and present an optical power readings graph in place of the network map, wherein the optical power readings graph illustrates power readings in both directions along the subway view and has an x-axis of optical power and a y-axis of each of the individual components in the subway view that measure optical power. 7. The network management system of claim 1, wherein the memory storing instructions that, when executed, further cause the processor to receive an input from the user selecting a power graph, and present an optical power readings graph in place of the network map, wherein the optical power readings graph illustrates power readings in both directions along the subway view and has an x-axis of optical power and a y-axis of each of the individual components in the subway view that measure optical power. 8. The network management system of claim 1, wherein the memory storing instructions that, when executed, further cause the processor to receive an input from the user selecting a point in the subway view for viewing an optical spectral analysis graph, and present an optical power readings graph in place of the network map, wherein the optical spectral analysis graph displays power on an x-axis and spectrum on a y-axis. 9. The network management system of claim 1, wherein the memory storing instructions that, when executed, further cause the processor to receive an input from the user selecting spectral use, and present an optical spectral allocation graph in place of the network map, wherein the optical spectral allocation graph displays spectrum on an x-axis and usage of the spectrum on a y-axis across the subway view. 10. A network management method, comprising: in a server comprising a network interface communicatively coupled to one or more network elements in a network for exchanging Operations, Administration, Maintenance, and Provisioning (OAM&P) data, obtaining the OAM&P data from the network; providing a Graphical User Interface (GUI) based on the network from the OAM&P data, wherein the GUI comprises a network map which provides a topological view and a subway view which provides a detailed device-level view which is more granular than the network map and illustrates individual components at each site; receiving a selection from a user of a service in the network; and updating the GUI to highlight the service in the network map and illustrate the associated sites in the subway view. 11. The network management method of claim 10, wherein the service traverses a plurality of sites in the network such that all of the sites cannot be displayed in the subway view, wherein the GUI further comprises a visual scrollbar which visualizes the service in a miniature format for the subway view with a portion shown in the subway view highlighted, and further comprising: updating the subway view based on input from the user through the visual scrollbar. 12. The network management method of claim 10, wherein the individual components in the subway view comprise any of a multiplexer, an optical transceiver, an optical switch, a multiplexer, a demultiplexer, a Wavelength Selective Switch (WSS), an amplifier, an attenuator, a dispersion compensation module, a C/L band coupler, a Time Division Multiplexing (TDM) switch, and a packet switch. 13. The network management method of claim 10, further comprising: receiving an input from the user from a selection in the GUI; and presenting correlated objects and data items based on the selection. 14. The network management method of claim 10, further comprising: receiving an input from the user selecting a power graph, and presenting an optical power readings graph in place of the network map, wherein the optical power readings graph illustrates power readings in both directions along the subway view and has an x-axis of optical power and a y-axis of each of the individual components in the subway view that measure optical power. 15. The network management method of claim 10, further comprising: receiving an input from the user selecting a power graph, and presenting an optical power readings graph in place of the network map, wherein the optical power readings graph illustrates power readings in both directions along the subway view and has an x-axis of optical power and a y-axis of each of the individual components in the subway view that measure optical power. 16. The network management method of claim 10, further comprising: receiving an input from the user selecting a point in the subway view for viewing an optical spectral analysis graph, and presenting an optical power readings graph in place of the network map, wherein the optical spectral analysis graph displays power on an x-axis and spectrum on a y-axis. 17. The network management method of claim 10, further comprising: receiving an input from the user selecting spectral use, and presenting an optical spectral allocation graph in place of the network map, wherein the optical spectral allocation graph displays spectrum on an x-axis and usage of the spectrum on a y-axis across the subway view. 18. A non-transitory computer-readable medium comprising instructions that, when executed, cause a processor to perform steps of: obtaining Operations, Administration, Maintenance, and Provisioning (OAM&P) data from the network via a network interface communicatively coupled to the processor and to one or more network elements; providing a Graphical User Interface (GUI) based on the network from the OAM&P data, wherein the GUI comprises a network map which provides a topological view and a subway view which provides a detailed device-level view which is more granular than the network map and illustrates individual components at each site; receiving a selection from a user of a service in the network; and updating the GUI to highlight the service in the network map and illustrate the associated sites in the subway view. 19. The non-transitory computer-readable medium of claim 18, wherein the service traverses a plurality of sites in the network such that all of the sites cannot be displayed in the subway view, wherein the GUI further comprises a visual scrollbar which visualizes the service in a miniature format for the subway view with a portion shown in the subway view highlighted, and wherein the instructions that, when executed, further cause the processor to perform steps of: updating the subway view based on input from the user through the visual scrollbar. 20. The non-transitory computer-readable medium of claim 18, wherein the individual components in the subway view comprise any of a multiplexer, an optical transceiver, an optical switch, a multiplexer, a demultiplexer, a Wavelength Selective Switch (WSS), an amplifier, an attenuator, a dispersion compensation module, a C/L band coupler, a Time Division Multiplexing (TDM) switch, and a packet switch.
2,400
9,333
9,333
16,275,039
2,472
Method and apparatus for controlling in-device coexistence (IDC) interference in a wireless communication system are described in the present invention. The present invention includes transmitting UE capability information whether the UE has a capability to measure IDC, to a base station (BS); receiving measurement configuration information whether the UE is allowed to send IDC indication, from the BS; and transmitting the IDC indication and at least one of measurements which are a measurement in consideration of IDC and a measurement without consideration of IDC to the BS. It is possible to control reducing occurrence of in-device coexistence interference.
1. A method for avoiding an interference, comprising: receiving, by a User Equipment (UE), In Device Coexistence (IDC) enabling information that indicates whether the UE is configured to initiate an IDC indication to a Base Station (BS) through a Radio Resource Control (RRC) connection reconfiguration message; generating, by the UE, the IDC indication; and transmitting, to the BS, the IDC indication including updated unusable frequency information and Time Division Multiplex (TDM) pattern information based on discontinuous reception (DRX) information, wherein a pattern periodicity interval comprises a scheduled period interval and an unscheduled period interval to avoid the IDC interference based on the DRX. 2. A User Equipment (UE) for avoiding an interference, comprising a transceiver for performing wireless transmission and reception and a processor operably coupled to the transceiver, to execute program instructions, wherein the processor, when executing the program instructions: causes the transceiver to receive In Device Coexistence (IDC) enabling information that indicates whether the UE is configured to initiate an IDC indication to a Base Station (BS) through a Radio Resource Control (RRC) connection reconfiguration message; generates the IDC indication; and causes the transceiver to transmit, to the BS, the IDC indication including updated unusable frequency information and Time Division Multiplex (TDM) pattern information based on discontinuous reception (DRX) information, wherein a pattern periodicity interval comprises a scheduled period interval and an unscheduled period interval to avoid the IDC interference based on the DRX.
Method and apparatus for controlling in-device coexistence (IDC) interference in a wireless communication system are described in the present invention. The present invention includes transmitting UE capability information whether the UE has a capability to measure IDC, to a base station (BS); receiving measurement configuration information whether the UE is allowed to send IDC indication, from the BS; and transmitting the IDC indication and at least one of measurements which are a measurement in consideration of IDC and a measurement without consideration of IDC to the BS. It is possible to control reducing occurrence of in-device coexistence interference.1. A method for avoiding an interference, comprising: receiving, by a User Equipment (UE), In Device Coexistence (IDC) enabling information that indicates whether the UE is configured to initiate an IDC indication to a Base Station (BS) through a Radio Resource Control (RRC) connection reconfiguration message; generating, by the UE, the IDC indication; and transmitting, to the BS, the IDC indication including updated unusable frequency information and Time Division Multiplex (TDM) pattern information based on discontinuous reception (DRX) information, wherein a pattern periodicity interval comprises a scheduled period interval and an unscheduled period interval to avoid the IDC interference based on the DRX. 2. A User Equipment (UE) for avoiding an interference, comprising a transceiver for performing wireless transmission and reception and a processor operably coupled to the transceiver, to execute program instructions, wherein the processor, when executing the program instructions: causes the transceiver to receive In Device Coexistence (IDC) enabling information that indicates whether the UE is configured to initiate an IDC indication to a Base Station (BS) through a Radio Resource Control (RRC) connection reconfiguration message; generates the IDC indication; and causes the transceiver to transmit, to the BS, the IDC indication including updated unusable frequency information and Time Division Multiplex (TDM) pattern information based on discontinuous reception (DRX) information, wherein a pattern periodicity interval comprises a scheduled period interval and an unscheduled period interval to avoid the IDC interference based on the DRX.
2,400
9,334
9,334
16,660,679
2,444
An automated service agent may be used to service issues discussed by users of a group communication channel. In the process of servicing the issue, the automated service agent may differentiate the roles of the users and identify a requester of the issue. In one scenario, the automated service agent may contact the requester in a private communication channel to collect more detailed or private information from the requester. The issue may be resolved in the private communication channel with the requester. Information may be posted back to the group communication channel to inform the other users as to the successful resolution of the issue and how the issue was resolved. While communicating with the requester in the private communication channel, messages may be posted to the group communication channel to keep the other users up to date on the progress of resolving the issue in the private communication channel.
1. A method, comprising: monitoring, by an automated service agent, messages communicated via a first communication thread of a group communication channel, wherein information communicated via the group communication channel is accessible to a group of users and the automated service agent, and wherein the group of users includes a first user; identifying, by the automated service agent, an issue from at least one message, from the first user, that is present in the first communication thread of the group communication channel, wherein the issue has not already been assigned, and wherein identifying the issue from the at least one message from the first user utilizes natural language processing; in response to determining that the issue is better addressed using a first private communication channel with the first user rather than using the group communication channel, posting, by the automated service agent, a message on the first communication thread that invites the first user to communicate with the automated service agent on the first private communication channel; communicating, by the automated service agent, with the first user on the first private communication channel so as to attempt to resolve the issue, wherein communication via the first private communication channel is restricted to only the automated service agent and the first user from the group of users; determining, by the automated service agent, a status of the issue being addressed in the first private communication channel; posting, by the automated service agent, the status of the issue being addressed in the first private communication channel on the first communication thread of the group communication channel; and posting, by the automated service agent, information that addresses the issue on the first communication thread of the group communication channel. 2. The method of claim 1, wherein the group communication channel includes the first communication thread and a second communication thread, and wherein the automated service agent monitors messages communicated via the first and second communication threads. 3. The method of claim 1, further comprising prior to communicating with the first user on the first private communication channel, posting, by the automated service agent, a message on the first communication thread that invites the first user to communicate with the automated service agent on the first private communication channel. 4. The method of claim 1, wherein communicating, by the automated service agent, with the first user on the first private communication channel comprises transmitting a message to the first user on the first private communicate channel, the message inviting the first user to communicate with the automated service agent via the first private communication channel. 5. The method of claim 1, wherein the issue includes an identification of a problem, and wherein the information that addresses the issue advances the issue towards a solution. 6. The method of claim 1, wherein the issue includes a request for assistance, and wherein the information that addresses the issue provides assistance to the request. 7. The method of claim 1, further comprising subsequent to identifying the issue from the at least one message from the first user, communicating, by the automated service agent, with a human agent on a second private communication channel so as to attempt to resolve the issue, wherein communication via the second private communication channel is restricted to only the automated service agent and the human agent. 8. The method of claim 7, further comprising subsequent to identifying the issue from the at least one message from the first user, and prior to communicating with the human agent on the second private communication channel, collecting information, by the automated service agent, regarding the first user via the first private communication channel, and transmitting the collected information regarding the first user to the human agent via the second private communication channel. 9. The method of claim 7, wherein the human agent is a system administrator, a supervisor of the first user or a colleague of the first user. 10. The method of claim 1, wherein the status of the issue being addressed in the first private communication channel indicates that one or more of the issue has been assigned to the automated service agent, the issue has been assigned to a human agent, a purchase order has been placed to resolve the issue, the first user has rejected assistance from the automated service agent, an approval request in association with the issue has been sent to the human agent, the automated service agent is actively working with the first user to resolve the issue, communication between the automated service agent and the first user has been idle for a time period, or the first user is providing additional information regarding the issue to the automated service agent. 11. The method of claim 1, further comprising subsequent to identifying the issue from the at least one message from the first user, collecting information, by the automated service agent, regarding the first user via the first private communication channel, and posting, by the automated service agent, a request on the group communication channel, the request requesting a human agent to contact the automated service agent to resolve the issue. 12. The method of claim 1, further comprising communicating, by the automated service agent and on the first private communication channel, information to the first user that addresses the issue. 13. The method of claim 12, wherein the information posted on the first communication thread of the group communication channel that addresses the issue is a shortened version of the information communicated on the first private communication channel to the first user. 14. The method of claim 1, wherein the issue is determined to be better addressed using the first private communication channel rather than using the group communication channel if resolution of the issue requires private information of the first user. 15. The method of claim 1, wherein the status of the issue that is posted on the first communication thread includes a graphical status indicator. 16. The method of claim 1, wherein the information that is posted on the first communication thread of the group communication channel and that addresses the issue is based on information previously posted on a second communication thread of the group communication channel. 17. The method of claim 1, wherein in order for the automated service agent to determine the information that addresses the issue, the automated service agent is trained with one or more of publicly available data, and private enterprise domain data. 18. The method of claim 1, further comprising, in response to the automated service agent detecting that a second communication thread has not been resolved within a certain time period after a commencement of the second communication thread, contacting, by the automated service agent, a human agent to address the unresolved second communication thread or filing a ticket to allow tracking of the unresolved second communication thread. 19. The method of claim 1, further comprising, in response to the automated service agent detecting one or more trending issues in the group communication channel, sending, by the automated service agent, an announcement to the group communication channel, wherein the announcement contains information regarding the one or more trending issues. 20. The method of claim 1, further comprising in response to the automated service agent detecting one or more trending issues or trouble shooting patterns in the group communication channel, communicating, by the automated service agent, with a human agent on a second private communication channel so as to inform the human agent of the one or more trending issues or trouble shooting patterns, wherein communication via the second private communication channel is restricted to only the automated service agent and the human agent. 21. The method of claim 1, further comprising in response to the automated service agent detecting an ongoing outage, sending, by the automated service agent, an announcement to the group communication channel, wherein the announcement contains information regarding a status of the ongoing outage. 22. A method, comprising: displaying a first and second communication thread from the group communication channel in a graphical user interface (GUI), wherein information communicated via the group communication channel is accessible to a group of users and an automated service agent, and wherein the group of users includes a first user; receiving, from the automated service agent, a status of an issue being addressed in a private communication channel, wherein communication via the private communication channel is restricted to only the automated service agent and the first user from the group of users; determining whether the issue is associated with the first or second communication thread based on metadata tagged with the private communication channel, the metadata indicating a communication thread from which the issue was originally described; and in response to determining that the issue is associated with the first communication thread, displaying, in the GUI and in connection with the first communication thread, the status of the issue being addressed in the private communication channel. 23. The method of claim 22, wherein the first communication thread is displayed in a top level view that contains a selectable region that, upon selected, causes the top level view to be transformed into a bottom level view that displays additional information regarding the first communication thread. 24. The method of claim 22, wherein the status of the issue indicates that one or more of the issue has been assigned to a human agent, a purchase order has been placed to resolve the issue, the first user has rejected assistance from the automated service agent, an approval request has been sent to the human agent in association with the issue, or the issue has been resolved. 25. The method of claim 22, wherein the status of the issue displayed in the first communication thread of the top level view of the group communication channel includes a graphical status indicator. 26. The method of claim 22, wherein the first communication thread and the second communication thread are displayed in a top level view, and wherein the top level view includes a synopsis of the issue associated with the first communication thread and a synopsis of an issue associated with the second communication thread. 27. The method of claim 22, wherein the issue includes one or more of an identification of a problem or a request for assistance.
An automated service agent may be used to service issues discussed by users of a group communication channel. In the process of servicing the issue, the automated service agent may differentiate the roles of the users and identify a requester of the issue. In one scenario, the automated service agent may contact the requester in a private communication channel to collect more detailed or private information from the requester. The issue may be resolved in the private communication channel with the requester. Information may be posted back to the group communication channel to inform the other users as to the successful resolution of the issue and how the issue was resolved. While communicating with the requester in the private communication channel, messages may be posted to the group communication channel to keep the other users up to date on the progress of resolving the issue in the private communication channel.1. A method, comprising: monitoring, by an automated service agent, messages communicated via a first communication thread of a group communication channel, wherein information communicated via the group communication channel is accessible to a group of users and the automated service agent, and wherein the group of users includes a first user; identifying, by the automated service agent, an issue from at least one message, from the first user, that is present in the first communication thread of the group communication channel, wherein the issue has not already been assigned, and wherein identifying the issue from the at least one message from the first user utilizes natural language processing; in response to determining that the issue is better addressed using a first private communication channel with the first user rather than using the group communication channel, posting, by the automated service agent, a message on the first communication thread that invites the first user to communicate with the automated service agent on the first private communication channel; communicating, by the automated service agent, with the first user on the first private communication channel so as to attempt to resolve the issue, wherein communication via the first private communication channel is restricted to only the automated service agent and the first user from the group of users; determining, by the automated service agent, a status of the issue being addressed in the first private communication channel; posting, by the automated service agent, the status of the issue being addressed in the first private communication channel on the first communication thread of the group communication channel; and posting, by the automated service agent, information that addresses the issue on the first communication thread of the group communication channel. 2. The method of claim 1, wherein the group communication channel includes the first communication thread and a second communication thread, and wherein the automated service agent monitors messages communicated via the first and second communication threads. 3. The method of claim 1, further comprising prior to communicating with the first user on the first private communication channel, posting, by the automated service agent, a message on the first communication thread that invites the first user to communicate with the automated service agent on the first private communication channel. 4. The method of claim 1, wherein communicating, by the automated service agent, with the first user on the first private communication channel comprises transmitting a message to the first user on the first private communicate channel, the message inviting the first user to communicate with the automated service agent via the first private communication channel. 5. The method of claim 1, wherein the issue includes an identification of a problem, and wherein the information that addresses the issue advances the issue towards a solution. 6. The method of claim 1, wherein the issue includes a request for assistance, and wherein the information that addresses the issue provides assistance to the request. 7. The method of claim 1, further comprising subsequent to identifying the issue from the at least one message from the first user, communicating, by the automated service agent, with a human agent on a second private communication channel so as to attempt to resolve the issue, wherein communication via the second private communication channel is restricted to only the automated service agent and the human agent. 8. The method of claim 7, further comprising subsequent to identifying the issue from the at least one message from the first user, and prior to communicating with the human agent on the second private communication channel, collecting information, by the automated service agent, regarding the first user via the first private communication channel, and transmitting the collected information regarding the first user to the human agent via the second private communication channel. 9. The method of claim 7, wherein the human agent is a system administrator, a supervisor of the first user or a colleague of the first user. 10. The method of claim 1, wherein the status of the issue being addressed in the first private communication channel indicates that one or more of the issue has been assigned to the automated service agent, the issue has been assigned to a human agent, a purchase order has been placed to resolve the issue, the first user has rejected assistance from the automated service agent, an approval request in association with the issue has been sent to the human agent, the automated service agent is actively working with the first user to resolve the issue, communication between the automated service agent and the first user has been idle for a time period, or the first user is providing additional information regarding the issue to the automated service agent. 11. The method of claim 1, further comprising subsequent to identifying the issue from the at least one message from the first user, collecting information, by the automated service agent, regarding the first user via the first private communication channel, and posting, by the automated service agent, a request on the group communication channel, the request requesting a human agent to contact the automated service agent to resolve the issue. 12. The method of claim 1, further comprising communicating, by the automated service agent and on the first private communication channel, information to the first user that addresses the issue. 13. The method of claim 12, wherein the information posted on the first communication thread of the group communication channel that addresses the issue is a shortened version of the information communicated on the first private communication channel to the first user. 14. The method of claim 1, wherein the issue is determined to be better addressed using the first private communication channel rather than using the group communication channel if resolution of the issue requires private information of the first user. 15. The method of claim 1, wherein the status of the issue that is posted on the first communication thread includes a graphical status indicator. 16. The method of claim 1, wherein the information that is posted on the first communication thread of the group communication channel and that addresses the issue is based on information previously posted on a second communication thread of the group communication channel. 17. The method of claim 1, wherein in order for the automated service agent to determine the information that addresses the issue, the automated service agent is trained with one or more of publicly available data, and private enterprise domain data. 18. The method of claim 1, further comprising, in response to the automated service agent detecting that a second communication thread has not been resolved within a certain time period after a commencement of the second communication thread, contacting, by the automated service agent, a human agent to address the unresolved second communication thread or filing a ticket to allow tracking of the unresolved second communication thread. 19. The method of claim 1, further comprising, in response to the automated service agent detecting one or more trending issues in the group communication channel, sending, by the automated service agent, an announcement to the group communication channel, wherein the announcement contains information regarding the one or more trending issues. 20. The method of claim 1, further comprising in response to the automated service agent detecting one or more trending issues or trouble shooting patterns in the group communication channel, communicating, by the automated service agent, with a human agent on a second private communication channel so as to inform the human agent of the one or more trending issues or trouble shooting patterns, wherein communication via the second private communication channel is restricted to only the automated service agent and the human agent. 21. The method of claim 1, further comprising in response to the automated service agent detecting an ongoing outage, sending, by the automated service agent, an announcement to the group communication channel, wherein the announcement contains information regarding a status of the ongoing outage. 22. A method, comprising: displaying a first and second communication thread from the group communication channel in a graphical user interface (GUI), wherein information communicated via the group communication channel is accessible to a group of users and an automated service agent, and wherein the group of users includes a first user; receiving, from the automated service agent, a status of an issue being addressed in a private communication channel, wherein communication via the private communication channel is restricted to only the automated service agent and the first user from the group of users; determining whether the issue is associated with the first or second communication thread based on metadata tagged with the private communication channel, the metadata indicating a communication thread from which the issue was originally described; and in response to determining that the issue is associated with the first communication thread, displaying, in the GUI and in connection with the first communication thread, the status of the issue being addressed in the private communication channel. 23. The method of claim 22, wherein the first communication thread is displayed in a top level view that contains a selectable region that, upon selected, causes the top level view to be transformed into a bottom level view that displays additional information regarding the first communication thread. 24. The method of claim 22, wherein the status of the issue indicates that one or more of the issue has been assigned to a human agent, a purchase order has been placed to resolve the issue, the first user has rejected assistance from the automated service agent, an approval request has been sent to the human agent in association with the issue, or the issue has been resolved. 25. The method of claim 22, wherein the status of the issue displayed in the first communication thread of the top level view of the group communication channel includes a graphical status indicator. 26. The method of claim 22, wherein the first communication thread and the second communication thread are displayed in a top level view, and wherein the top level view includes a synopsis of the issue associated with the first communication thread and a synopsis of an issue associated with the second communication thread. 27. The method of claim 22, wherein the issue includes one or more of an identification of a problem or a request for assistance.
2,400
9,335
9,335
15,671,740
2,449
A system includes a processor configured to receive a request from a host vehicle for video relating to a location specified in the request. The processor is also configured to determine whether a candidate vehicle receiving the request can provide the request video when the request is received. The processor is further configured to relay the request to a transceiver in wireless communication with the candidate vehicle, if the candidate vehicle cannot provide the requested video, otherwise record and transmit the requested video.
1. A system comprising: a processor configured to: receive a request from a host vehicle for video relating to a location specified in the request; determine whether a candidate vehicle receiving the request can provide the requested video when the request is received; and relay the request to a transceiver in wireless communication with the candidate vehicle if the candidate vehicle cannot provide the requested video, otherwise record and transmit the requested video. 2. The system of claim 1, wherein the request includes a host identifier and wherein the processor is configured to include the host identifier in the transmission of the requested video. 3. The system of claim 1, wherein the transceiver is another vehicle's transceiver. 4. The system of claim 1, wherein the transceiver is an infrastructure transceiver. 5. The system of claim 1, wherein the processor is configured to transmit the requested video directly back to the host vehicle, based on host vehicle identification included in the request, via a cellular network. 6. The system of claim 1, wherein the processor is configured to transmit the requested video to a transceiver in wireless communication with the candidate vehicle. 7. The system of claim 1, wherein the processor is further configured to: receive video transmission at the candidate vehicle from a wirelessly connected vehicle, including a host identifier; and play back the video transmission based on a determination that the candidate vehicle corresponds to the host identifier. 8. The system of claim 7, wherein the processor is further configured to: offer the video transmission for playback based on a determination that the candidate vehicle does not correspond to the host identifier; and relay the video transmission to the transceiver in wireless communication with the candidate vehicle. 9. The system of claim 7, wherein the wirelessly connected vehicle is a video-originating vehicle. 10. The system of claim 7, wherein the wirelessly connected vehicle is another candidate vehicle, other than a video-originating vehicle. 11. A system comprising: a processor configured to: receive a video request, including a location, from a host vehicle; access a record of current candidate vehicle locations; determine a candidate vehicle within a predefined threshold distance of the location, based on the candidate vehicle locations; send an instruction to the candidate vehicle to record video; receive recorded video from the candidate vehicle; and send the recorded video to the host vehicle. 12. The system of claim 11, wherein the record includes current candidate vehicle headings, and wherein the processor is further configured to determine the candidate vehicle based on the candidate vehicle indicating a heading that would allow at least one vehicle camera to view the location. 13. The system of claim 11, wherein the location includes a set of coordinates defining an area, and wherein the predefined threshold distance is considered with respect to an outer boundary of the area defined by the coordinates. 14. The system of claim 11, wherein the location includes a defined point of interest. 15. The system of claim 11, wherein the processor is further configured to: receive an indication that the candidate video cannot service the request; and repeat the process of accessing the record, determining the candidate vehicle, and sending the instruction until a candidate vehicle selected through the repeating sends recorded video. 16. A computer-implemented method comprising: recording video of an area-of-interest (AOI), using a candidate vehicle camera, responsive to a request from a host vehicle, received through wireless transmission at a candidate vehicle including the camera and performing the recording; transmitting recorded video to a plurality of transceivers wirelessly connected to the candidate vehicle; and transmitting the request to the plurality of transceivers, responsive to determining that the candidate vehicle camera can no longer detect the AOI. 17. The method of claim 16, wherein the determining that the candidate vehicle camera can no longer detect the AOI is based on a candidate vehicle location compared to the AOI. 18. The method of claim 16, wherein the determining that the candidate vehicle camera can no longer detect the AOI is based on a candidate vehicle heading causing the candidate vehicle camera to be pointed such that the camera can no longer detect the AOI. 19. The method of claim 16, wherein the transmitting the request is further responsive to determining that an original time limit associated with the request has not yet expired. 20. The method of claim 19, further comprising: setting a new time limit to an amount of time remaining in the original time limit, and wherein the transmitting further comprises transmitting the request, including the new time limit.
A system includes a processor configured to receive a request from a host vehicle for video relating to a location specified in the request. The processor is also configured to determine whether a candidate vehicle receiving the request can provide the request video when the request is received. The processor is further configured to relay the request to a transceiver in wireless communication with the candidate vehicle, if the candidate vehicle cannot provide the requested video, otherwise record and transmit the requested video.1. A system comprising: a processor configured to: receive a request from a host vehicle for video relating to a location specified in the request; determine whether a candidate vehicle receiving the request can provide the requested video when the request is received; and relay the request to a transceiver in wireless communication with the candidate vehicle if the candidate vehicle cannot provide the requested video, otherwise record and transmit the requested video. 2. The system of claim 1, wherein the request includes a host identifier and wherein the processor is configured to include the host identifier in the transmission of the requested video. 3. The system of claim 1, wherein the transceiver is another vehicle's transceiver. 4. The system of claim 1, wherein the transceiver is an infrastructure transceiver. 5. The system of claim 1, wherein the processor is configured to transmit the requested video directly back to the host vehicle, based on host vehicle identification included in the request, via a cellular network. 6. The system of claim 1, wherein the processor is configured to transmit the requested video to a transceiver in wireless communication with the candidate vehicle. 7. The system of claim 1, wherein the processor is further configured to: receive video transmission at the candidate vehicle from a wirelessly connected vehicle, including a host identifier; and play back the video transmission based on a determination that the candidate vehicle corresponds to the host identifier. 8. The system of claim 7, wherein the processor is further configured to: offer the video transmission for playback based on a determination that the candidate vehicle does not correspond to the host identifier; and relay the video transmission to the transceiver in wireless communication with the candidate vehicle. 9. The system of claim 7, wherein the wirelessly connected vehicle is a video-originating vehicle. 10. The system of claim 7, wherein the wirelessly connected vehicle is another candidate vehicle, other than a video-originating vehicle. 11. A system comprising: a processor configured to: receive a video request, including a location, from a host vehicle; access a record of current candidate vehicle locations; determine a candidate vehicle within a predefined threshold distance of the location, based on the candidate vehicle locations; send an instruction to the candidate vehicle to record video; receive recorded video from the candidate vehicle; and send the recorded video to the host vehicle. 12. The system of claim 11, wherein the record includes current candidate vehicle headings, and wherein the processor is further configured to determine the candidate vehicle based on the candidate vehicle indicating a heading that would allow at least one vehicle camera to view the location. 13. The system of claim 11, wherein the location includes a set of coordinates defining an area, and wherein the predefined threshold distance is considered with respect to an outer boundary of the area defined by the coordinates. 14. The system of claim 11, wherein the location includes a defined point of interest. 15. The system of claim 11, wherein the processor is further configured to: receive an indication that the candidate video cannot service the request; and repeat the process of accessing the record, determining the candidate vehicle, and sending the instruction until a candidate vehicle selected through the repeating sends recorded video. 16. A computer-implemented method comprising: recording video of an area-of-interest (AOI), using a candidate vehicle camera, responsive to a request from a host vehicle, received through wireless transmission at a candidate vehicle including the camera and performing the recording; transmitting recorded video to a plurality of transceivers wirelessly connected to the candidate vehicle; and transmitting the request to the plurality of transceivers, responsive to determining that the candidate vehicle camera can no longer detect the AOI. 17. The method of claim 16, wherein the determining that the candidate vehicle camera can no longer detect the AOI is based on a candidate vehicle location compared to the AOI. 18. The method of claim 16, wherein the determining that the candidate vehicle camera can no longer detect the AOI is based on a candidate vehicle heading causing the candidate vehicle camera to be pointed such that the camera can no longer detect the AOI. 19. The method of claim 16, wherein the transmitting the request is further responsive to determining that an original time limit associated with the request has not yet expired. 20. The method of claim 19, further comprising: setting a new time limit to an amount of time remaining in the original time limit, and wherein the transmitting further comprises transmitting the request, including the new time limit.
2,400
9,336
9,336
16,024,622
2,455
A web based software system generally designed for processing pre-employment background investigations is described. The software system allows an organization the ability to create and customize electronic documents to be sent to their applicants to complete via the web based software system, and returned in the same fashion. The subject matter turns much of a common pre-employment background investigation electronic, so that fewer hardcopy documents are necessary, thus creating more efficient management of individual background investigations.
1. A method for a computing device with a processor and a system memory to assist an investigator in conducting a background investigation of an applicant for a position within a first organization, comprising the steps of: receiving a first set of program data comprising information identifying the applicant, the position, the first organization, and the investigator; storing a new applicant entry in the system memory, the new applicant entry associated with the first set of program data; and generating a suggested reference list of one or more law enforcement agencies around a selected address, wherein the selected address is one of an applicant current residential address, an applicant past address, and a reference source address associated with a reference source, wherein the reference source is a person. 2. A method for a computing device with a processor and a system memory to assist an investigator in conducting a background investigation of an applicant for a position within a first organization, comprising the steps of: receiving a first set of program data comprising information identifying the applicant, the position, the first organization, and the investigator; storing a new applicant entry in the system memory, the new applicant entry associated with the first set of program data; searching for a previous applicant entry in the system memory associated with the applicant and a second organization different from the first organization, the previous applicant entry having a second set of program data, the second set of program data comprising information regarding the applicant, the second organization, the position the applicant applied for in the second organization, and status of a previous application the applicant applied for in the second organization; and presenting the second set of program data to the investigator. 3. The method of claim 2, further comprising the steps of: transmitting an applicant hyperlink to an applicant email address associated with the applicant, the applicant hyperlink for viewing an applicant set of electronic documents; and presenting to the investigator, prior to transmitting the applicant hyperlink for viewing the applicant set of electronic documents, an option of changing one or more documents in the applicant set of electronic documents. 4. The method of claim 3, wherein one document of the applicant set of electronic documents is an inter-active questionnaire in which a next question presented to the applicant is based on a response to a prior question. 5. A non-transitory computer-readable medium having stored thereon instructions which, when executed by a processor of a computing device with a system memory, cause the computing device to perform the steps of a method to assist an investigator in conducting a background investigation of an applicant for a position within a first organization, the steps of the method comprising: receiving a first set of program data comprising information identifying the applicant, the position, the first organization, and the investigator; storing a new applicant entry in the system memory, the new applicant entry associated with the first set of program data; and generating a suggested reference list of one or more law enforcement agencies around a selected address, wherein the selected address is one of an applicant current residential address, an applicant past address, and a reference source address associated with a reference source, wherein the reference source is a person. 6. A non-transitory computer-readable medium having stored thereon instructions which, when executed by a processor of a computing device with a system memory, cause the computing device to perform the steps of a method to assist an investigator in conducting a background investigation of an applicant for a position within a first organization, the steps of the method comprising: receiving a first set of program data comprising information identifying the applicant, the position, the first organization, and the investigator; storing a new applicant entry in the system memory, the new applicant entry associated with the first set of program data; searching for a previous applicant entry in the system memory associated with the applicant and a second organization different from the first organization, the previous applicant entry having a second set of program data, the second set of program data comprising information regarding the applicant, the second organization, the position the applicant applied for in the second organization, and status of a previous application the applicant applied for in the second organization; and presenting the second set of program data to the investigator. 7. The non-transitory computer-readable medium of claim 6, having stored thereon additional instructions which, when executed by the processor of the computing device, cause the computing device to perform the steps of: transmitting an applicant hyperlink to an applicant email address associated with the applicant, the applicant hyperlink for viewing an applicant set of electronic documents; and presenting to the investigator, prior to transmitting the applicant hyperlink for viewing the applicant set of electronic documents, an option of changing one or more documents in the applicant set of electronic documents. 8. The non-transitory computer-readable medium of claim 7, wherein one document of the applicant set of electronic documents is an inter-active questionnaire in which a next question presented to the applicant is based on a response to a prior question.
A web based software system generally designed for processing pre-employment background investigations is described. The software system allows an organization the ability to create and customize electronic documents to be sent to their applicants to complete via the web based software system, and returned in the same fashion. The subject matter turns much of a common pre-employment background investigation electronic, so that fewer hardcopy documents are necessary, thus creating more efficient management of individual background investigations.1. A method for a computing device with a processor and a system memory to assist an investigator in conducting a background investigation of an applicant for a position within a first organization, comprising the steps of: receiving a first set of program data comprising information identifying the applicant, the position, the first organization, and the investigator; storing a new applicant entry in the system memory, the new applicant entry associated with the first set of program data; and generating a suggested reference list of one or more law enforcement agencies around a selected address, wherein the selected address is one of an applicant current residential address, an applicant past address, and a reference source address associated with a reference source, wherein the reference source is a person. 2. A method for a computing device with a processor and a system memory to assist an investigator in conducting a background investigation of an applicant for a position within a first organization, comprising the steps of: receiving a first set of program data comprising information identifying the applicant, the position, the first organization, and the investigator; storing a new applicant entry in the system memory, the new applicant entry associated with the first set of program data; searching for a previous applicant entry in the system memory associated with the applicant and a second organization different from the first organization, the previous applicant entry having a second set of program data, the second set of program data comprising information regarding the applicant, the second organization, the position the applicant applied for in the second organization, and status of a previous application the applicant applied for in the second organization; and presenting the second set of program data to the investigator. 3. The method of claim 2, further comprising the steps of: transmitting an applicant hyperlink to an applicant email address associated with the applicant, the applicant hyperlink for viewing an applicant set of electronic documents; and presenting to the investigator, prior to transmitting the applicant hyperlink for viewing the applicant set of electronic documents, an option of changing one or more documents in the applicant set of electronic documents. 4. The method of claim 3, wherein one document of the applicant set of electronic documents is an inter-active questionnaire in which a next question presented to the applicant is based on a response to a prior question. 5. A non-transitory computer-readable medium having stored thereon instructions which, when executed by a processor of a computing device with a system memory, cause the computing device to perform the steps of a method to assist an investigator in conducting a background investigation of an applicant for a position within a first organization, the steps of the method comprising: receiving a first set of program data comprising information identifying the applicant, the position, the first organization, and the investigator; storing a new applicant entry in the system memory, the new applicant entry associated with the first set of program data; and generating a suggested reference list of one or more law enforcement agencies around a selected address, wherein the selected address is one of an applicant current residential address, an applicant past address, and a reference source address associated with a reference source, wherein the reference source is a person. 6. A non-transitory computer-readable medium having stored thereon instructions which, when executed by a processor of a computing device with a system memory, cause the computing device to perform the steps of a method to assist an investigator in conducting a background investigation of an applicant for a position within a first organization, the steps of the method comprising: receiving a first set of program data comprising information identifying the applicant, the position, the first organization, and the investigator; storing a new applicant entry in the system memory, the new applicant entry associated with the first set of program data; searching for a previous applicant entry in the system memory associated with the applicant and a second organization different from the first organization, the previous applicant entry having a second set of program data, the second set of program data comprising information regarding the applicant, the second organization, the position the applicant applied for in the second organization, and status of a previous application the applicant applied for in the second organization; and presenting the second set of program data to the investigator. 7. The non-transitory computer-readable medium of claim 6, having stored thereon additional instructions which, when executed by the processor of the computing device, cause the computing device to perform the steps of: transmitting an applicant hyperlink to an applicant email address associated with the applicant, the applicant hyperlink for viewing an applicant set of electronic documents; and presenting to the investigator, prior to transmitting the applicant hyperlink for viewing the applicant set of electronic documents, an option of changing one or more documents in the applicant set of electronic documents. 8. The non-transitory computer-readable medium of claim 7, wherein one document of the applicant set of electronic documents is an inter-active questionnaire in which a next question presented to the applicant is based on a response to a prior question.
2,400
9,337
9,337
16,385,814
2,488
A system for detecting behavior of a target may include: a target detection engine, adapted to detect at least one target from one or more objects from a video surveillance system recording a scene; a path builder, adapted to create at least one mature path model from analysis of the behavior of a plurality of targets in the scene, wherein the at least one mature path model includes a model of expected target behavior with respect to the at least one path model; and a target behavior analyzer, adapted to analyze and identify target behavior with respect to the at least one mature path model. The system may further include an alert generator, adapted to generate an alert based on the identified behavior.
1.-24. (canceled) 25. A video processing system comprising: memory storing data and instructions; and one or more computer processors configured to receive an input video sequence including a plurality of first targets and a second target, and further configured to access the memory and execute the instructions, causing the one or more computer processors to: derive target trajectory data from analysis of each first target of the plurality of first targets of the input video sequence; train a path model based on the target trajectory data of each first target of the plurality of first targets; build an entry/exit map using the trained path model; and using the entry/exit map, determine whether behavior of the second target is consistent with respect to expected behavior of the second target in relation to a path in the path model. 26. The video processing system of claim 25, wherein when the one or more computer processors are configured to derive target property data from the input video sequence, the one or more computer processors are further configured to: derive, from the input video sequence, the target property data based on one or more properties of the plurality of first targets. 27. The video processing system of claim 26, wherein the one or more computer processors are configured to: calculate a plurality of statistical models based on a same target property of the plurality of first targets. 28. The video processing system of claim 27, wherein when the one or more computer processors are configured to calculate the plurality of statistical models, the one or more computer processors are further configured to: calculate the plurality of statistical models based on a function of one or more target properties of the plurality of first targets. 29. The video processing system of claim 28, wherein the one or more computer processors are configured to map each of the plurality of statistical models to a corresponding location on the entry/exit map. 30. The video processing system of claim 29, wherein the one or more computer processors are further configured to: initialize an array corresponding to a size of the entry/exit map. 31. The video processing system of claim 25, wherein the one or more computer processors are further configured to: initialize an array corresponding to a size of a frame of the input video sequence. 32. The video processing system of claim 25, wherein the one or more computer processors are further configured to: identify regions of interest based on the entry/exit map. 33. The video processing system of claim 32, wherein the one or more computer processors are further configured to: determine trajectory information based on the regions of interest. 34. The video processing system of claim 33, wherein the one or more computer processors are further configured to: receive new target property data corresponding to a new target instance of the second target; and compare at least a portion of the new target property data with the entry/exit map to determine a degree of conformance. 35. The video processing system of claim 34, wherein the one or more computer processors are further configured to: determine whether the new target instance is consistent with behavior predicted by the entry/exit map based on the degree of conformance to detect abnormal behavior.
A system for detecting behavior of a target may include: a target detection engine, adapted to detect at least one target from one or more objects from a video surveillance system recording a scene; a path builder, adapted to create at least one mature path model from analysis of the behavior of a plurality of targets in the scene, wherein the at least one mature path model includes a model of expected target behavior with respect to the at least one path model; and a target behavior analyzer, adapted to analyze and identify target behavior with respect to the at least one mature path model. The system may further include an alert generator, adapted to generate an alert based on the identified behavior.1.-24. (canceled) 25. A video processing system comprising: memory storing data and instructions; and one or more computer processors configured to receive an input video sequence including a plurality of first targets and a second target, and further configured to access the memory and execute the instructions, causing the one or more computer processors to: derive target trajectory data from analysis of each first target of the plurality of first targets of the input video sequence; train a path model based on the target trajectory data of each first target of the plurality of first targets; build an entry/exit map using the trained path model; and using the entry/exit map, determine whether behavior of the second target is consistent with respect to expected behavior of the second target in relation to a path in the path model. 26. The video processing system of claim 25, wherein when the one or more computer processors are configured to derive target property data from the input video sequence, the one or more computer processors are further configured to: derive, from the input video sequence, the target property data based on one or more properties of the plurality of first targets. 27. The video processing system of claim 26, wherein the one or more computer processors are configured to: calculate a plurality of statistical models based on a same target property of the plurality of first targets. 28. The video processing system of claim 27, wherein when the one or more computer processors are configured to calculate the plurality of statistical models, the one or more computer processors are further configured to: calculate the plurality of statistical models based on a function of one or more target properties of the plurality of first targets. 29. The video processing system of claim 28, wherein the one or more computer processors are configured to map each of the plurality of statistical models to a corresponding location on the entry/exit map. 30. The video processing system of claim 29, wherein the one or more computer processors are further configured to: initialize an array corresponding to a size of the entry/exit map. 31. The video processing system of claim 25, wherein the one or more computer processors are further configured to: initialize an array corresponding to a size of a frame of the input video sequence. 32. The video processing system of claim 25, wherein the one or more computer processors are further configured to: identify regions of interest based on the entry/exit map. 33. The video processing system of claim 32, wherein the one or more computer processors are further configured to: determine trajectory information based on the regions of interest. 34. The video processing system of claim 33, wherein the one or more computer processors are further configured to: receive new target property data corresponding to a new target instance of the second target; and compare at least a portion of the new target property data with the entry/exit map to determine a degree of conformance. 35. The video processing system of claim 34, wherein the one or more computer processors are further configured to: determine whether the new target instance is consistent with behavior predicted by the entry/exit map based on the degree of conformance to detect abnormal behavior.
2,400
9,338
9,338
15,418,291
2,477
A high frequency data network access system leverages commodity WiFi chipsets and specifically multi spatial stream (e.g., 802.11 ac) chipsets in combination with phased array antenna systems at the aggregation nodes. Examples can be very spectrally efficient with both polarization and frequency diversity.
1. A subscriber node adapted for installation at a premises, the subscriber node comprising: an outdoor unit for carrying a steerable antenna module; and an indoor unit holding a local wireless module. 2. The subscriber node of claim 1, wherein the steerable antenna module transmits and receives information to and from one or more aggregation nodes. 3. A subscriber node of claim 1, wherein the steerable antenna module comprises one or more patch array antennas. 4. The subscriber node of claim 1, wherein the steerable antenna module comprises a motor unit that mechanically steers its one or more antennas. 5. The subscriber node of claim 4, wherein the motor unit causes the antennas to point to one or more aggregation nodes. 6. The subscriber node of claim 1, wherein the subscriber node communicates with one or more aggregation nodes in a spectral band of 10 GHz to 300 GHz. 7. The subscriber node of claim 1, wherein the subscriber node communicates with one or more aggregation nodes in a spectral band of 30 GHz to 60 GHz. 8. The subscriber node of claim 1, further comprising a bridge unit configured to mechanically support the outdoor unit and the indoor unit through a window. 9. The subscriber node of claim 1, wherein the local wireless module communicates with network devices at the subscriber's premises. 10. The subscriber node of claim 1, wherein the local wireless module maintains a wireless local area network for the subscriber's premises. 11. The subscriber node of claim 1, wherein the local wireless module transmits and receives information with a local wireless access point that maintains a wireless local area network for the subscriber's premises. 12. The subscriber node of claim 1, wherein the outdoor unit and the indoor unit are installed on either side of a double-hung window. 13. The subscriber node of claim 1, wherein the steerable antenna module provided in a weather hardened enclosure. 14. A subscriber node adapted for installation at a subscriber's premises, the subscriber node comprising: a steerable antenna module installed on an exterior side of a window at the subscriber's premises; and a local communication module installed on an interior side of the window. 15. A method for communicating with one or more aggregation nodes, the method comprising: positioning a steerable antenna module to point to a first aggregation node; and in response to a failure of the first aggregation node, repositioning the steerable antenna module to point to a second aggregation node. 16. A method for providing access to a premises, comprising: sending high frequency signals to and receiving high frequency signals from an aggregation node via an outdoor unit; and communicating with a local area network via an indoor unit. 17. The method of claim 16, further controlling a steerable antenna module at least one antenna toward the aggregation node. 18. The method of claim 16, wherein the high frequency signals are located in a spectral band of 10 GHz to 300 GHz. 19. The method of claim 16, wherein the high frequency signals are located in a spectral band of 30 GHz to 60 GHz.
A high frequency data network access system leverages commodity WiFi chipsets and specifically multi spatial stream (e.g., 802.11 ac) chipsets in combination with phased array antenna systems at the aggregation nodes. Examples can be very spectrally efficient with both polarization and frequency diversity.1. A subscriber node adapted for installation at a premises, the subscriber node comprising: an outdoor unit for carrying a steerable antenna module; and an indoor unit holding a local wireless module. 2. The subscriber node of claim 1, wherein the steerable antenna module transmits and receives information to and from one or more aggregation nodes. 3. A subscriber node of claim 1, wherein the steerable antenna module comprises one or more patch array antennas. 4. The subscriber node of claim 1, wherein the steerable antenna module comprises a motor unit that mechanically steers its one or more antennas. 5. The subscriber node of claim 4, wherein the motor unit causes the antennas to point to one or more aggregation nodes. 6. The subscriber node of claim 1, wherein the subscriber node communicates with one or more aggregation nodes in a spectral band of 10 GHz to 300 GHz. 7. The subscriber node of claim 1, wherein the subscriber node communicates with one or more aggregation nodes in a spectral band of 30 GHz to 60 GHz. 8. The subscriber node of claim 1, further comprising a bridge unit configured to mechanically support the outdoor unit and the indoor unit through a window. 9. The subscriber node of claim 1, wherein the local wireless module communicates with network devices at the subscriber's premises. 10. The subscriber node of claim 1, wherein the local wireless module maintains a wireless local area network for the subscriber's premises. 11. The subscriber node of claim 1, wherein the local wireless module transmits and receives information with a local wireless access point that maintains a wireless local area network for the subscriber's premises. 12. The subscriber node of claim 1, wherein the outdoor unit and the indoor unit are installed on either side of a double-hung window. 13. The subscriber node of claim 1, wherein the steerable antenna module provided in a weather hardened enclosure. 14. A subscriber node adapted for installation at a subscriber's premises, the subscriber node comprising: a steerable antenna module installed on an exterior side of a window at the subscriber's premises; and a local communication module installed on an interior side of the window. 15. A method for communicating with one or more aggregation nodes, the method comprising: positioning a steerable antenna module to point to a first aggregation node; and in response to a failure of the first aggregation node, repositioning the steerable antenna module to point to a second aggregation node. 16. A method for providing access to a premises, comprising: sending high frequency signals to and receiving high frequency signals from an aggregation node via an outdoor unit; and communicating with a local area network via an indoor unit. 17. The method of claim 16, further controlling a steerable antenna module at least one antenna toward the aggregation node. 18. The method of claim 16, wherein the high frequency signals are located in a spectral band of 10 GHz to 300 GHz. 19. The method of claim 16, wherein the high frequency signals are located in a spectral band of 30 GHz to 60 GHz.
2,400
9,339
9,339
15,368,563
2,416
A method for synchronizing devices in a vehicle may make use of the Controller Area Network (CAN) communication bus. A bus interface of each of two or more devices coupled to the bus may be configured to accept a same message broadcast via the communication bus, in which the message has a specific message identification (ID) header. A message may be received from the communication bus that has the specific message ID simultaneously by each of the two or more devices. Operation of the two or more devices may be synchronized by triggering a task on each of the two or more devices in response to receiving the message having the specific message ID.
1. A method for synchronizing devices in a vehicle, the method comprising: configuring a bus interface of each of two or more devices coupled to a communication bus within a vehicle to accept a same message broadcast via the communication bus, in which the message has a specific message identification (ID) header; receiving from the communication bus a message having the specific message ID simultaneously by each of the two or more devices; and synchronizing operation of the two or more devices by triggering a task on each of the two or more devices in response to receiving the message having the specific message ID. 2. The method of claim 1, in which triggering a first task on a first one of the two or more devices delays a first time amount and triggering a second task on a second one of the two or more devices delays a second time amount. 3. The method of claim 1, in which the message is transmitted by a control module coupled to the communication bus. 4. The method of claim 1, in which the communication bus is an International Standards Organization (ISO) 11898 Controller Area Network (CAN) bus. 5. The method of claim 1, further including receiving a periodic sequence of messages having the specific message ID for maintaining synchronization between the two or more devices. 6. The method of claim 5, further including synchronizing operation of the two or more devices by triggering a task on each of the two or more devices in response to receiving each of the periodic sequence of messages having the specific message ID. 7. A sensor module comprising: function circuitry configured to perform an operation; interface circuitry configured to receive messages broadcast on a communication bus coupled to the interface circuitry, in which the interface circuitry is operable to be configured to assert a synchronization signal in response to receiving a message having a preselected identification parameter included within the message; offset storage circuitry configured to hold an offset time parameter; and timing circuitry coupled to the offset storage circuitry and to the function circuitry, in which the timing circuitry is operable to cause the function circuitry to start the operation in response to the synchronization signal offset in time by the offset time parameter. 8. The sensor module of claim 7, in which the sensor module is a radar module, and in which the function circuitry generates a radar frame signal. 9. The sensor module of claim 8, in which the function circuitry is configured to transmit Multiple Frequency Modulated continuous saw-tooth waves (FMCW) and to receive reflected FMCW signals. 10. The sensor module of claim 7, in which the interface circuitry is configured to interface to a communication bus as defined by International Standards Organization (ISO) 11898 standard Controller Area Network (CAN) bus. 11. A vehicle comprising: a communication bus cable; two or more radar sensor modules coupled to receive broadcast messages from the communication bus cable, in which each of the radar sensor modules includes: radio frequency (RF) circuitry configured to transmit Multiple Frequency Modulated continuous saw-tooth waves (FMCW) and to receive reflected FMCW signals; interface circuitry configured to receive messages broadcast on the communication bus, in which the interface circuitry is operable to be configured to assert a synchronization signal in response to receiving a message having a preselected identification (ID) parameter included within the message; offset storage circuitry configured to hold an offset time parameter; and timing circuitry coupled to the offset storage circuitry and to the function circuitry, in which the timing circuitry is operable to cause the RF circuitry to start a frame of FMCW in response to the synchronization signal offset in time by the offset time parameter. 12. The vehicle of claim 11, in which the communication bus is defined by International Standards Organization (ISO) 11898 Controller Area Network (CAN) bus. 13. The vehicle of claim 11, further including a processor module coupled to the communication bus, in which the processor module is operable to transmit a message having the preselected ID parameter on the communication bus. 14. The vehicle of claim 13, in which the processor module is configured to periodically transmit another message having the preselected ID parameter on the communication bus. 15. The vehicle of claim 14, in which the timing circuitry is operable to cause the RF circuitry to start a sequence of frames of FMCW in response to each assertion of the synchronization signal offset in time by the offset time parameter. 16. A method of communicating in a vehicle, the method comprising: coupling a bus interface of two or more radar sensor modules to a communication bus cable located within the vehicle, in which each of the two or more radar sensor modules are operable to transmit Multiple Frequency Modulated continuous saw-tooth waves (FMCW) and to receive reflected FMCW signals; storing a first offset time in a first sensor of the two or more radar sensor modules and storing a second offset in a second sensor of the two or more radar sensor modules; configuring the bus interface of each of two or more radar sensor modules to accept a sync message broadcast via the communication bus, in which the sync message has a specific message identification (ID) header; receiving from the communication bus a sync message having the specific message ID simultaneously by each of the two or more radar sensor modules; delaying the first sensor by the first offset time after receiving the sync message by the first sensor, then initiating transmission of a sequence of FMCW frames by the first sensor; and delaying the second sensor by the second offset time after receiving the sync message by the second sensor, then initiating transmission of a sequence of FMCW frames by the second sensor. 17. The method of claim 16, in which the communication bus is defined by International Standards Organization (ISO) 11898 Controller Area Network (CAN) bus. 18. The method of claim 16, further including coupling a processor module to the communication bus; and transmitting the sync message having the specific message ID on the communication bus by the processor. 19. The method of claim 18, further including periodically transmitting a follow-up sync message having the specific message ID on the communication bus. 20. The method of claim 19, further including: delaying the first sensor by the first offset time after receiving each of the follow-up sync messages by the first sensor, then initiating transmission of a sequence of FMCW frames by the first sensor; and delaying the second sensor by the second offset time after receiving each of the follow-up sync messages by the second sensor, then initiating transmission of a sequence of FMCW frames by the second sensor.
A method for synchronizing devices in a vehicle may make use of the Controller Area Network (CAN) communication bus. A bus interface of each of two or more devices coupled to the bus may be configured to accept a same message broadcast via the communication bus, in which the message has a specific message identification (ID) header. A message may be received from the communication bus that has the specific message ID simultaneously by each of the two or more devices. Operation of the two or more devices may be synchronized by triggering a task on each of the two or more devices in response to receiving the message having the specific message ID.1. A method for synchronizing devices in a vehicle, the method comprising: configuring a bus interface of each of two or more devices coupled to a communication bus within a vehicle to accept a same message broadcast via the communication bus, in which the message has a specific message identification (ID) header; receiving from the communication bus a message having the specific message ID simultaneously by each of the two or more devices; and synchronizing operation of the two or more devices by triggering a task on each of the two or more devices in response to receiving the message having the specific message ID. 2. The method of claim 1, in which triggering a first task on a first one of the two or more devices delays a first time amount and triggering a second task on a second one of the two or more devices delays a second time amount. 3. The method of claim 1, in which the message is transmitted by a control module coupled to the communication bus. 4. The method of claim 1, in which the communication bus is an International Standards Organization (ISO) 11898 Controller Area Network (CAN) bus. 5. The method of claim 1, further including receiving a periodic sequence of messages having the specific message ID for maintaining synchronization between the two or more devices. 6. The method of claim 5, further including synchronizing operation of the two or more devices by triggering a task on each of the two or more devices in response to receiving each of the periodic sequence of messages having the specific message ID. 7. A sensor module comprising: function circuitry configured to perform an operation; interface circuitry configured to receive messages broadcast on a communication bus coupled to the interface circuitry, in which the interface circuitry is operable to be configured to assert a synchronization signal in response to receiving a message having a preselected identification parameter included within the message; offset storage circuitry configured to hold an offset time parameter; and timing circuitry coupled to the offset storage circuitry and to the function circuitry, in which the timing circuitry is operable to cause the function circuitry to start the operation in response to the synchronization signal offset in time by the offset time parameter. 8. The sensor module of claim 7, in which the sensor module is a radar module, and in which the function circuitry generates a radar frame signal. 9. The sensor module of claim 8, in which the function circuitry is configured to transmit Multiple Frequency Modulated continuous saw-tooth waves (FMCW) and to receive reflected FMCW signals. 10. The sensor module of claim 7, in which the interface circuitry is configured to interface to a communication bus as defined by International Standards Organization (ISO) 11898 standard Controller Area Network (CAN) bus. 11. A vehicle comprising: a communication bus cable; two or more radar sensor modules coupled to receive broadcast messages from the communication bus cable, in which each of the radar sensor modules includes: radio frequency (RF) circuitry configured to transmit Multiple Frequency Modulated continuous saw-tooth waves (FMCW) and to receive reflected FMCW signals; interface circuitry configured to receive messages broadcast on the communication bus, in which the interface circuitry is operable to be configured to assert a synchronization signal in response to receiving a message having a preselected identification (ID) parameter included within the message; offset storage circuitry configured to hold an offset time parameter; and timing circuitry coupled to the offset storage circuitry and to the function circuitry, in which the timing circuitry is operable to cause the RF circuitry to start a frame of FMCW in response to the synchronization signal offset in time by the offset time parameter. 12. The vehicle of claim 11, in which the communication bus is defined by International Standards Organization (ISO) 11898 Controller Area Network (CAN) bus. 13. The vehicle of claim 11, further including a processor module coupled to the communication bus, in which the processor module is operable to transmit a message having the preselected ID parameter on the communication bus. 14. The vehicle of claim 13, in which the processor module is configured to periodically transmit another message having the preselected ID parameter on the communication bus. 15. The vehicle of claim 14, in which the timing circuitry is operable to cause the RF circuitry to start a sequence of frames of FMCW in response to each assertion of the synchronization signal offset in time by the offset time parameter. 16. A method of communicating in a vehicle, the method comprising: coupling a bus interface of two or more radar sensor modules to a communication bus cable located within the vehicle, in which each of the two or more radar sensor modules are operable to transmit Multiple Frequency Modulated continuous saw-tooth waves (FMCW) and to receive reflected FMCW signals; storing a first offset time in a first sensor of the two or more radar sensor modules and storing a second offset in a second sensor of the two or more radar sensor modules; configuring the bus interface of each of two or more radar sensor modules to accept a sync message broadcast via the communication bus, in which the sync message has a specific message identification (ID) header; receiving from the communication bus a sync message having the specific message ID simultaneously by each of the two or more radar sensor modules; delaying the first sensor by the first offset time after receiving the sync message by the first sensor, then initiating transmission of a sequence of FMCW frames by the first sensor; and delaying the second sensor by the second offset time after receiving the sync message by the second sensor, then initiating transmission of a sequence of FMCW frames by the second sensor. 17. The method of claim 16, in which the communication bus is defined by International Standards Organization (ISO) 11898 Controller Area Network (CAN) bus. 18. The method of claim 16, further including coupling a processor module to the communication bus; and transmitting the sync message having the specific message ID on the communication bus by the processor. 19. The method of claim 18, further including periodically transmitting a follow-up sync message having the specific message ID on the communication bus. 20. The method of claim 19, further including: delaying the first sensor by the first offset time after receiving each of the follow-up sync messages by the first sensor, then initiating transmission of a sequence of FMCW frames by the first sensor; and delaying the second sensor by the second offset time after receiving each of the follow-up sync messages by the second sensor, then initiating transmission of a sequence of FMCW frames by the second sensor.
2,400
9,340
9,340
14,828,249
2,426
A method, system, apparatus, and computer program product provide/deliver information during a live broadcast. Information feeds (that include attributes and values) are ingested via a plug-in architecture, into an application server. The application server drives the information feeds into a database, and distributes the attributes to a web server. The web server exposes, using a web service, the attributes clients. The web service enables clients to select a set of the attributes and configure, for visual display, the values corresponding to the selected set of the attributes. The values are composited in real-time, based on the configuration, with live audio-video content. The composited elements and live audio-video content are broadcast/streamed live.
1. A computer-implemented method for providing information during a live broadcast, comprising: ingesting one or more information feeds, via a plug-in architecture, into an application server, wherein the information feeds comprise attributes and values for the attributes; the application server driving the one or more information feeds into a database; the application server distributing the attributes to a web server; the web server exposing, using a web service, the attributes to one or more clients, wherein the web service enables: selecting a set of the attributes; and configuring, for visual display, the values corresponding to the selected set of the attributes; and compositing, in real-time, the values, based on the configuration, with live audio-video content, wherein the composited elements and live audio-video content are live broadcast. 2. The computer-implemented method of claim 1, wherein: the one or more information feeds are from different sources; and the one or more information feeds are normalized for storage in the database. 3. The computer-implemented method of claim 1, wherein: the database comprises a document-oriented database; and the attributes and values are stored in one or more objects in the document-oriented database. 4. The computer-implemented method of claim 3, wherein: each of the one or more objects in the document-oriented database is associated with an object in the application server. 5. The computer-implemented method of claim 3, wherein: the one or more objects are stored in the document-oriented database as a hierarchical data model. 6. The computer-implemented method of claim 5, wherein: the application server generates and maintains a correlation identification (ID); the correlation ID identifies each of the one or more objects and each object's relationship within the hierarchical data model; and the application server uses the correlation ID to traverse the hierarchical relationship of the one or more objects. 7. The computer-implemented method of claim 1, wherein: the database comprises a local database; and the information is backed up to a cloud based database. 8. The computer-implemented method of claim 7, wherein: the local database and the cloud based database enable parallel processing. 9. The computer-implemented method of claim 1, wherein: the values comprise real-time sports statistics for the live audio-video content. 10. The computer-implemented method of claim 1, wherein: the compositing provides on-air graphics for the live-broadcast. 11. A computer system for providing information during a live broadcast comprising: (a) an application server executing on one or more computers, wherein the application server is configured to: (1) ingest one or more information feeds, via a plug-in architecture, wherein the information feeds comprise attributes and values for the attributes; (2) drive the one or more information feeds into a database; the application server distributing the attributes to a web server; (c) the web server executing on the one or more computers, wherein the web server is configured to: (1) expose the attributes to one or more clients; (2) select a set of the attributes; and (3) configure, for visual display, the values corresponding to the selected set of the attributes; and (d) a compositing application executing on the one or more computers, wherein the compositing application is configured to composite, in real-time, the values, based on the configuration, with live audio-video content, wherein the composited elements and live audio-video content are live broadcast. 12. The computer system of claim 11, wherein: the one or more information feeds are from different sources; and the one or more information feeds are normalized for storage in the database. 13. The computer system of claim 11, wherein: the database comprises a document-oriented database; and the attributes and values are stored in one or more objects in the document-oriented database. 14. The computer system of claim 13, wherein: each of the one or more objects in the document-oriented database is associated with an object in the application server. 15. The computer system of claim 13, wherein: the one or more objects are stored in the document-oriented database as a hierarchical data model. 16. The computer system of claim 15, wherein: the application server is further configured to generate and maintain a correlation identification (ID); the correlation ID identifies each of the one or more objects and each object's relationship within the hierarchical data model; and the application server is configured to use the correlation ID to traverse the hierarchical relationship of the one or more objects. 17. The computer system of claim 11, wherein: the database comprises a local database; and the information is backed up to a cloud based database. 18. The computer system of claim 17, wherein: the local database and the cloud based database enable parallel processing. 19. The computer system of claim 11, wherein: the values comprise real-time sports statistics for the live audio-video content. 20. The computer system of claim 11, wherein: the compositing provides on-air graphics for the live-broadcast.
A method, system, apparatus, and computer program product provide/deliver information during a live broadcast. Information feeds (that include attributes and values) are ingested via a plug-in architecture, into an application server. The application server drives the information feeds into a database, and distributes the attributes to a web server. The web server exposes, using a web service, the attributes clients. The web service enables clients to select a set of the attributes and configure, for visual display, the values corresponding to the selected set of the attributes. The values are composited in real-time, based on the configuration, with live audio-video content. The composited elements and live audio-video content are broadcast/streamed live.1. A computer-implemented method for providing information during a live broadcast, comprising: ingesting one or more information feeds, via a plug-in architecture, into an application server, wherein the information feeds comprise attributes and values for the attributes; the application server driving the one or more information feeds into a database; the application server distributing the attributes to a web server; the web server exposing, using a web service, the attributes to one or more clients, wherein the web service enables: selecting a set of the attributes; and configuring, for visual display, the values corresponding to the selected set of the attributes; and compositing, in real-time, the values, based on the configuration, with live audio-video content, wherein the composited elements and live audio-video content are live broadcast. 2. The computer-implemented method of claim 1, wherein: the one or more information feeds are from different sources; and the one or more information feeds are normalized for storage in the database. 3. The computer-implemented method of claim 1, wherein: the database comprises a document-oriented database; and the attributes and values are stored in one or more objects in the document-oriented database. 4. The computer-implemented method of claim 3, wherein: each of the one or more objects in the document-oriented database is associated with an object in the application server. 5. The computer-implemented method of claim 3, wherein: the one or more objects are stored in the document-oriented database as a hierarchical data model. 6. The computer-implemented method of claim 5, wherein: the application server generates and maintains a correlation identification (ID); the correlation ID identifies each of the one or more objects and each object's relationship within the hierarchical data model; and the application server uses the correlation ID to traverse the hierarchical relationship of the one or more objects. 7. The computer-implemented method of claim 1, wherein: the database comprises a local database; and the information is backed up to a cloud based database. 8. The computer-implemented method of claim 7, wherein: the local database and the cloud based database enable parallel processing. 9. The computer-implemented method of claim 1, wherein: the values comprise real-time sports statistics for the live audio-video content. 10. The computer-implemented method of claim 1, wherein: the compositing provides on-air graphics for the live-broadcast. 11. A computer system for providing information during a live broadcast comprising: (a) an application server executing on one or more computers, wherein the application server is configured to: (1) ingest one or more information feeds, via a plug-in architecture, wherein the information feeds comprise attributes and values for the attributes; (2) drive the one or more information feeds into a database; the application server distributing the attributes to a web server; (c) the web server executing on the one or more computers, wherein the web server is configured to: (1) expose the attributes to one or more clients; (2) select a set of the attributes; and (3) configure, for visual display, the values corresponding to the selected set of the attributes; and (d) a compositing application executing on the one or more computers, wherein the compositing application is configured to composite, in real-time, the values, based on the configuration, with live audio-video content, wherein the composited elements and live audio-video content are live broadcast. 12. The computer system of claim 11, wherein: the one or more information feeds are from different sources; and the one or more information feeds are normalized for storage in the database. 13. The computer system of claim 11, wherein: the database comprises a document-oriented database; and the attributes and values are stored in one or more objects in the document-oriented database. 14. The computer system of claim 13, wherein: each of the one or more objects in the document-oriented database is associated with an object in the application server. 15. The computer system of claim 13, wherein: the one or more objects are stored in the document-oriented database as a hierarchical data model. 16. The computer system of claim 15, wherein: the application server is further configured to generate and maintain a correlation identification (ID); the correlation ID identifies each of the one or more objects and each object's relationship within the hierarchical data model; and the application server is configured to use the correlation ID to traverse the hierarchical relationship of the one or more objects. 17. The computer system of claim 11, wherein: the database comprises a local database; and the information is backed up to a cloud based database. 18. The computer system of claim 17, wherein: the local database and the cloud based database enable parallel processing. 19. The computer system of claim 11, wherein: the values comprise real-time sports statistics for the live audio-video content. 20. The computer system of claim 11, wherein: the compositing provides on-air graphics for the live-broadcast.
2,400
9,341
9,341
14,331,968
2,446
Methods and systems for processing signals and data are disclosed. An example method can comprise receiving a first portion of a first signal. An example method can comprise processing the first portion of the first signal based on a module. The module can comprise instructions for physical layer processing. An example method can comprise receiving an update for the module. The update can be configured to modify the instructions for physical layer processing. The module can be reconfigured based on the update. An example method can comprise processing at least one of a second portion of the first signal and a second signal based on the module reconfigured based on the update.
1. A method, comprising: receiving a first portion of a first signal; processing the first portion of the first signal based on a module, wherein the module comprises instructions for physical layer processing; receiving an update for the module, wherein the update is configured to modify the instructions for physical layer processing; reconfiguring the module based on the update; and processing at least one of a second portion of the first signal and a second signal based on the module reconfigured based on the update. 2. The method of claim 1, wherein the update is configured to modify a spectrum range upon which a device operates based on the module. 3. The method of claim 1, wherein the update is configured to add a protocol used by the module for physical layer processing of at least the first portion of the first signal or modify the protocol used by the module for physical layer processing of at least the first portion of the first signal. 4. The method of claim 3, wherein the protocol comprises at least one of a Data Over Cable Service Interface Specification (DOCSIS) protocol, a multimedia over coax alliance (MoCA) protocol, and a protocol for processing quadrature amplitude modulation (QAM) based content streams. 5. The method of claim 1, wherein the update is configured to modify a radio frequency bonding procedure of the module. 6. The method of claim 1, wherein receiving the update to the module comprises receiving the update via the first signal. 7. The method of claim 1, wherein the update is configured to modify at least one of a procedure for generating packets based on a bit stream and a procedure for generating the bit stream based on the packets. 8. A method, comprising: receiving a first signal; converting the first signal to a second signal; selecting a first portion of the second signal based a first reconfigurable module configured with first signal processing instructions; selecting a second portion of the second signal based on a second reconfigurable module configured with second signal processing instructions; processing the first portion of the second signal based on the first reconfigurable module; and processing the second portion of the second signal based on the second reconfigurable module. 9. The method of claim 8, wherein the first signal processing instructions are based on a Data Over Cable Service Interface Specification (DOCSIS) protocol, and wherein the second signal processing instructions are based on a Multimedia. Over Coax Alliance (MCA) protocol. 10. The method of claim 8, further comprising selecting a third portion of the second signal based on a third reconfigurable module configured with third signal processing instructions; and processing the third portion of the second signal based on the third reconfigurable module, wherein the third signal processing instructions are based on a protocol for processing quadrature amplitude modulation (QAM) based content streams. 11. The method of claim 8, wherein the first signal processing instructions are based on a first physical layer protocol. 12. The method of claim 8, wherein selecting the first portion of the second signal based on the first reconfigurable module comprises applying at least one of a first Fourier Transform and a first Finite Impulse Response filter to the second signal. 13. The method of claim 8, wherein the first reconfigurable module and the second reconfigurable module are reconfigurable based on an update. 14. The method of claim 8, wherein processing the first portion of the second signal based on the first reconfigurable module comprises generating a bit stream based on packets or generating the packets based on the bit stream. 15. An apparatus, comprising: a processing unit configured to receive a first signal from a first digital-to-analog converter, wherein the processing unit is configured to, process a first portion of the first signal according to a first module, wherein the first module comprises instructions for processing the first portion of the first signal based on a first protocol, process a second portion of the first signal according to a second module, wherein the second module comprises instructions for processing the second portion of the first signal based on a second protocol, and wherein at least one of the first module and the second module is reconfigurable, based on an update, in controlling signal processing at a physical layer of the first signal. 16. The apparatus of claim 15, wherein the first protocol comprises a Data Over Cable Service Interface Specification (DOCSIS) protocol, and wherein the second protocol comprises at least one of a Multimedia Over Coax Alliance (MoCA) protocol and a protocol for processing quadrature amplitude modulation (QAM) based content streams. 17. The apparatus of claim 15, wherein the first protocol comprises a physical layer protocol. 18. The apparatus of claim 15, wherein the processing unit is configured to receive the update via the first signal. 19. The apparatus of claim 15, wherein the first module comprises instructions for at least one of accessing and manipulating the physical layer of the first signal. 20. The apparatus of claim 15, wherein the first module comprises instructions for selecting the first portion of the first signal based on a first frequency range, and wherein the instructions are reconfigurable to select a third portion of the first signal based on a second frequency range.
Methods and systems for processing signals and data are disclosed. An example method can comprise receiving a first portion of a first signal. An example method can comprise processing the first portion of the first signal based on a module. The module can comprise instructions for physical layer processing. An example method can comprise receiving an update for the module. The update can be configured to modify the instructions for physical layer processing. The module can be reconfigured based on the update. An example method can comprise processing at least one of a second portion of the first signal and a second signal based on the module reconfigured based on the update.1. A method, comprising: receiving a first portion of a first signal; processing the first portion of the first signal based on a module, wherein the module comprises instructions for physical layer processing; receiving an update for the module, wherein the update is configured to modify the instructions for physical layer processing; reconfiguring the module based on the update; and processing at least one of a second portion of the first signal and a second signal based on the module reconfigured based on the update. 2. The method of claim 1, wherein the update is configured to modify a spectrum range upon which a device operates based on the module. 3. The method of claim 1, wherein the update is configured to add a protocol used by the module for physical layer processing of at least the first portion of the first signal or modify the protocol used by the module for physical layer processing of at least the first portion of the first signal. 4. The method of claim 3, wherein the protocol comprises at least one of a Data Over Cable Service Interface Specification (DOCSIS) protocol, a multimedia over coax alliance (MoCA) protocol, and a protocol for processing quadrature amplitude modulation (QAM) based content streams. 5. The method of claim 1, wherein the update is configured to modify a radio frequency bonding procedure of the module. 6. The method of claim 1, wherein receiving the update to the module comprises receiving the update via the first signal. 7. The method of claim 1, wherein the update is configured to modify at least one of a procedure for generating packets based on a bit stream and a procedure for generating the bit stream based on the packets. 8. A method, comprising: receiving a first signal; converting the first signal to a second signal; selecting a first portion of the second signal based a first reconfigurable module configured with first signal processing instructions; selecting a second portion of the second signal based on a second reconfigurable module configured with second signal processing instructions; processing the first portion of the second signal based on the first reconfigurable module; and processing the second portion of the second signal based on the second reconfigurable module. 9. The method of claim 8, wherein the first signal processing instructions are based on a Data Over Cable Service Interface Specification (DOCSIS) protocol, and wherein the second signal processing instructions are based on a Multimedia. Over Coax Alliance (MCA) protocol. 10. The method of claim 8, further comprising selecting a third portion of the second signal based on a third reconfigurable module configured with third signal processing instructions; and processing the third portion of the second signal based on the third reconfigurable module, wherein the third signal processing instructions are based on a protocol for processing quadrature amplitude modulation (QAM) based content streams. 11. The method of claim 8, wherein the first signal processing instructions are based on a first physical layer protocol. 12. The method of claim 8, wherein selecting the first portion of the second signal based on the first reconfigurable module comprises applying at least one of a first Fourier Transform and a first Finite Impulse Response filter to the second signal. 13. The method of claim 8, wherein the first reconfigurable module and the second reconfigurable module are reconfigurable based on an update. 14. The method of claim 8, wherein processing the first portion of the second signal based on the first reconfigurable module comprises generating a bit stream based on packets or generating the packets based on the bit stream. 15. An apparatus, comprising: a processing unit configured to receive a first signal from a first digital-to-analog converter, wherein the processing unit is configured to, process a first portion of the first signal according to a first module, wherein the first module comprises instructions for processing the first portion of the first signal based on a first protocol, process a second portion of the first signal according to a second module, wherein the second module comprises instructions for processing the second portion of the first signal based on a second protocol, and wherein at least one of the first module and the second module is reconfigurable, based on an update, in controlling signal processing at a physical layer of the first signal. 16. The apparatus of claim 15, wherein the first protocol comprises a Data Over Cable Service Interface Specification (DOCSIS) protocol, and wherein the second protocol comprises at least one of a Multimedia Over Coax Alliance (MoCA) protocol and a protocol for processing quadrature amplitude modulation (QAM) based content streams. 17. The apparatus of claim 15, wherein the first protocol comprises a physical layer protocol. 18. The apparatus of claim 15, wherein the processing unit is configured to receive the update via the first signal. 19. The apparatus of claim 15, wherein the first module comprises instructions for at least one of accessing and manipulating the physical layer of the first signal. 20. The apparatus of claim 15, wherein the first module comprises instructions for selecting the first portion of the first signal based on a first frequency range, and wherein the instructions are reconfigurable to select a third portion of the first signal based on a second frequency range.
2,400
9,342
9,342
15,343,139
2,449
An example method to provide communication between a first computer in a first computer network and a second computer in a second computer network is disclosed. The method includes aliasing the second computer's address in the second computer network to a loopback interface of a third computer in the first computer network and establishing a tunnel between the third computer and a fourth computer in the second computer network. Establishing the tunnel includes configuring the fourth computer to forward traffic received from the tunnel to the second computer. The method further includes configuring routing in the first computer network to direct traffic destined for the second computer network to the third computer, and configuring the first computer to transmit packets destined for the second computer with the second computer's address in the second computer network.
1: A method to provide communication between a first computer in a first computer network and a second computer in a second computer network, comprising: aliasing the second computer's address in the second computer network to a loopback interface of a third computer in the first computer network; establishing a tunnel between the third computer and a fourth computer in the second computer network, wherein establishing the tunnel includes configuring the fourth computer to forward traffic received from the tunnel to the second computer; configuring routing in the first computer network to direct traffic destined for the second computer network to the third computer; and configuring the first computer to transmit packets destined for the second computer with the second computer's address in the second computer network. 2: The method of claim 1, further comprising: the first computer transmits a packet with the second computer's address in the second computer network; the third computer receives the packet and sends the packet, via the loopback interface, to the tunnel; and the fourth computer receives the packet from the tunnel and forwards the packet to the second computer. 3: The method of claim 1, further comprising providing the second machine's address in the second computer network to the first computer. 4: The method of claim 1, wherein the tunnel comprises a secure shell (SSH) tunnel, the third computer comprises a SSH server, the fourth computer comprises a SSH client. 5: The method of claim 1, wherein the first computer network comprises a virtual private cloud in a public cloud and the second computer network comprises a private network. 6: The method of claim 1, wherein the first computer, the second computer, the third computer, and the fourth computer are physical computers, virtual machines on physical host computers, or a combination of physical computers and virtual machines. 7: The method of claim 1, wherein configuring routing in the first computer network comprising configuring a routing table of a router in the first computer network. 8: A non-transitory, computer-readable storage medium encoded with instructions executable by a processor to provide communication between a first computer in a first computer network and a second compute in a second computer, the instructions comprising: aliasing the second computer's address in the second computer network to a loopback interface of a third computer in the first computer network; establishing a tunnel between the third computer and a fourth computer in the second computer network, wherein establishing the tunnel includes configuring the fourth computer to forward traffic received from the tunnel to the second computer; configuring routing in the first computer network to direct traffic destined for the second computer network to the third computer; and configuring the first computer to transmit packets destined for the second computer with the second computer's address in the second computer network. 9: The storage medium of claim 8, wherein the instructions further comprises: the first computer transmits a packet with the second computer's address in the second computer network; the third computer receives the packet and sends the packet, via the loopback interface, to the tunnel; and the fourth computer receives the packet from the tunnel and forwards the packet to the second computer. 10: The storage medium of claim 8, wherein the instructions further comprises providing the second machine's address in the second computer network to the first computer. 11: The storage medium of claim 8, wherein the tunnel comprises a secure shell (SSH) tunnel, the third computer comprises a SSH server, the fourth computer comprises a SSH client. 12: The storage medium of claim 8, wherein the first computer network comprises a virtual private cloud in a public cloud and the second computer network comprises a private network. 13: The storage medium of claim 8, wherein the first computer, the second computer, the third computer, and the fourth computer are physical computers, virtual machines on physical host computers, or a combination of physical computers and virtual machines. 14: The storage medium of claim 8, wherein configuring routing in the first computer network comprising configuring a routing table of a router in the first computer network. 15: A system for communication between a first computer in a first computer network and a second computer in a second computer, comprising: the first computer network, comprising: the first computer configured to transmit packets destined for the second computer with the second computer's address in the second computer network; a third computer configured with the second computer's address in the second computer network aliased on a loopback interface of the third computer; and a router configured to direct traffic destined for the second computer network to the third computer; and the second computer network comprising: the second computer; and a fourth configured with a tunnel to the third computer and to forward traffic received from to the tunnel second computer. 16: The system of claim 15, wherein: the first computer transmits a packet with the second computer's address in the second computer network; the router directs the packet to the third computer; the third computer sends the packet, via the loopback interface, to the tunnel; and the fourth computer receives the packet from the tunnel and forwards the packet to the second computer. 17: The system of claim 15, further comprising a fifth computer configured to receive the second machine's address from the second computer network and send the second machine's address to the first computer network. 18: The system of claim 15, wherein the tunnel comprises a secure shell (SSH) tunnel, the third computer comprises a SSH server, the fourth computer comprises a SSH client. 19: The system of claim 15, wherein the first computer network comprises a virtual private cloud in a public cloud and the second computer network comprises a private network. 20: The system of claim 15, wherein the first computer, the second computer, the third computer, and the fourth computer are physical computers, virtual machines on physical host computers, or a combination of physical computers and virtual machines.
An example method to provide communication between a first computer in a first computer network and a second computer in a second computer network is disclosed. The method includes aliasing the second computer's address in the second computer network to a loopback interface of a third computer in the first computer network and establishing a tunnel between the third computer and a fourth computer in the second computer network. Establishing the tunnel includes configuring the fourth computer to forward traffic received from the tunnel to the second computer. The method further includes configuring routing in the first computer network to direct traffic destined for the second computer network to the third computer, and configuring the first computer to transmit packets destined for the second computer with the second computer's address in the second computer network.1: A method to provide communication between a first computer in a first computer network and a second computer in a second computer network, comprising: aliasing the second computer's address in the second computer network to a loopback interface of a third computer in the first computer network; establishing a tunnel between the third computer and a fourth computer in the second computer network, wherein establishing the tunnel includes configuring the fourth computer to forward traffic received from the tunnel to the second computer; configuring routing in the first computer network to direct traffic destined for the second computer network to the third computer; and configuring the first computer to transmit packets destined for the second computer with the second computer's address in the second computer network. 2: The method of claim 1, further comprising: the first computer transmits a packet with the second computer's address in the second computer network; the third computer receives the packet and sends the packet, via the loopback interface, to the tunnel; and the fourth computer receives the packet from the tunnel and forwards the packet to the second computer. 3: The method of claim 1, further comprising providing the second machine's address in the second computer network to the first computer. 4: The method of claim 1, wherein the tunnel comprises a secure shell (SSH) tunnel, the third computer comprises a SSH server, the fourth computer comprises a SSH client. 5: The method of claim 1, wherein the first computer network comprises a virtual private cloud in a public cloud and the second computer network comprises a private network. 6: The method of claim 1, wherein the first computer, the second computer, the third computer, and the fourth computer are physical computers, virtual machines on physical host computers, or a combination of physical computers and virtual machines. 7: The method of claim 1, wherein configuring routing in the first computer network comprising configuring a routing table of a router in the first computer network. 8: A non-transitory, computer-readable storage medium encoded with instructions executable by a processor to provide communication between a first computer in a first computer network and a second compute in a second computer, the instructions comprising: aliasing the second computer's address in the second computer network to a loopback interface of a third computer in the first computer network; establishing a tunnel between the third computer and a fourth computer in the second computer network, wherein establishing the tunnel includes configuring the fourth computer to forward traffic received from the tunnel to the second computer; configuring routing in the first computer network to direct traffic destined for the second computer network to the third computer; and configuring the first computer to transmit packets destined for the second computer with the second computer's address in the second computer network. 9: The storage medium of claim 8, wherein the instructions further comprises: the first computer transmits a packet with the second computer's address in the second computer network; the third computer receives the packet and sends the packet, via the loopback interface, to the tunnel; and the fourth computer receives the packet from the tunnel and forwards the packet to the second computer. 10: The storage medium of claim 8, wherein the instructions further comprises providing the second machine's address in the second computer network to the first computer. 11: The storage medium of claim 8, wherein the tunnel comprises a secure shell (SSH) tunnel, the third computer comprises a SSH server, the fourth computer comprises a SSH client. 12: The storage medium of claim 8, wherein the first computer network comprises a virtual private cloud in a public cloud and the second computer network comprises a private network. 13: The storage medium of claim 8, wherein the first computer, the second computer, the third computer, and the fourth computer are physical computers, virtual machines on physical host computers, or a combination of physical computers and virtual machines. 14: The storage medium of claim 8, wherein configuring routing in the first computer network comprising configuring a routing table of a router in the first computer network. 15: A system for communication between a first computer in a first computer network and a second computer in a second computer, comprising: the first computer network, comprising: the first computer configured to transmit packets destined for the second computer with the second computer's address in the second computer network; a third computer configured with the second computer's address in the second computer network aliased on a loopback interface of the third computer; and a router configured to direct traffic destined for the second computer network to the third computer; and the second computer network comprising: the second computer; and a fourth configured with a tunnel to the third computer and to forward traffic received from to the tunnel second computer. 16: The system of claim 15, wherein: the first computer transmits a packet with the second computer's address in the second computer network; the router directs the packet to the third computer; the third computer sends the packet, via the loopback interface, to the tunnel; and the fourth computer receives the packet from the tunnel and forwards the packet to the second computer. 17: The system of claim 15, further comprising a fifth computer configured to receive the second machine's address from the second computer network and send the second machine's address to the first computer network. 18: The system of claim 15, wherein the tunnel comprises a secure shell (SSH) tunnel, the third computer comprises a SSH server, the fourth computer comprises a SSH client. 19: The system of claim 15, wherein the first computer network comprises a virtual private cloud in a public cloud and the second computer network comprises a private network. 20: The system of claim 15, wherein the first computer, the second computer, the third computer, and the fourth computer are physical computers, virtual machines on physical host computers, or a combination of physical computers and virtual machines.
2,400
9,343
9,343
15,834,134
2,459
Providing inter-virtual agent communication between communication devices owned by different users is provided. A first communication channel and a second communication channel are established with a remote data processing system. A virtual agent-to-virtual agent handshake is performed during establishment of the first communication channel. Virtual agent commands are exchanged with a remote virtual agent located on the remote data processing system via the first communication channel. An action corresponding to a virtual agent command received from the remote virtual agent located on the remote data processing system is performed while a human conversation is conducted via the second communication channel.
1. A method for providing inter-virtual agent communication between communication devices owned by different users, the method comprising: establishing a first communication channel and a second communication channel with a remote data processing system; performing a virtual agent-to-virtual agent handshake during establishment of the first communication channel; exchanging virtual agent commands with a remote virtual agent located on the remote data processing system via the first communication channel; and performing an action corresponding to a virtual agent command received from the remote virtual agent located on the remote data processing system while a human conversation is conducted via the second communication channel. 2. The method of claim 1 further comprising: analyzing the human conversation conducted via the second communication channel using a local virtual agent; determining a conversation context of the human conversation based on the local virtual agent analyzing the human conversation; and identifying missing conversation information in the human conversation based on the local virtual agent determining the conversation context. 3. The method of claim 2 further comprising: requesting user confirmation to share the missing conversation information with the remote virtual agent located on the remote data processing system; and sharing the missing conversation information with the remote virtual agent located on the remote data processing system via the first communication channel based on receiving the user confirmation to share the missing conversation information. 4. The method of claim 1 further comprising: informing the remote virtual agent located on the remote data processing system about the performed action via the first communication channel; and receiving confirmation via the first communication channel from the remote virtual agent located on the remote data processing system regarding the performed action. 5. The method of claim 1, wherein the first communication channel is a virtual agent-to-virtual agent communication channel where only virtual agents of different data processing systems communicate and interact during a network connection between the different data processing systems. 6. The method of claim 1, wherein the first communication channel is a peer-to-peer voice and text asynchronous channel dedicated to virtual agents. 7. The method of claim 1, wherein the second communication channel is a human-to-human communication channel where the human conversation is conducted during a network connection between different data processing systems. 8. The method of claim 1, wherein the virtual agent commands are at least one of voice-based commands and text-based commands that a respective virtual agent understands to perform tasks and services. 9. The method of claim 1, wherein the remote virtual agent via the first communication channel shares data corresponding to a user of the remote virtual agent with a local virtual agent located on a local data processing system based on a preference of the user. 10. The method of claim 9, wherein the local virtual agent proactively notifies a user of the local virtual agent on a display device regarding a particular portion of the data shared by the remote virtual agent while the human conversation is conducted via the second communication channel. 11. A data processing system for providing inter-virtual agent communication between communication devices owned by different users, the data processing system comprising: a bus system; a storage device connected to the bus system, wherein the storage device stores program instructions; and a processor connected to the bus system, wherein the processor executes the program instructions to: establish a first communication channel and a second communication channel with a remote data processing system; perform a virtual agent-to-virtual agent handshake during establishment of the first communication channel; exchange virtual agent commands with a remote virtual agent located on the remote data processing system via the first communication channel; and perform an action corresponding to a virtual agent command received from the remote virtual agent located on the remote data processing system while a human conversation is conducted via the second communication channel. 12. The data processing system of claim 11, wherein the processor further executes the program instructions to: analyze the human conversation conducted via the second communication channel using a local virtual agent; determine a conversation context of the human conversation based on the local virtual agent analyzing the human conversation; and identify missing conversation information in the human conversation based on the local virtual agent determining the conversation context. 13. The data processing system of claim 12, wherein the processor further executes the program instructions to: request user confirmation to share the missing conversation information with the remote virtual agent located on the remote data processing system; and share the missing conversation information with the remote virtual agent located on the remote data processing system via the first communication channel based on receiving the user confirmation to share the missing conversation information. 14. A computer program product for providing inter-virtual agent communication between communication devices owned by different users, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a data processing system to cause the data processing system to perform a method comprising: establishing a first communication channel and a second communication channel with a remote data processing system; performing a virtual agent-to-virtual agent handshake during establishment of the first communication channel; exchanging virtual agent commands with a remote virtual agent located on the remote data processing system via the first communication channel; and performing an action corresponding to a virtual agent command received from the remote virtual agent located on the remote data processing system while a human conversation is conducted via the second communication channel. 15. The computer program product of claim 14 further comprising: analyzing the human conversation conducted via the second communication channel using a local virtual agent; determining a conversation context of the human conversation based on the local virtual agent analyzing the human conversation; and identifying missing conversation information in the human conversation based on the local virtual agent determining the conversation context. 16. The computer program product of claim 15 further comprising: requesting user confirmation to share the missing conversation information with the remote virtual agent located on the remote data processing system; and sharing the missing conversation information with the remote virtual agent located on the remote data processing system via the first communication channel based on receiving the user confirmation to share the missing conversation information. 17. The computer program product of claim 14 further comprising: informing the remote virtual agent located on the remote data processing system about the performed action via the first communication channel; and receiving confirmation via the first communication channel from the remote virtual agent located on the remote data processing system regarding the performed action. 18. The computer program product of claim 14, wherein the first communication channel is a virtual agent-to-virtual agent communication channel where only virtual agents of different data processing systems communicate and interact during a network connection between the different data processing systems. 19. The computer program product of claim 14, wherein the first communication channel is a peer-to-peer voice and text asynchronous channel dedicated to virtual agents. 20. The computer program product of claim 14, wherein the second communication channel is a human-to-human communication channel where the human conversation is conducted during a network connection between different data processing systems.
Providing inter-virtual agent communication between communication devices owned by different users is provided. A first communication channel and a second communication channel are established with a remote data processing system. A virtual agent-to-virtual agent handshake is performed during establishment of the first communication channel. Virtual agent commands are exchanged with a remote virtual agent located on the remote data processing system via the first communication channel. An action corresponding to a virtual agent command received from the remote virtual agent located on the remote data processing system is performed while a human conversation is conducted via the second communication channel.1. A method for providing inter-virtual agent communication between communication devices owned by different users, the method comprising: establishing a first communication channel and a second communication channel with a remote data processing system; performing a virtual agent-to-virtual agent handshake during establishment of the first communication channel; exchanging virtual agent commands with a remote virtual agent located on the remote data processing system via the first communication channel; and performing an action corresponding to a virtual agent command received from the remote virtual agent located on the remote data processing system while a human conversation is conducted via the second communication channel. 2. The method of claim 1 further comprising: analyzing the human conversation conducted via the second communication channel using a local virtual agent; determining a conversation context of the human conversation based on the local virtual agent analyzing the human conversation; and identifying missing conversation information in the human conversation based on the local virtual agent determining the conversation context. 3. The method of claim 2 further comprising: requesting user confirmation to share the missing conversation information with the remote virtual agent located on the remote data processing system; and sharing the missing conversation information with the remote virtual agent located on the remote data processing system via the first communication channel based on receiving the user confirmation to share the missing conversation information. 4. The method of claim 1 further comprising: informing the remote virtual agent located on the remote data processing system about the performed action via the first communication channel; and receiving confirmation via the first communication channel from the remote virtual agent located on the remote data processing system regarding the performed action. 5. The method of claim 1, wherein the first communication channel is a virtual agent-to-virtual agent communication channel where only virtual agents of different data processing systems communicate and interact during a network connection between the different data processing systems. 6. The method of claim 1, wherein the first communication channel is a peer-to-peer voice and text asynchronous channel dedicated to virtual agents. 7. The method of claim 1, wherein the second communication channel is a human-to-human communication channel where the human conversation is conducted during a network connection between different data processing systems. 8. The method of claim 1, wherein the virtual agent commands are at least one of voice-based commands and text-based commands that a respective virtual agent understands to perform tasks and services. 9. The method of claim 1, wherein the remote virtual agent via the first communication channel shares data corresponding to a user of the remote virtual agent with a local virtual agent located on a local data processing system based on a preference of the user. 10. The method of claim 9, wherein the local virtual agent proactively notifies a user of the local virtual agent on a display device regarding a particular portion of the data shared by the remote virtual agent while the human conversation is conducted via the second communication channel. 11. A data processing system for providing inter-virtual agent communication between communication devices owned by different users, the data processing system comprising: a bus system; a storage device connected to the bus system, wherein the storage device stores program instructions; and a processor connected to the bus system, wherein the processor executes the program instructions to: establish a first communication channel and a second communication channel with a remote data processing system; perform a virtual agent-to-virtual agent handshake during establishment of the first communication channel; exchange virtual agent commands with a remote virtual agent located on the remote data processing system via the first communication channel; and perform an action corresponding to a virtual agent command received from the remote virtual agent located on the remote data processing system while a human conversation is conducted via the second communication channel. 12. The data processing system of claim 11, wherein the processor further executes the program instructions to: analyze the human conversation conducted via the second communication channel using a local virtual agent; determine a conversation context of the human conversation based on the local virtual agent analyzing the human conversation; and identify missing conversation information in the human conversation based on the local virtual agent determining the conversation context. 13. The data processing system of claim 12, wherein the processor further executes the program instructions to: request user confirmation to share the missing conversation information with the remote virtual agent located on the remote data processing system; and share the missing conversation information with the remote virtual agent located on the remote data processing system via the first communication channel based on receiving the user confirmation to share the missing conversation information. 14. A computer program product for providing inter-virtual agent communication between communication devices owned by different users, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a data processing system to cause the data processing system to perform a method comprising: establishing a first communication channel and a second communication channel with a remote data processing system; performing a virtual agent-to-virtual agent handshake during establishment of the first communication channel; exchanging virtual agent commands with a remote virtual agent located on the remote data processing system via the first communication channel; and performing an action corresponding to a virtual agent command received from the remote virtual agent located on the remote data processing system while a human conversation is conducted via the second communication channel. 15. The computer program product of claim 14 further comprising: analyzing the human conversation conducted via the second communication channel using a local virtual agent; determining a conversation context of the human conversation based on the local virtual agent analyzing the human conversation; and identifying missing conversation information in the human conversation based on the local virtual agent determining the conversation context. 16. The computer program product of claim 15 further comprising: requesting user confirmation to share the missing conversation information with the remote virtual agent located on the remote data processing system; and sharing the missing conversation information with the remote virtual agent located on the remote data processing system via the first communication channel based on receiving the user confirmation to share the missing conversation information. 17. The computer program product of claim 14 further comprising: informing the remote virtual agent located on the remote data processing system about the performed action via the first communication channel; and receiving confirmation via the first communication channel from the remote virtual agent located on the remote data processing system regarding the performed action. 18. The computer program product of claim 14, wherein the first communication channel is a virtual agent-to-virtual agent communication channel where only virtual agents of different data processing systems communicate and interact during a network connection between the different data processing systems. 19. The computer program product of claim 14, wherein the first communication channel is a peer-to-peer voice and text asynchronous channel dedicated to virtual agents. 20. The computer program product of claim 14, wherein the second communication channel is a human-to-human communication channel where the human conversation is conducted during a network connection between different data processing systems.
2,400
9,344
9,344
15,711,433
2,451
A proxy apparatus acts as an intermediary between one or more bot apparatuses and one or more communication channels. The proxy apparatus connects a communication channel to a bot apparatus for the exchange of messages. A user can interact with the bot apparatus through the communication channel. The proxy apparatus is configured to perform one or more operations or services. Example operations include, but are not limited to, registration, authentication and authorization, the recordation of telemetry data, schema transformation, and identity transformation.
1. A proxy apparatus for exchanging messages between a bot apparatus and a communication channel, the proxy apparatus comprising: a registration apparatus for receiving registration information associated with the bot apparatus and the communication channel, wherein the received registration information registers the bot apparatus and the communication channel with the proxy apparatus; an authentication and authorization apparatus for authenticating the bot apparatus and the communication channel based on the registration information and authorizing the exchange of messages between the bot apparatus and the communication channel; and a telemetry apparatus for creating a telemetry record for at least one message exchanged between the bot apparatus and the communication channel. 2. The proxy apparatus of claim 1, further comprising a schema transformation apparatus to transform a received message from a first format to a different second format. 3. The proxy apparatus of claim 1, further comprising an identity transformation apparatus for altering identifying information in a received message. 4. The proxy apparatus of claim 1, further comprising an opaque attachments apparatus for processing an attachment in a message, where the attachment has a non-binary format. 5. The proxy apparatus of claim 1, wherein the communication channel comprises a public communication channel. 6. The proxy apparatus of claim 1, wherein the communication channel comprises a private communication channel. 7. The proxy apparatus of claim 1, wherein: the registration apparatus, the authentication and authorization apparatus, and the telemetry apparatus are included in a proxy service apparatus within the proxy apparatus; and the proxy apparatus further comprises one or more additional services that support the operations of the proxy service apparatus. 8. The proxy apparatus of claim 1, further comprising a customization apparatus for alternating content in at least one message. 9. The proxy apparatus of claim 1, wherein the registration apparatus includes a publisher apparatus for publishing information about at least one of the bot apparatus or the communication channel. 10. A method of operating a proxy apparatus, the method comprising: in response to a received message, reviewing, by the proxy apparatus, registration data associated with a communication channel to authenticate the communication channel; reviewing, by the proxy apparatus, registration data associated with a bot apparatus to authenticate the bot apparatus; reviewing, by the proxy apparatus, information that links the authenticated bot apparatus with the authenticated communication channel to enable the bot apparatus and the communication channel to exchange one or more messages using the proxy apparatus; and authorizing, by the proxy apparatus, the exchange of the received message based on the authentications of the bot apparatus and the communication channel and the information that links the bot apparatus with the communication channel. 11. The method of claim 10, further comprising receiving, by the proxy apparatus, information that specifies the communication channel as a private or a public communication channel. 12. The method of claim 10, further comprising performing, by the proxy apparatus, a schema transformation operation on a message received by the proxy apparatus, the schema transformation operation converting a format of the message from a first format to a different second format. 13. The method of claim 10, further comprising performing, by the proxy apparatus, an identity transformation operation on a message received by the proxy apparatus, the identity transformation operation altering identifying information in the message. 14. The method of claim 10, further comprising creating, by the proxy apparatus, a telemetry record for a message received or transmitted by the proxy apparatus. 15. The method of claim 10, further comprising repackaging, by the proxy apparatus, a received message prior to transmitting the repackaged message. 16. The method of claim 15, wherein the operation of repacking the received message comprises changing a security domain associated with the message. 17. The method of claim 10, further comprising processing, by the proxy apparatus, an opaque attachment attached to a received message to permit the proxy apparatus to transmit the message and the opaque attachment. 18. The method of claim 10, further comprising not authorizing the exchange of the received message when the proxy apparatus is unable to authorize the bot apparatus or the communication channel. 19. The method of claim 10, further comprising not authorizing the exchange of the received message when the bot apparatus is not linked to the communication channel. 20. The method of claim 10, further comprising asserting, by the proxy apparatus, an identity of the proxy apparatus to the bot apparatus and to the communication channel.
A proxy apparatus acts as an intermediary between one or more bot apparatuses and one or more communication channels. The proxy apparatus connects a communication channel to a bot apparatus for the exchange of messages. A user can interact with the bot apparatus through the communication channel. The proxy apparatus is configured to perform one or more operations or services. Example operations include, but are not limited to, registration, authentication and authorization, the recordation of telemetry data, schema transformation, and identity transformation.1. A proxy apparatus for exchanging messages between a bot apparatus and a communication channel, the proxy apparatus comprising: a registration apparatus for receiving registration information associated with the bot apparatus and the communication channel, wherein the received registration information registers the bot apparatus and the communication channel with the proxy apparatus; an authentication and authorization apparatus for authenticating the bot apparatus and the communication channel based on the registration information and authorizing the exchange of messages between the bot apparatus and the communication channel; and a telemetry apparatus for creating a telemetry record for at least one message exchanged between the bot apparatus and the communication channel. 2. The proxy apparatus of claim 1, further comprising a schema transformation apparatus to transform a received message from a first format to a different second format. 3. The proxy apparatus of claim 1, further comprising an identity transformation apparatus for altering identifying information in a received message. 4. The proxy apparatus of claim 1, further comprising an opaque attachments apparatus for processing an attachment in a message, where the attachment has a non-binary format. 5. The proxy apparatus of claim 1, wherein the communication channel comprises a public communication channel. 6. The proxy apparatus of claim 1, wherein the communication channel comprises a private communication channel. 7. The proxy apparatus of claim 1, wherein: the registration apparatus, the authentication and authorization apparatus, and the telemetry apparatus are included in a proxy service apparatus within the proxy apparatus; and the proxy apparatus further comprises one or more additional services that support the operations of the proxy service apparatus. 8. The proxy apparatus of claim 1, further comprising a customization apparatus for alternating content in at least one message. 9. The proxy apparatus of claim 1, wherein the registration apparatus includes a publisher apparatus for publishing information about at least one of the bot apparatus or the communication channel. 10. A method of operating a proxy apparatus, the method comprising: in response to a received message, reviewing, by the proxy apparatus, registration data associated with a communication channel to authenticate the communication channel; reviewing, by the proxy apparatus, registration data associated with a bot apparatus to authenticate the bot apparatus; reviewing, by the proxy apparatus, information that links the authenticated bot apparatus with the authenticated communication channel to enable the bot apparatus and the communication channel to exchange one or more messages using the proxy apparatus; and authorizing, by the proxy apparatus, the exchange of the received message based on the authentications of the bot apparatus and the communication channel and the information that links the bot apparatus with the communication channel. 11. The method of claim 10, further comprising receiving, by the proxy apparatus, information that specifies the communication channel as a private or a public communication channel. 12. The method of claim 10, further comprising performing, by the proxy apparatus, a schema transformation operation on a message received by the proxy apparatus, the schema transformation operation converting a format of the message from a first format to a different second format. 13. The method of claim 10, further comprising performing, by the proxy apparatus, an identity transformation operation on a message received by the proxy apparatus, the identity transformation operation altering identifying information in the message. 14. The method of claim 10, further comprising creating, by the proxy apparatus, a telemetry record for a message received or transmitted by the proxy apparatus. 15. The method of claim 10, further comprising repackaging, by the proxy apparatus, a received message prior to transmitting the repackaged message. 16. The method of claim 15, wherein the operation of repacking the received message comprises changing a security domain associated with the message. 17. The method of claim 10, further comprising processing, by the proxy apparatus, an opaque attachment attached to a received message to permit the proxy apparatus to transmit the message and the opaque attachment. 18. The method of claim 10, further comprising not authorizing the exchange of the received message when the proxy apparatus is unable to authorize the bot apparatus or the communication channel. 19. The method of claim 10, further comprising not authorizing the exchange of the received message when the bot apparatus is not linked to the communication channel. 20. The method of claim 10, further comprising asserting, by the proxy apparatus, an identity of the proxy apparatus to the bot apparatus and to the communication channel.
2,400
9,345
9,345
16,330,334
2,425
A client device adaptively streams a 360-degree video. A first segment is displayed based on a first viewing direction at a first time, where the first viewing direction is associated with a first viewport. The client requests a first base buffer segment based on the first viewport. The first base buffer segment has a presentation time after the first segment. At a second time, the viewing direction changes to a second viewing direction associated with a second viewport. The client requests, prior to the presentation time, a first viewport buffer segment based on the second viewport, with the same presentation time. The client device displays a second segment at the presentation time, wherein the second segment is either the first viewport buffer segment or the first base buffer segment. The client provides reports on viewport switching latency and on the most-requested segments.
1-8. (canceled) 9. A method of operating a 360-degree video client device, the method comprising: tracking a series of viewing directions of a user, each viewing direction corresponding to one of a plurality of respective viewport representations of a viewport-adaptive 360-degree video; adaptively requesting the viewport representations corresponding to the tracked viewing directions; receiving and displaying the requested viewport representations to the user; and sending, to a metrics server, a viewport request report, wherein the viewport request report is based on a number of requests made for the respective viewport representations. 10. The method of claim 9, wherein the viewport representations are requested from at least one DASH-Aware Network Element different from the metrics server. 11. The method of claim 9, wherein the viewport request report indicates, for each of a plurality of the viewport representations, a number of requests made for the respective representation. 12. The method of claim 9, wherein the viewport request report identifies a most-viewed viewport representation for at least one time interval. 13. The method of claim 9, wherein the viewport request report is sent in a Server and Network Assisted DASH (SAND) message. 14. The method of claim 9, further comprising: measuring at least one viewport switch latency; and sending to a server a latency report based at least in part on the measured viewport switch latency. 15. The method of claim 9, wherein the 360-degree video client device is a head-mounted display. 16. A 360-degree video client device comprising a display, a processor, and non-transitory computer storage medium storing instructions operative, when executed on the processor, to perform functions comprising: tracking a series of viewing directions of a user, each viewing direction corresponding to one of a plurality of respective viewport representations of a viewport-adaptive 360-degree video; adaptively requesting the viewport representations corresponding to the tracked viewing directions; receiving and displaying the requested viewport representations to the user on the display; and sending, to a metrics server, a viewport request report, wherein the viewport request report is based on a number of requests made for the respective viewport representations. 17. The client device of claim 16, wherein the instructions are further operative to perform functions comprising: measuring at least one viewport switch latency; and sending to a server a latency report based at least in part on the measured viewport switch latency. 18. The client device of claim 16, wherein the display is a head-mounted display.
A client device adaptively streams a 360-degree video. A first segment is displayed based on a first viewing direction at a first time, where the first viewing direction is associated with a first viewport. The client requests a first base buffer segment based on the first viewport. The first base buffer segment has a presentation time after the first segment. At a second time, the viewing direction changes to a second viewing direction associated with a second viewport. The client requests, prior to the presentation time, a first viewport buffer segment based on the second viewport, with the same presentation time. The client device displays a second segment at the presentation time, wherein the second segment is either the first viewport buffer segment or the first base buffer segment. The client provides reports on viewport switching latency and on the most-requested segments.1-8. (canceled) 9. A method of operating a 360-degree video client device, the method comprising: tracking a series of viewing directions of a user, each viewing direction corresponding to one of a plurality of respective viewport representations of a viewport-adaptive 360-degree video; adaptively requesting the viewport representations corresponding to the tracked viewing directions; receiving and displaying the requested viewport representations to the user; and sending, to a metrics server, a viewport request report, wherein the viewport request report is based on a number of requests made for the respective viewport representations. 10. The method of claim 9, wherein the viewport representations are requested from at least one DASH-Aware Network Element different from the metrics server. 11. The method of claim 9, wherein the viewport request report indicates, for each of a plurality of the viewport representations, a number of requests made for the respective representation. 12. The method of claim 9, wherein the viewport request report identifies a most-viewed viewport representation for at least one time interval. 13. The method of claim 9, wherein the viewport request report is sent in a Server and Network Assisted DASH (SAND) message. 14. The method of claim 9, further comprising: measuring at least one viewport switch latency; and sending to a server a latency report based at least in part on the measured viewport switch latency. 15. The method of claim 9, wherein the 360-degree video client device is a head-mounted display. 16. A 360-degree video client device comprising a display, a processor, and non-transitory computer storage medium storing instructions operative, when executed on the processor, to perform functions comprising: tracking a series of viewing directions of a user, each viewing direction corresponding to one of a plurality of respective viewport representations of a viewport-adaptive 360-degree video; adaptively requesting the viewport representations corresponding to the tracked viewing directions; receiving and displaying the requested viewport representations to the user on the display; and sending, to a metrics server, a viewport request report, wherein the viewport request report is based on a number of requests made for the respective viewport representations. 17. The client device of claim 16, wherein the instructions are further operative to perform functions comprising: measuring at least one viewport switch latency; and sending to a server a latency report based at least in part on the measured viewport switch latency. 18. The client device of claim 16, wherein the display is a head-mounted display.
2,400
9,346
9,346
15,439,893
2,482
A deep learning based compression (DLBC) system trains multiple models that, when deployed, generates a compressed binary encoding of an input image that achieves a reconstruction quality and a target compression ratio. The applied models effectively identifies structures of an input image, quantizes the input image to a target bit precision, and compresses the binary code of the input image via adaptive arithmetic coding to a target codelength. During training, the DLBC system reconstructs the input image from the compressed binary encoding and determines the loss in quality from the encoding process. Thus, the models can be continually trained to, when applied to an input image, minimize the loss in reconstruction quality that arises due to the encoding process while also achieving the target compression ratio.
1. A computer-implemented method for compressing an input image, the method comprising: receiving the input image to be compressed; extracting a plurality of feature coefficients across a plurality of scales of the input image according to feature extraction operators of a trained feature model; identifying joint structures across the plurality of scales based on the extracted feature coefficients; and compressing the input image based on the identified joint structures. 2. The computer-implemented method of claim 1, wherein the trained feature model is previously trained to use downsampling operators to generate a plurality of downscaled input images, extract one or more feature coefficients from each downscaled input image, and apply one or more parameterized functions to align the extracted one or more feature coefficients. 3. The computer-implemented method of claim 2, wherein the trained feature model is trained by training the downsampling operators to maximize reconstruction at a given compression rate. 4. The computer-implemented method of claim 1, wherein the trained feature model is trained by training the feature extraction operators to maximize reconstruction quality at a given compression rate. 5. The computer-implemented method of claim 1, wherein the input image is a residual frame of a video predicted from a plurality of video frames of the video. 6. The computer-implemented method of claim 1, wherein extracting feature coefficients across a plurality of scales of the input image comprises: pyramidally decomposing the input image into a plurality of downsampled input images, each downsampled input image corresponding to a scale in the plurality of scales; and for each scale in the plurality of scales, applying the trained feature model trained to extract feature coefficients from a downsampled input image corresponding to the scale. 7. The computer-implemented method of claim 1, wherein compressing the input image based on the identified joint structures comprises: quantizing the extracted feature coefficients based on the identified joint structures; decomposing each of the quantized coefficients into a plurality of bitplanes; applying a trained adaptive arithmetic coder model to the decomposed plurality of bitplanes to generate compressed codes of the input image. 8. The computer-implemented method of claim 1 further comprising: combining extracted feature coefficients into a common space; and transforming the combined feature coefficients in the common space to identify structures across scales and to obtain feature coefficients for compression. 9. The computer-implemented method of claim 1, wherein the trained feature model is a neural network trained based on backpropagated loss between the input image and a previously reconstructed input image. 10. The computer-implemented method of claim 9, wherein the backpropagated loss is calculated based on a quality metric. 11. The computer-implemented method of claim 10, wherein the quality metric is one of peak signal-to-noise ratio, structural similarity index, or multi-scale structural similarity index. 12. A non-transitory computer-readable storage medium comprising code that, when executed by a processor, causes the processor to perform steps including: receiving the input image to be compressed; extracting a plurality of feature coefficients across a plurality of scales of the input image according to feature extraction operators of a trained feature model; identifying joint structures across the plurality of scales based on the extracted feature coefficients; and compressing the input image based on the identified joint structures. 13. The non-transitory computer-readable storage medium of claim 12, wherein the trained feature model is previously trained to use downsampling operators to generate a plurality of downscaled input images, extract one or more feature coefficients from each downscaled input image, and apply one or more parameterized functions to align the extracted one or more feature coefficients. 14. The non-transitory computer-readable storage medium of claim 13, wherein the trained feature model is trained by training the downsampling operators to maximize reconstruction at a given compression rate. 15. The non-transitory computer-readable storage medium of claim 12, wherein the trained feature model is trained by training the feature extraction operators to maximize reconstruction quality at a given compression rate. 16. The non-transitory computer-readable storage medium of claim 12, wherein the input image is a residual frame of a video predicted from a plurality of video frames of the video. 17. The non-transitory computer-readable storage medium of claim 12, wherein extracting feature coefficients across a plurality of scales of the input image comprises: pyramidally decomposing the input image into a plurality of downsampled input images, each downsampled input image corresponding to a scale in the plurality of scales; and for each scale in the plurality of scales, applying the trained feature model trained to extract feature coefficients from a downsampled input image corresponding to the scale. 18. The non-transitory computer-readable storage medium of claim 12 further comprising code that, when executed by a processor, causes the processor to perform steps including: quantizing the extracted feature coefficients based on the identified joint structures; decomposing each of the quantized coefficients into a plurality of bitplanes; applying a trained adaptive arithmetic coder model to the decomposed plurality of bitplanes to generate compressed codes of the input image. 19. The non-transitory computer-readable storage medium of claim 12 further comprising code that, when executed by a processor, causes the processor to perform steps including: combining extracted feature coefficients into a common space; and transforming the combined feature coefficients in the common space to identify structures across scales and to obtain feature coefficients for compression. 20. The non-transitory computer-readable storage medium of claim 12, wherein the trained feature model is a neural network trained based on backpropagated loss between the input image and a previously reconstructed input image. 21. The non-transitory computer-readable storage medium of claim 20, wherein the backpropagated loss is calculated based on a quality metric. 22. The non-transitory computer-readable storage medium of claim 21, wherein the quality metric is one of peak signal-to-noise ratio, structural similarity index, or multi-scale structural similarity index.
A deep learning based compression (DLBC) system trains multiple models that, when deployed, generates a compressed binary encoding of an input image that achieves a reconstruction quality and a target compression ratio. The applied models effectively identifies structures of an input image, quantizes the input image to a target bit precision, and compresses the binary code of the input image via adaptive arithmetic coding to a target codelength. During training, the DLBC system reconstructs the input image from the compressed binary encoding and determines the loss in quality from the encoding process. Thus, the models can be continually trained to, when applied to an input image, minimize the loss in reconstruction quality that arises due to the encoding process while also achieving the target compression ratio.1. A computer-implemented method for compressing an input image, the method comprising: receiving the input image to be compressed; extracting a plurality of feature coefficients across a plurality of scales of the input image according to feature extraction operators of a trained feature model; identifying joint structures across the plurality of scales based on the extracted feature coefficients; and compressing the input image based on the identified joint structures. 2. The computer-implemented method of claim 1, wherein the trained feature model is previously trained to use downsampling operators to generate a plurality of downscaled input images, extract one or more feature coefficients from each downscaled input image, and apply one or more parameterized functions to align the extracted one or more feature coefficients. 3. The computer-implemented method of claim 2, wherein the trained feature model is trained by training the downsampling operators to maximize reconstruction at a given compression rate. 4. The computer-implemented method of claim 1, wherein the trained feature model is trained by training the feature extraction operators to maximize reconstruction quality at a given compression rate. 5. The computer-implemented method of claim 1, wherein the input image is a residual frame of a video predicted from a plurality of video frames of the video. 6. The computer-implemented method of claim 1, wherein extracting feature coefficients across a plurality of scales of the input image comprises: pyramidally decomposing the input image into a plurality of downsampled input images, each downsampled input image corresponding to a scale in the plurality of scales; and for each scale in the plurality of scales, applying the trained feature model trained to extract feature coefficients from a downsampled input image corresponding to the scale. 7. The computer-implemented method of claim 1, wherein compressing the input image based on the identified joint structures comprises: quantizing the extracted feature coefficients based on the identified joint structures; decomposing each of the quantized coefficients into a plurality of bitplanes; applying a trained adaptive arithmetic coder model to the decomposed plurality of bitplanes to generate compressed codes of the input image. 8. The computer-implemented method of claim 1 further comprising: combining extracted feature coefficients into a common space; and transforming the combined feature coefficients in the common space to identify structures across scales and to obtain feature coefficients for compression. 9. The computer-implemented method of claim 1, wherein the trained feature model is a neural network trained based on backpropagated loss between the input image and a previously reconstructed input image. 10. The computer-implemented method of claim 9, wherein the backpropagated loss is calculated based on a quality metric. 11. The computer-implemented method of claim 10, wherein the quality metric is one of peak signal-to-noise ratio, structural similarity index, or multi-scale structural similarity index. 12. A non-transitory computer-readable storage medium comprising code that, when executed by a processor, causes the processor to perform steps including: receiving the input image to be compressed; extracting a plurality of feature coefficients across a plurality of scales of the input image according to feature extraction operators of a trained feature model; identifying joint structures across the plurality of scales based on the extracted feature coefficients; and compressing the input image based on the identified joint structures. 13. The non-transitory computer-readable storage medium of claim 12, wherein the trained feature model is previously trained to use downsampling operators to generate a plurality of downscaled input images, extract one or more feature coefficients from each downscaled input image, and apply one or more parameterized functions to align the extracted one or more feature coefficients. 14. The non-transitory computer-readable storage medium of claim 13, wherein the trained feature model is trained by training the downsampling operators to maximize reconstruction at a given compression rate. 15. The non-transitory computer-readable storage medium of claim 12, wherein the trained feature model is trained by training the feature extraction operators to maximize reconstruction quality at a given compression rate. 16. The non-transitory computer-readable storage medium of claim 12, wherein the input image is a residual frame of a video predicted from a plurality of video frames of the video. 17. The non-transitory computer-readable storage medium of claim 12, wherein extracting feature coefficients across a plurality of scales of the input image comprises: pyramidally decomposing the input image into a plurality of downsampled input images, each downsampled input image corresponding to a scale in the plurality of scales; and for each scale in the plurality of scales, applying the trained feature model trained to extract feature coefficients from a downsampled input image corresponding to the scale. 18. The non-transitory computer-readable storage medium of claim 12 further comprising code that, when executed by a processor, causes the processor to perform steps including: quantizing the extracted feature coefficients based on the identified joint structures; decomposing each of the quantized coefficients into a plurality of bitplanes; applying a trained adaptive arithmetic coder model to the decomposed plurality of bitplanes to generate compressed codes of the input image. 19. The non-transitory computer-readable storage medium of claim 12 further comprising code that, when executed by a processor, causes the processor to perform steps including: combining extracted feature coefficients into a common space; and transforming the combined feature coefficients in the common space to identify structures across scales and to obtain feature coefficients for compression. 20. The non-transitory computer-readable storage medium of claim 12, wherein the trained feature model is a neural network trained based on backpropagated loss between the input image and a previously reconstructed input image. 21. The non-transitory computer-readable storage medium of claim 20, wherein the backpropagated loss is calculated based on a quality metric. 22. The non-transitory computer-readable storage medium of claim 21, wherein the quality metric is one of peak signal-to-noise ratio, structural similarity index, or multi-scale structural similarity index.
2,400
9,347
9,347
14,618,365
2,446
A state of a system having a plurality of appliances is controlled by using a device discovery process to establish a listing of each of the plurality of appliances in the system. The listing of each of the plurality of appliances is then used, with reference to a command and/or protoctol database, to configure a software agent to exchange communications, via a one or more communication channels, with each of the plurality of appliances. An action triggering state of at least one of the plurality of appliances is associated with an action. The action is performed when it is determined that a current state of the at least one of the plurality of appliances corresponds to the action triggering state.
1. A method for controlling a state of a system comprised of a plurality of appliances, the method comprising: using a device discovery process to establish a listing of each of the plurality of appliances in the system; using the listing of each of the plurality of appliances in the system, with reference to a command and/or protoctol database, to configure a software agent to exchange communications, via a one or more communication channels, with each of the plurality of appliances; associating an action triggering state of at least one of the plurality of appliances in the system with an action to be performed by the software agent; receiving by the software agent, via the one or more communication channels, a message from the at least one of the plurality of appliances in the system, the message having data indicative of a current state of the at least one of the plurality of appliances; and causing the software agent to perform the action when it is determined by the software agent that the current state of the at least one of the plurality of appliances corresponds to the action triggering state; wherein the action comprises the software agent transmitting one or more commands, via the one or more communication channels, to a target one or more of the plurality of appliances in the system to thereby cause a change in state of the target one or more of the plurality of appliances. 2. The method as recited in claim 1, wherein the software agent uses the listing of each of the plurality of appliances in the system to automatically associate the action triggering state of at least one the plurality of appliances in the system with the action to be performed by the software agent. 3. The method as recited in claim 1, wherein the software agent causes a display of a user interface having input elements for allowing a user to manually associate the action triggering state of at least one the plurality of appliances in the system with the action to be performed by the software agent. 4. The method as recited in claim 1, wherein the device discovery process comprises the software agent receiving from a controlling device configured to command functional operations of each of the plurality of appliances in the system appliance identity data for use in establishing the listing of each of the plurality of appliances in the system. 5. The method as recited in claim 1, wherein the device discovery process comprises the software agent issuing one or more polling requests to retrieve from one or more of the plurality of appliances in the system appliance identity data for use in establishing the listing of each of the plurality of appliances in the system. 6. The method as recited in claim 1, wherein the software agent periodically issues a request, via the one or more communication channels, to the at least one of the plurality of appliances in the system for the message having data indicative of the current state of the at least one of the plurality of appliances in the system. 7. The method as recited in claim 1, wherein the at least of the plurality of appliance in the system is caused to issue the message having data indicative of the current state of the at least one of the plurality of appliances in the system for receipt by the software agent in response to the at least one of the plurality of appliance in the system changing state. 8. The method as recited in claim 1, wherein the action triggering state of the at least one of the plurality of appliances in the system comprises a location state of the at least one of the plurality of appliances in the system. 9. The method as recited in claim 8, wherein the at least one of the plurality of appliances in the system comprises a smart phone. 10. A non-transitory, computer readable media having instructions stored thereon for controlling a state of a system comprised of a plurality of appliances, the instructions, when executed by a device, performing steps comprising: using a device discovery process to establish a listing of each of the plurality of appliances in the system; using the listing of each of the plurality of appliances in the system, with reference to a command and/or protoctol database, to configure the device to exchange communications, via a one or more communication channels, with each of the plurality of appliances; associating an action triggering state of at least one of the plurality of appliances in the system with an action; receiving by the device, via the one or more communication channels, a message from the at least one of the plurality of appliances in the system, the message having data indicative of a current state of the at least one of the plurality of appliances; and causing performance of the action when it is determined that the current state of the at least one of the plurality of appliances corresponds to the action triggering state; wherein the action comprises the device transmitting one or more commands, via the one or more communication channels, to a target one or more of the plurality of appliances in the system to thereby cause a change in state of the target one or more of the plurality of appliances. 11. The non-transitory, computer readable media as recited in claim 10, wherein the instructions use the listing of each of the plurality of appliances in the system to automatically associate the action triggering state of at least one the plurality of appliances in the system with the action. 12. The non-transitory, computer readable media as recited in claim 10, wherein the instructions cause a display of a user interface having input elements for allowing a user to manually associate the action triggering state of at least one the plurality of appliances in the system with the action. 13. The non-transitory, computer readable media as recited in claim 10, wherein the instructions use appliance identity data received from a controlling device configured to command functional operations of each of the plurality of appliances in the system in establishing the listing of each of the plurality of appliances in the system. 14. The non-transitory, computer readable media as recited in claim 10, wherein the instructions cause the device to issue one or more polling requests to retrieve from one or more of the plurality of appliances in the system appliance identity data for use in establishing the listing of each of the plurality of appliances in the system. 15. The non-transitory, computer readable media as recited in claim 14, wherein the instructions cause the device to periodically issue a request, via the one or more communication channels, to the at least one of the plurality of appliances in the system for the message having data indicative of the current state of the at least one of the plurality of appliances in the system. 16. The non-transitory, computer readable media as recited in claim 10, wherein the instructions receive from the at least one of the plurality of appliance in the system the message having data indicative of the current state of the at least one of the plurality of appliances in the system when the at least one of the plurality of appliance in the system changes state. 17. The non-transitory, computer readable media as recited in claim 10, wherein the action triggering state of the at least one of the plurality of appliances in the system comprises a location state of the at least one of the plurality of appliances in the system. 18. The non-transitory, computer readable media as recited in claim 17, wherein the at least one of the plurality of appliances in the system comprises a smart phone. 19. The non-transitory, computer readable media as recited in claim 10, wherein the instructions reference the command and/or protoctol database stored in the memory of the device. 20. The non-transitory, computer readable media as recited in claim 10, wherein the instructions reference the command and/or protoctol database stored in a database remotely located from the device.
A state of a system having a plurality of appliances is controlled by using a device discovery process to establish a listing of each of the plurality of appliances in the system. The listing of each of the plurality of appliances is then used, with reference to a command and/or protoctol database, to configure a software agent to exchange communications, via a one or more communication channels, with each of the plurality of appliances. An action triggering state of at least one of the plurality of appliances is associated with an action. The action is performed when it is determined that a current state of the at least one of the plurality of appliances corresponds to the action triggering state.1. A method for controlling a state of a system comprised of a plurality of appliances, the method comprising: using a device discovery process to establish a listing of each of the plurality of appliances in the system; using the listing of each of the plurality of appliances in the system, with reference to a command and/or protoctol database, to configure a software agent to exchange communications, via a one or more communication channels, with each of the plurality of appliances; associating an action triggering state of at least one of the plurality of appliances in the system with an action to be performed by the software agent; receiving by the software agent, via the one or more communication channels, a message from the at least one of the plurality of appliances in the system, the message having data indicative of a current state of the at least one of the plurality of appliances; and causing the software agent to perform the action when it is determined by the software agent that the current state of the at least one of the plurality of appliances corresponds to the action triggering state; wherein the action comprises the software agent transmitting one or more commands, via the one or more communication channels, to a target one or more of the plurality of appliances in the system to thereby cause a change in state of the target one or more of the plurality of appliances. 2. The method as recited in claim 1, wherein the software agent uses the listing of each of the plurality of appliances in the system to automatically associate the action triggering state of at least one the plurality of appliances in the system with the action to be performed by the software agent. 3. The method as recited in claim 1, wherein the software agent causes a display of a user interface having input elements for allowing a user to manually associate the action triggering state of at least one the plurality of appliances in the system with the action to be performed by the software agent. 4. The method as recited in claim 1, wherein the device discovery process comprises the software agent receiving from a controlling device configured to command functional operations of each of the plurality of appliances in the system appliance identity data for use in establishing the listing of each of the plurality of appliances in the system. 5. The method as recited in claim 1, wherein the device discovery process comprises the software agent issuing one or more polling requests to retrieve from one or more of the plurality of appliances in the system appliance identity data for use in establishing the listing of each of the plurality of appliances in the system. 6. The method as recited in claim 1, wherein the software agent periodically issues a request, via the one or more communication channels, to the at least one of the plurality of appliances in the system for the message having data indicative of the current state of the at least one of the plurality of appliances in the system. 7. The method as recited in claim 1, wherein the at least of the plurality of appliance in the system is caused to issue the message having data indicative of the current state of the at least one of the plurality of appliances in the system for receipt by the software agent in response to the at least one of the plurality of appliance in the system changing state. 8. The method as recited in claim 1, wherein the action triggering state of the at least one of the plurality of appliances in the system comprises a location state of the at least one of the plurality of appliances in the system. 9. The method as recited in claim 8, wherein the at least one of the plurality of appliances in the system comprises a smart phone. 10. A non-transitory, computer readable media having instructions stored thereon for controlling a state of a system comprised of a plurality of appliances, the instructions, when executed by a device, performing steps comprising: using a device discovery process to establish a listing of each of the plurality of appliances in the system; using the listing of each of the plurality of appliances in the system, with reference to a command and/or protoctol database, to configure the device to exchange communications, via a one or more communication channels, with each of the plurality of appliances; associating an action triggering state of at least one of the plurality of appliances in the system with an action; receiving by the device, via the one or more communication channels, a message from the at least one of the plurality of appliances in the system, the message having data indicative of a current state of the at least one of the plurality of appliances; and causing performance of the action when it is determined that the current state of the at least one of the plurality of appliances corresponds to the action triggering state; wherein the action comprises the device transmitting one or more commands, via the one or more communication channels, to a target one or more of the plurality of appliances in the system to thereby cause a change in state of the target one or more of the plurality of appliances. 11. The non-transitory, computer readable media as recited in claim 10, wherein the instructions use the listing of each of the plurality of appliances in the system to automatically associate the action triggering state of at least one the plurality of appliances in the system with the action. 12. The non-transitory, computer readable media as recited in claim 10, wherein the instructions cause a display of a user interface having input elements for allowing a user to manually associate the action triggering state of at least one the plurality of appliances in the system with the action. 13. The non-transitory, computer readable media as recited in claim 10, wherein the instructions use appliance identity data received from a controlling device configured to command functional operations of each of the plurality of appliances in the system in establishing the listing of each of the plurality of appliances in the system. 14. The non-transitory, computer readable media as recited in claim 10, wherein the instructions cause the device to issue one or more polling requests to retrieve from one or more of the plurality of appliances in the system appliance identity data for use in establishing the listing of each of the plurality of appliances in the system. 15. The non-transitory, computer readable media as recited in claim 14, wherein the instructions cause the device to periodically issue a request, via the one or more communication channels, to the at least one of the plurality of appliances in the system for the message having data indicative of the current state of the at least one of the plurality of appliances in the system. 16. The non-transitory, computer readable media as recited in claim 10, wherein the instructions receive from the at least one of the plurality of appliance in the system the message having data indicative of the current state of the at least one of the plurality of appliances in the system when the at least one of the plurality of appliance in the system changes state. 17. The non-transitory, computer readable media as recited in claim 10, wherein the action triggering state of the at least one of the plurality of appliances in the system comprises a location state of the at least one of the plurality of appliances in the system. 18. The non-transitory, computer readable media as recited in claim 17, wherein the at least one of the plurality of appliances in the system comprises a smart phone. 19. The non-transitory, computer readable media as recited in claim 10, wherein the instructions reference the command and/or protoctol database stored in the memory of the device. 20. The non-transitory, computer readable media as recited in claim 10, wherein the instructions reference the command and/or protoctol database stored in a database remotely located from the device.
2,400
9,348
9,348
16,300,429
2,474
A radio transmitter circuit (10) for transmitting signals within an uplink or sidelink frequency band of a cellular communications system is disclosed. It comprises a signal-generation circuit (20) configured to generate a transmission signal to be transmitted, and a radio front-end circuit (30), connected to the signal-generation circuit (20) at an input of the radio front-end circuit (30), for receiving the transmission signal, and configured to be connected to an antenna (40) at an output of the radio front-end circuit and to transmit the transmission signal to a remote node via said antenna (40). The signal-generation circuit (20) is configured to select a distortion function (D1, D2) based on a location of an allocated radio frequency resource, within said uplink or sidelink frequency band, for the transmission signal. Furthermore, the signal-generation circuit (20) is configured to generate an intermediate transmission signal, based on information to be transmitted in the transmission signal. Moreover, the signal-generation circuit (20) is configured to generate the transmission signal by applying the distortion function (D1, D2) to the intermediate transmission signal.
1-19. (canceled) 20. A radio transmitter circuit for transmitting signals within an uplink or sidelink frequency band of a cellular communications system, the radio transmitter circuit comprising: a signal-generation circuit configured to generate a transmission signal to be transmitted; and a radio front-end circuit, connected to the signal-generation circuit at an input of the radio front-end circuit, for receiving the transmission signal, and configured to be connected to an antenna at an output of the radio front-end circuit and to transmit the transmission signal to a remote node via said antenna; wherein the signal-generation circuit is configured to select a distortion function based on a location of an allocated radio frequency resource, within said uplink or sidelink frequency band, for the transmission signal, generate an intermediate transmission signal, based on information to be transmitted in the transmission signal, and generate the transmission signal by applying the distortion function to the intermediate transmission signal. 21. The radio transmitter circuit of claim 20, wherein the signal-generation circuit is configured to select the distortion function based on a bandwidth of the allocated radio-frequency resource. 22. The radio transmitter circuit of claim 20, wherein the signal-generation circuit is configured to select the distortion function based on a coding and modulation format of the transmission signal. 23. The radio transmitter circuit of claim 20, wherein the signal to be transmitted is an OFDM signal. 24. The radio transmitter circuit of claim 20, wherein the distortion function is one of a companding function; a clipping function; and a peak-canceling filtering function. 25. The radio transmitter circuit of claim 20, wherein the signal-generation circuit is configured to select a first distortion function if the allocated radio frequency resource is in a first sub band of the uplink or sidelink frequency band; and select a second distortion function if the allocated radio frequency resource is in a second sub band of the uplink or sidelink frequency band; wherein the first and second sub bands are different and the second sub band is located closer to an edge of the uplink or sidelink frequency band than the first sub band. 26. The radio transmitter circuit of claim 25, wherein the first sub band is located in the center of the uplink or sidelink frequency band. 27. The radio transmitter circuit of claim 20, wherein the signal generation circuit is configured to receive information indicating the location of the allocated radio frequency resource from a network node of the cellular communications system. 28. The radio transmitter circuit of claim 20, wherein the signal generation circuit is a digital signal processor. 29. A method of operating a radio transmitter circuit for transmitting signals within an uplink or sidelink frequency band of a cellular communications system, the method comprising: selecting a distortion function based on a location of an allocated radio frequency resource, within said uplink or sidelink frequency band, for a transmission signal to be transmitted; generating an intermediate transmission signal, based on information to be transmitted in the transmission signal; generating the transmission signal by applying the distortion function to the intermediate transmission signal; and transmitting the transmission signal to a remote node via an antenna. 30. The method of claim 29, wherein selecting the distortion function comprises selecting the distortion function based on a bandwidth of the allocated radio-frequency resource. 31. The method of claim 29, wherein selecting the distortion function comprises selecting the distortion function based on a coding and modulation format of the transmission signal. 32. The method of claim 29, wherein the signal to be transmitted is an OFDM signal. 33. The method of claim 29, wherein the distortion function is one of a companding function; a clipping function; and a peak-canceling filtering function. 34. The method of claim 29, wherein selecting the distortion function comprises: selecting a first distortion function if the allocated radio frequency resource is in a first sub band of the uplink or sidelink frequency band; and selecting a second distortion function if the allocated radio frequency resource is in a second sub band of the uplink or sidelink frequency band; wherein the first and second sub bands are different and the second sub band is located closer to an edge of the uplink or sidelink frequency band than the first sub band. 35. The method of claim 34, wherein the first sub band is located in the center of the uplink or sidelink frequency band. 36. The method of claim 29, comprising: receiving information indicating the location of the allocated radio frequency from a network node of the cellular communications system. 37. A wireless communication device configured to operate within a cellular communications system, comprising the radio transmitter circuit of claim 20; and said antenna; wherein the output of the radio front-end circuit of the radio transmitter circuit is connected to said antenna. 38. The wireless communication device of claim 33, wherein the wireless communication device is a mobile phone.
A radio transmitter circuit (10) for transmitting signals within an uplink or sidelink frequency band of a cellular communications system is disclosed. It comprises a signal-generation circuit (20) configured to generate a transmission signal to be transmitted, and a radio front-end circuit (30), connected to the signal-generation circuit (20) at an input of the radio front-end circuit (30), for receiving the transmission signal, and configured to be connected to an antenna (40) at an output of the radio front-end circuit and to transmit the transmission signal to a remote node via said antenna (40). The signal-generation circuit (20) is configured to select a distortion function (D1, D2) based on a location of an allocated radio frequency resource, within said uplink or sidelink frequency band, for the transmission signal. Furthermore, the signal-generation circuit (20) is configured to generate an intermediate transmission signal, based on information to be transmitted in the transmission signal. Moreover, the signal-generation circuit (20) is configured to generate the transmission signal by applying the distortion function (D1, D2) to the intermediate transmission signal.1-19. (canceled) 20. A radio transmitter circuit for transmitting signals within an uplink or sidelink frequency band of a cellular communications system, the radio transmitter circuit comprising: a signal-generation circuit configured to generate a transmission signal to be transmitted; and a radio front-end circuit, connected to the signal-generation circuit at an input of the radio front-end circuit, for receiving the transmission signal, and configured to be connected to an antenna at an output of the radio front-end circuit and to transmit the transmission signal to a remote node via said antenna; wherein the signal-generation circuit is configured to select a distortion function based on a location of an allocated radio frequency resource, within said uplink or sidelink frequency band, for the transmission signal, generate an intermediate transmission signal, based on information to be transmitted in the transmission signal, and generate the transmission signal by applying the distortion function to the intermediate transmission signal. 21. The radio transmitter circuit of claim 20, wherein the signal-generation circuit is configured to select the distortion function based on a bandwidth of the allocated radio-frequency resource. 22. The radio transmitter circuit of claim 20, wherein the signal-generation circuit is configured to select the distortion function based on a coding and modulation format of the transmission signal. 23. The radio transmitter circuit of claim 20, wherein the signal to be transmitted is an OFDM signal. 24. The radio transmitter circuit of claim 20, wherein the distortion function is one of a companding function; a clipping function; and a peak-canceling filtering function. 25. The radio transmitter circuit of claim 20, wherein the signal-generation circuit is configured to select a first distortion function if the allocated radio frequency resource is in a first sub band of the uplink or sidelink frequency band; and select a second distortion function if the allocated radio frequency resource is in a second sub band of the uplink or sidelink frequency band; wherein the first and second sub bands are different and the second sub band is located closer to an edge of the uplink or sidelink frequency band than the first sub band. 26. The radio transmitter circuit of claim 25, wherein the first sub band is located in the center of the uplink or sidelink frequency band. 27. The radio transmitter circuit of claim 20, wherein the signal generation circuit is configured to receive information indicating the location of the allocated radio frequency resource from a network node of the cellular communications system. 28. The radio transmitter circuit of claim 20, wherein the signal generation circuit is a digital signal processor. 29. A method of operating a radio transmitter circuit for transmitting signals within an uplink or sidelink frequency band of a cellular communications system, the method comprising: selecting a distortion function based on a location of an allocated radio frequency resource, within said uplink or sidelink frequency band, for a transmission signal to be transmitted; generating an intermediate transmission signal, based on information to be transmitted in the transmission signal; generating the transmission signal by applying the distortion function to the intermediate transmission signal; and transmitting the transmission signal to a remote node via an antenna. 30. The method of claim 29, wherein selecting the distortion function comprises selecting the distortion function based on a bandwidth of the allocated radio-frequency resource. 31. The method of claim 29, wherein selecting the distortion function comprises selecting the distortion function based on a coding and modulation format of the transmission signal. 32. The method of claim 29, wherein the signal to be transmitted is an OFDM signal. 33. The method of claim 29, wherein the distortion function is one of a companding function; a clipping function; and a peak-canceling filtering function. 34. The method of claim 29, wherein selecting the distortion function comprises: selecting a first distortion function if the allocated radio frequency resource is in a first sub band of the uplink or sidelink frequency band; and selecting a second distortion function if the allocated radio frequency resource is in a second sub band of the uplink or sidelink frequency band; wherein the first and second sub bands are different and the second sub band is located closer to an edge of the uplink or sidelink frequency band than the first sub band. 35. The method of claim 34, wherein the first sub band is located in the center of the uplink or sidelink frequency band. 36. The method of claim 29, comprising: receiving information indicating the location of the allocated radio frequency from a network node of the cellular communications system. 37. A wireless communication device configured to operate within a cellular communications system, comprising the radio transmitter circuit of claim 20; and said antenna; wherein the output of the radio front-end circuit of the radio transmitter circuit is connected to said antenna. 38. The wireless communication device of claim 33, wherein the wireless communication device is a mobile phone.
2,400
9,349
9,349
15,127,523
2,468
A user equipment method, user equipment, a base station method, a base station and computer program products are disclosed. The user equipment method, comprises in response to a radio resource control connection re-establishment procedure being initiated when operating in a dual-connectivity mode, retaining configuration information of at least one data bearer utilised in the dual-connectivity mode for subsequent re-use. In this way, rather than losing all the data radio bearer configuration during the RRC connection re-establishment procedure, some of this bearer configuration is retained so that it may be subsequently re-used, thereby improving the speed and efficiency of the RRC connection re-establishment procedure.
1. A user equipment method, comprising: in response to a radio resource control connection re-establishment procedure being initiated when operating in a dual-connectivity mode, retaining configuration information of at least one data bearer utilised in said dual-connectivity mode for subsequent re-use. 2. The method of claim 1, wherein said at least one data bearer comprises a data radio bearer of a master base station. 3. The method of claim 1, wherein said at least one data bearer comprises a split data radio bearer of said master base station. 4. The method of claim 1, wherein said configuration information comprises evolved packet system bearer identifiers for released data radio bearers. 5. The method of claim 4, comprising re-associating said evolved packet system bearer identifiers with re-established data radio bearers. 6. The method of claim 1, wherein said at least one data bearer comprises data radio bearers of a secondary base station special cell. 7. The method of claim 6, wherein said at least one data bearer comprises at least one of split data radio bearers and secondary base station cell group bearers of said secondary base station special cell. 8. The method of claim 1, comprising receiving and applying a change to said configuration information. 9. User equipment, comprising: retention logic operable, in response to a radio resource control connection re-establishment procedure being initiated when operating in a dual-connectivity mode, to retain configuration information of at least one data bearer utilised in said dual-connectivity mode for subsequent re-use. 10. A base station method, comprising in response to a radio resource control connection re-establishment procedure being initiated when operating in a dual-connectivity mode, retaining configuration information of at least one data bearer utilised in said dual-connectivity mode for subsequent re-use. 11. The method of claim 10, comprising requesting a modification to at least one data radio bearer of a secondary base station. 12. The method of claim 11, comprising receiving an indication of said modification and communicating said modification to user equipment. 13. The method of claim 11, wherein said modification comprises a release of said at least one data radio bearer. 14. A base station, comprising: retention logic operable, in response to a radio resource control connection re-establishment procedure being initiated when operating in a dual-connectivity mode, to retain configuration information of at least one data bearer utilised in said dual-connectivity mode for subsequent re-use. 15. A computer program product operable, when executed on a computer, to perform the method of claim 1. 16. A computer program product operable, when executed on a computer, to perform the method of claim 10.
A user equipment method, user equipment, a base station method, a base station and computer program products are disclosed. The user equipment method, comprises in response to a radio resource control connection re-establishment procedure being initiated when operating in a dual-connectivity mode, retaining configuration information of at least one data bearer utilised in the dual-connectivity mode for subsequent re-use. In this way, rather than losing all the data radio bearer configuration during the RRC connection re-establishment procedure, some of this bearer configuration is retained so that it may be subsequently re-used, thereby improving the speed and efficiency of the RRC connection re-establishment procedure.1. A user equipment method, comprising: in response to a radio resource control connection re-establishment procedure being initiated when operating in a dual-connectivity mode, retaining configuration information of at least one data bearer utilised in said dual-connectivity mode for subsequent re-use. 2. The method of claim 1, wherein said at least one data bearer comprises a data radio bearer of a master base station. 3. The method of claim 1, wherein said at least one data bearer comprises a split data radio bearer of said master base station. 4. The method of claim 1, wherein said configuration information comprises evolved packet system bearer identifiers for released data radio bearers. 5. The method of claim 4, comprising re-associating said evolved packet system bearer identifiers with re-established data radio bearers. 6. The method of claim 1, wherein said at least one data bearer comprises data radio bearers of a secondary base station special cell. 7. The method of claim 6, wherein said at least one data bearer comprises at least one of split data radio bearers and secondary base station cell group bearers of said secondary base station special cell. 8. The method of claim 1, comprising receiving and applying a change to said configuration information. 9. User equipment, comprising: retention logic operable, in response to a radio resource control connection re-establishment procedure being initiated when operating in a dual-connectivity mode, to retain configuration information of at least one data bearer utilised in said dual-connectivity mode for subsequent re-use. 10. A base station method, comprising in response to a radio resource control connection re-establishment procedure being initiated when operating in a dual-connectivity mode, retaining configuration information of at least one data bearer utilised in said dual-connectivity mode for subsequent re-use. 11. The method of claim 10, comprising requesting a modification to at least one data radio bearer of a secondary base station. 12. The method of claim 11, comprising receiving an indication of said modification and communicating said modification to user equipment. 13. The method of claim 11, wherein said modification comprises a release of said at least one data radio bearer. 14. A base station, comprising: retention logic operable, in response to a radio resource control connection re-establishment procedure being initiated when operating in a dual-connectivity mode, to retain configuration information of at least one data bearer utilised in said dual-connectivity mode for subsequent re-use. 15. A computer program product operable, when executed on a computer, to perform the method of claim 1. 16. A computer program product operable, when executed on a computer, to perform the method of claim 10.
2,400
9,350
9,350
15,135,500
2,483
A method is provided for encoding a digital video to provide for improved color mapping. The digital video has values in a first color space, and the method includes performing a color mapping operation on values in each sub-picture to convert the values in the first color space to values in a second, narrower, color space, wherein the color mapping operation is adapted based on the content of each sub-picture, encoding the values in the second color space into a base layer, performing a reverse color mapping operation on decoded values from the base layer in the second color space in each sub-picture to generate a reconstructed reference frame having values in the first color space, encoding values in the first color space into an enhancement layer based at least in part on the reconstructed reference frame, combining the base layer and the enhancement layer into a bitstream, sending the bitstream to a decoder, and sending one or more parameters to the decoder that describe the adaption of the reverse color mapping operation for at least some sub-pictures.
1. A method of encoding a digital video, comprising: receiving a digital video at a video encoder, said digital video comprising values in a first color space; performing a color mapping operation on values in each sub-picture at said video encoder to convert said values in said first color space to values in a second color space that is narrower than said first color space, wherein said video encoder adapts said color mapping operation based on the content of each sub-picture; encoding said values in said second color space into a base layer; decoding and performing a reverse color mapping operation on said values in said second color space in each sub-picture as decoded from said base layer to generate a reconstructed reference frame having values in said first color space; encoding said values in said first color space into an enhancement layer based at least in part on said reconstructed reference frame; combining said base layer and said enhancement layer into a bitstream; sending said bitstream to a decoder; sending one or more parameters to said decoder that describe the adaption of said reverse color mapping operation for at least some sub-pictures. 2. A method of decoding a digital video, comprising: receiving a bitstream comprising a base layer and an enhancement layer at a video decoder; receiving one or more parameters associated with at least some sub-pictures; decoding base layer values in a first color space from said base layer; performing a reverse color mapping operation on said base layer values within each sub-picture, to generate a reconstructed reference picture having values in a second color space that is wider than said first color space, wherein said video decoder adapts said reverse color mapping operation for each sub-picture based on received parameters associated with that sub-picture; and decoding enhancement layer values in said second color space from said enhancement layer using prediction based on said reconstructed reference picture. 3. The method of claim 2, further comprising predicting parameters for sub-pictures for which parameters were not received, based on received parameters associated with neighboring sub-pictures. 4. The method of claim 2, further comprising: reversing a previously performed color mapping operation performed on sub-pictures of a reference frame using a first set of parameters associated with the sub-pictures of the reference frame; re-mapping the sub-pictures of a reference frame with a color mapping operation using a second set of parameters associated with a current sub-picture; and decoding the current sub-picture with reference to the re-mapped sub-pictures of the reference frame. 5. A video encoder, comprising: a data transmission interface configured to receive a digital video comprising full resolution values; and a processor configured to: perform a downsampling operation to convert said full resolution values into downsampled values; encode said downsampled values into a base layer; decode said base layer into reconstructed downsampled values; perform an upsampling operation on said reconstructed downsampled values to generate a reconstructed full resolution reference frame for a particular coding level; encode said full resolution values into an enhancement layer based at least in part on said reconstructed full resolution reference frame; and combine said base layer and said enhancement layer into a bitstream, wherein said data transmission interface is further configured to: send said bitstream to a decoder; and send one or more parameters to said decoder that describe said upsampling operation for said particular coding level. 6. The video encoder of claim 5, wherein said upsampling operation is a color mapping operation that converts a triplet of values from a first color space to a corresponding spatial location in a second color space. 7. The video encoder of claim 5, wherein said particular coding level is a sub-picture level for encoding one or more sub-pictures within said digital video. 8. The video encoder of claim 5, wherein said particular coding level is a picture level for encoding a picture within said digital video. 9. The video encoder of claim 8, wherein said parameters are sent in a picture parameter set associated with said picture. 10. The video encoder of claim 5, wherein said particular coding level is a supra-picture level for encoding a sequence of pictures within said digital video. 11. The video encoder of claim 10, wherein said parameters are sent in a supplemental enhancement information (SEI) message associated with said sequence of pictures. 12. A video decoder, comprising: a data transmission interface configured to receive a bitstream comprising a base layer and an enhancement layer, and one or more parameters associated with an upsampling operation for a particular coding level; and a processor configured to: derive said upsampling operation for said particular coding level from said one or more parameters; decode said base layer into values at a downsampled resolution; perform said upsampling operation to generate a reconstructed reference picture at a full resolution; and decode a picture in said enhancement layer using said reconstructed reference picture. 13. The video decoder of claim 12, wherein said upsampling operation is a color mapping operation that converts a triplet of values from a first color space to a corresponding spatial location in a second color space. 14. The video decoder of claim 12, wherein said upsampling operation is a two-dimensional filter selected from a set of two-dimensional filters. 15. The video decoder of claim 12, wherein said upsampling operation is a transfer function. 16. The video decoder of claim 12, wherein said particular coding level is a sub-picture level for encoding one or more sub-pictures within said digital video. 17. The video decoder of claim 12, wherein said particular coding level is a picture level for encoding a picture within said digital video. 18. The video decoder of claim 17, wherein said parameters are sent in a picture parameter set associated with said picture. 19. The video decoder of claim 18, wherein said particular coding level is a supra-picture level for encoding a sequence of pictures within said digital video. 20. The video decoder of claim 19, wherein said parameters are sent in a supplemental enhancement information (SEI) message associated with said sequence of pictures.
A method is provided for encoding a digital video to provide for improved color mapping. The digital video has values in a first color space, and the method includes performing a color mapping operation on values in each sub-picture to convert the values in the first color space to values in a second, narrower, color space, wherein the color mapping operation is adapted based on the content of each sub-picture, encoding the values in the second color space into a base layer, performing a reverse color mapping operation on decoded values from the base layer in the second color space in each sub-picture to generate a reconstructed reference frame having values in the first color space, encoding values in the first color space into an enhancement layer based at least in part on the reconstructed reference frame, combining the base layer and the enhancement layer into a bitstream, sending the bitstream to a decoder, and sending one or more parameters to the decoder that describe the adaption of the reverse color mapping operation for at least some sub-pictures.1. A method of encoding a digital video, comprising: receiving a digital video at a video encoder, said digital video comprising values in a first color space; performing a color mapping operation on values in each sub-picture at said video encoder to convert said values in said first color space to values in a second color space that is narrower than said first color space, wherein said video encoder adapts said color mapping operation based on the content of each sub-picture; encoding said values in said second color space into a base layer; decoding and performing a reverse color mapping operation on said values in said second color space in each sub-picture as decoded from said base layer to generate a reconstructed reference frame having values in said first color space; encoding said values in said first color space into an enhancement layer based at least in part on said reconstructed reference frame; combining said base layer and said enhancement layer into a bitstream; sending said bitstream to a decoder; sending one or more parameters to said decoder that describe the adaption of said reverse color mapping operation for at least some sub-pictures. 2. A method of decoding a digital video, comprising: receiving a bitstream comprising a base layer and an enhancement layer at a video decoder; receiving one or more parameters associated with at least some sub-pictures; decoding base layer values in a first color space from said base layer; performing a reverse color mapping operation on said base layer values within each sub-picture, to generate a reconstructed reference picture having values in a second color space that is wider than said first color space, wherein said video decoder adapts said reverse color mapping operation for each sub-picture based on received parameters associated with that sub-picture; and decoding enhancement layer values in said second color space from said enhancement layer using prediction based on said reconstructed reference picture. 3. The method of claim 2, further comprising predicting parameters for sub-pictures for which parameters were not received, based on received parameters associated with neighboring sub-pictures. 4. The method of claim 2, further comprising: reversing a previously performed color mapping operation performed on sub-pictures of a reference frame using a first set of parameters associated with the sub-pictures of the reference frame; re-mapping the sub-pictures of a reference frame with a color mapping operation using a second set of parameters associated with a current sub-picture; and decoding the current sub-picture with reference to the re-mapped sub-pictures of the reference frame. 5. A video encoder, comprising: a data transmission interface configured to receive a digital video comprising full resolution values; and a processor configured to: perform a downsampling operation to convert said full resolution values into downsampled values; encode said downsampled values into a base layer; decode said base layer into reconstructed downsampled values; perform an upsampling operation on said reconstructed downsampled values to generate a reconstructed full resolution reference frame for a particular coding level; encode said full resolution values into an enhancement layer based at least in part on said reconstructed full resolution reference frame; and combine said base layer and said enhancement layer into a bitstream, wherein said data transmission interface is further configured to: send said bitstream to a decoder; and send one or more parameters to said decoder that describe said upsampling operation for said particular coding level. 6. The video encoder of claim 5, wherein said upsampling operation is a color mapping operation that converts a triplet of values from a first color space to a corresponding spatial location in a second color space. 7. The video encoder of claim 5, wherein said particular coding level is a sub-picture level for encoding one or more sub-pictures within said digital video. 8. The video encoder of claim 5, wherein said particular coding level is a picture level for encoding a picture within said digital video. 9. The video encoder of claim 8, wherein said parameters are sent in a picture parameter set associated with said picture. 10. The video encoder of claim 5, wherein said particular coding level is a supra-picture level for encoding a sequence of pictures within said digital video. 11. The video encoder of claim 10, wherein said parameters are sent in a supplemental enhancement information (SEI) message associated with said sequence of pictures. 12. A video decoder, comprising: a data transmission interface configured to receive a bitstream comprising a base layer and an enhancement layer, and one or more parameters associated with an upsampling operation for a particular coding level; and a processor configured to: derive said upsampling operation for said particular coding level from said one or more parameters; decode said base layer into values at a downsampled resolution; perform said upsampling operation to generate a reconstructed reference picture at a full resolution; and decode a picture in said enhancement layer using said reconstructed reference picture. 13. The video decoder of claim 12, wherein said upsampling operation is a color mapping operation that converts a triplet of values from a first color space to a corresponding spatial location in a second color space. 14. The video decoder of claim 12, wherein said upsampling operation is a two-dimensional filter selected from a set of two-dimensional filters. 15. The video decoder of claim 12, wherein said upsampling operation is a transfer function. 16. The video decoder of claim 12, wherein said particular coding level is a sub-picture level for encoding one or more sub-pictures within said digital video. 17. The video decoder of claim 12, wherein said particular coding level is a picture level for encoding a picture within said digital video. 18. The video decoder of claim 17, wherein said parameters are sent in a picture parameter set associated with said picture. 19. The video decoder of claim 18, wherein said particular coding level is a supra-picture level for encoding a sequence of pictures within said digital video. 20. The video decoder of claim 19, wherein said parameters are sent in a supplemental enhancement information (SEI) message associated with said sequence of pictures.
2,400
9,351
9,351
14,982,616
2,448
A device may receive information associated with media content that is capable of being provided by a first content delivery network and a second content delivery network. The first content delivery network may include a first host device and a second host device. The device may determine scores associated with the first content delivery network and the second content delivery network. The device may provide, based on the scores, information regarding the first content delivery to a user device to cause the user device to request the media content from the first content delivery network. The device may determine scores associated with the first host device and the second host device. The device may provide information regarding the first host device to a network device to cause the network device to route requests for the media content to the first host device.
1. A device, comprising: one or more processors to: receive information associated with media content, a first content delivery network and a second content delivery network being capable of providing the media content, the first content delivery network including a first host device and a second host device; determine a first score associated with the first content delivery network; determine a second score associated with the second content delivery network; provide, based on the first score and the second score, information regarding the first content delivery network to a user device to cause the user device to request the media content from the first content delivery network; determine a third score associated with the first host device; determine a fourth score associated with the second host device; and provide, based on the third score and the fourth score, information regarding the first host device to a network device to cause the network device to route requests for the media content to the first host device. 2. The device of claim 1, where the one or more processors, when receiving information associated with the media content, are to: receive one or more performance metrics associated with the first content delivery network and the second content delivery network, the one or more performance metrics including at least one of: a latency value, a jitter value, or a bandwidth value; where the one or more processors, when determining the first score, are to: determine the first score based on at least one performance metric, of the one or more performance metrics, associated with the first content delivery network; and where the one or more processors, when determining the second score, are to: determine the second score based on at least one performance metric, of the one or more performance metrics, associated with the second content delivery network. 3. The device of claim 1, where the one or more processors, when determining the first score, are to: determine that the first score satisfies a threshold; and where the one or more processors, when providing the information regarding the first content delivery network to the user device, are to: provide the information regarding the first content delivery network based on determining that the first score satisfies the threshold. 4. The device of claim 1, where the one or more processors are further to: compare the first score and the second score; and where the one or more processors, when providing the information regarding the first content delivery network to the user device, are to: provide the information regarding the first content delivery network based on comparing the first score and the second score. 5. The device of claim 1, where the media content is associated with a geographic location: the geographic location including at least one of: a location of a base station, a location of a cell, a location of a city, or a region. 6. The device of claim 1, where the one or more processors are further to: determine that the third score satisfies a threshold; and where the one or more processors, when providing the information regarding the first host device to the network device, are to: provide the information regarding the first host device based on determining that the third score satisfies the threshold. 7. The device of claim 1, where the one or more processors are further to: compare the third score and the fourth score; and where the one or more processors, when providing the information regarding the first host device to the network device, are to: provide the information regarding the first host device based on comparing the third score and the fourth score. 8. A non-transitory computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors of a device, cause the one or more processors to: receive information associated with media content, a first content delivery network and a second content delivery network being capable of providing the media content, the information including one or more first performance metrics associated with the first content delivery network and one or more second performance metrics associated with the second content delivery network; determine a first score associated with the first content delivery network based on the one or more first performance metrics associated with the first content delivery network; determine a second score associated with the second content delivery network based on the one or more second performance metrics associated with the second content delivery network; and provide, based on the first score and the second score, information regarding the first content delivery network to a user device to cause the user device to request the media content from the first content delivery network. 9. The non-transitory computer-readable medium of claim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: receive information associated with a first host device and a second host device, the first content delivery network including the first host device and the second host device, the first host device and the second host device being capable of providing the media content; determine a third score associated with the first host device; determine a fourth score associated with the second host device; compare the third score and the fourth score; and provide information regarding the first host device to a network device to cause the network device to route a request for the media content to the first host device based on comparing the third score and the fourth score. 10. The non-transitory computer-readable medium of claim 8, where the user device being located in a geographic location; and where the one or more instructions, that cause the one or more processors to provide the information regarding the first content delivery network to the user device, cause the one or more processors to: provide the information regarding the first content delivery network to the user device based on the user device being located in the geographic location. 11. The non-transitory computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to determine the first score, cause the one or more processors to: determine that the first score satisfies a threshold; and where the one or more instructions, that cause the one or more processors to provide the information regarding the first content delivery network to the user device, cause the one or more processors to: provide the information regarding the first content delivery network to the user device based on determining that the first score satisfies the threshold. 12. The non-transitory computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to determine the second score, cause the one or more processors to: determine that the second score satisfies a threshold; and where the one or more instructions, that cause the one or more processors to provide the information regarding the first content delivery network to the user device, cause the one or more processors to: provide the information regarding the first content delivery network to the user device based on determining that the second score satisfies the threshold. 13. The non-transitory computer-readable medium of claim 8, where the one or more first performance metrics or the one or more second performance metrics include at least one of: a latency value, a jitter value, a packet loss value, a bit error rate value, a bandwidth value, or a throughput value. 14. The non-transitory computer-readable medium of claim 8, where the media content is associated with streaming media traffic. 15. A method, comprising: receiving, by a device, information associated with media content, a first host device and a second host device being capable of providing the media content, the first host device and the second host device being included in a content delivery network, the information including one or more first performance metrics associated with the first host device and one or more second performance metrics associated with the second host device; determining, by the device, a first score associated with the first host device based on the one or more first performance metrics; determining, by the device, a second score associated with the second host device based on the one or more second performance metrics; and providing, by the device, information regarding the first host device to another device to cause the other device to route a request for the media content to the first host device. 16. The method of claim 15, where the content delivery network is a first content delivery network; the method further comprising: determining a third score associated with a second content delivery network, the second content delivery network being capable of providing the media content; determining that the third score associated with the second content delivery network satisfies a threshold; and providing information regarding the second content delivery network to a user device to cause the user device to request the media content from the second content delivery network based on determining that the third score satisfies the threshold. 17. The method of claim 15, where the media content is associated with streaming media traffic. 18. The method of claim 15, further comprising: comparing the first score and the second score; and where providing the information regarding the first host device to the other device comprises: providing the information regarding the first host device based on comparing the first score and the second score. 19. The method of claim 15, where the one or more first performance metrics or the one or more second performance metrics include at least one of: a latency value, a jitter value, a packet loss value, a bit error rate value, a bandwidth value, or a throughput value. 20. The method of claim 15, where the information associated with media content does not include information associated with delivering the media content from a base station to a user device.
A device may receive information associated with media content that is capable of being provided by a first content delivery network and a second content delivery network. The first content delivery network may include a first host device and a second host device. The device may determine scores associated with the first content delivery network and the second content delivery network. The device may provide, based on the scores, information regarding the first content delivery to a user device to cause the user device to request the media content from the first content delivery network. The device may determine scores associated with the first host device and the second host device. The device may provide information regarding the first host device to a network device to cause the network device to route requests for the media content to the first host device.1. A device, comprising: one or more processors to: receive information associated with media content, a first content delivery network and a second content delivery network being capable of providing the media content, the first content delivery network including a first host device and a second host device; determine a first score associated with the first content delivery network; determine a second score associated with the second content delivery network; provide, based on the first score and the second score, information regarding the first content delivery network to a user device to cause the user device to request the media content from the first content delivery network; determine a third score associated with the first host device; determine a fourth score associated with the second host device; and provide, based on the third score and the fourth score, information regarding the first host device to a network device to cause the network device to route requests for the media content to the first host device. 2. The device of claim 1, where the one or more processors, when receiving information associated with the media content, are to: receive one or more performance metrics associated with the first content delivery network and the second content delivery network, the one or more performance metrics including at least one of: a latency value, a jitter value, or a bandwidth value; where the one or more processors, when determining the first score, are to: determine the first score based on at least one performance metric, of the one or more performance metrics, associated with the first content delivery network; and where the one or more processors, when determining the second score, are to: determine the second score based on at least one performance metric, of the one or more performance metrics, associated with the second content delivery network. 3. The device of claim 1, where the one or more processors, when determining the first score, are to: determine that the first score satisfies a threshold; and where the one or more processors, when providing the information regarding the first content delivery network to the user device, are to: provide the information regarding the first content delivery network based on determining that the first score satisfies the threshold. 4. The device of claim 1, where the one or more processors are further to: compare the first score and the second score; and where the one or more processors, when providing the information regarding the first content delivery network to the user device, are to: provide the information regarding the first content delivery network based on comparing the first score and the second score. 5. The device of claim 1, where the media content is associated with a geographic location: the geographic location including at least one of: a location of a base station, a location of a cell, a location of a city, or a region. 6. The device of claim 1, where the one or more processors are further to: determine that the third score satisfies a threshold; and where the one or more processors, when providing the information regarding the first host device to the network device, are to: provide the information regarding the first host device based on determining that the third score satisfies the threshold. 7. The device of claim 1, where the one or more processors are further to: compare the third score and the fourth score; and where the one or more processors, when providing the information regarding the first host device to the network device, are to: provide the information regarding the first host device based on comparing the third score and the fourth score. 8. A non-transitory computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors of a device, cause the one or more processors to: receive information associated with media content, a first content delivery network and a second content delivery network being capable of providing the media content, the information including one or more first performance metrics associated with the first content delivery network and one or more second performance metrics associated with the second content delivery network; determine a first score associated with the first content delivery network based on the one or more first performance metrics associated with the first content delivery network; determine a second score associated with the second content delivery network based on the one or more second performance metrics associated with the second content delivery network; and provide, based on the first score and the second score, information regarding the first content delivery network to a user device to cause the user device to request the media content from the first content delivery network. 9. The non-transitory computer-readable medium of claim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: receive information associated with a first host device and a second host device, the first content delivery network including the first host device and the second host device, the first host device and the second host device being capable of providing the media content; determine a third score associated with the first host device; determine a fourth score associated with the second host device; compare the third score and the fourth score; and provide information regarding the first host device to a network device to cause the network device to route a request for the media content to the first host device based on comparing the third score and the fourth score. 10. The non-transitory computer-readable medium of claim 8, where the user device being located in a geographic location; and where the one or more instructions, that cause the one or more processors to provide the information regarding the first content delivery network to the user device, cause the one or more processors to: provide the information regarding the first content delivery network to the user device based on the user device being located in the geographic location. 11. The non-transitory computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to determine the first score, cause the one or more processors to: determine that the first score satisfies a threshold; and where the one or more instructions, that cause the one or more processors to provide the information regarding the first content delivery network to the user device, cause the one or more processors to: provide the information regarding the first content delivery network to the user device based on determining that the first score satisfies the threshold. 12. The non-transitory computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to determine the second score, cause the one or more processors to: determine that the second score satisfies a threshold; and where the one or more instructions, that cause the one or more processors to provide the information regarding the first content delivery network to the user device, cause the one or more processors to: provide the information regarding the first content delivery network to the user device based on determining that the second score satisfies the threshold. 13. The non-transitory computer-readable medium of claim 8, where the one or more first performance metrics or the one or more second performance metrics include at least one of: a latency value, a jitter value, a packet loss value, a bit error rate value, a bandwidth value, or a throughput value. 14. The non-transitory computer-readable medium of claim 8, where the media content is associated with streaming media traffic. 15. A method, comprising: receiving, by a device, information associated with media content, a first host device and a second host device being capable of providing the media content, the first host device and the second host device being included in a content delivery network, the information including one or more first performance metrics associated with the first host device and one or more second performance metrics associated with the second host device; determining, by the device, a first score associated with the first host device based on the one or more first performance metrics; determining, by the device, a second score associated with the second host device based on the one or more second performance metrics; and providing, by the device, information regarding the first host device to another device to cause the other device to route a request for the media content to the first host device. 16. The method of claim 15, where the content delivery network is a first content delivery network; the method further comprising: determining a third score associated with a second content delivery network, the second content delivery network being capable of providing the media content; determining that the third score associated with the second content delivery network satisfies a threshold; and providing information regarding the second content delivery network to a user device to cause the user device to request the media content from the second content delivery network based on determining that the third score satisfies the threshold. 17. The method of claim 15, where the media content is associated with streaming media traffic. 18. The method of claim 15, further comprising: comparing the first score and the second score; and where providing the information regarding the first host device to the other device comprises: providing the information regarding the first host device based on comparing the first score and the second score. 19. The method of claim 15, where the one or more first performance metrics or the one or more second performance metrics include at least one of: a latency value, a jitter value, a packet loss value, a bit error rate value, a bandwidth value, or a throughput value. 20. The method of claim 15, where the information associated with media content does not include information associated with delivering the media content from a base station to a user device.
2,400
9,352
9,352
15,803,444
2,443
A system for managing messaging conversations that can be simultaneous and can be maintained across various different autonomous processing systems is described. In one embodiment, the system (operated by or on behalf of a first organization) can include a messaging manager and a first autonomous processing system (first APS) and a second APS. The system can receive a first message and a second message, both directed to the first organization, and the messaging manager can select the first APS to respond to the first message and route the first message to the first APS which can transmit a response to the first message. The messaging manager can select the second APS to respond to the second message and route the second message to the second APS. The messages can be managed asynchronously without a persistent connection during the one or more conversations.
1. A non-transitory machine readable media storing executable program instructions which when executed by one or more data processing systems cause the one or more data processing systems to perform a method comprising: receiving a first message directed to a first organization; selecting a first autonomous processing system to respond to the first message; routing the first message to the first autonomous processing system; transmitting a response, from the first autonomous processing system, to the first message; receiving a second message directed to the first organization; selecting a second autonomous processing system to respond to the second message; routing the second message to the second autonomous processing system; and transmitting a response, from the second autonomous processing system, to the second message. 2. The media as in claim 1 wherein the selecting is performed by a messaging manager that manages communication of messages without a persistent connection during conversations that include the messages, and wherein the first autonomous processing system is configured to respond to messages of a first type and the second autonomous processing system is configured to respond to messages of a second type, and wherein the first autonomous processing system is configured to update first metadata for a first conversation of the first type and the second autonomous processing system is configured to update second metadata for a second conversation of the second type, and wherein the messaging manager is configured to store the updated first metadata after the response to the first message has been transmitted and is configured to store the updated second metadata after the response to the second message has been transmitted, and wherein the first type is for a customer interaction of a first intent or purpose and the second type is for a customer interaction of a second intent or purpose. 3. The media as in claim 2 wherein the messaging manager creates new metadata for a new conversation in response to determining one of the first message or the second message is an initial message in a new conversation. 4. The media as in claim 2 wherein the selecting by the messaging manager of the first autonomous processing system is based on the first metadata that is associated with the first message and the selecting by the messaging manager of the second autonomous processing system is based on the second metadata that is associated with the second message. 5. The media as in claim 4 wherein the first autonomous processing system is configured for generating responses by a first business unit within the first organization and the second autonomous processing system is configured for generating responses by a second business unit within the first organization. 6. The media as in claim 4 wherein the first message is received through a first messaging platform and the second message is received through a second messaging platform and wherein the first messaging platform and the second messaging platform are different and are one of: text (SMS) messaging; or iMessage; or web chat; or chat within an application; or email; or voice; or Twitter; or WeChat; or Facebook Messenger; or Snapchat; or voice messaging; or video messaging. 7. The media as in claim 1 wherein the first message is received through a first messaging platform from a first customer and the second message is received through a second messaging platform from the first customer, the first message and the second message being part of the same conversation and the second message represents a cross-channel message. 8. The media as in claim 2 wherein the first message is received through a first messaging platform from a first customer engaged in the first conversation of the first intent and the second message is received through a second messaging platform from a second customer engaged in the second conversation of the second intent. 9. The media as in claim 1 wherein the routing is dependent on session state and data specifying customer intent, and wherein all routing is specified by the session state and data specifying customer intent for each message and the routing is performed without a persistent communication channel during a conversation. 10. The media as in claim 1 wherein the first autonomous processing system receives a third message routed to the first autonomous system and determines the third message cannot be processed by the first autonomous processing system and then forwards the third message to at least one of another autonomous processing system or a messaging manager or a human customer service assistant. 11. The media as in claim 10 wherein the first message and the third message are part of a single conversation that is maintained across either (1) the first autonomous processing system and the another autonomous processing system if the third message is forwarded to the another autonomous processing system or (2) the first autonomous processing system and the human customer service assistant if the third message is forwarded to the human customer service assistant. 12. The media as in claim 1 wherein the first message is from a first customer that is identified, within the first organization, by a first customer identifier, and the first customer identifier is associated with one or more of: (1) one or more social media handles, or (2) one or more email addresses, or (3) one or more phone numbers, and wherein the association allows the first organization to determine the first customer identifier from the first message. 13. The media as in claim 2 wherein the first autonomous processing system does not retain the updated first metadata after the response to the first message is transmitted, and the second autonomous processing system does not retain the updated second metadata after the response to the second message is transmitted. 14. The media as in claim 1 wherein the method further comprises: storing time data for each message in a conversation; comparing the time data to one or more conversation timeout values; changing a state of the conversation if the time data indicates a time between consecutive messages in the conversation exceeds the one or more conversation timeout values. 15. The media as in claim 14 wherein the state of the conversation is changed to a new conversation state and wherein metadata for the conversation is saved to allow a new conversation to resume using a state indicated by the metadata. 16. The media as in claim 15 wherein the metadata includes one or more of: (1) identifier of one or more human assistants involved in the conversation before the state was changed; or (2) identifier of one or more possible purchases of products or services involved in the conversation before the state was changed. 17. The media as in claim 14 wherein a first timeout value for a first conversation of a first intent differs from a second timeout value for a second conversation of a second intent, and wherein a third timeout value for a third conversation conducted over a first messaging platform differs from a fourth timeout value for a fourth conversation conducted over a second messaging platform. 18. The media as in claim 1 wherein each message in a conversation has a unique sequence number within the conversation to identify a sequence in time of receipt of the messages and wherein the conversation is associated with a conversation identifier that identifies the conversation from the start of the conversation to the end of the conversation. 19. The media as in claim 2 wherein the messaging manager stores session data that includes the first metadata before the response to the first message is transmitted and includes the updated first metadata after the response to the first message is transmitted and wherein at least a portion of the session data is provided to the first autonomous processing system prior to transmitting the response to the first message, and wherein the session data includes one or more of: (1) session state; (2) identifier of human assistant in most recent response; (3) time data for the last message and indicator of sender of most recent message; (4) conversation identifier; (5) intent of a conversation; (6) metadata from the first autonomous processing system; (7) message sequence numbers; (8) customer identifier; or (9) customer location. 20. A set of one or more data processing systems for managing conversations, the set comprising: a set of message adaptors, each configured to receive and send messages on a particular messaging platform; a messaging manager coupled to the set of message adaptors and coupled to a message repository; a first autonomous processing system (first APS) configured to process and respond to messages of a first type, the first autonomous processing system coupled to the messaging manager and coupled to the set of message adaptors; a second autonomous processing system (second APS) configured to process and respond to messages of a second type, the second autonomous processing system coupled to the messaging manager and coupled to the set of message adaptors; wherein the messaging manager is configured to select the first APS to respond to the first message based on metadata associated with the first message, which metadata indicates the first message is of the first type; and wherein the messaging manager is configured to select the second APS to respond to the second message based on metadata associated with the second message, the metadata associated with the second message indicating that the second message is of the first type; and wherein the messaging manager identifies conversations based on a customer identifier that is associated with one or more of: (1) one or more social media handles of a customer; or (2) one or more email addresses of the customer; or (3) one or more phone numbers of the customer.
A system for managing messaging conversations that can be simultaneous and can be maintained across various different autonomous processing systems is described. In one embodiment, the system (operated by or on behalf of a first organization) can include a messaging manager and a first autonomous processing system (first APS) and a second APS. The system can receive a first message and a second message, both directed to the first organization, and the messaging manager can select the first APS to respond to the first message and route the first message to the first APS which can transmit a response to the first message. The messaging manager can select the second APS to respond to the second message and route the second message to the second APS. The messages can be managed asynchronously without a persistent connection during the one or more conversations.1. A non-transitory machine readable media storing executable program instructions which when executed by one or more data processing systems cause the one or more data processing systems to perform a method comprising: receiving a first message directed to a first organization; selecting a first autonomous processing system to respond to the first message; routing the first message to the first autonomous processing system; transmitting a response, from the first autonomous processing system, to the first message; receiving a second message directed to the first organization; selecting a second autonomous processing system to respond to the second message; routing the second message to the second autonomous processing system; and transmitting a response, from the second autonomous processing system, to the second message. 2. The media as in claim 1 wherein the selecting is performed by a messaging manager that manages communication of messages without a persistent connection during conversations that include the messages, and wherein the first autonomous processing system is configured to respond to messages of a first type and the second autonomous processing system is configured to respond to messages of a second type, and wherein the first autonomous processing system is configured to update first metadata for a first conversation of the first type and the second autonomous processing system is configured to update second metadata for a second conversation of the second type, and wherein the messaging manager is configured to store the updated first metadata after the response to the first message has been transmitted and is configured to store the updated second metadata after the response to the second message has been transmitted, and wherein the first type is for a customer interaction of a first intent or purpose and the second type is for a customer interaction of a second intent or purpose. 3. The media as in claim 2 wherein the messaging manager creates new metadata for a new conversation in response to determining one of the first message or the second message is an initial message in a new conversation. 4. The media as in claim 2 wherein the selecting by the messaging manager of the first autonomous processing system is based on the first metadata that is associated with the first message and the selecting by the messaging manager of the second autonomous processing system is based on the second metadata that is associated with the second message. 5. The media as in claim 4 wherein the first autonomous processing system is configured for generating responses by a first business unit within the first organization and the second autonomous processing system is configured for generating responses by a second business unit within the first organization. 6. The media as in claim 4 wherein the first message is received through a first messaging platform and the second message is received through a second messaging platform and wherein the first messaging platform and the second messaging platform are different and are one of: text (SMS) messaging; or iMessage; or web chat; or chat within an application; or email; or voice; or Twitter; or WeChat; or Facebook Messenger; or Snapchat; or voice messaging; or video messaging. 7. The media as in claim 1 wherein the first message is received through a first messaging platform from a first customer and the second message is received through a second messaging platform from the first customer, the first message and the second message being part of the same conversation and the second message represents a cross-channel message. 8. The media as in claim 2 wherein the first message is received through a first messaging platform from a first customer engaged in the first conversation of the first intent and the second message is received through a second messaging platform from a second customer engaged in the second conversation of the second intent. 9. The media as in claim 1 wherein the routing is dependent on session state and data specifying customer intent, and wherein all routing is specified by the session state and data specifying customer intent for each message and the routing is performed without a persistent communication channel during a conversation. 10. The media as in claim 1 wherein the first autonomous processing system receives a third message routed to the first autonomous system and determines the third message cannot be processed by the first autonomous processing system and then forwards the third message to at least one of another autonomous processing system or a messaging manager or a human customer service assistant. 11. The media as in claim 10 wherein the first message and the third message are part of a single conversation that is maintained across either (1) the first autonomous processing system and the another autonomous processing system if the third message is forwarded to the another autonomous processing system or (2) the first autonomous processing system and the human customer service assistant if the third message is forwarded to the human customer service assistant. 12. The media as in claim 1 wherein the first message is from a first customer that is identified, within the first organization, by a first customer identifier, and the first customer identifier is associated with one or more of: (1) one or more social media handles, or (2) one or more email addresses, or (3) one or more phone numbers, and wherein the association allows the first organization to determine the first customer identifier from the first message. 13. The media as in claim 2 wherein the first autonomous processing system does not retain the updated first metadata after the response to the first message is transmitted, and the second autonomous processing system does not retain the updated second metadata after the response to the second message is transmitted. 14. The media as in claim 1 wherein the method further comprises: storing time data for each message in a conversation; comparing the time data to one or more conversation timeout values; changing a state of the conversation if the time data indicates a time between consecutive messages in the conversation exceeds the one or more conversation timeout values. 15. The media as in claim 14 wherein the state of the conversation is changed to a new conversation state and wherein metadata for the conversation is saved to allow a new conversation to resume using a state indicated by the metadata. 16. The media as in claim 15 wherein the metadata includes one or more of: (1) identifier of one or more human assistants involved in the conversation before the state was changed; or (2) identifier of one or more possible purchases of products or services involved in the conversation before the state was changed. 17. The media as in claim 14 wherein a first timeout value for a first conversation of a first intent differs from a second timeout value for a second conversation of a second intent, and wherein a third timeout value for a third conversation conducted over a first messaging platform differs from a fourth timeout value for a fourth conversation conducted over a second messaging platform. 18. The media as in claim 1 wherein each message in a conversation has a unique sequence number within the conversation to identify a sequence in time of receipt of the messages and wherein the conversation is associated with a conversation identifier that identifies the conversation from the start of the conversation to the end of the conversation. 19. The media as in claim 2 wherein the messaging manager stores session data that includes the first metadata before the response to the first message is transmitted and includes the updated first metadata after the response to the first message is transmitted and wherein at least a portion of the session data is provided to the first autonomous processing system prior to transmitting the response to the first message, and wherein the session data includes one or more of: (1) session state; (2) identifier of human assistant in most recent response; (3) time data for the last message and indicator of sender of most recent message; (4) conversation identifier; (5) intent of a conversation; (6) metadata from the first autonomous processing system; (7) message sequence numbers; (8) customer identifier; or (9) customer location. 20. A set of one or more data processing systems for managing conversations, the set comprising: a set of message adaptors, each configured to receive and send messages on a particular messaging platform; a messaging manager coupled to the set of message adaptors and coupled to a message repository; a first autonomous processing system (first APS) configured to process and respond to messages of a first type, the first autonomous processing system coupled to the messaging manager and coupled to the set of message adaptors; a second autonomous processing system (second APS) configured to process and respond to messages of a second type, the second autonomous processing system coupled to the messaging manager and coupled to the set of message adaptors; wherein the messaging manager is configured to select the first APS to respond to the first message based on metadata associated with the first message, which metadata indicates the first message is of the first type; and wherein the messaging manager is configured to select the second APS to respond to the second message based on metadata associated with the second message, the metadata associated with the second message indicating that the second message is of the first type; and wherein the messaging manager identifies conversations based on a customer identifier that is associated with one or more of: (1) one or more social media handles of a customer; or (2) one or more email addresses of the customer; or (3) one or more phone numbers of the customer.
2,400
9,353
9,353
16,008,422
2,443
Systems, methods, and apparatuses are described for simulating a network. Interrogations directed to hosts in the simulated network may be received. For some interrogations, data objects may be instantiated to simulate the interrogated hosts by, e.g., providing responses to low-level network commands. One or more characteristics of a simulated host may be determined randomly or pseudo-randomly.
1. A method comprising: receiving, by a computer system, first interrogations directed to first host addresses in a simulated network; determining that the first host addresses correspond to first possible background hosts; instantiating, in response to the first interrogations, data objects corresponding to the first possible background hosts; generating, by the instantiated data objects, responses to the first interrogations; and forwarding, to users from which the first interrogations were received, the responses to the first interrogations. 2. The method of claim 1, further comprising: receiving second interrogations directed to second host addresses in the simulated network; determining that the second host addresses correspond to second possible background hosts; determining that the second possible background hosts are outside a permitted background host volume threshold; and determining, based on the determination that the second possible background hosts are outside the permitted background host volume threshold, that data objects corresponding to the second possible background hosts should not be instantiated. 3. The method of claim 2, wherein the determining that the second possible background hosts are outside the permitted background host volume threshold comprises: generating, for each of the second host addresses, a hash of the second host address; comparing the generated hashes to a sorted listing of hashes corresponding to a listing of host addresses comprising the first host addresses and the second host addresses; and determining that each of the generated hashes is outside of a predetermined range defined in the sorted listing of hashes. 4. The method of claim 1, wherein instantiating the data objects corresponding to the first possible background hosts comprises, for each of the first possible background hosts, pseudo-randomly generating a host name. 5. The method of claim 1, wherein instantiating the data objects corresponding to the first possible background hosts comprises, for each of the first possible background hosts, pseudo-randomly selecting one or more services supported by the first possible background host. 6. The method of claim 1, wherein instantiating the data objects corresponding to the first possible background hosts comprises, for each of the first possible background hosts, pseudo-randomly selecting one or more ports supported by the first possible background host. 7. The method of claim 1, further comprising: storing, in one or more memories of the computer system, configuration data corresponding to primary hosts in the simulated network; receiving third interrogations directed to third host addresses in the simulated network; determining that the third host addresses correspond to primary hosts; and forwarding, to the primary hosts, the third interrogations. 8. The method of claim 7, further comprising rewriting, based on the configuration data, source and destination addresses of the third interrogations. 9. The method of claim 7, further comprising rewriting, based on the configuration data, source and destination addresses of responses to the third interrogations. 10. The method of claim 1, further comprising inducing simulated performance degradation of the simulated network. 11. The method of claim 10, wherein the simulated performance degradation comprises one or more of simulated received packet loss, simulated transmitted packet loss, simulated reception latency, simulated transmission latency, simulated reception bandwidth reduction, simulated transmission bandwidth reduction, or loss of connectivity to portions of the simulated network. 12. A method comprising: receiving, by a computer system, interrogations directed to host addresses in a simulated network; generating, for each of the host addresses, a hash of the host address; comparing the generated hashes to a sorted listing of hashes corresponding to a listing of possible host addresses; determining that each of the generated hashes is outside of a predetermined range defined in the sorted listing of hashes; and determining, based on each of the generated hashes being outside of the predetermined range, that data objects should not be instantiated for hosts corresponding to the host addresses. 13. The method of claim 12, further comprising: receiving second interrogations directed to second host addresses in the simulated network; generating, for each of the second host addresses, a hash of the second host address; comparing the generated hashes of the second host addresses to the sorted listing of hashes corresponding to the listing of possible host addresses; determining that each of the generated hashes of the second host addresses is inside of the predetermined range; instantiating, based on each of the generated hashes of the second host addresses being inside of the predetermined range, data objects corresponding to simulated hosts associated with the second host addresses; generating, by the instantiated data objects, responses to the second interrogations; and forwarding, to users from which the second interrogations were received, the responses to the second interrogations. 14. The method of claim 12, wherein instantiating the data objects comprises, for each of the simulated hosts, pseudo-randomly generating a host name. 15. The method of claim 12, wherein instantiating the data objects comprises, for each of the simulated hosts, pseudo-randomly selecting one or more services supported by the simulated host. 16. The method of claim 12, wherein instantiating the data objects comprises, for each of the simulated hosts, pseudo-randomly selecting one or more ports supported by the simulated host. 17. The method of claim 12, further comprising inducing simulated performance degradation of the simulated network. 18. The method of claim 17, wherein the simulated performance degradation comprises one or more of simulated received packet loss, simulated transmitted packet loss, simulated reception latency, simulated transmission latency, simulated reception bandwidth reduction, simulated transmission bandwidth reduction, or loss of connectivity to portions of the simulated network. 19. The method of claim 12, further comprising: storing, in one or more memories of the computer system, configuration data corresponding to primary hosts in the simulated network; receiving third interrogations directed to third host addresses in the simulated network; determining that the third host addresses correspond to primary hosts; and forwarding, to the primary hosts, the third interrogations. 20. The method of claim 19, further comprising: rewriting, based on the configuration data, source and destination addresses of the third interrogations; and rewriting, based on the configuration data, source and destination addresses of responses to the third interrogations.
Systems, methods, and apparatuses are described for simulating a network. Interrogations directed to hosts in the simulated network may be received. For some interrogations, data objects may be instantiated to simulate the interrogated hosts by, e.g., providing responses to low-level network commands. One or more characteristics of a simulated host may be determined randomly or pseudo-randomly.1. A method comprising: receiving, by a computer system, first interrogations directed to first host addresses in a simulated network; determining that the first host addresses correspond to first possible background hosts; instantiating, in response to the first interrogations, data objects corresponding to the first possible background hosts; generating, by the instantiated data objects, responses to the first interrogations; and forwarding, to users from which the first interrogations were received, the responses to the first interrogations. 2. The method of claim 1, further comprising: receiving second interrogations directed to second host addresses in the simulated network; determining that the second host addresses correspond to second possible background hosts; determining that the second possible background hosts are outside a permitted background host volume threshold; and determining, based on the determination that the second possible background hosts are outside the permitted background host volume threshold, that data objects corresponding to the second possible background hosts should not be instantiated. 3. The method of claim 2, wherein the determining that the second possible background hosts are outside the permitted background host volume threshold comprises: generating, for each of the second host addresses, a hash of the second host address; comparing the generated hashes to a sorted listing of hashes corresponding to a listing of host addresses comprising the first host addresses and the second host addresses; and determining that each of the generated hashes is outside of a predetermined range defined in the sorted listing of hashes. 4. The method of claim 1, wherein instantiating the data objects corresponding to the first possible background hosts comprises, for each of the first possible background hosts, pseudo-randomly generating a host name. 5. The method of claim 1, wherein instantiating the data objects corresponding to the first possible background hosts comprises, for each of the first possible background hosts, pseudo-randomly selecting one or more services supported by the first possible background host. 6. The method of claim 1, wherein instantiating the data objects corresponding to the first possible background hosts comprises, for each of the first possible background hosts, pseudo-randomly selecting one or more ports supported by the first possible background host. 7. The method of claim 1, further comprising: storing, in one or more memories of the computer system, configuration data corresponding to primary hosts in the simulated network; receiving third interrogations directed to third host addresses in the simulated network; determining that the third host addresses correspond to primary hosts; and forwarding, to the primary hosts, the third interrogations. 8. The method of claim 7, further comprising rewriting, based on the configuration data, source and destination addresses of the third interrogations. 9. The method of claim 7, further comprising rewriting, based on the configuration data, source and destination addresses of responses to the third interrogations. 10. The method of claim 1, further comprising inducing simulated performance degradation of the simulated network. 11. The method of claim 10, wherein the simulated performance degradation comprises one or more of simulated received packet loss, simulated transmitted packet loss, simulated reception latency, simulated transmission latency, simulated reception bandwidth reduction, simulated transmission bandwidth reduction, or loss of connectivity to portions of the simulated network. 12. A method comprising: receiving, by a computer system, interrogations directed to host addresses in a simulated network; generating, for each of the host addresses, a hash of the host address; comparing the generated hashes to a sorted listing of hashes corresponding to a listing of possible host addresses; determining that each of the generated hashes is outside of a predetermined range defined in the sorted listing of hashes; and determining, based on each of the generated hashes being outside of the predetermined range, that data objects should not be instantiated for hosts corresponding to the host addresses. 13. The method of claim 12, further comprising: receiving second interrogations directed to second host addresses in the simulated network; generating, for each of the second host addresses, a hash of the second host address; comparing the generated hashes of the second host addresses to the sorted listing of hashes corresponding to the listing of possible host addresses; determining that each of the generated hashes of the second host addresses is inside of the predetermined range; instantiating, based on each of the generated hashes of the second host addresses being inside of the predetermined range, data objects corresponding to simulated hosts associated with the second host addresses; generating, by the instantiated data objects, responses to the second interrogations; and forwarding, to users from which the second interrogations were received, the responses to the second interrogations. 14. The method of claim 12, wherein instantiating the data objects comprises, for each of the simulated hosts, pseudo-randomly generating a host name. 15. The method of claim 12, wherein instantiating the data objects comprises, for each of the simulated hosts, pseudo-randomly selecting one or more services supported by the simulated host. 16. The method of claim 12, wherein instantiating the data objects comprises, for each of the simulated hosts, pseudo-randomly selecting one or more ports supported by the simulated host. 17. The method of claim 12, further comprising inducing simulated performance degradation of the simulated network. 18. The method of claim 17, wherein the simulated performance degradation comprises one or more of simulated received packet loss, simulated transmitted packet loss, simulated reception latency, simulated transmission latency, simulated reception bandwidth reduction, simulated transmission bandwidth reduction, or loss of connectivity to portions of the simulated network. 19. The method of claim 12, further comprising: storing, in one or more memories of the computer system, configuration data corresponding to primary hosts in the simulated network; receiving third interrogations directed to third host addresses in the simulated network; determining that the third host addresses correspond to primary hosts; and forwarding, to the primary hosts, the third interrogations. 20. The method of claim 19, further comprising: rewriting, based on the configuration data, source and destination addresses of the third interrogations; and rewriting, based on the configuration data, source and destination addresses of responses to the third interrogations.
2,400
9,354
9,354
15,745,487
2,477
A method of determining a mode of operation for a wireless terminal comprises determining a parameter indicating Hybrid Automatic Repeat Request, HARQ, re-transmissions in communications with the wireless terminal. The method further comprises determining a full duplex or half duplex mode of operation based on the parameter of HARQ re-transmissions.
1. A method of determining a mode of operation for a wireless terminal, determining a parameter indicating Hybrid Automatic Repeat Request, HARQ, re-transmissions in communications with the wireless terminal, and determining a full duplex or half duplex mode of operation based on the parameter of HARQ re-transmissions. 2. The method as claimed in claim 1 wherein determining the mode of operation further comprises determining a device-to-device mode or wireless access network mode of operation for the wireless terminal, based on a or the parameter indicating HARQ re-transmissions. 3. The method as claimed in claim 1 further comprising signalling to the wireless terminal and/or a network node and/or a further wireless terminal an indication of the determined mode of operation for the wireless terminal. 4. The method as claimed in claim 1 wherein determining the mode of operation comprises determining a half duplex mode of operation if the parameter indicating HARQ re-transmissions is above a threshold. 5. The method as claimed in claim 1 wherein determining the mode of operation comprises determining a full duplex mode of operation if the parameter indicating HARQ re-transmissions is below a threshold or below a further threshold. 6. The method as claimed in claim 1 wherein the parameter indicating HARQ re-transmissions is, or is based on, a number of HARQ re-transmissions. 7. The method as claimed in claim 1 wherein the parameter indicating HARQ re-transmissions is, or a based on, a number of indicated re-transmission events, wherein a re-transmission event is indicated by a plurality of HARQ re-transmission failures. 8. The method as claimed in claim 1 wherein the method is implemented in a network node, wherein determining the parameter indicating HARQ re-transmissions comprises receiving the parameter from the wireless terminal. 9. The method as claimed in claim 1 wherein the method is implemented in a, or the, wireless terminal, wherein the determining the parameter indicating HARQ re-transmissions comprises measuring HARQ retransmissions to generate the parameter for the wireless terminal. 10. The method as claimed in claim 1 wherein the method is implemented in a network node and/or the wireless terminal, wherein the network node and said wireless terminal each determine a mode of operation based on the parameter of HARQ retransmissions, and the mode of operation is selected based on the determined mode of operations from both of the network node and the said wireless terminal. 11. The method as claimed in claim 1 wherein an initial mode of operation is based on one or more capability of the wireless terminal associated with the device-to-device mode or wireless access network communication mode and/or based on a radio measurement performed by the wireless terminal. 12. An apparatus configured to determine a mode of operation for a wireless terminal, the apparatus comprising: a HARQ parameter unit configured to determine a parameter indicating Hybrid Automatic Repeat Request, HARQ, re-transmissions in communications with the wireless terminal, and a mode selection unit configured to determine a full duplex or half duplex mode of operation based on the parameter of HARQ re-transmissions. 13. The apparatus as claimed in claim 12 wherein the apparatus is a wireless terminal or the apparatus is a network node. 14. The apparatus as claimed in claim 12 wherein the mode selection unit is configured to determine a device-to-device mode or a wireless access network mode of operation for the wireless terminal, based on a or the parameter indicating HARQ re-transmissions. 15. The apparatus as claimed in claim 12 wherein the parameter indicating HARQ re-transmissions is, or a based on, a number of indicated re-transmissions or re-transmission events, wherein a re-transmission event is indicated by a plurality of HARQ re-transmission failures. 16. An apparatus configured to determine a mode of operation for a wireless terminal, the apparatus comprising a processing arrangement and a memory, said memory containing instructions that when executed cause the apparatus to: determine a parameter indicating Hybrid Automatic Repeat Request, HARQ, re-transmissions in communications with the wireless terminal, and determine a full duplex or half duplex mode of operation based on the parameter of HARQ re-transmissions. 17. A computer program product comprising a machine-readable medium carrying instructions which, when executed by a processor, cause the processor to perform the method of claim 1.
A method of determining a mode of operation for a wireless terminal comprises determining a parameter indicating Hybrid Automatic Repeat Request, HARQ, re-transmissions in communications with the wireless terminal. The method further comprises determining a full duplex or half duplex mode of operation based on the parameter of HARQ re-transmissions.1. A method of determining a mode of operation for a wireless terminal, determining a parameter indicating Hybrid Automatic Repeat Request, HARQ, re-transmissions in communications with the wireless terminal, and determining a full duplex or half duplex mode of operation based on the parameter of HARQ re-transmissions. 2. The method as claimed in claim 1 wherein determining the mode of operation further comprises determining a device-to-device mode or wireless access network mode of operation for the wireless terminal, based on a or the parameter indicating HARQ re-transmissions. 3. The method as claimed in claim 1 further comprising signalling to the wireless terminal and/or a network node and/or a further wireless terminal an indication of the determined mode of operation for the wireless terminal. 4. The method as claimed in claim 1 wherein determining the mode of operation comprises determining a half duplex mode of operation if the parameter indicating HARQ re-transmissions is above a threshold. 5. The method as claimed in claim 1 wherein determining the mode of operation comprises determining a full duplex mode of operation if the parameter indicating HARQ re-transmissions is below a threshold or below a further threshold. 6. The method as claimed in claim 1 wherein the parameter indicating HARQ re-transmissions is, or is based on, a number of HARQ re-transmissions. 7. The method as claimed in claim 1 wherein the parameter indicating HARQ re-transmissions is, or a based on, a number of indicated re-transmission events, wherein a re-transmission event is indicated by a plurality of HARQ re-transmission failures. 8. The method as claimed in claim 1 wherein the method is implemented in a network node, wherein determining the parameter indicating HARQ re-transmissions comprises receiving the parameter from the wireless terminal. 9. The method as claimed in claim 1 wherein the method is implemented in a, or the, wireless terminal, wherein the determining the parameter indicating HARQ re-transmissions comprises measuring HARQ retransmissions to generate the parameter for the wireless terminal. 10. The method as claimed in claim 1 wherein the method is implemented in a network node and/or the wireless terminal, wherein the network node and said wireless terminal each determine a mode of operation based on the parameter of HARQ retransmissions, and the mode of operation is selected based on the determined mode of operations from both of the network node and the said wireless terminal. 11. The method as claimed in claim 1 wherein an initial mode of operation is based on one or more capability of the wireless terminal associated with the device-to-device mode or wireless access network communication mode and/or based on a radio measurement performed by the wireless terminal. 12. An apparatus configured to determine a mode of operation for a wireless terminal, the apparatus comprising: a HARQ parameter unit configured to determine a parameter indicating Hybrid Automatic Repeat Request, HARQ, re-transmissions in communications with the wireless terminal, and a mode selection unit configured to determine a full duplex or half duplex mode of operation based on the parameter of HARQ re-transmissions. 13. The apparatus as claimed in claim 12 wherein the apparatus is a wireless terminal or the apparatus is a network node. 14. The apparatus as claimed in claim 12 wherein the mode selection unit is configured to determine a device-to-device mode or a wireless access network mode of operation for the wireless terminal, based on a or the parameter indicating HARQ re-transmissions. 15. The apparatus as claimed in claim 12 wherein the parameter indicating HARQ re-transmissions is, or a based on, a number of indicated re-transmissions or re-transmission events, wherein a re-transmission event is indicated by a plurality of HARQ re-transmission failures. 16. An apparatus configured to determine a mode of operation for a wireless terminal, the apparatus comprising a processing arrangement and a memory, said memory containing instructions that when executed cause the apparatus to: determine a parameter indicating Hybrid Automatic Repeat Request, HARQ, re-transmissions in communications with the wireless terminal, and determine a full duplex or half duplex mode of operation based on the parameter of HARQ re-transmissions. 17. A computer program product comprising a machine-readable medium carrying instructions which, when executed by a processor, cause the processor to perform the method of claim 1.
2,400
9,355
9,355
15,564,930
2,477
Communications control in response to establishment of a multi-access PDN connection or with rejection of establishment of a multi-access PDN connection is performed based on a response to a PDN connectivity establishment request from a terminal device. This provides a method of communication control and the like in response to a multi-access PDN connectivity establishment request from the terminal device.
1. A terminal device comprising: an LTE interface unit configured to: transmit a Packet Data Network (PDN) connectivity request message to a Mobility Management Entity (MME), in order to establish a PDN connection; and receive an Activate default EPS bearer context request message from the MME, wherein the PDN connectivity request message includes first information indicating a requested Network-based IP Flow Mobility (NBIFOM) mode, and the Activate default EPS bearer context request message is a response message to the PDN connectivity request message, and includes second information indicating an NBIFOM mode. 2. The terminal device according to claim 1, wherein the PDN connectivity request message further includes a request type and a Protocol Configuration Option (PCO), the terminal device is configured to set the request type to information indicating an initial connectivity request, and the PCO includes information indicating a request for use of NBIFOM. 3. The terminal device according to claim 1, wherein each of the first information and the second information indicates a UE-initiated NBIFOM mode or a Network-initiated NBIFOM mode. 4. The terminal device according to claim 3, wherein the second information indicates the UE-initiated NBIFOM mode, in a case that the first information indicates the UE-initiated NBIFOM mode, and the second information indicates the Network-initiated NBIFOM mode, in a case that the first information indicates the Network-initiated NBIFOM mode. 5. The terminal device according to claim 1, wherein the Activate default EPS bearer context request message further includes information indicating that a request for use of NBIFOM is accepted, and based on the reception of the Activate default EPS bearer context request message, the terminal device is configured to: recognize that NBIFOM is applied to the PDN connection, and recognize the second information as an NBIFOM mode for the PDN connection. 6. A Mobility Management Entity (MME) comprising: an IP mobile communication network interface unit configured to: receive a Packet Data Network (PDN) connectivity request message from a terminal device; and transmit an Activate default EPS bearer context request message to the terminal device, wherein the PDN connectivity request message includes first information indicating a requested Network-based IP Flow Mobility (NBIFOM) mode, and the Activate default EPS bearer context request message is a response message to the PDN connectivity request message, and includes second information indicating an NBIFOM mode. 7. The MME according to claim 6, wherein the PDN connectivity request message further includes a request type and a Protocol Configuration Option (PCO), the request type is set to information indicating an initial connectivity request, and the PCO includes information indicating a request for use of NBIFOM. 8. The MME according to claim 6, wherein each of the first information and the second information indicates a UE-initiated NBIFOM mode or a Network-initiated NBIFOM mode. 9. The MME according to claim 8, wherein the second information indicates the UE-initiated NBIFOM mode, in a case that the first information indicates the UE-initiated NBIFOM mode, and the second information indicates the Network-initiated NBIFOM mode, in a case that the first information indicates the Network-initiated NBIFOM mode. 10. The MME according to claim 6, wherein the Activate default EPS bearer context request message further includes information indicating that a request for use of NBIFOM is accepted. 11. A PDN Gateway (PGW) comprising: an IP mobile communication network interface unit configured to: receive a Create Session Request message from a Serving Gateway (SGW); and transmit a Create Session Response message to the SGW, wherein the Create Session Request message includes first information indicating a Network-based IP Flow Mobility (NBIFOM) mode, and the Create Session Response message is a response message to the Create Session Request message, and includes second information indicating an NBIFOM mode. 12. The PGW according to claim 11, wherein each of the first information and the second information indicates a UE-initiated NBIFOM mode or a Network-initiated NBIFOM mode. 13. The PGW according to claim 12, wherein the second information indicates the UE-initiated NBIFOM mode, in a case that the first information indicates the UE-initiated NBIFOM mode, and the second information indicates the Network-initiated NBIFOM mode, in a case that the first information indicates the Network-initiated NBIFOM mode.
Communications control in response to establishment of a multi-access PDN connection or with rejection of establishment of a multi-access PDN connection is performed based on a response to a PDN connectivity establishment request from a terminal device. This provides a method of communication control and the like in response to a multi-access PDN connectivity establishment request from the terminal device.1. A terminal device comprising: an LTE interface unit configured to: transmit a Packet Data Network (PDN) connectivity request message to a Mobility Management Entity (MME), in order to establish a PDN connection; and receive an Activate default EPS bearer context request message from the MME, wherein the PDN connectivity request message includes first information indicating a requested Network-based IP Flow Mobility (NBIFOM) mode, and the Activate default EPS bearer context request message is a response message to the PDN connectivity request message, and includes second information indicating an NBIFOM mode. 2. The terminal device according to claim 1, wherein the PDN connectivity request message further includes a request type and a Protocol Configuration Option (PCO), the terminal device is configured to set the request type to information indicating an initial connectivity request, and the PCO includes information indicating a request for use of NBIFOM. 3. The terminal device according to claim 1, wherein each of the first information and the second information indicates a UE-initiated NBIFOM mode or a Network-initiated NBIFOM mode. 4. The terminal device according to claim 3, wherein the second information indicates the UE-initiated NBIFOM mode, in a case that the first information indicates the UE-initiated NBIFOM mode, and the second information indicates the Network-initiated NBIFOM mode, in a case that the first information indicates the Network-initiated NBIFOM mode. 5. The terminal device according to claim 1, wherein the Activate default EPS bearer context request message further includes information indicating that a request for use of NBIFOM is accepted, and based on the reception of the Activate default EPS bearer context request message, the terminal device is configured to: recognize that NBIFOM is applied to the PDN connection, and recognize the second information as an NBIFOM mode for the PDN connection. 6. A Mobility Management Entity (MME) comprising: an IP mobile communication network interface unit configured to: receive a Packet Data Network (PDN) connectivity request message from a terminal device; and transmit an Activate default EPS bearer context request message to the terminal device, wherein the PDN connectivity request message includes first information indicating a requested Network-based IP Flow Mobility (NBIFOM) mode, and the Activate default EPS bearer context request message is a response message to the PDN connectivity request message, and includes second information indicating an NBIFOM mode. 7. The MME according to claim 6, wherein the PDN connectivity request message further includes a request type and a Protocol Configuration Option (PCO), the request type is set to information indicating an initial connectivity request, and the PCO includes information indicating a request for use of NBIFOM. 8. The MME according to claim 6, wherein each of the first information and the second information indicates a UE-initiated NBIFOM mode or a Network-initiated NBIFOM mode. 9. The MME according to claim 8, wherein the second information indicates the UE-initiated NBIFOM mode, in a case that the first information indicates the UE-initiated NBIFOM mode, and the second information indicates the Network-initiated NBIFOM mode, in a case that the first information indicates the Network-initiated NBIFOM mode. 10. The MME according to claim 6, wherein the Activate default EPS bearer context request message further includes information indicating that a request for use of NBIFOM is accepted. 11. A PDN Gateway (PGW) comprising: an IP mobile communication network interface unit configured to: receive a Create Session Request message from a Serving Gateway (SGW); and transmit a Create Session Response message to the SGW, wherein the Create Session Request message includes first information indicating a Network-based IP Flow Mobility (NBIFOM) mode, and the Create Session Response message is a response message to the Create Session Request message, and includes second information indicating an NBIFOM mode. 12. The PGW according to claim 11, wherein each of the first information and the second information indicates a UE-initiated NBIFOM mode or a Network-initiated NBIFOM mode. 13. The PGW according to claim 12, wherein the second information indicates the UE-initiated NBIFOM mode, in a case that the first information indicates the UE-initiated NBIFOM mode, and the second information indicates the Network-initiated NBIFOM mode, in a case that the first information indicates the Network-initiated NBIFOM mode.
2,400
9,356
9,356
15,616,571
2,423
A server resource provides notification to subscribers in a respective network environment that the content is available for retrieval at a particular bit rate (e.g., a promotional bit rate) or particular level of quality (e.g., promotional level of quality) amongst multiple levels of quality for a limited duration of time. For example, an especially high level of quality (or bit rate) of the content may be available only for the limited duration of time. After making the especially high level of quality of content available for retrieval during a promotional period, the content may be subsequently available for retrieval only at lower levels of quality. Accordingly, one or more configurations as discussed herein include changing the ability to access content encoded at different levels of quality over time.
1. A method comprising: providing notification to subscribers in a network environment, the notification indicating that a particular bit rate of multiple available bit rates for playing back content is available for a limited time duration; distributing portions of the content at the particular bit rate during the limited time duration; and preventing distribution of the content at the particular bit rate in the network environment subsequent to expiration of the limited time duration. 2. The method as in claim 1, wherein the particular bit rate is a first bit rate of the multiple bit rates, the method further comprising: distributing portions of the content at a second bit rate of the multiple bit rates subsequent to the limited time duration. 3. The method as in claim 2, wherein the notification indicates continued availability of the second bit rate after the expiration of the limited time duration. 4. The method as in claim 1, wherein the particular bit rate is a first bit rate of the multiple bit rates, the method further comprising: producing the notification to indicate that the content encoded at a second bit rate of the multiple bit rates is available before, during, and after the limited time duration. 5. The method as in claim 1 further comprising: providing the notification in a content guide, the content guide indicating that the content encoded at the particular bit rate is a temporarily available bit rate not available outside a time slot as specified by the content guide. 6. The method as in claim 1, wherein providing the notification includes: notifying the subscribers in the network environment that the particular bit rate corresponds to a stream of the content encoded in accordance with a highest level of quality amongst the multiple available bit rates. 7. The method as in claim 1, wherein the limited time duration expires in response to detecting that a threshold number of the subscribers retrieves the content encoded at the particular bit rate. 8. The method as in claim 1, wherein distributing the multiple streams of data in the network environment includes: during the limited time duration, switching between transmitting portions of a first stream of the content encoded at the particular bit rate and transmitting portions of a second stream of the content encoded at a second bit rate of the multiple available bit rates. 9. The method as in claim 1, wherein distributing the multiple streams of data in the network environment includes: from a first network address, distributing portions of the content in the network environment as a first stream of the content encoded in accordance with a first level of playback quality; from a second network address, distributing portions of the content in the network environment as a second stream of the content encoded in accordance with a second level of playback quality, the second level of quality higher than the first level of playback quality; and from a third network address, distributing portions of the content in the network environment as a third stream of the content encoded in accordance with a third level of playback quality, the third level of quality higher than the second level of playback quality. 10. The method as in claim 1, wherein providing the notification includes: providing notification to the subscribers in the network environment that the content is retrievable at the particular bit rate in an adaptive bit-rate data stream during the limited time duration. 11. The method as in claim 1, wherein providing the notification includes: initiating display of the notification on a display screen, the notification indicating that the content encoded at the particular bit rate is temporarily available for retrieval and inclusion in an adaptive bit rate data stream. 12. A method comprising: adaptively transmitting portions of encoded content at multiple levels of quality including a first level of quality bit rate and a second level of quality bit rate; detecting occurrence of a trigger event; and subsequent to detecting the occurrence of the trigger event: i) preventing transmission of the content at the first level of quality bit rate, and ii) providing continued availability of the content at the second level of quality bit rate for inclusion in an adaptive bit rate data stream. 13. The method as in claim 12, wherein the first level of quality of the encoded content is a temporarily available bit rate. 14. The method as in claim 12, wherein the first level of quality bit rate is a highest level of quality amongst the multiple levels of quality. 15. The method as in claim 12, wherein detecting occurrence of the trigger event includes: detecting switchover from a first content distribution mode to a second content distribution mode, the first content distribution mode operable to distribute the content at the multiple different levels of quality including the first level of quality bit rate, the second content distribution mode operable to distribute the content in accordance with multiple levels of playback quality other than at the first level of quality bit rate. 16. The method as in claim 12 further comprising: prior to detecting the trigger event, producing a first adaptive bit rate data stream including at least portions of the content encoded at the first level of quality bit rate and the second level of quality bit rate; and subsequent to detecting the trigger event, producing a second adaptive bit rate data stream including portions of the content encoded at the second level of quality bit rate, preventing inclusion of portions of the content encoded at the first level of quality bit rate in the second adaptive bit rate data stream. 17. The method as in claim 12 further comprising: receiving a selection to view playback of an adaptive bit rate data stream of the content without advertisements; and in response to the selection, initiating transmission of the encoded content at the multiple different bit rates in an adaptive bit rate data stream without the advertisements. 18. The method as in claim 12 further comprising: storing a first stream of encoded data to include segments of the content encoded at the first level of playback quality bit rate; storing a second stream of encoded data to include the segments of the content encoded at the second level of playback quality bit rate, the first level of playback quality bit rate being a higher bit rate than the second level of playback quality bit rate; and wherein adaptively transmitting portions of the encoded content includes producing an adaptive bit rate data stream to include content encoded according to the first level of playback quality bit rate and the second level of playback quality bit rate. 19. The method as in claim 18 further comprising: in an adaptive bit rate data stream, inserting a network address indicating a resource from which to retrieve segments of the content encoded at the first level of quality bit rate. 20. The method as in claim 12 further comprising: producing a notification to indicate that the content encoded at the first level of quality bit rate is available for a limited time duration. 21. The method as in claim 20, wherein the notification further indicates that, after the occurrence of the trigger event, the content is available at the second level of quality bit rate and not the first level of quality bit rate.
A server resource provides notification to subscribers in a respective network environment that the content is available for retrieval at a particular bit rate (e.g., a promotional bit rate) or particular level of quality (e.g., promotional level of quality) amongst multiple levels of quality for a limited duration of time. For example, an especially high level of quality (or bit rate) of the content may be available only for the limited duration of time. After making the especially high level of quality of content available for retrieval during a promotional period, the content may be subsequently available for retrieval only at lower levels of quality. Accordingly, one or more configurations as discussed herein include changing the ability to access content encoded at different levels of quality over time.1. A method comprising: providing notification to subscribers in a network environment, the notification indicating that a particular bit rate of multiple available bit rates for playing back content is available for a limited time duration; distributing portions of the content at the particular bit rate during the limited time duration; and preventing distribution of the content at the particular bit rate in the network environment subsequent to expiration of the limited time duration. 2. The method as in claim 1, wherein the particular bit rate is a first bit rate of the multiple bit rates, the method further comprising: distributing portions of the content at a second bit rate of the multiple bit rates subsequent to the limited time duration. 3. The method as in claim 2, wherein the notification indicates continued availability of the second bit rate after the expiration of the limited time duration. 4. The method as in claim 1, wherein the particular bit rate is a first bit rate of the multiple bit rates, the method further comprising: producing the notification to indicate that the content encoded at a second bit rate of the multiple bit rates is available before, during, and after the limited time duration. 5. The method as in claim 1 further comprising: providing the notification in a content guide, the content guide indicating that the content encoded at the particular bit rate is a temporarily available bit rate not available outside a time slot as specified by the content guide. 6. The method as in claim 1, wherein providing the notification includes: notifying the subscribers in the network environment that the particular bit rate corresponds to a stream of the content encoded in accordance with a highest level of quality amongst the multiple available bit rates. 7. The method as in claim 1, wherein the limited time duration expires in response to detecting that a threshold number of the subscribers retrieves the content encoded at the particular bit rate. 8. The method as in claim 1, wherein distributing the multiple streams of data in the network environment includes: during the limited time duration, switching between transmitting portions of a first stream of the content encoded at the particular bit rate and transmitting portions of a second stream of the content encoded at a second bit rate of the multiple available bit rates. 9. The method as in claim 1, wherein distributing the multiple streams of data in the network environment includes: from a first network address, distributing portions of the content in the network environment as a first stream of the content encoded in accordance with a first level of playback quality; from a second network address, distributing portions of the content in the network environment as a second stream of the content encoded in accordance with a second level of playback quality, the second level of quality higher than the first level of playback quality; and from a third network address, distributing portions of the content in the network environment as a third stream of the content encoded in accordance with a third level of playback quality, the third level of quality higher than the second level of playback quality. 10. The method as in claim 1, wherein providing the notification includes: providing notification to the subscribers in the network environment that the content is retrievable at the particular bit rate in an adaptive bit-rate data stream during the limited time duration. 11. The method as in claim 1, wherein providing the notification includes: initiating display of the notification on a display screen, the notification indicating that the content encoded at the particular bit rate is temporarily available for retrieval and inclusion in an adaptive bit rate data stream. 12. A method comprising: adaptively transmitting portions of encoded content at multiple levels of quality including a first level of quality bit rate and a second level of quality bit rate; detecting occurrence of a trigger event; and subsequent to detecting the occurrence of the trigger event: i) preventing transmission of the content at the first level of quality bit rate, and ii) providing continued availability of the content at the second level of quality bit rate for inclusion in an adaptive bit rate data stream. 13. The method as in claim 12, wherein the first level of quality of the encoded content is a temporarily available bit rate. 14. The method as in claim 12, wherein the first level of quality bit rate is a highest level of quality amongst the multiple levels of quality. 15. The method as in claim 12, wherein detecting occurrence of the trigger event includes: detecting switchover from a first content distribution mode to a second content distribution mode, the first content distribution mode operable to distribute the content at the multiple different levels of quality including the first level of quality bit rate, the second content distribution mode operable to distribute the content in accordance with multiple levels of playback quality other than at the first level of quality bit rate. 16. The method as in claim 12 further comprising: prior to detecting the trigger event, producing a first adaptive bit rate data stream including at least portions of the content encoded at the first level of quality bit rate and the second level of quality bit rate; and subsequent to detecting the trigger event, producing a second adaptive bit rate data stream including portions of the content encoded at the second level of quality bit rate, preventing inclusion of portions of the content encoded at the first level of quality bit rate in the second adaptive bit rate data stream. 17. The method as in claim 12 further comprising: receiving a selection to view playback of an adaptive bit rate data stream of the content without advertisements; and in response to the selection, initiating transmission of the encoded content at the multiple different bit rates in an adaptive bit rate data stream without the advertisements. 18. The method as in claim 12 further comprising: storing a first stream of encoded data to include segments of the content encoded at the first level of playback quality bit rate; storing a second stream of encoded data to include the segments of the content encoded at the second level of playback quality bit rate, the first level of playback quality bit rate being a higher bit rate than the second level of playback quality bit rate; and wherein adaptively transmitting portions of the encoded content includes producing an adaptive bit rate data stream to include content encoded according to the first level of playback quality bit rate and the second level of playback quality bit rate. 19. The method as in claim 18 further comprising: in an adaptive bit rate data stream, inserting a network address indicating a resource from which to retrieve segments of the content encoded at the first level of quality bit rate. 20. The method as in claim 12 further comprising: producing a notification to indicate that the content encoded at the first level of quality bit rate is available for a limited time duration. 21. The method as in claim 20, wherein the notification further indicates that, after the occurrence of the trigger event, the content is available at the second level of quality bit rate and not the first level of quality bit rate.
2,400
9,357
9,357
14,381,051
2,448
In an information processing apparatus 58 for displaying a connection relation between a server and a client, an information acquisition block 62 acquires client information from the server. A display processing block 64 displays the connection relation between the server and the client apparatus 20 in a tree structure with the server being a root node by use of the acquired client information. The display processing block 64 connects information indicative of the server to information indicative of the client apparatus 20 with a line in accordance with a connection type between the server and the client apparatus 20 , thereby displaying the connection relation in the tree structure.
1. An information processing apparatus for displaying a connection relation between a server and a client, comprising: an information acquisition block configured to acquire client information from the server; and a display processing block configured to display the connection relation between the server and the client apparatus in a tree structure with the server being a root node by use of the acquired client information. 2. The information processing apparatus according to claim 1, wherein the display processing block connects information indicative of the server to information indicative of the client apparatus with a line in accordance with a connection type between the server and the client apparatus. 3. The information processing apparatus according to claim 2, wherein the connection type is information for identifying one of wired connection and wireless connection. 4. A server for providing display data to an information processing apparatus, comprising: a registration processing block configured to register a client apparatus connectable with the server into a storage block; and an information provision block configured to read a plurality of pieces of client information registered in the storage block and, by use of the read client information, generate display data for displaying a connection relation between the server and the client apparatus in a tree structure with the server being a root node, thereby providing the generated display data to the information processing apparatus. 5. A program for causing a computer for displaying a connection relation between a server and a client apparatus to realize: a function of acquiring client information from the server; and a function of displaying the connection relation between the server and the client apparatus in a tree structure with the server being a root node by use of the acquired client information. 6. A program for causing a computer to realize: a function of reading a plurality of pieces of client information registered in a storage block; and a function of generating display data for displaying a connection relation between a server and a client apparatus in a tree structure with the server being a root node by use of the read client information. 7. A computer-readable recording medium in which the program cited in claim 5 is recorded.
In an information processing apparatus 58 for displaying a connection relation between a server and a client, an information acquisition block 62 acquires client information from the server. A display processing block 64 displays the connection relation between the server and the client apparatus 20 in a tree structure with the server being a root node by use of the acquired client information. The display processing block 64 connects information indicative of the server to information indicative of the client apparatus 20 with a line in accordance with a connection type between the server and the client apparatus 20 , thereby displaying the connection relation in the tree structure.1. An information processing apparatus for displaying a connection relation between a server and a client, comprising: an information acquisition block configured to acquire client information from the server; and a display processing block configured to display the connection relation between the server and the client apparatus in a tree structure with the server being a root node by use of the acquired client information. 2. The information processing apparatus according to claim 1, wherein the display processing block connects information indicative of the server to information indicative of the client apparatus with a line in accordance with a connection type between the server and the client apparatus. 3. The information processing apparatus according to claim 2, wherein the connection type is information for identifying one of wired connection and wireless connection. 4. A server for providing display data to an information processing apparatus, comprising: a registration processing block configured to register a client apparatus connectable with the server into a storage block; and an information provision block configured to read a plurality of pieces of client information registered in the storage block and, by use of the read client information, generate display data for displaying a connection relation between the server and the client apparatus in a tree structure with the server being a root node, thereby providing the generated display data to the information processing apparatus. 5. A program for causing a computer for displaying a connection relation between a server and a client apparatus to realize: a function of acquiring client information from the server; and a function of displaying the connection relation between the server and the client apparatus in a tree structure with the server being a root node by use of the acquired client information. 6. A program for causing a computer to realize: a function of reading a plurality of pieces of client information registered in a storage block; and a function of generating display data for displaying a connection relation between a server and a client apparatus in a tree structure with the server being a root node by use of the read client information. 7. A computer-readable recording medium in which the program cited in claim 5 is recorded.
2,400
9,358
9,358
15,364,914
2,481
Aspects of the disclosure relate to adjusting a virtual camera's orientation when a vehicle is making a turn. One or more computing devices may receive the vehicle's original heading prior to making the turn and the vehicle's current heading. Based on the vehicle's original heading and the vehicle's current heading, the one or more computing devices may determine an angle of a turn the vehicle is performing and The one or more computing devices may determine a camera rotation angle and adjust the virtual camera's orientation relative to the vehicle to an updated orientation by rotating the virtual camera by the camera rotation angle and generate a video corresponding to the virtual camera's updated orientation. The video may be displayed on the display by the one or more computing devices.
1. A computer implemented method for adjusting a virtual camera's orientation when a vehicle is making a turn, the method comprising: receiving, by one or more computing devices, the vehicle's original heading prior to entering the turn and the vehicle's current heading; determining, based on the vehicle's original heading and the vehicle's current heading, by the one or more computing devices, an angle of a turn the vehicle is performing; determining, by the one or more computing devices, a camera rotation angle; adjusting, by one or more computing devices, the virtual camera's orientation relative to the vehicle to an updated orientation by rotating the virtual camera by the camera rotation angle; generating and displaying, by the one or more computing devices, a video corresponding to the virtual camera's updated orientation. 2. The method of claim 1, wherein the vehicle's original heading and the vehicle's current heading are received from the vehicle's positioning system. 3. The method of claim 1, wherein determining the angle of the turn is determined by calculating the difference between the vehicle's original heading from the vehicle's current heading. 4. The method of claim 1, wherein the camera rotation angle is based on the angle of the turn, and is calculated by inputting the angle of the turn into a squashing function and receiving an outputted angle, wherein the outputted angle is the camera rotation angle. 5. The method of claim 1, wherein the virtual camera's orientation is adjusted and the video is displayed while the vehicle is making the turn. 6. The method of claim 1, wherein the vehicle's current heading is a projected heading and the virtual camera's orientation is updated before the vehicle performs the turn. 7. The method of claim 1, wherein the camera rotation angle is calculated by inputting the angle of the turn into a squashing function and receiving an outputted angle, wherein the outputted angle is the camera rotation angle. 8. The method of claim 1, wherein the camera rotation angle is determined by accessing a table including predetermined camera rotation angles for each angle of the turn. 9. A system for adjusting a virtual camera's orientation when a vehicle is making a turn, the system comprising one or more processors configured to: receive the vehicle's original heading prior to entering the turn and the vehicle's current heading; determine, based on the vehicle's original heading and the vehicle's current heading, an angle of a turn the vehicle is performing; determine a camera rotation angle; adjust the virtual camera's orientation relative to the vehicle to an updated orientation by rotating the virtual camera by the camera rotation angle; generate and display a video corresponding to the virtual camera's updated orientation. 10. The system of claim 9, wherein the vehicle's original heading and the vehicle's current heading are received from the vehicle's positioning system. 11. The system of claim 9, wherein determining the angle of the turn is determined by calculating the difference between the vehicle's original heading from the vehicle's current heading. 12. The system of claim 9, wherein the camera rotation angle is based on the angle of the turn, and is calculated by inputting the angle of the turn into a squashing function and receiving an outputted angle, wherein the outputted angle is the camera rotation angle. 13. The system of claim 9, wherein the virtual camera's orientation is adjusted and the video is displayed while the vehicle is making the turn. 14. The system of claim 9, wherein the vehicle's current heading is a projected heading and the virtual camera's orientation is updated before the vehicle performs the turn. 15. The system of claim 9, wherein the camera rotation angle is calculated by inputting the angle of the turn into a squashing function and receiving an outputted angle, wherein the outputted angle is the camera rotation angle. 16. The method of claim 9, wherein the camera rotation angle is determined by accessing a table including predetermined camera rotation angles for each angle of the turn. 17. A non-transitory computer readable medium on which instructions are stored, the instructions when executed by one or more processors, cause the one or more processors to perform a method of adjusting a virtual camera's orientation when a vehicle is making a turn, the method comprising: receiving the vehicle's original heading prior to entering the turn and the vehicle's current heading; determining, based on the vehicle's original heading and the vehicle's current heading, an angle of a turn the vehicle is performing; determining a camera rotation angle; adjusting the virtual camera's orientation relative to the vehicle to an updated orientation by rotating the virtual camera by the camera rotation angle; generating and displaying a video corresponding to the virtual camera's updated orientation. 18. The non-transitory computer readable medium of claim 17, wherein the vehicle's original heading and the vehicle's current heading are received from the vehicle's positioning system. 19. The non-transitory computer readable medium of claim 17, wherein determining the angle of the turn is determined by calculating the difference between the vehicle's original heading from the vehicle's current heading. 20. The non-transitory computer readable medium of claim 17, wherein the camera rotation angle is based on the angle of the turn, and is calculated by inputting the angle of the turn into a squashing function and receiving an outputted angle, wherein the outputted angle is the camera rotation angle.
Aspects of the disclosure relate to adjusting a virtual camera's orientation when a vehicle is making a turn. One or more computing devices may receive the vehicle's original heading prior to making the turn and the vehicle's current heading. Based on the vehicle's original heading and the vehicle's current heading, the one or more computing devices may determine an angle of a turn the vehicle is performing and The one or more computing devices may determine a camera rotation angle and adjust the virtual camera's orientation relative to the vehicle to an updated orientation by rotating the virtual camera by the camera rotation angle and generate a video corresponding to the virtual camera's updated orientation. The video may be displayed on the display by the one or more computing devices.1. A computer implemented method for adjusting a virtual camera's orientation when a vehicle is making a turn, the method comprising: receiving, by one or more computing devices, the vehicle's original heading prior to entering the turn and the vehicle's current heading; determining, based on the vehicle's original heading and the vehicle's current heading, by the one or more computing devices, an angle of a turn the vehicle is performing; determining, by the one or more computing devices, a camera rotation angle; adjusting, by one or more computing devices, the virtual camera's orientation relative to the vehicle to an updated orientation by rotating the virtual camera by the camera rotation angle; generating and displaying, by the one or more computing devices, a video corresponding to the virtual camera's updated orientation. 2. The method of claim 1, wherein the vehicle's original heading and the vehicle's current heading are received from the vehicle's positioning system. 3. The method of claim 1, wherein determining the angle of the turn is determined by calculating the difference between the vehicle's original heading from the vehicle's current heading. 4. The method of claim 1, wherein the camera rotation angle is based on the angle of the turn, and is calculated by inputting the angle of the turn into a squashing function and receiving an outputted angle, wherein the outputted angle is the camera rotation angle. 5. The method of claim 1, wherein the virtual camera's orientation is adjusted and the video is displayed while the vehicle is making the turn. 6. The method of claim 1, wherein the vehicle's current heading is a projected heading and the virtual camera's orientation is updated before the vehicle performs the turn. 7. The method of claim 1, wherein the camera rotation angle is calculated by inputting the angle of the turn into a squashing function and receiving an outputted angle, wherein the outputted angle is the camera rotation angle. 8. The method of claim 1, wherein the camera rotation angle is determined by accessing a table including predetermined camera rotation angles for each angle of the turn. 9. A system for adjusting a virtual camera's orientation when a vehicle is making a turn, the system comprising one or more processors configured to: receive the vehicle's original heading prior to entering the turn and the vehicle's current heading; determine, based on the vehicle's original heading and the vehicle's current heading, an angle of a turn the vehicle is performing; determine a camera rotation angle; adjust the virtual camera's orientation relative to the vehicle to an updated orientation by rotating the virtual camera by the camera rotation angle; generate and display a video corresponding to the virtual camera's updated orientation. 10. The system of claim 9, wherein the vehicle's original heading and the vehicle's current heading are received from the vehicle's positioning system. 11. The system of claim 9, wherein determining the angle of the turn is determined by calculating the difference between the vehicle's original heading from the vehicle's current heading. 12. The system of claim 9, wherein the camera rotation angle is based on the angle of the turn, and is calculated by inputting the angle of the turn into a squashing function and receiving an outputted angle, wherein the outputted angle is the camera rotation angle. 13. The system of claim 9, wherein the virtual camera's orientation is adjusted and the video is displayed while the vehicle is making the turn. 14. The system of claim 9, wherein the vehicle's current heading is a projected heading and the virtual camera's orientation is updated before the vehicle performs the turn. 15. The system of claim 9, wherein the camera rotation angle is calculated by inputting the angle of the turn into a squashing function and receiving an outputted angle, wherein the outputted angle is the camera rotation angle. 16. The method of claim 9, wherein the camera rotation angle is determined by accessing a table including predetermined camera rotation angles for each angle of the turn. 17. A non-transitory computer readable medium on which instructions are stored, the instructions when executed by one or more processors, cause the one or more processors to perform a method of adjusting a virtual camera's orientation when a vehicle is making a turn, the method comprising: receiving the vehicle's original heading prior to entering the turn and the vehicle's current heading; determining, based on the vehicle's original heading and the vehicle's current heading, an angle of a turn the vehicle is performing; determining a camera rotation angle; adjusting the virtual camera's orientation relative to the vehicle to an updated orientation by rotating the virtual camera by the camera rotation angle; generating and displaying a video corresponding to the virtual camera's updated orientation. 18. The non-transitory computer readable medium of claim 17, wherein the vehicle's original heading and the vehicle's current heading are received from the vehicle's positioning system. 19. The non-transitory computer readable medium of claim 17, wherein determining the angle of the turn is determined by calculating the difference between the vehicle's original heading from the vehicle's current heading. 20. The non-transitory computer readable medium of claim 17, wherein the camera rotation angle is based on the angle of the turn, and is calculated by inputting the angle of the turn into a squashing function and receiving an outputted angle, wherein the outputted angle is the camera rotation angle.
2,400
9,359
9,359
16,116,010
2,459
A source device executing the application can transmit the streaming content to the playback device. The size of the buffer can be changed during the playback of streaming content. To perform the change seamlessly, embodiments can cause the application to provide the streaming content at an increased or decreased rate, depending on how the size of the playback buffer is to be changed. The new buffer size (i.e., smaller or larger amount) can provide improved playback of the streaming content, e.g., based on a latency-reliability tradeoff as determined using various factors (e.g., quality of connection between the devices). The changed rate for providing the streaming content can be achieved by slowing down or speeding up a clock signal that is provided to the application.
1. A method of using a source device for facilitating playback of streaming content at a playback device that is in wireless communication with the source device, the method comprising performing, at the source device: receiving, at a first rate during a first time period, the streaming content from an application executing on a processor of the source device; transmitting, at the first rate over a wireless interface, the streaming content to the playback device during the first time period, the playback device including a buffer configured to store the transmitted streaming content before being played at the playback device, wherein the buffer has a first size during the first time period; determining that the buffer of the playback device is to change to a second size; during a second time period, causing the application to provide the streaming content at a second rate that is different than the first rate; and transmitting, at the second rate over the wireless interface, the streaming content to the playback device during the second time period such that a size of the buffer of the playback device changes. 2. The method of claim 1, further comprising: determining that the buffer of the playback device has attained the second size; and after determining that the buffer attained the second size, causing the application to provide the streaming content at the first rate. 3. The method of claim 2, wherein the second rate differs from the first rate by a specified percentage, and wherein determining that the buffer of the playback device has attained the second size uses the specified percentage and a difference between the first size and the second size. 4. The method of claim 1, wherein causing the application to provide the streaming content at the second rate includes changing a clock signal provided to the application. 5. The method of claim 1, wherein the second size is larger than the first size and the second rate is higher than the first rate, or wherein the second size is smaller than the first size and the second rate is lower than the first rate. 6. The method of claim 1, wherein determining that the buffer of the playback device is to change includes: receiving a change in a state of the source device, a state of the playback device, or a connection property of a connection between the source device and the playback device; and determining the second size based at least on the change. 7. The method of claim 6, wherein the second size is further determined based on one or more system properties that have not changed. 8. The method of claim 7, wherein the one or more system properties that have not changed include a type of the application. 9. The method of claim 6, wherein the change is in the state of the source device, and wherein the change is a display screen of the source device transitioning between ‘on’ and ‘off’. 10. The method of claim 1, further comprising: providing the second size to the playback device. 11. The method of claim 1, wherein the source device is a portable device. 12. A computer product comprising a non-transitory computer-readable medium storing instructions that when executed control a source device to facilitate playback of streaming content at a playback device that is in wireless communication with the source device, the instructions causing the source device to perform: receiving, at a first rate during a first time period, the streaming content from an application executing on a processor of the source device; transmitting, at the first rate over a wireless interface, the streaming content to the playback device during the first time period, the playback device including a buffer configured to store the transmitted streaming content before being played at the playback device, wherein the buffer has a first size during the first time period; determining that the buffer of the playback device is to change to a second size; during a second time period, causing the application to provide the streaming content at a second rate that is different than the first rate; and transmitting, at the second rate over the wireless interface, the streaming content to the playback device during the second time period such that a size of the buffer of the playback device changes. 13. The computer product of claim 12, wherein the instructions further cause the source device to perform: determining that the buffer of the playback device has attained the second size; and after determining that the buffer attained the second size, causing the application to provide the streaming content at the first rate. 14. The computer product of claim 12, wherein causing the application to provide the streaming content at the second rate includes changing a clock signal provided to the application. 15. The computer product of claim 12, wherein determining that the buffer of the playback device is to change includes: receiving a change in a state of the source device, a state of the playback device, or a connection property of a connection between the source device and the playback device; and determining the second size based at least on the change. 16. The computer product of claim 12, wherein the instructions further cause the source device to perform: providing the second size to the playback device. 17. A source device for facilitating playback of streaming content at a playback device that is in wireless communication with the source device, the source device comprising one or more processors configured to: receive, at a first rate during a first time period, the streaming content from an application executing on a processor of the source device; transmit, at the first rate over a wireless interface, the streaming content to the playback device during the first time period, the playback device including a buffer configured to store the transmitted streaming content before being played at the playback device, wherein the buffer has a first size during the first time period; determine that the buffer of the playback device is to change to a second size; during a second time period, causing the application to provide the streaming content at a second rate that is different than the first rate; and transmit, at the second rate over the wireless interface, the streaming content to the playback device during the second time period such that a size of the buffer of the playback device changes. 18. The source device of claim 17, wherein the one or more processors are further configured to: determine that the buffer of the playback device has attained the second size; and after determining that the buffer attained the second size, cause the application to provide the streaming content at the first rate. 19. The source device of claim 17, wherein causing the application to provide the streaming content at the second rate includes changing a clock signal provided to the application. 20. The source device of claim 17, wherein the one or more processors are further configured to: provide the second size to the playback device.
A source device executing the application can transmit the streaming content to the playback device. The size of the buffer can be changed during the playback of streaming content. To perform the change seamlessly, embodiments can cause the application to provide the streaming content at an increased or decreased rate, depending on how the size of the playback buffer is to be changed. The new buffer size (i.e., smaller or larger amount) can provide improved playback of the streaming content, e.g., based on a latency-reliability tradeoff as determined using various factors (e.g., quality of connection between the devices). The changed rate for providing the streaming content can be achieved by slowing down or speeding up a clock signal that is provided to the application.1. A method of using a source device for facilitating playback of streaming content at a playback device that is in wireless communication with the source device, the method comprising performing, at the source device: receiving, at a first rate during a first time period, the streaming content from an application executing on a processor of the source device; transmitting, at the first rate over a wireless interface, the streaming content to the playback device during the first time period, the playback device including a buffer configured to store the transmitted streaming content before being played at the playback device, wherein the buffer has a first size during the first time period; determining that the buffer of the playback device is to change to a second size; during a second time period, causing the application to provide the streaming content at a second rate that is different than the first rate; and transmitting, at the second rate over the wireless interface, the streaming content to the playback device during the second time period such that a size of the buffer of the playback device changes. 2. The method of claim 1, further comprising: determining that the buffer of the playback device has attained the second size; and after determining that the buffer attained the second size, causing the application to provide the streaming content at the first rate. 3. The method of claim 2, wherein the second rate differs from the first rate by a specified percentage, and wherein determining that the buffer of the playback device has attained the second size uses the specified percentage and a difference between the first size and the second size. 4. The method of claim 1, wherein causing the application to provide the streaming content at the second rate includes changing a clock signal provided to the application. 5. The method of claim 1, wherein the second size is larger than the first size and the second rate is higher than the first rate, or wherein the second size is smaller than the first size and the second rate is lower than the first rate. 6. The method of claim 1, wherein determining that the buffer of the playback device is to change includes: receiving a change in a state of the source device, a state of the playback device, or a connection property of a connection between the source device and the playback device; and determining the second size based at least on the change. 7. The method of claim 6, wherein the second size is further determined based on one or more system properties that have not changed. 8. The method of claim 7, wherein the one or more system properties that have not changed include a type of the application. 9. The method of claim 6, wherein the change is in the state of the source device, and wherein the change is a display screen of the source device transitioning between ‘on’ and ‘off’. 10. The method of claim 1, further comprising: providing the second size to the playback device. 11. The method of claim 1, wherein the source device is a portable device. 12. A computer product comprising a non-transitory computer-readable medium storing instructions that when executed control a source device to facilitate playback of streaming content at a playback device that is in wireless communication with the source device, the instructions causing the source device to perform: receiving, at a first rate during a first time period, the streaming content from an application executing on a processor of the source device; transmitting, at the first rate over a wireless interface, the streaming content to the playback device during the first time period, the playback device including a buffer configured to store the transmitted streaming content before being played at the playback device, wherein the buffer has a first size during the first time period; determining that the buffer of the playback device is to change to a second size; during a second time period, causing the application to provide the streaming content at a second rate that is different than the first rate; and transmitting, at the second rate over the wireless interface, the streaming content to the playback device during the second time period such that a size of the buffer of the playback device changes. 13. The computer product of claim 12, wherein the instructions further cause the source device to perform: determining that the buffer of the playback device has attained the second size; and after determining that the buffer attained the second size, causing the application to provide the streaming content at the first rate. 14. The computer product of claim 12, wherein causing the application to provide the streaming content at the second rate includes changing a clock signal provided to the application. 15. The computer product of claim 12, wherein determining that the buffer of the playback device is to change includes: receiving a change in a state of the source device, a state of the playback device, or a connection property of a connection between the source device and the playback device; and determining the second size based at least on the change. 16. The computer product of claim 12, wherein the instructions further cause the source device to perform: providing the second size to the playback device. 17. A source device for facilitating playback of streaming content at a playback device that is in wireless communication with the source device, the source device comprising one or more processors configured to: receive, at a first rate during a first time period, the streaming content from an application executing on a processor of the source device; transmit, at the first rate over a wireless interface, the streaming content to the playback device during the first time period, the playback device including a buffer configured to store the transmitted streaming content before being played at the playback device, wherein the buffer has a first size during the first time period; determine that the buffer of the playback device is to change to a second size; during a second time period, causing the application to provide the streaming content at a second rate that is different than the first rate; and transmit, at the second rate over the wireless interface, the streaming content to the playback device during the second time period such that a size of the buffer of the playback device changes. 18. The source device of claim 17, wherein the one or more processors are further configured to: determine that the buffer of the playback device has attained the second size; and after determining that the buffer attained the second size, cause the application to provide the streaming content at the first rate. 19. The source device of claim 17, wherein causing the application to provide the streaming content at the second rate includes changing a clock signal provided to the application. 20. The source device of claim 17, wherein the one or more processors are further configured to: provide the second size to the playback device.
2,400
9,360
9,360
16,402,403
2,419
A multiple-identity secure device (MISD) persistently may store an identification code. The identification code may be stored in an integral memory of the device, or on an interchangeable card received in a physical interface of the MISD. The MISD may generate one or more unique identities (e.g., network addresses) from the stored identification code. The generated identities may be dynamically generated or may be securely stored in the MISD for subsequent retrieval. The generated identities may generates in accordance with an addressing scheme, a global/network setting, or as determined from a received data transmission.
1. A method comprising: receiving, from a server and by a computing device storing a first identifier that identifies the computing device, a data transmission; extracting, from the data transmission, a second identifier; determining an addressing scheme used by the server to direct the data transmission to the computing device; generating, using the first identifier, an address of the computing device, wherein the address is compliant with the addressing scheme; comparing the address to the second identifier; and processing, based on determining that the address corresponds to the second identifier, the data transmission. 2. The method of claim 1, wherein the computing device comprises a set top box. 3. The method of claim 1, wherein the first identifier comprises a network address, a serial number, an alphanumeric string, or a media access control address. 4. The method of claim 1, further comprising: storing the first identifier at a first memory location of the computing device; and storing the address at a second memory location of the computing device different from the first memory location. 5. The method of claim 1, wherein determining the addressing scheme comprises using the second identifier extracted from the data transmission. 6. The method of claim 1, wherein generating the address occurs after receiving the data transmission. 7. The method of claim 1, wherein the address is a first address and the addressing scheme is a first addressing scheme, the method further comprising: generating, using the first identifier, a plurality of unique addresses of the computing device, wherein: the first address is one of the plurality of unique addresses; each of the plurality of unique addresses is compliant with a different addressing scheme; and the first address is compliant with the first addressing scheme. 8. The method of claim 7, further comprising: determining a second addressing scheme used to direct a second data transmission to the computing device; and retrieving, from among the plurality of unique addresses, a second address that is compliant with the second addressing scheme. 9. A method comprising: receiving, from a server and by a computing device storing a first identifier that identifies the computing device, a data transmission; extracting, from the data transmission, a second identifier; determining an addressing scheme used by the server to direct the data transmission to the computing device; generating, using the first identifier, an address of the computing device, wherein the address is compliant with the addressing scheme; comparing the address to the second identifier; and discarding, based on determining that the second identifier does not correspond to the address, the data transmission. 10. The method of claim 9, wherein the computing device comprises a set top box. 11. The method of claim 9, wherein the first identifier comprises a network address, a serial number, an alphanumeric string, or a media access control address. 12. The method of claim 9, further comprising: storing, by the computing device, the first identifier at a first memory location of the computing device; and storing, by the computing device, the address at a second memory location of the computing device different from the first memory location. 13. The method of claim 9, wherein determining the addressing scheme comprises using the second identifier extracted from the data transmission. 14. The method of claim 9, wherein generating the address occurs after receiving the data transmission. 15. The method of claim 9, wherein the address is a first address and the addressing scheme is a first addressing scheme, the method further comprising: generating, using the first identifier, a plurality of unique addresses of the computing device, wherein: the first address is one of the plurality of unique addresses; each of the plurality of unique addresses is compliant with a different addressing scheme; and the first address is compliant with the first addressing scheme. 16. The method of claim 15, further comprising: determining a second addressing scheme used to direct a second data transmission to the computing device; and retrieving, from among the plurality of unique addresses, a second address that is compliant with the second addressing scheme. 17. A computer-readable storage medium storing instructions that, when executed by one or more processors, cause a computing device storing a first identifier that identifies the computing device to: receive, from a server, a data transmission; extract, from the data transmission, a second identifier; determine an addressing scheme used by the server to direct the data transmission to the computing device; generate, using the first identifier, an address of the computing device, wherein the address is compliant with the addressing scheme; compare the address to the second identifier; and either process, based on determining that the address corresponds to the second identifier, the data transmission or discard, based on determining that the second identifier does not correspond to the address, the data transmission. 18. The computer-readable storage medium of claim 17, wherein the computing device comprises a set top box. 19. The computer-readable storage medium of claim 17, wherein the first identifier comprises a network address, a serial number, an alphanumeric string, or a media access control address. 20. The computer-readable storage medium of claim 17, wherein the instructions, when executed by the one or more processors, further cause the computing device to: store the first identifier at a first memory location of the computing device; and store the address at a second memory location of the computing device different from the first memory location. 21. The computer-readable storage medium of claim 17, wherein the instructions, when executed by the one or more processors, cause the computing device to: use the second identifier extracted from the data transmission to determine the addressing scheme. 22. The computer-readable storage medium of claim 17, wherein the instructions, when executed by the one or more processors, cause the computing device to: generate the address after receiving the data transmission. 23. The computer-readable storage medium of claim 17, wherein the address is a first address and the addressing scheme is a first addressing scheme and the instructions, when executed by the one or more processors, cause the computing device to: generate, using the first identifier, a plurality of unique addresses of the computing device, wherein: the first address is one of the plurality of unique addresses; each of the plurality of unique addresses is compliant with a different addressing scheme; and the first address is compliant with the first addressing scheme. 24. The computer-readable storage medium of claim 23, wherein the instructions, when executed by the one or more processors, cause the computing device to: determine a second addressing scheme used to direct a second data transmission to the computing device; and retrieve, from among the plurality of unique addresses, a second address that is compliant with the second addressing scheme.
A multiple-identity secure device (MISD) persistently may store an identification code. The identification code may be stored in an integral memory of the device, or on an interchangeable card received in a physical interface of the MISD. The MISD may generate one or more unique identities (e.g., network addresses) from the stored identification code. The generated identities may be dynamically generated or may be securely stored in the MISD for subsequent retrieval. The generated identities may generates in accordance with an addressing scheme, a global/network setting, or as determined from a received data transmission.1. A method comprising: receiving, from a server and by a computing device storing a first identifier that identifies the computing device, a data transmission; extracting, from the data transmission, a second identifier; determining an addressing scheme used by the server to direct the data transmission to the computing device; generating, using the first identifier, an address of the computing device, wherein the address is compliant with the addressing scheme; comparing the address to the second identifier; and processing, based on determining that the address corresponds to the second identifier, the data transmission. 2. The method of claim 1, wherein the computing device comprises a set top box. 3. The method of claim 1, wherein the first identifier comprises a network address, a serial number, an alphanumeric string, or a media access control address. 4. The method of claim 1, further comprising: storing the first identifier at a first memory location of the computing device; and storing the address at a second memory location of the computing device different from the first memory location. 5. The method of claim 1, wherein determining the addressing scheme comprises using the second identifier extracted from the data transmission. 6. The method of claim 1, wherein generating the address occurs after receiving the data transmission. 7. The method of claim 1, wherein the address is a first address and the addressing scheme is a first addressing scheme, the method further comprising: generating, using the first identifier, a plurality of unique addresses of the computing device, wherein: the first address is one of the plurality of unique addresses; each of the plurality of unique addresses is compliant with a different addressing scheme; and the first address is compliant with the first addressing scheme. 8. The method of claim 7, further comprising: determining a second addressing scheme used to direct a second data transmission to the computing device; and retrieving, from among the plurality of unique addresses, a second address that is compliant with the second addressing scheme. 9. A method comprising: receiving, from a server and by a computing device storing a first identifier that identifies the computing device, a data transmission; extracting, from the data transmission, a second identifier; determining an addressing scheme used by the server to direct the data transmission to the computing device; generating, using the first identifier, an address of the computing device, wherein the address is compliant with the addressing scheme; comparing the address to the second identifier; and discarding, based on determining that the second identifier does not correspond to the address, the data transmission. 10. The method of claim 9, wherein the computing device comprises a set top box. 11. The method of claim 9, wherein the first identifier comprises a network address, a serial number, an alphanumeric string, or a media access control address. 12. The method of claim 9, further comprising: storing, by the computing device, the first identifier at a first memory location of the computing device; and storing, by the computing device, the address at a second memory location of the computing device different from the first memory location. 13. The method of claim 9, wherein determining the addressing scheme comprises using the second identifier extracted from the data transmission. 14. The method of claim 9, wherein generating the address occurs after receiving the data transmission. 15. The method of claim 9, wherein the address is a first address and the addressing scheme is a first addressing scheme, the method further comprising: generating, using the first identifier, a plurality of unique addresses of the computing device, wherein: the first address is one of the plurality of unique addresses; each of the plurality of unique addresses is compliant with a different addressing scheme; and the first address is compliant with the first addressing scheme. 16. The method of claim 15, further comprising: determining a second addressing scheme used to direct a second data transmission to the computing device; and retrieving, from among the plurality of unique addresses, a second address that is compliant with the second addressing scheme. 17. A computer-readable storage medium storing instructions that, when executed by one or more processors, cause a computing device storing a first identifier that identifies the computing device to: receive, from a server, a data transmission; extract, from the data transmission, a second identifier; determine an addressing scheme used by the server to direct the data transmission to the computing device; generate, using the first identifier, an address of the computing device, wherein the address is compliant with the addressing scheme; compare the address to the second identifier; and either process, based on determining that the address corresponds to the second identifier, the data transmission or discard, based on determining that the second identifier does not correspond to the address, the data transmission. 18. The computer-readable storage medium of claim 17, wherein the computing device comprises a set top box. 19. The computer-readable storage medium of claim 17, wherein the first identifier comprises a network address, a serial number, an alphanumeric string, or a media access control address. 20. The computer-readable storage medium of claim 17, wherein the instructions, when executed by the one or more processors, further cause the computing device to: store the first identifier at a first memory location of the computing device; and store the address at a second memory location of the computing device different from the first memory location. 21. The computer-readable storage medium of claim 17, wherein the instructions, when executed by the one or more processors, cause the computing device to: use the second identifier extracted from the data transmission to determine the addressing scheme. 22. The computer-readable storage medium of claim 17, wherein the instructions, when executed by the one or more processors, cause the computing device to: generate the address after receiving the data transmission. 23. The computer-readable storage medium of claim 17, wherein the address is a first address and the addressing scheme is a first addressing scheme and the instructions, when executed by the one or more processors, cause the computing device to: generate, using the first identifier, a plurality of unique addresses of the computing device, wherein: the first address is one of the plurality of unique addresses; each of the plurality of unique addresses is compliant with a different addressing scheme; and the first address is compliant with the first addressing scheme. 24. The computer-readable storage medium of claim 23, wherein the instructions, when executed by the one or more processors, cause the computing device to: determine a second addressing scheme used to direct a second data transmission to the computing device; and retrieve, from among the plurality of unique addresses, a second address that is compliant with the second addressing scheme.
2,400
9,361
9,361
16,295,176
2,482
Video coding may include generating, by a processor, a decoded frame by decoding a current frame from an encoded bitstream and outputting a reconstructed frame based on the decoded frame. Decoding includes identifying a current encoded block from the current frame, identifying a prediction coding model for the current block, wherein the prediction coding model is a machine learning prediction coding model from a plurality of machine learning prediction coding models, identifying reference values for decoding the current block based on the prediction coding model, obtaining prediction values based on the prediction coding model and the reference values, generating a decoded block corresponding to the current encoded block based on the prediction values, and including the decoded block in the decoded frame.
1. A method comprising: generating, by a processor, a decoded frame by decoding a current frame from an encoded bitstream, wherein decoding includes: identifying a current encoded block from the current frame; identifying a prediction coding model for the current block, wherein the prediction coding model is a machine learning prediction coding model from a plurality of machine learning prediction coding models; identifying reference values for decoding the current block based on the prediction coding model; obtaining prediction values based on the prediction coding model and the reference values; generating a decoded block corresponding to the current encoded block based on the prediction values; and including the decoded block in the decoded frame; and outputting a reconstructed frame based on the decoded frame. 2. The method of claim 1, wherein: identifying the prediction coding model includes identifying a set of non-linear functions representing the machine learning prediction coding model; and obtaining the prediction values includes obtaining the prediction values using at least one non-linear function from the set of non-linear functions. 3. The method of claim 1, wherein decoding includes: decoding a prediction coding model identifier form the encoded bitstream, the prediction coding model identifier indicting the prediction coding model; and identifying the prediction coding model based on the prediction coding model identifier. 4. The method of claim 3, wherein decoding includes: identifying a quality level for decoding the current frame; and identifying the prediction coding model based on the prediction coding model identifier and the quality level. 5. The method of claim 1, wherein identifying the prediction coding model includes identifying a prediction coding type, wherein the prediction coding type is an intra-prediction coding type, an inter-prediction coding type, or a compound prediction coding type. 6. The method of claim 1, wherein the prediction coding model is an intra-prediction coding model from a plurality of intra-prediction coding models. 7. The method of claim 1, wherein obtaining the prediction values includes: using the reference values as input values for an artificial neural network corresponding to the prediction coding model such that the prediction values are output by the artificial neural network in response to the reference values. 8. The method of claim 1, wherein identifying the prediction coding model includes: identifying a trained prediction coding model from a plurality of trained prediction coding models, trained by: identifying a prediction coding type, wherein the prediction coding type is an intra-prediction coding type, an inter-prediction coding type, or a compound prediction coding type; identifying a plurality of prediction coding modes associated with the prediction coding type, the plurality of prediction coding modes having a defined cardinality; identifying a plurality of prediction coding models such that each prediction coding mode from the plurality of prediction coding modes is associated with a respective prediction coding model from the plurality of prediction coding models; and obtaining the plurality of trained prediction coding models by training the prediction coding type using the plurality of prediction coding models as current prediction coding models; and identifying the trained prediction coding model as the prediction coding model. 9. The method of claim 8, wherein training the prediction coding type includes: obtaining partially trained prediction coding models by training the current prediction coding models; determining whether a convergence criterion for the prediction coding type is satisfied based on the partially trained prediction coding models; in response to a determination that the convergence criterion for the prediction coding type is satisfied, identifying the partially trained prediction coding models as the plurality of trained prediction coding models; and in response to a determination that the convergence criterion for the prediction coding type is unsatisfied, training the prediction coding type using the partially trained prediction coding models as the current prediction coding models. 10. The method of claim 9, wherein training the current prediction coding models includes: obtaining training data, the training data including a plurality of training data sets, each training data set including a respective plurality of reference values and a respective block of input pixel values; obtaining a classifier for partitioning the training data; obtaining a plurality of training data partitions by partitioning the training data using the classifier, wherein partitioning the training data using the classifier includes obtaining a plurality of training data partitions wherein each training data set from the plurality of training data sets is included in a respective training data partition from the plurality of training data partitions in accordance with the classifier, and wherein each training data partition from the plurality of training data partitions is associated with a respective prediction coding mode from the plurality of prediction coding modes; for each prediction coding mode from the plurality of prediction coding modes: obtaining a set of internal parameter values for a current prediction coding model from the current prediction coding models, the current prediction coding model corresponding to the prediction coding mode; for each training data set from the corresponding training data partition: obtaining prediction values output based on the current prediction coding model in response to reference values from the current training data set, wherein obtaining the prediction values includes using the set of internal parameter values as current internal parameter values; determining an accuracy metric based on a difference between the prediction values and input pixel values from the current training data set; generating an updated set of internal parameter values based on the current internal parameter values and the accuracy metric; and identifying the updated set of internal parameter values as the set of internal parameter values. 11. The method of claim 10, wherein: on a condition that the current prediction coding models are untrained prediction coding models, obtaining the classifier includes identifying a first classifier as the classifier; and on a condition that the current prediction coding models are partially trained prediction coding models, obtaining the classifier includes identifying a second classifier as the classifier. 12. The method of claim 11, wherein identifying the first classifier includes: identifying the first classifier such that the first classifier classifies a respective training data set based on encoding the respective training data set using ad-hoc prediction coding models that differ from the machine learning prediction coding models; or identifying the first classifier such that the first classifier classifies the respective training data set based on the input pixel values from the respective training data set. 13. The method of claim 12, wherein identifying the second classifier includes identifying the second classifier such that the second classifier classifies a respective training data set based on encoding the respective training data set using the partially trained prediction coding models. 14. The method of claim 10, wherein determining whether the convergence criterion for the prediction coding type is satisfied includes: in response to a determination that the current prediction coding models are untrained prediction coding models, determining that the convergence criterion for the prediction coding type is unsatisfied; in response to a determination that the current prediction coding models are partially trained prediction coding models: determining a cardinality of differences between the plurality of training data partitions and a previously generated plurality of training data partitions; in response to a determination that the cardinality of differences is at least a minimum variance threshold, determining that the convergence criterion for the prediction coding type is unsatisfied; and in response to a determination that the minimum variance threshold exceeds the cardinality of differences, determining that the convergence criterion for the prediction coding type is satisfied. 15. A method comprising: generating, by a processor, a decoded frame by decoding a current frame from an encoded bitstream, wherein decoding includes: identifying a current encoded block from the current frame; decoding a prediction coding model identifier form the encoded bitstream; identifying a prediction coding model for the current block based on the prediction coding model identifier, wherein the prediction coding model is a machine learning prediction coding model from a plurality of machine learning prediction coding models; identifying reference values for decoding the current block based on the prediction coding model; obtaining prediction values based on the prediction coding model and the reference values by using the reference values as input values for an artificial neural network corresponding to the prediction coding model such that the prediction values are output by the artificial neural network in response to the reference values; generating a decoded block corresponding to the current encoded block based on the prediction values; and including the decoded block in the decoded frame; and outputting a reconstructed frame based on the decoded frame. 16. The method of claim 15, wherein identifying the prediction coding model includes: identifying a trained prediction coding model from a plurality of trained prediction coding models, trained by: identifying a prediction coding type, wherein the prediction coding type is an intra-prediction coding type, an inter-prediction coding type, or a compound prediction coding type; identifying a plurality of prediction coding modes associated with the prediction coding type, the plurality of prediction coding modes having a defined cardinality; identifying a plurality of prediction coding models such that each prediction coding mode from the plurality of prediction coding modes is associated with a respective prediction coding model from the plurality of prediction coding models; and obtaining the plurality of trained prediction coding models by training the prediction coding type using the plurality of prediction coding models as current prediction coding models; and identifying the trained prediction coding model as the prediction coding model. 17. The method of claim 16, wherein training the prediction coding type includes: obtaining partially trained prediction coding models by training the current prediction coding models; determining whether a convergence criterion for the prediction coding type is satisfied based on the partially trained prediction coding models; in response to a determination that the convergence criterion for the prediction coding type is satisfied, identifying the partially trained prediction coding models as the plurality of trained prediction coding models; and in response to a determination that the convergence criterion for the prediction coding type is unsatisfied, training the prediction coding type using the partially trained prediction coding models as the current prediction coding models. 18. The method of claim 17, wherein training the current prediction coding models includes: obtaining training data, the training data including a plurality of training data sets, each training data set including a respective plurality of reference values and a respective block of input pixel values; obtaining a classifier for partitioning the training data; obtaining a plurality of training data partitions by partitioning the training data using the classifier, wherein partitioning the training data using the classifier includes obtaining a plurality of training data partitions wherein each training data set from the plurality of training data sets is included in a respective training data partition from the plurality of training data partitions in accordance with the classifier, and wherein each training data partition from the plurality of training data partitions is associated with a respective prediction coding mode from the plurality of prediction coding modes; for each prediction coding mode from the plurality of prediction coding modes: obtaining a set of internal parameter values for a current prediction coding model from the current prediction coding models, the current prediction coding model corresponding to the prediction coding mode; for each training data set from the corresponding training data partition: obtaining prediction values output based on the current prediction coding model in response to reference values from the current training data set, wherein obtaining the prediction values includes using the set of internal parameter values as current internal parameter values; determining an accuracy metric based on a difference between the prediction values and input pixel values from the current training data set; generating an updated set of internal parameter values based on the current internal parameter values and the accuracy metric; and identifying the updated set of internal parameter values as the set of internal parameter values. 19. The method of claim 18, wherein: on a condition that the current prediction coding models are untrained prediction coding models, obtaining the classifier includes identifying a first classifier as the classifier, wherein identifying the first classifier includes: identifying the first classifier such that the first classifier classifies a respective training data set based on encoding the respective training data set using ad-hoc prediction coding models that differ from the machine learning prediction coding models; or identifying the first classifier such that the first classifier classifies the respective training data set based on the input pixel values from the respective training data set; and on a condition that the current prediction coding models are partially trained prediction coding models, obtaining the classifier includes identifying a second classifier as the classifier, wherein identifying the second classifier includes identifying the second classifier such that the second classifier classifies a respective training data set based on encoding the respective training data set using the partially trained prediction coding models. 20. The method of claim 18, wherein determining whether the convergence criterion for the prediction coding type is satisfied includes: in response to a determination that the current prediction coding models are untrained prediction coding models, determining that the convergence criterion for the prediction coding type is unsatisfied; in response to a determination that the current prediction coding models are partially trained prediction coding models: determining a cardinality of differences between the plurality of training data partitions and a previously generated plurality of training data partitions; in response to a determination that the cardinality of differences is at least a minimum variance threshold, determining that the convergence criterion for the prediction coding type is unsatisfied; and in response to a determination that the minimum variance threshold exceeds the cardinality of differences, determining that the convergence criterion for the prediction coding type is satisfied. 21. An apparatus comprising: a processor configured to: generate a decoded frame by decoding a current frame from an encoded bitstream, wherein decoding includes: identifying a current encoded block from the current frame; identifying a prediction coding model for the current block, wherein the prediction coding model is a machine learning prediction coding model from a plurality of machine learning prediction coding models; identifying reference values for decoding the current block based on the prediction coding model; obtaining prediction values based on the prediction coding model and the reference values; generating a decoded block corresponding to the current encoded block based on the prediction values; and including the decoded block in the decoded frame; and output a reconstructed frame based on the decoded frame. 22. The apparatus of claim 21, wherein: identifying the prediction coding model includes identifying a set of non-linear functions representing the machine learning prediction coding model; and obtaining the prediction values includes obtaining the prediction values using at least one non-linear function from the set of non-linear functions.
Video coding may include generating, by a processor, a decoded frame by decoding a current frame from an encoded bitstream and outputting a reconstructed frame based on the decoded frame. Decoding includes identifying a current encoded block from the current frame, identifying a prediction coding model for the current block, wherein the prediction coding model is a machine learning prediction coding model from a plurality of machine learning prediction coding models, identifying reference values for decoding the current block based on the prediction coding model, obtaining prediction values based on the prediction coding model and the reference values, generating a decoded block corresponding to the current encoded block based on the prediction values, and including the decoded block in the decoded frame.1. A method comprising: generating, by a processor, a decoded frame by decoding a current frame from an encoded bitstream, wherein decoding includes: identifying a current encoded block from the current frame; identifying a prediction coding model for the current block, wherein the prediction coding model is a machine learning prediction coding model from a plurality of machine learning prediction coding models; identifying reference values for decoding the current block based on the prediction coding model; obtaining prediction values based on the prediction coding model and the reference values; generating a decoded block corresponding to the current encoded block based on the prediction values; and including the decoded block in the decoded frame; and outputting a reconstructed frame based on the decoded frame. 2. The method of claim 1, wherein: identifying the prediction coding model includes identifying a set of non-linear functions representing the machine learning prediction coding model; and obtaining the prediction values includes obtaining the prediction values using at least one non-linear function from the set of non-linear functions. 3. The method of claim 1, wherein decoding includes: decoding a prediction coding model identifier form the encoded bitstream, the prediction coding model identifier indicting the prediction coding model; and identifying the prediction coding model based on the prediction coding model identifier. 4. The method of claim 3, wherein decoding includes: identifying a quality level for decoding the current frame; and identifying the prediction coding model based on the prediction coding model identifier and the quality level. 5. The method of claim 1, wherein identifying the prediction coding model includes identifying a prediction coding type, wherein the prediction coding type is an intra-prediction coding type, an inter-prediction coding type, or a compound prediction coding type. 6. The method of claim 1, wherein the prediction coding model is an intra-prediction coding model from a plurality of intra-prediction coding models. 7. The method of claim 1, wherein obtaining the prediction values includes: using the reference values as input values for an artificial neural network corresponding to the prediction coding model such that the prediction values are output by the artificial neural network in response to the reference values. 8. The method of claim 1, wherein identifying the prediction coding model includes: identifying a trained prediction coding model from a plurality of trained prediction coding models, trained by: identifying a prediction coding type, wherein the prediction coding type is an intra-prediction coding type, an inter-prediction coding type, or a compound prediction coding type; identifying a plurality of prediction coding modes associated with the prediction coding type, the plurality of prediction coding modes having a defined cardinality; identifying a plurality of prediction coding models such that each prediction coding mode from the plurality of prediction coding modes is associated with a respective prediction coding model from the plurality of prediction coding models; and obtaining the plurality of trained prediction coding models by training the prediction coding type using the plurality of prediction coding models as current prediction coding models; and identifying the trained prediction coding model as the prediction coding model. 9. The method of claim 8, wherein training the prediction coding type includes: obtaining partially trained prediction coding models by training the current prediction coding models; determining whether a convergence criterion for the prediction coding type is satisfied based on the partially trained prediction coding models; in response to a determination that the convergence criterion for the prediction coding type is satisfied, identifying the partially trained prediction coding models as the plurality of trained prediction coding models; and in response to a determination that the convergence criterion for the prediction coding type is unsatisfied, training the prediction coding type using the partially trained prediction coding models as the current prediction coding models. 10. The method of claim 9, wherein training the current prediction coding models includes: obtaining training data, the training data including a plurality of training data sets, each training data set including a respective plurality of reference values and a respective block of input pixel values; obtaining a classifier for partitioning the training data; obtaining a plurality of training data partitions by partitioning the training data using the classifier, wherein partitioning the training data using the classifier includes obtaining a plurality of training data partitions wherein each training data set from the plurality of training data sets is included in a respective training data partition from the plurality of training data partitions in accordance with the classifier, and wherein each training data partition from the plurality of training data partitions is associated with a respective prediction coding mode from the plurality of prediction coding modes; for each prediction coding mode from the plurality of prediction coding modes: obtaining a set of internal parameter values for a current prediction coding model from the current prediction coding models, the current prediction coding model corresponding to the prediction coding mode; for each training data set from the corresponding training data partition: obtaining prediction values output based on the current prediction coding model in response to reference values from the current training data set, wherein obtaining the prediction values includes using the set of internal parameter values as current internal parameter values; determining an accuracy metric based on a difference between the prediction values and input pixel values from the current training data set; generating an updated set of internal parameter values based on the current internal parameter values and the accuracy metric; and identifying the updated set of internal parameter values as the set of internal parameter values. 11. The method of claim 10, wherein: on a condition that the current prediction coding models are untrained prediction coding models, obtaining the classifier includes identifying a first classifier as the classifier; and on a condition that the current prediction coding models are partially trained prediction coding models, obtaining the classifier includes identifying a second classifier as the classifier. 12. The method of claim 11, wherein identifying the first classifier includes: identifying the first classifier such that the first classifier classifies a respective training data set based on encoding the respective training data set using ad-hoc prediction coding models that differ from the machine learning prediction coding models; or identifying the first classifier such that the first classifier classifies the respective training data set based on the input pixel values from the respective training data set. 13. The method of claim 12, wherein identifying the second classifier includes identifying the second classifier such that the second classifier classifies a respective training data set based on encoding the respective training data set using the partially trained prediction coding models. 14. The method of claim 10, wherein determining whether the convergence criterion for the prediction coding type is satisfied includes: in response to a determination that the current prediction coding models are untrained prediction coding models, determining that the convergence criterion for the prediction coding type is unsatisfied; in response to a determination that the current prediction coding models are partially trained prediction coding models: determining a cardinality of differences between the plurality of training data partitions and a previously generated plurality of training data partitions; in response to a determination that the cardinality of differences is at least a minimum variance threshold, determining that the convergence criterion for the prediction coding type is unsatisfied; and in response to a determination that the minimum variance threshold exceeds the cardinality of differences, determining that the convergence criterion for the prediction coding type is satisfied. 15. A method comprising: generating, by a processor, a decoded frame by decoding a current frame from an encoded bitstream, wherein decoding includes: identifying a current encoded block from the current frame; decoding a prediction coding model identifier form the encoded bitstream; identifying a prediction coding model for the current block based on the prediction coding model identifier, wherein the prediction coding model is a machine learning prediction coding model from a plurality of machine learning prediction coding models; identifying reference values for decoding the current block based on the prediction coding model; obtaining prediction values based on the prediction coding model and the reference values by using the reference values as input values for an artificial neural network corresponding to the prediction coding model such that the prediction values are output by the artificial neural network in response to the reference values; generating a decoded block corresponding to the current encoded block based on the prediction values; and including the decoded block in the decoded frame; and outputting a reconstructed frame based on the decoded frame. 16. The method of claim 15, wherein identifying the prediction coding model includes: identifying a trained prediction coding model from a plurality of trained prediction coding models, trained by: identifying a prediction coding type, wherein the prediction coding type is an intra-prediction coding type, an inter-prediction coding type, or a compound prediction coding type; identifying a plurality of prediction coding modes associated with the prediction coding type, the plurality of prediction coding modes having a defined cardinality; identifying a plurality of prediction coding models such that each prediction coding mode from the plurality of prediction coding modes is associated with a respective prediction coding model from the plurality of prediction coding models; and obtaining the plurality of trained prediction coding models by training the prediction coding type using the plurality of prediction coding models as current prediction coding models; and identifying the trained prediction coding model as the prediction coding model. 17. The method of claim 16, wherein training the prediction coding type includes: obtaining partially trained prediction coding models by training the current prediction coding models; determining whether a convergence criterion for the prediction coding type is satisfied based on the partially trained prediction coding models; in response to a determination that the convergence criterion for the prediction coding type is satisfied, identifying the partially trained prediction coding models as the plurality of trained prediction coding models; and in response to a determination that the convergence criterion for the prediction coding type is unsatisfied, training the prediction coding type using the partially trained prediction coding models as the current prediction coding models. 18. The method of claim 17, wherein training the current prediction coding models includes: obtaining training data, the training data including a plurality of training data sets, each training data set including a respective plurality of reference values and a respective block of input pixel values; obtaining a classifier for partitioning the training data; obtaining a plurality of training data partitions by partitioning the training data using the classifier, wherein partitioning the training data using the classifier includes obtaining a plurality of training data partitions wherein each training data set from the plurality of training data sets is included in a respective training data partition from the plurality of training data partitions in accordance with the classifier, and wherein each training data partition from the plurality of training data partitions is associated with a respective prediction coding mode from the plurality of prediction coding modes; for each prediction coding mode from the plurality of prediction coding modes: obtaining a set of internal parameter values for a current prediction coding model from the current prediction coding models, the current prediction coding model corresponding to the prediction coding mode; for each training data set from the corresponding training data partition: obtaining prediction values output based on the current prediction coding model in response to reference values from the current training data set, wherein obtaining the prediction values includes using the set of internal parameter values as current internal parameter values; determining an accuracy metric based on a difference between the prediction values and input pixel values from the current training data set; generating an updated set of internal parameter values based on the current internal parameter values and the accuracy metric; and identifying the updated set of internal parameter values as the set of internal parameter values. 19. The method of claim 18, wherein: on a condition that the current prediction coding models are untrained prediction coding models, obtaining the classifier includes identifying a first classifier as the classifier, wherein identifying the first classifier includes: identifying the first classifier such that the first classifier classifies a respective training data set based on encoding the respective training data set using ad-hoc prediction coding models that differ from the machine learning prediction coding models; or identifying the first classifier such that the first classifier classifies the respective training data set based on the input pixel values from the respective training data set; and on a condition that the current prediction coding models are partially trained prediction coding models, obtaining the classifier includes identifying a second classifier as the classifier, wherein identifying the second classifier includes identifying the second classifier such that the second classifier classifies a respective training data set based on encoding the respective training data set using the partially trained prediction coding models. 20. The method of claim 18, wherein determining whether the convergence criterion for the prediction coding type is satisfied includes: in response to a determination that the current prediction coding models are untrained prediction coding models, determining that the convergence criterion for the prediction coding type is unsatisfied; in response to a determination that the current prediction coding models are partially trained prediction coding models: determining a cardinality of differences between the plurality of training data partitions and a previously generated plurality of training data partitions; in response to a determination that the cardinality of differences is at least a minimum variance threshold, determining that the convergence criterion for the prediction coding type is unsatisfied; and in response to a determination that the minimum variance threshold exceeds the cardinality of differences, determining that the convergence criterion for the prediction coding type is satisfied. 21. An apparatus comprising: a processor configured to: generate a decoded frame by decoding a current frame from an encoded bitstream, wherein decoding includes: identifying a current encoded block from the current frame; identifying a prediction coding model for the current block, wherein the prediction coding model is a machine learning prediction coding model from a plurality of machine learning prediction coding models; identifying reference values for decoding the current block based on the prediction coding model; obtaining prediction values based on the prediction coding model and the reference values; generating a decoded block corresponding to the current encoded block based on the prediction values; and including the decoded block in the decoded frame; and output a reconstructed frame based on the decoded frame. 22. The apparatus of claim 21, wherein: identifying the prediction coding model includes identifying a set of non-linear functions representing the machine learning prediction coding model; and obtaining the prediction values includes obtaining the prediction values using at least one non-linear function from the set of non-linear functions.
2,400
9,362
9,362
15,685,484
2,439
A system and method for protecting cloud-hosted applications against hypertext transfer protocol (HTTP) flood distributed denial-of-service (DDoS) attacks are provided. The method includes collecting telemetries from a plurality of sources deployed in at least one cloud computing platform hosting a protected cloud-hosted application; providing at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least HTTP traffic directed to the protected cloud-hosted application; evaluating the at least one rate-based feature and the at least one rate-invariant feature to determine whether the behavior of the at least HTTP traffic indicates a potential HTTP flood DDoS attack; and causing execution of a mitigation action when an indication of a potential HTTP flood DDoS attack is determined.
1. A method for protecting cloud-hosted applications against hypertext transfer protocol (HTTP) flood distributed denial-of-service (DDoS) attacks, comprising: collecting telemetries from a plurality of sources deployed in at least one cloud computing platform hosting at least one protected cloud-hosted application; providing at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least HTTP traffic directed to the at least one protected cloud-hosted application; evaluating the at least one rate-based feature and the at least one rate-invariant feature to determine whether the behavior of the at least HTTP traffic indicates a potential HTTP flood DDoS attack; and causing execution of a mitigation action when an indication of a potential HTTP flood DDoS attack is determined. 2. The method of claim 1, wherein the at least one cloud computing platform further includes one or more on-premises locations. 3. The method of claim 1, wherein the at least one protected cloud-hosted application is hosted in a plurality of cloud computing platforms of different vendors that includes one on-premises locations. 4. The method of claim 1, wherein the collected telemetries include at least one of: a number of HTTP methods requests originating from all end-user devices currently accessing the at least one protected cloud-hosted application, a number of processed bytes of HTTP traffic directed to the at least one protected cloud-hosted application. 5. The method of claim 4, wherein the least one rate-based feature is at least a number of HTTP requests per second (RPS) directed to the at least one protected cloud-hosted application and the rate-invariant feature is at least an average size of HTTP requests (ARS) directed to the at least one protected cloud-hosted application. 6. The method of claim 1, wherein evaluating the at least one rate-based feature and the at least one rate-invariant feature further comprises: evaluating, using a fuzzy logic inference engine, a normal degree of fulfilment (DoF) score, a suspicious DoF score, and an attack DoF score. 7. The method of claim 6, further comprising: evaluating, using an expert system, a degree of attack (DoA) score based on the maximum DoF scores computed for the normal DoF score, the suspicious DoF score and the attach DoF score; and comparing the DoA score to a predefined threshold, wherein an indication of a potential HTTP flood DDoS attack is determined when the DoA score exceeds the predefined threshold. 8. The method of claim 7, wherein the DoA score indicates a potential HTTP flood DDoS attack when the at least one rate-base feature demonstrates an increase and the at least one rate-invariant feature demonstrates a decrease or an increase. 9. The method of claim 1, wherein causing execution of a mitigation action further comprises: redirecting traffic destined to the at least one protected cloud-hosted application to a mitigation resource for at least cleaning the traffic; and sending the clean traffic to the destined protected cloud-hosted application. 10. The method of claim 9, wherein the mitigation resource and a detection resource are deployed in a defense cloud computing platform that is out-of-path from the at least one cloud computing platform hosting the at least one protected cloud-hosted application. 11. A non-transitory computer readable medium having stored thereon instructions for causing processing circuity to perform the method of claim 1. 12. A system for protecting cloud-hosted applications against hypertext transfer protocol (HTTP) flood distributed denial-of-service (DDoS) attacks, comprising: a processing circuity; and a memory connected to the processor, the memory contains instructions that when executed by the processing circuity, configure the system to: collect telemetries from a plurality of sources deployed in at least one cloud computing platform hosting at least one protected cloud-hosted application; provide at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least HTTP traffic directed to the at least one protected cloud-hosted application; evaluate the at least one rate-based feature and the at least one rate-invariant feature to determine whether the behavior of the at least HTTP traffic indicates a potential HTTP flood DDoS attack; and cause execution of a mitigation action, when an indication of a potential HTTP flood DDoS attack is determined. 13. A method for protecting cloud-hosted applications against transmission control protocol (TCP) flood distributed denial-of-service (DDoS) attacks, comprising: collecting telemetries from a plurality of sources deployed in at least one cloud computing platform hosting at least one protected cloud-hosted application; providing at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least TCP connections established with a server hosting the at least one protected cloud-hosted application; evaluating the at least one rate-based and the at least one rate-invariant feature to determine whether their behavior indicates a potential TCP flood DDoS attack; and causing execution of a mitigation action, when an indication of a potential TCP flood DDoS attack is determined. 14. The method of claim 13, wherein the at least one cloud computing platform further includes one or more on-premises locations. 15. The method of claim 13, wherein the protected cloud-hosted application is hosted in a plurality of cloud computing platforms of various vendors that includes one or on-premises locations. 16. The method of claim 13, wherein the collected telemetries include at least one of: a new TCP connections count, a concurrent active TCP connections count, a number of processed bytes of TCP connections directed to the protected by the cloud-hosted application. 17. The method of claim 16, wherein the at least one rate-base feature is any one of: a number of new TCP connections per second (NCPS); a number of concurrent TCP connections per second (ACPS), and wherein the at least one rate-invariant feature is at least an average TCP connection size (ACS). 18. The method of claim 13, wherein evaluating the feature further comprising: evaluate, using a FIS engine, a normal degree of fulfilment (DoF) score, a suspicious DoF score, and an attack DoF score. 19. The method of claim 18, further comprising: evaluating, using an expert system, a degree of attack (DoA) score based on the maximum DoF scores computed over all the DoF scores of all features; and comparing the DoA score to a predefined threshold, wherein an indication of a potential TCP flood DDoS attack is determined when the DoA score exceeds the predefined threshold. 20. The method of claim 19, wherein the DoA score indicates the potential TCP flood DDoS attack when the at least one rate-base feature demonstrates an increase and the at least one rate-invariant feature demonstrates an increase or a decrease. 21. The method of claim 13, wherein causing execution of a mitigation action further comprising: redirecting traffic destined to the at least one protected cloud-hosted application to a mitigation resource for at least cleaning the traffic; and sending the clean traffic to the destined protected cloud-hosted application. 22. The method of claim 21, wherein the mitigation resource and a detection resource are deployed in a defense cloud computing platform that is out-of-path from the at least one cloud computing platform hosting the at least one protected cloud-hosted application. 23. A non-transitory computer readable medium having stored thereon instructions for causing processing circuity to perform the method of claim 13. 24. A system for protecting cloud-hosted applications against transmission control protocol (TCP) flood distributed denial-of-service (DDoS) attacks, comprising: a processing circuity; and a memory connected to the processor, the memory contains instructions that when executed by the processing circuity, configure the system to: collect telemetries from a plurality of sources deployed in at least one cloud computing platform hosting at least one protected cloud-hosted application; provide at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least TCP connections established with a server hosting the at least one protected cloud-hosted application; evaluate the at least one rate-based and the at least one rate-invariant feature to determine whether their behavior indicates a potential TCP flood DDoS attack; and cause execution of a mitigation action, when an indication of a potential TCP flood DDoS attack is determined.
A system and method for protecting cloud-hosted applications against hypertext transfer protocol (HTTP) flood distributed denial-of-service (DDoS) attacks are provided. The method includes collecting telemetries from a plurality of sources deployed in at least one cloud computing platform hosting a protected cloud-hosted application; providing at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least HTTP traffic directed to the protected cloud-hosted application; evaluating the at least one rate-based feature and the at least one rate-invariant feature to determine whether the behavior of the at least HTTP traffic indicates a potential HTTP flood DDoS attack; and causing execution of a mitigation action when an indication of a potential HTTP flood DDoS attack is determined.1. A method for protecting cloud-hosted applications against hypertext transfer protocol (HTTP) flood distributed denial-of-service (DDoS) attacks, comprising: collecting telemetries from a plurality of sources deployed in at least one cloud computing platform hosting at least one protected cloud-hosted application; providing at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least HTTP traffic directed to the at least one protected cloud-hosted application; evaluating the at least one rate-based feature and the at least one rate-invariant feature to determine whether the behavior of the at least HTTP traffic indicates a potential HTTP flood DDoS attack; and causing execution of a mitigation action when an indication of a potential HTTP flood DDoS attack is determined. 2. The method of claim 1, wherein the at least one cloud computing platform further includes one or more on-premises locations. 3. The method of claim 1, wherein the at least one protected cloud-hosted application is hosted in a plurality of cloud computing platforms of different vendors that includes one on-premises locations. 4. The method of claim 1, wherein the collected telemetries include at least one of: a number of HTTP methods requests originating from all end-user devices currently accessing the at least one protected cloud-hosted application, a number of processed bytes of HTTP traffic directed to the at least one protected cloud-hosted application. 5. The method of claim 4, wherein the least one rate-based feature is at least a number of HTTP requests per second (RPS) directed to the at least one protected cloud-hosted application and the rate-invariant feature is at least an average size of HTTP requests (ARS) directed to the at least one protected cloud-hosted application. 6. The method of claim 1, wherein evaluating the at least one rate-based feature and the at least one rate-invariant feature further comprises: evaluating, using a fuzzy logic inference engine, a normal degree of fulfilment (DoF) score, a suspicious DoF score, and an attack DoF score. 7. The method of claim 6, further comprising: evaluating, using an expert system, a degree of attack (DoA) score based on the maximum DoF scores computed for the normal DoF score, the suspicious DoF score and the attach DoF score; and comparing the DoA score to a predefined threshold, wherein an indication of a potential HTTP flood DDoS attack is determined when the DoA score exceeds the predefined threshold. 8. The method of claim 7, wherein the DoA score indicates a potential HTTP flood DDoS attack when the at least one rate-base feature demonstrates an increase and the at least one rate-invariant feature demonstrates a decrease or an increase. 9. The method of claim 1, wherein causing execution of a mitigation action further comprises: redirecting traffic destined to the at least one protected cloud-hosted application to a mitigation resource for at least cleaning the traffic; and sending the clean traffic to the destined protected cloud-hosted application. 10. The method of claim 9, wherein the mitigation resource and a detection resource are deployed in a defense cloud computing platform that is out-of-path from the at least one cloud computing platform hosting the at least one protected cloud-hosted application. 11. A non-transitory computer readable medium having stored thereon instructions for causing processing circuity to perform the method of claim 1. 12. A system for protecting cloud-hosted applications against hypertext transfer protocol (HTTP) flood distributed denial-of-service (DDoS) attacks, comprising: a processing circuity; and a memory connected to the processor, the memory contains instructions that when executed by the processing circuity, configure the system to: collect telemetries from a plurality of sources deployed in at least one cloud computing platform hosting at least one protected cloud-hosted application; provide at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least HTTP traffic directed to the at least one protected cloud-hosted application; evaluate the at least one rate-based feature and the at least one rate-invariant feature to determine whether the behavior of the at least HTTP traffic indicates a potential HTTP flood DDoS attack; and cause execution of a mitigation action, when an indication of a potential HTTP flood DDoS attack is determined. 13. A method for protecting cloud-hosted applications against transmission control protocol (TCP) flood distributed denial-of-service (DDoS) attacks, comprising: collecting telemetries from a plurality of sources deployed in at least one cloud computing platform hosting at least one protected cloud-hosted application; providing at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least TCP connections established with a server hosting the at least one protected cloud-hosted application; evaluating the at least one rate-based and the at least one rate-invariant feature to determine whether their behavior indicates a potential TCP flood DDoS attack; and causing execution of a mitigation action, when an indication of a potential TCP flood DDoS attack is determined. 14. The method of claim 13, wherein the at least one cloud computing platform further includes one or more on-premises locations. 15. The method of claim 13, wherein the protected cloud-hosted application is hosted in a plurality of cloud computing platforms of various vendors that includes one or on-premises locations. 16. The method of claim 13, wherein the collected telemetries include at least one of: a new TCP connections count, a concurrent active TCP connections count, a number of processed bytes of TCP connections directed to the protected by the cloud-hosted application. 17. The method of claim 16, wherein the at least one rate-base feature is any one of: a number of new TCP connections per second (NCPS); a number of concurrent TCP connections per second (ACPS), and wherein the at least one rate-invariant feature is at least an average TCP connection size (ACS). 18. The method of claim 13, wherein evaluating the feature further comprising: evaluate, using a FIS engine, a normal degree of fulfilment (DoF) score, a suspicious DoF score, and an attack DoF score. 19. The method of claim 18, further comprising: evaluating, using an expert system, a degree of attack (DoA) score based on the maximum DoF scores computed over all the DoF scores of all features; and comparing the DoA score to a predefined threshold, wherein an indication of a potential TCP flood DDoS attack is determined when the DoA score exceeds the predefined threshold. 20. The method of claim 19, wherein the DoA score indicates the potential TCP flood DDoS attack when the at least one rate-base feature demonstrates an increase and the at least one rate-invariant feature demonstrates an increase or a decrease. 21. The method of claim 13, wherein causing execution of a mitigation action further comprising: redirecting traffic destined to the at least one protected cloud-hosted application to a mitigation resource for at least cleaning the traffic; and sending the clean traffic to the destined protected cloud-hosted application. 22. The method of claim 21, wherein the mitigation resource and a detection resource are deployed in a defense cloud computing platform that is out-of-path from the at least one cloud computing platform hosting the at least one protected cloud-hosted application. 23. A non-transitory computer readable medium having stored thereon instructions for causing processing circuity to perform the method of claim 13. 24. A system for protecting cloud-hosted applications against transmission control protocol (TCP) flood distributed denial-of-service (DDoS) attacks, comprising: a processing circuity; and a memory connected to the processor, the memory contains instructions that when executed by the processing circuity, configure the system to: collect telemetries from a plurality of sources deployed in at least one cloud computing platform hosting at least one protected cloud-hosted application; provide at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least TCP connections established with a server hosting the at least one protected cloud-hosted application; evaluate the at least one rate-based and the at least one rate-invariant feature to determine whether their behavior indicates a potential TCP flood DDoS attack; and cause execution of a mitigation action, when an indication of a potential TCP flood DDoS attack is determined.
2,400
9,363
9,363
16,138,302
2,485
In an example method and system, image data to an image processing module. Image data is read from memory into a down-scaler, which down-scales the image data to a first resolution, which is stored in a first buffer. A region of image data which the image processing module will request is predicted, and image data corresponding to at least part of the predicted region of image data is stored in a first buffer, in a second resolution, higher than the first. When a request for image data is received, it is then determined whether image data corresponding to the requested image data is in the second buffer, and if so, then image data is provided to the image processing module from the second buffer. If not, then image data from the first buffer is up-scaled, and the up-scaled image data is provided to the image processing module.
1. A method for providing image data to an image processing module, comprising: storing image data at a first resolution in a first buffer; storing a subset of the image data corresponding to a portion of the image in a second buffer, wherein the image data in the second buffer is at a higher resolution than the first resolution; receiving a request for image data from the image processing module; determining that image data corresponding to at least a portion of the requested image data is not in the second buffer; up-scaling image data from the first buffer to provide a substitute for the at least a portion of the requested image data at a resolution that at least matches the higher resolution; and providing the up-scaled image data to the image processing module. 2. The method according to claim 1, further comprising reading image data from memory into a down-scaler which down scales the image data to the first resolution, prior to it being stored in the first buffer. 3. The method according to claim 1, further comprising predicting a region of image data which the image processing module will request. 4. The method according to claim 3, wherein the subset of the image data corresponding to a portion of the image stored in a second buffer corresponds to at least part of the predicted region. 5. The method according to claim 4, wherein the step of storing image data corresponding to at least part of the predicted region of image data in a second buffer comprises: reading image data from memory into a down-scaler which downscales the image to a second resolution; and storing the second resolution image data in the second buffer. 6. The method according to claim 1, further comprising: determining that image data corresponding to a portion of the requested image data is in the second buffer; and providing image data from the second buffer to the image processing module at a resolution at least equal to the higher resolution. 7. The method according to claim 1, where the first buffer stores image data corresponding to the full width of an image frame. 8. The method according to claim 1, wherein image data is arranged in each of the first and second buffers in rectangular blocks. 9. The method according to claim 1, wherein the size of the blocks in the first buffer is related to the size of the blocks in the second buffer by a scale factor corresponding to the difference between the first resolution and the higher resolution. 10. The method according to claim 1, wherein the second buffer is implemented using a content addressable memory. 11. The method according to claim 3, wherein the region of image data which the image processing module will request is predicted using data supplied by the image processing module or a further image processing module. 12. The method according to claim 11, wherein the region of image data which the image processing module will request is predicted using motion vectors supplied by the image processing module or the further image processing module. 13. The method according to claim 1, wherein storing the first resolution image data in the first buffer comprises: writing the first resolution image data to memory; and reading the first resolution image data from memory into the first buffer. 14. The method according to claim 2, wherein the down-scaler produces residual image data by determining a difference between: image data at the higher resolution; and image data which has been up-scaled from the first resolution to the higher resolution. 15. The method according to claim 14, wherein the residual image data is compressed using lossy or non-lossy compression. 16. The method according to claim 14, wherein the image data in the second buffer comprises residual image data. 17. The method according to claim 16, wherein providing image data from the second buffer to the image processing module comprises: up-scaling image data from the second buffer with the upscaled image data; and providing the result to the image processing module. 18. The method according to claim 16, further comprising determining the amount of high frequency information in a part of the image. 19. The method according to claim 18, wherein image data corresponding to a portion of the image is not stored into the second buffer if it is determined that the amount of high frequency information in that part of the image is below a threshold. 20. A system for providing image data to an image processing module, comprising: a first buffer arranged to store the first resolution image data; a second buffer arranged to store a subset of the image data corresponding to a portion of the image, wherein the resolution of the image data stored in the second buffer is higher than the first resolution; and a processor configured to: receive a request for image data from the image processing module; determine that image data corresponding to at least a portion of the requested image data is not in the second buffer; up-scale image data from the first buffer to provide a substitute for the at least a portion of the requested region of image data at a resolution that at least matches the higher resolution; and provide the up-scaled image data to the image processing module.
In an example method and system, image data to an image processing module. Image data is read from memory into a down-scaler, which down-scales the image data to a first resolution, which is stored in a first buffer. A region of image data which the image processing module will request is predicted, and image data corresponding to at least part of the predicted region of image data is stored in a first buffer, in a second resolution, higher than the first. When a request for image data is received, it is then determined whether image data corresponding to the requested image data is in the second buffer, and if so, then image data is provided to the image processing module from the second buffer. If not, then image data from the first buffer is up-scaled, and the up-scaled image data is provided to the image processing module.1. A method for providing image data to an image processing module, comprising: storing image data at a first resolution in a first buffer; storing a subset of the image data corresponding to a portion of the image in a second buffer, wherein the image data in the second buffer is at a higher resolution than the first resolution; receiving a request for image data from the image processing module; determining that image data corresponding to at least a portion of the requested image data is not in the second buffer; up-scaling image data from the first buffer to provide a substitute for the at least a portion of the requested image data at a resolution that at least matches the higher resolution; and providing the up-scaled image data to the image processing module. 2. The method according to claim 1, further comprising reading image data from memory into a down-scaler which down scales the image data to the first resolution, prior to it being stored in the first buffer. 3. The method according to claim 1, further comprising predicting a region of image data which the image processing module will request. 4. The method according to claim 3, wherein the subset of the image data corresponding to a portion of the image stored in a second buffer corresponds to at least part of the predicted region. 5. The method according to claim 4, wherein the step of storing image data corresponding to at least part of the predicted region of image data in a second buffer comprises: reading image data from memory into a down-scaler which downscales the image to a second resolution; and storing the second resolution image data in the second buffer. 6. The method according to claim 1, further comprising: determining that image data corresponding to a portion of the requested image data is in the second buffer; and providing image data from the second buffer to the image processing module at a resolution at least equal to the higher resolution. 7. The method according to claim 1, where the first buffer stores image data corresponding to the full width of an image frame. 8. The method according to claim 1, wherein image data is arranged in each of the first and second buffers in rectangular blocks. 9. The method according to claim 1, wherein the size of the blocks in the first buffer is related to the size of the blocks in the second buffer by a scale factor corresponding to the difference between the first resolution and the higher resolution. 10. The method according to claim 1, wherein the second buffer is implemented using a content addressable memory. 11. The method according to claim 3, wherein the region of image data which the image processing module will request is predicted using data supplied by the image processing module or a further image processing module. 12. The method according to claim 11, wherein the region of image data which the image processing module will request is predicted using motion vectors supplied by the image processing module or the further image processing module. 13. The method according to claim 1, wherein storing the first resolution image data in the first buffer comprises: writing the first resolution image data to memory; and reading the first resolution image data from memory into the first buffer. 14. The method according to claim 2, wherein the down-scaler produces residual image data by determining a difference between: image data at the higher resolution; and image data which has been up-scaled from the first resolution to the higher resolution. 15. The method according to claim 14, wherein the residual image data is compressed using lossy or non-lossy compression. 16. The method according to claim 14, wherein the image data in the second buffer comprises residual image data. 17. The method according to claim 16, wherein providing image data from the second buffer to the image processing module comprises: up-scaling image data from the second buffer with the upscaled image data; and providing the result to the image processing module. 18. The method according to claim 16, further comprising determining the amount of high frequency information in a part of the image. 19. The method according to claim 18, wherein image data corresponding to a portion of the image is not stored into the second buffer if it is determined that the amount of high frequency information in that part of the image is below a threshold. 20. A system for providing image data to an image processing module, comprising: a first buffer arranged to store the first resolution image data; a second buffer arranged to store a subset of the image data corresponding to a portion of the image, wherein the resolution of the image data stored in the second buffer is higher than the first resolution; and a processor configured to: receive a request for image data from the image processing module; determine that image data corresponding to at least a portion of the requested image data is not in the second buffer; up-scale image data from the first buffer to provide a substitute for the at least a portion of the requested region of image data at a resolution that at least matches the higher resolution; and provide the up-scaled image data to the image processing module.
2,400
9,364
9,364
15,205,946
2,483
A vision-assist device may include at least one image sensor for generating image data corresponding to an environment, a user input device for receiving user input regarding one or more physical characteristics of a user, and a processor. The processor may be programmed to receive the image data from the at least one image sensor, receive the user input from the user input device, and adjust an alignment of the at least one image sensor based on the received image data and the user input. Methods for aligning an image sensor are also provided.
1. A vision-assist device comprising: at least one image sensor for generating image data corresponding to an environment; a user input device for receiving user input regarding one or more physical characteristics of a user; and a processor, wherein the processor is programmed to: receive the image data from the at least one image sensor; receive the user input from the user input device; and adjust an alignment of the at least one image sensor based on the received image data and the user input. 2. The vision-assist device of claim 1, wherein the one or more physical characteristics of the user are selected from a group consisting of a height of the user, a weight of the user, a neck size of the user, and a chest size of the user. 3. The vision-assist device of claim 1, further comprising a motor coupled to the at least one image sensor, wherein the processor is programmed to drive the motor to adjust the alignment of the at least one image sensor. 4. The vision-assist device of claim 1, wherein the processor is further programmed to: determine at least one additional physical characteristic of the user based at least in part on the received image data. 5. The vision-assist device of claim 4, wherein the at least one additional physical characteristic is selected from the group consisting of an angle of the user's chest with respect to a vertical axis, an angle of the user's shoulders with respect to a horizontal axis, and an amount of curvature of the user's chest. 6. The vision-assist device of claim 1, wherein adjusting the alignment of the at least one image sensor comprises adjusting a horizontal alignment of a field of view of the at least one image sensor. 7. The vision-assist device of claim 1, wherein adjusting the alignment of the at least one image sensor comprises adjusting a vertical alignment of a field of view of the at least one image sensor. 8. A method comprising: receiving, from an image sensor, image data corresponding to an environment; receiving, from a user input device, user input regarding one or more physical characteristics of a user; and adjusting an alignment of the image sensor based at least in part on the one or more physical characteristics of the user. 9. The method of claim 8, wherein adjusting the alignment of the image sensor comprises adjusting the alignment of the image sensor with respect to the environment. 10. The method of claim 8, further comprising: providing one or more questions regarding the one or more physical characteristics of the user, wherein the user input is received responsive to providing the one or more questions. 11. The method of claim 10, wherein providing the one or more questions comprises providing the one or more questions via an audio device, and wherein the user input device comprises a microphone. 12. The method of claim 8, wherein adjusting the alignment of the image sensor comprises driving a motor to adjust the alignment of the image sensor. 13. The method of claim 8, further comprising: selecting a user characteristic profile for the user based on the one or more physical characteristics of the user; and adjusting the alignment of the image sensor based on the user characteristic profile. 14. The method of claim 13, wherein the user characteristic profile is selected from a plurality of user characteristic profiles. 15. The method of claim 8, wherein the image sensor comprises a first image sensor, the method further comprising: receiving, from a second image sensor, image data corresponding to the environment; and adjusting an alignment of the second image sensor based at least in part on the one or more physical characteristics of the user. 16. The method of claim 15, wherein the first image sensor is adjusted independent of the second image sensor. 17. A vision-assist device comprising: at least one image sensor for generating image data corresponding to an environment; a motor coupled to the at least one image sensor; a user input device for receiving user input regarding one or more physical characteristics of a user; and a processor, wherein the processor is programmed to: receive the image data from the at least one image sensor; receive the user input from the user input device; and provide a signal to the motor regarding a desired alignment for the at least one image sensor based on the received image data and the user input. 18. The vision-assist device of claim 17, wherein the motor comprises a servomotor. 19. The vision-assist device of claim 17, further comprising an audio device configured to provide questions regarding the one or more physical characteristics of the user. 20. The vision-assist device of claim 19, wherein the user input device comprises a microphone.
A vision-assist device may include at least one image sensor for generating image data corresponding to an environment, a user input device for receiving user input regarding one or more physical characteristics of a user, and a processor. The processor may be programmed to receive the image data from the at least one image sensor, receive the user input from the user input device, and adjust an alignment of the at least one image sensor based on the received image data and the user input. Methods for aligning an image sensor are also provided.1. A vision-assist device comprising: at least one image sensor for generating image data corresponding to an environment; a user input device for receiving user input regarding one or more physical characteristics of a user; and a processor, wherein the processor is programmed to: receive the image data from the at least one image sensor; receive the user input from the user input device; and adjust an alignment of the at least one image sensor based on the received image data and the user input. 2. The vision-assist device of claim 1, wherein the one or more physical characteristics of the user are selected from a group consisting of a height of the user, a weight of the user, a neck size of the user, and a chest size of the user. 3. The vision-assist device of claim 1, further comprising a motor coupled to the at least one image sensor, wherein the processor is programmed to drive the motor to adjust the alignment of the at least one image sensor. 4. The vision-assist device of claim 1, wherein the processor is further programmed to: determine at least one additional physical characteristic of the user based at least in part on the received image data. 5. The vision-assist device of claim 4, wherein the at least one additional physical characteristic is selected from the group consisting of an angle of the user's chest with respect to a vertical axis, an angle of the user's shoulders with respect to a horizontal axis, and an amount of curvature of the user's chest. 6. The vision-assist device of claim 1, wherein adjusting the alignment of the at least one image sensor comprises adjusting a horizontal alignment of a field of view of the at least one image sensor. 7. The vision-assist device of claim 1, wherein adjusting the alignment of the at least one image sensor comprises adjusting a vertical alignment of a field of view of the at least one image sensor. 8. A method comprising: receiving, from an image sensor, image data corresponding to an environment; receiving, from a user input device, user input regarding one or more physical characteristics of a user; and adjusting an alignment of the image sensor based at least in part on the one or more physical characteristics of the user. 9. The method of claim 8, wherein adjusting the alignment of the image sensor comprises adjusting the alignment of the image sensor with respect to the environment. 10. The method of claim 8, further comprising: providing one or more questions regarding the one or more physical characteristics of the user, wherein the user input is received responsive to providing the one or more questions. 11. The method of claim 10, wherein providing the one or more questions comprises providing the one or more questions via an audio device, and wherein the user input device comprises a microphone. 12. The method of claim 8, wherein adjusting the alignment of the image sensor comprises driving a motor to adjust the alignment of the image sensor. 13. The method of claim 8, further comprising: selecting a user characteristic profile for the user based on the one or more physical characteristics of the user; and adjusting the alignment of the image sensor based on the user characteristic profile. 14. The method of claim 13, wherein the user characteristic profile is selected from a plurality of user characteristic profiles. 15. The method of claim 8, wherein the image sensor comprises a first image sensor, the method further comprising: receiving, from a second image sensor, image data corresponding to the environment; and adjusting an alignment of the second image sensor based at least in part on the one or more physical characteristics of the user. 16. The method of claim 15, wherein the first image sensor is adjusted independent of the second image sensor. 17. A vision-assist device comprising: at least one image sensor for generating image data corresponding to an environment; a motor coupled to the at least one image sensor; a user input device for receiving user input regarding one or more physical characteristics of a user; and a processor, wherein the processor is programmed to: receive the image data from the at least one image sensor; receive the user input from the user input device; and provide a signal to the motor regarding a desired alignment for the at least one image sensor based on the received image data and the user input. 18. The vision-assist device of claim 17, wherein the motor comprises a servomotor. 19. The vision-assist device of claim 17, further comprising an audio device configured to provide questions regarding the one or more physical characteristics of the user. 20. The vision-assist device of claim 19, wherein the user input device comprises a microphone.
2,400
9,365
9,365
16,411,923
2,419
in a slice-based network, switches can be programmed to perform routing functions based on a slice identifier. The switch can receive a packet and determine a slice identifier for the packet based on packet header information. The switch can use the slice identifier to determine a next hop. Using the slice identifier with a multi-path table, the switch can select an egress interface for sending the packet to the next hop. The multi-path table can ensure that traffic for a slice stays on the same interface link to the next hop, even when a link aggregation group (“LAG”) is used for creation of a virtual channel across multiple interfaces or ports.
1. A method for slice-based routing, comprising: receiving a first packet at a switch; determining, at the switch, a slice identifier for the first packet based on header information of the first packet, wherein the slice identifier uniquely identifies a slice in a virtual service network (“VSN”); determining, at the switch, a next hop for the first packet; selecting an egress interface from a plurality of interfaces based on the slice identifier, wherein the slice identifier is used to create a hash, and the hash is used to select the egress interface; and sending the first packet from the egress interface to the next hop. 2. The method of claim 1, further comprising determining a different next hop for a second packet, wherein the first and second packets include a same destination address but have different slice identifiers. 3. The method of claim 1, wherein determining the slice identifier includes looking up the slice identifier at the switch based on a destination machine address control (“MAC”) address, destination internet protocol (“IP”) address, and destination port. 4. The method of claim 1, further comprising: determining whether a multi-path table exists for sending traffic to the next hop, the multi-path table including multiple links for sending traffic to the next hop; and when the multi-path table exists, selecting the egress interface from the multi-path table based on the hash created using the slice identifier. 5. The method of claim 4, wherein the multi-path table is a Layer 3 equal-cost multi-path (“ECMP”) table. 6. The method of claim 1, further comprising grouping the plurality of interfaces together in a link aggregation group (“LAG”), wherein the egress interface within the LAG is selected based on the hash created using the slice identifier. 7. The method of claim 6, wherein selection of the egress interfaces within the LAG changes based on a new slice path being implemented for the slice identifier. 8. A non-transitory, computer-readable medium comprising instructions that, when executed by a processor, perform stages for slice-based routing, the stages comprising: receiving a first packet at a switch; determining, at the switch, a slice identifier for the first packet based on header information of the first packet, wherein the slice identifier uniquely identifies a slice in a virtual service network (“VSN”); determining, at the switch, a next hop for the first packet; selecting an egress interface from a plurality of interfaces based on the slice identifier, wherein the slice identifier is used to create a hash, and the hash is used to select the egress interface; and sending the first packet from the egress interface to the next hop. 9. The non-transitory, computer-readable medium of claim 8, the stages further comprising determining a different next hop for a second packet, wherein the first and second packets include a same destination address but have different slice identifiers. 10. The non-transitory, computer-readable medium of claim 8, wherein determining the slice identifier includes looking up the slice identifier at the switch based on a destination machine address control (“MAC”) address, destination internet protocol (“IP”) address, and destination port. 11. The non-transitory, computer-readable medium of claim 8, the stages further comprising: determining whether a multi-path table exists for sending traffic to the next hop, the multi-path table including multiple links for sending traffic to the next hop; and when the multi-path table exists, selecting the egress interface from the multi-path table based on the hash created using the slice identifier. 12. The non-transitory, computer-readable medium of claim 11, wherein the multi-path table is a Layer 3 equal-cost multi-path (“ECMP”) table. 13. The non-transitory, computer-readable medium of claim 8, the stages further comprising grouping the plurality of interfaces together in a link aggregation group (“LAG”), wherein the egress interface within the LAG is selected based on the hash created using the slice identifier. 14. The non-transitory, computer-readable medium of claim 13, wherein selection of the egress interfaces within the LAG changes based on a new slice path being implemented for the slice identifier. 15. A system for slice-based routing, comprising: a non-transitory, computer-readable medium containing instructions; and a processor that executes the monitoring module to perform stages comprising: receiving a first packet at a switch; determining, at the switch, a slice identifier for the first packet based on header information of the first packet, wherein the slice identifier uniquely identifies a slice in a virtual service network (“VSN”); determining, at the switch, a next hop for the first packet; selecting an egress interface from a plurality of interfaces based on the slice identifier, wherein the slice identifier is used to create a hash, and the hash is used to select the egress interface; and sending the first packet from the egress interface to the next hop. 16. The system of claim 15, the stages further comprising determining a different next hop for a second packet, wherein the first and second packets include a same destination address but have different slice identifiers. 17. The system of claim 15, wherein determining the slice identifier includes looking up the slice identifier at the switch based on a destination machine address control (“MAC”) address, destination internet protocol (“IP”) address, and destination port. 18. The system of claim 15, the stages further comprising: determining whether a multi-path table exists for sending traffic to the next hop, the multi-path table including multiple links for sending traffic to the next hop; and when the multi-path table exists, selecting the egress interface from the multi-path table based on the hash created using the slice identifier. 19. The system of claim 18, wherein the multi-path table is a Layer 3 equal-cost multi-path (“ECMP”) table. 20. The system of claim 19, the stages further comprising grouping the plurality of interfaces together in a link aggregation group (“LAG”), wherein the egress interface within the LAG is selected based on the hash created using the slice identifier.
in a slice-based network, switches can be programmed to perform routing functions based on a slice identifier. The switch can receive a packet and determine a slice identifier for the packet based on packet header information. The switch can use the slice identifier to determine a next hop. Using the slice identifier with a multi-path table, the switch can select an egress interface for sending the packet to the next hop. The multi-path table can ensure that traffic for a slice stays on the same interface link to the next hop, even when a link aggregation group (“LAG”) is used for creation of a virtual channel across multiple interfaces or ports.1. A method for slice-based routing, comprising: receiving a first packet at a switch; determining, at the switch, a slice identifier for the first packet based on header information of the first packet, wherein the slice identifier uniquely identifies a slice in a virtual service network (“VSN”); determining, at the switch, a next hop for the first packet; selecting an egress interface from a plurality of interfaces based on the slice identifier, wherein the slice identifier is used to create a hash, and the hash is used to select the egress interface; and sending the first packet from the egress interface to the next hop. 2. The method of claim 1, further comprising determining a different next hop for a second packet, wherein the first and second packets include a same destination address but have different slice identifiers. 3. The method of claim 1, wherein determining the slice identifier includes looking up the slice identifier at the switch based on a destination machine address control (“MAC”) address, destination internet protocol (“IP”) address, and destination port. 4. The method of claim 1, further comprising: determining whether a multi-path table exists for sending traffic to the next hop, the multi-path table including multiple links for sending traffic to the next hop; and when the multi-path table exists, selecting the egress interface from the multi-path table based on the hash created using the slice identifier. 5. The method of claim 4, wherein the multi-path table is a Layer 3 equal-cost multi-path (“ECMP”) table. 6. The method of claim 1, further comprising grouping the plurality of interfaces together in a link aggregation group (“LAG”), wherein the egress interface within the LAG is selected based on the hash created using the slice identifier. 7. The method of claim 6, wherein selection of the egress interfaces within the LAG changes based on a new slice path being implemented for the slice identifier. 8. A non-transitory, computer-readable medium comprising instructions that, when executed by a processor, perform stages for slice-based routing, the stages comprising: receiving a first packet at a switch; determining, at the switch, a slice identifier for the first packet based on header information of the first packet, wherein the slice identifier uniquely identifies a slice in a virtual service network (“VSN”); determining, at the switch, a next hop for the first packet; selecting an egress interface from a plurality of interfaces based on the slice identifier, wherein the slice identifier is used to create a hash, and the hash is used to select the egress interface; and sending the first packet from the egress interface to the next hop. 9. The non-transitory, computer-readable medium of claim 8, the stages further comprising determining a different next hop for a second packet, wherein the first and second packets include a same destination address but have different slice identifiers. 10. The non-transitory, computer-readable medium of claim 8, wherein determining the slice identifier includes looking up the slice identifier at the switch based on a destination machine address control (“MAC”) address, destination internet protocol (“IP”) address, and destination port. 11. The non-transitory, computer-readable medium of claim 8, the stages further comprising: determining whether a multi-path table exists for sending traffic to the next hop, the multi-path table including multiple links for sending traffic to the next hop; and when the multi-path table exists, selecting the egress interface from the multi-path table based on the hash created using the slice identifier. 12. The non-transitory, computer-readable medium of claim 11, wherein the multi-path table is a Layer 3 equal-cost multi-path (“ECMP”) table. 13. The non-transitory, computer-readable medium of claim 8, the stages further comprising grouping the plurality of interfaces together in a link aggregation group (“LAG”), wherein the egress interface within the LAG is selected based on the hash created using the slice identifier. 14. The non-transitory, computer-readable medium of claim 13, wherein selection of the egress interfaces within the LAG changes based on a new slice path being implemented for the slice identifier. 15. A system for slice-based routing, comprising: a non-transitory, computer-readable medium containing instructions; and a processor that executes the monitoring module to perform stages comprising: receiving a first packet at a switch; determining, at the switch, a slice identifier for the first packet based on header information of the first packet, wherein the slice identifier uniquely identifies a slice in a virtual service network (“VSN”); determining, at the switch, a next hop for the first packet; selecting an egress interface from a plurality of interfaces based on the slice identifier, wherein the slice identifier is used to create a hash, and the hash is used to select the egress interface; and sending the first packet from the egress interface to the next hop. 16. The system of claim 15, the stages further comprising determining a different next hop for a second packet, wherein the first and second packets include a same destination address but have different slice identifiers. 17. The system of claim 15, wherein determining the slice identifier includes looking up the slice identifier at the switch based on a destination machine address control (“MAC”) address, destination internet protocol (“IP”) address, and destination port. 18. The system of claim 15, the stages further comprising: determining whether a multi-path table exists for sending traffic to the next hop, the multi-path table including multiple links for sending traffic to the next hop; and when the multi-path table exists, selecting the egress interface from the multi-path table based on the hash created using the slice identifier. 19. The system of claim 18, wherein the multi-path table is a Layer 3 equal-cost multi-path (“ECMP”) table. 20. The system of claim 19, the stages further comprising grouping the plurality of interfaces together in a link aggregation group (“LAG”), wherein the egress interface within the LAG is selected based on the hash created using the slice identifier.
2,400
9,366
9,366
14,817,815
2,419
A computing system includes: a storage device configured to perform in-storage processing with formatted data based on application data from an application; and return an in-storage processing output to the application for continued execution.
1. A computing system comprising: a storage device configured to: perform in-storage processing with formatted data based on application data from an application; and return an in-storage processing output to the application for continued execution. 2. The system as claimed in claim 1 wherein the storage device is further configured to receive a sub-application request based on an application request from the application for performing in-storage processing. 3. The system as claimed in claim 1 wherein the storage device is further configured to generate an aggregated output from in-storage processing outputs from one or more other storage devices and return the aggregated output to the application for continued execution. 4. The system as claimed in claim 1 wherein the storage device is further configured to issue a device request based on an application request from the application to at least one of other storage devices. 5. The system as claimed in claim 1 wherein: the storage device is further configured to: issue a device request; further comprising: another storage device configured to: receive the device request, generate another device request; and yet another storage device configured to receive the another device request. 6. The system as claimed in claim 1 further comprising a storage group including the storage device, configured to send in-storage processing outputs to be aggregated and sent to the application. 7. The system as claimed in claim 1 wherein the storage device is further configured to aggregate an in-storage processing output as a partial aggregated output to be returned to the application. 8. The system as claimed in claim 1 wherein the storage device is further configured to generate the formatted data from the application data. 9. The system as claimed in claim 1 wherein the storage device is further configured to generate a formatted unit of the formatted data with an application unit of the application data and a data pad. 10. The system as claimed in claim 1 wherein the storage device is further configured to generate a formatted unit of the formatted data with non-aligned instances of application units of the application data and a data pad. 11. A method of operation of a computing system comprising: performing in-storage processing with a storage device with formatted data based on application data from an application; and returning an in-storage processing output from the storage device to the application for continued execution. 12. The method as claimed in claim 11 further comprising receiving a sub-application request at the storage device based on an application request from the application for performing in-storage processing. 13. The method as claimed in claim 11 further comprising sorting in-storage processing outputs from a storage group including the storage device. 14. The method as claimed in claim 11 further comprising issuing a device request based on an application request from the application to a storage group including the storage device. 15. The method as claimed in claim 11 further comprising: issuing a device request from the storage device; receiving the device request at another storage device; generating another device request by the another storage device; and receiving the another device request by yet another storage device. 16. The method as claimed in claim 11 further comprising sending in-storage processing outputs by a storage group include the storage device to be aggregated and sent to the application. 17. The method as claimed in claim 11 further comprising aggregating an in-storage processing output as a partial aggregated output to be returned to the application. 18. The method as claimed in claim 11 further comprising generating the formatted data based on the application data. 19. The method as claimed in claim 11 further comprising generating a formatted unit of the formatted data with an application unit of the application data and a data pad. 20. The method as claimed in claim 11 further comprising generating a formatted unit of the formatted data with non-aligned instances of application units of the application data and a data pad.
A computing system includes: a storage device configured to perform in-storage processing with formatted data based on application data from an application; and return an in-storage processing output to the application for continued execution.1. A computing system comprising: a storage device configured to: perform in-storage processing with formatted data based on application data from an application; and return an in-storage processing output to the application for continued execution. 2. The system as claimed in claim 1 wherein the storage device is further configured to receive a sub-application request based on an application request from the application for performing in-storage processing. 3. The system as claimed in claim 1 wherein the storage device is further configured to generate an aggregated output from in-storage processing outputs from one or more other storage devices and return the aggregated output to the application for continued execution. 4. The system as claimed in claim 1 wherein the storage device is further configured to issue a device request based on an application request from the application to at least one of other storage devices. 5. The system as claimed in claim 1 wherein: the storage device is further configured to: issue a device request; further comprising: another storage device configured to: receive the device request, generate another device request; and yet another storage device configured to receive the another device request. 6. The system as claimed in claim 1 further comprising a storage group including the storage device, configured to send in-storage processing outputs to be aggregated and sent to the application. 7. The system as claimed in claim 1 wherein the storage device is further configured to aggregate an in-storage processing output as a partial aggregated output to be returned to the application. 8. The system as claimed in claim 1 wherein the storage device is further configured to generate the formatted data from the application data. 9. The system as claimed in claim 1 wherein the storage device is further configured to generate a formatted unit of the formatted data with an application unit of the application data and a data pad. 10. The system as claimed in claim 1 wherein the storage device is further configured to generate a formatted unit of the formatted data with non-aligned instances of application units of the application data and a data pad. 11. A method of operation of a computing system comprising: performing in-storage processing with a storage device with formatted data based on application data from an application; and returning an in-storage processing output from the storage device to the application for continued execution. 12. The method as claimed in claim 11 further comprising receiving a sub-application request at the storage device based on an application request from the application for performing in-storage processing. 13. The method as claimed in claim 11 further comprising sorting in-storage processing outputs from a storage group including the storage device. 14. The method as claimed in claim 11 further comprising issuing a device request based on an application request from the application to a storage group including the storage device. 15. The method as claimed in claim 11 further comprising: issuing a device request from the storage device; receiving the device request at another storage device; generating another device request by the another storage device; and receiving the another device request by yet another storage device. 16. The method as claimed in claim 11 further comprising sending in-storage processing outputs by a storage group include the storage device to be aggregated and sent to the application. 17. The method as claimed in claim 11 further comprising aggregating an in-storage processing output as a partial aggregated output to be returned to the application. 18. The method as claimed in claim 11 further comprising generating the formatted data based on the application data. 19. The method as claimed in claim 11 further comprising generating a formatted unit of the formatted data with an application unit of the application data and a data pad. 20. The method as claimed in claim 11 further comprising generating a formatted unit of the formatted data with non-aligned instances of application units of the application data and a data pad.
2,400
9,367
9,367
15,130,080
2,483
An image coding method of hierarchically coding a plurality of pictures to generate a bitstream, includes: coding each of the plurality of pictures, which belongs to any one of a plurality of hierarchical layers, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the picture belongs; and generating the bitstream by coding the coded pictures and time information indicating decoding times of the coded pictures. The time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers.
1. An image coding method of hierarchically coding a plurality of pictures to generate a bitstream, the image coding method comprising: coding each picture of the plurality of pictures, which belongs to any one of a plurality of hierarchical layers, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the each picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the each picture belongs; and generating the bitstream by coding the coded pictures and time information indicating decoding times of the coded pictures, wherein the time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers, and the plurality of pictures includes at least one picture which is located differently in coding order and display order. 2. An image decoding method of decoding a bitstream generated by hierarchically coding a plurality of pictures each belonging to any one of a plurality of hierarchical layers, the image decoding method comprising: decoding time information indicating decoding times of the plurality of pictures, from the bitstream; and decoding each picture of the plurality of pictures according to the time information, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the each picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the each picture belongs, wherein the time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers, and the plurality of pictures includes at least one picture which is located differently in coding order and display order. 3. An image coding apparatus that hierarchically codes a plurality of pictures to generate a bitstream, the image coding apparatus comprising: a coding unit configured to code each picture of the plurality of pictures, which belongs to any one of a plurality of hierarchical layers, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the each picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the each picture belongs; and a generating unit configured to generate the bitstream by coding the coded pictures and time information indicating decoding times of the coded pictures, wherein the time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers, and the plurality of pictures includes at least one picture which is located differently in coding order and display order. 4. A receiving apparatus that receives a bitstream generated by hierarchically coding a plurality of pictures each belonging to any one of a plurality of hierarchical layers, the receiving apparatus comprising: a first decoding unit configured to decode time information indicating decoding times of the plurality of pictures, from the bitstream; and a second decoding unit configured to decode each picture of the plurality of pictures according to the time information, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the each picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the each picture belongs, wherein the time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers, and the plurality of pictures includes at least one picture which is located differently in coding order and display order. 5. A transmitting apparatus that transmits to the outside a bitstream generated by hierarchical coding of a plurality of pictures, wherein the hierarchical coding is executed by: coding each picture of the plurality of pictures, which belongs to any one of a plurality of hierarchical layers, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the each picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the each picture belongs; and generating the bitstream by coding the coded pictures and time information indicating decoding times of the coded pictures, the time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers, and the plurality of pictures includes at least one picture which is located differently in coding order and display order.
An image coding method of hierarchically coding a plurality of pictures to generate a bitstream, includes: coding each of the plurality of pictures, which belongs to any one of a plurality of hierarchical layers, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the picture belongs; and generating the bitstream by coding the coded pictures and time information indicating decoding times of the coded pictures. The time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers.1. An image coding method of hierarchically coding a plurality of pictures to generate a bitstream, the image coding method comprising: coding each picture of the plurality of pictures, which belongs to any one of a plurality of hierarchical layers, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the each picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the each picture belongs; and generating the bitstream by coding the coded pictures and time information indicating decoding times of the coded pictures, wherein the time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers, and the plurality of pictures includes at least one picture which is located differently in coding order and display order. 2. An image decoding method of decoding a bitstream generated by hierarchically coding a plurality of pictures each belonging to any one of a plurality of hierarchical layers, the image decoding method comprising: decoding time information indicating decoding times of the plurality of pictures, from the bitstream; and decoding each picture of the plurality of pictures according to the time information, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the each picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the each picture belongs, wherein the time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers, and the plurality of pictures includes at least one picture which is located differently in coding order and display order. 3. An image coding apparatus that hierarchically codes a plurality of pictures to generate a bitstream, the image coding apparatus comprising: a coding unit configured to code each picture of the plurality of pictures, which belongs to any one of a plurality of hierarchical layers, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the each picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the each picture belongs; and a generating unit configured to generate the bitstream by coding the coded pictures and time information indicating decoding times of the coded pictures, wherein the time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers, and the plurality of pictures includes at least one picture which is located differently in coding order and display order. 4. A receiving apparatus that receives a bitstream generated by hierarchically coding a plurality of pictures each belonging to any one of a plurality of hierarchical layers, the receiving apparatus comprising: a first decoding unit configured to decode time information indicating decoding times of the plurality of pictures, from the bitstream; and a second decoding unit configured to decode each picture of the plurality of pictures according to the time information, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the each picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the each picture belongs, wherein the time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers, and the plurality of pictures includes at least one picture which is located differently in coding order and display order. 5. A transmitting apparatus that transmits to the outside a bitstream generated by hierarchical coding of a plurality of pictures, wherein the hierarchical coding is executed by: coding each picture of the plurality of pictures, which belongs to any one of a plurality of hierarchical layers, with reference to a picture belonging to a hierarchical layer which is same as or lower than a hierarchical layer to which the each picture belongs, and without reference to a picture belonging to a hierarchical layer which is higher than the hierarchical layer to which the each picture belongs; and generating the bitstream by coding the coded pictures and time information indicating decoding times of the coded pictures, the time information indicates that the decoding times are set at equal intervals for low-layer pictures which are the plurality of pictures other than highest-layer pictures belonging to a highest layer among the plurality of hierarchical layers, and the plurality of pictures includes at least one picture which is located differently in coding order and display order.
2,400
9,368
9,368
15,550,364
2,424
Systems and methods for streaming content are disclosed. A Media Presentation Description (MPD) may be associated with streaming content, for example, in Dynamic Adaptive Streaming Over HTTP (DASH). An MPD may comprise an element, e.g., a header element or URL query element, which provides a name/Value functionality. An element may allow a request that results in insertion of custom headers. Requests may be used for retrieval of a subsegment, segment, or MPD, re-referencing of remote elements, or triggered by an event. The event may be embedded either in an MPD or in segments.
1. A method for obtaining streaming content, the method comprising: receiving a Media Presentation Description (MPD) file; determining a name parameter from the MPD file; determining a value parameter associated with the name parameter; determining a request type in which to include the name parameter and the value parameter; sending a request of the determined request type, wherein the request comprises an HTTP header including the name parameter and value parameter; and receiving the streaming content. 2. The method of claim 1, wherein the name parameter is specified in the MPD file. 3. The method of claim 1, wherein the value parameter is specified in the MPD file. 4. The method of claim 1, wherein the value parameter is derived. 5. The method of claim 1, wherein the value parameter is retrieved. 6. The method of claim 1, wherein determining a request type in which to include the name parameter and the value parameter comprises determining from among a plurality of request types in which the name parameter and value parameter are included. 7. The method of claim 1, wherein the determined request type is an XLink GET request. 8. The method of claim 1, wherein the determined request type is an MPD GET request. 9. The method of claim 1, wherein the determined request type is an event GET request. 10. The method of claim 1, wherein the determined request results in at least one of retrieval of at least one of a subsegment, a segment, or an MPD, re-referencing of remote elements, or triggering an event. 11.-12. (canceled) 13. The method of claim 1, wherein the name parameter and the value parameter are used to at least one of authenticate a user, target content for a user, or indicate the location of a user. 14. A device comprising: a processor configured to: receive a Media Presentation Description (MPD) file; determine a name parameter from the MPD file; determine a value parameter associated with the name; determine a request type in which to include the name parameter and the value parameter; and send a request of the determined request type, wherein the request comprises an HTTP header including the name parameter and the value parameter. 15. The device of claim 14, wherein the name parameter is specified in the MPD file. 16. The device of claim 14, wherein the value parameter is specified in the MPD file. 17. The device of claim 14, wherein the value parameter is derived. 18. The device of claim 14, wherein the value parameter is retrieved. 19. The device of claim 14, wherein the processor is further configured to determine from among a plurality of request types in which the name parameter and value parameter are included. 20. The device of claim 14, wherein the determined request type is an XLink GET request. 21. The device of claim 14, wherein the determined request type is an MPD GET request. 22. The device of claim 14, wherein the determined request type is an event GET request. 23. The device of claim 14, wherein the determined request results in at least one of retrieval of at least one of a subsegment, a segment, or an MPD, re-referencing of remote elements, or triggering an event. 24.-25. (canceled) 26. The device of claim 14, wherein the name parameter and the value parameter are used to at least one of authenticate a user, target content for a user, or indicate the location of a user.
Systems and methods for streaming content are disclosed. A Media Presentation Description (MPD) may be associated with streaming content, for example, in Dynamic Adaptive Streaming Over HTTP (DASH). An MPD may comprise an element, e.g., a header element or URL query element, which provides a name/Value functionality. An element may allow a request that results in insertion of custom headers. Requests may be used for retrieval of a subsegment, segment, or MPD, re-referencing of remote elements, or triggered by an event. The event may be embedded either in an MPD or in segments.1. A method for obtaining streaming content, the method comprising: receiving a Media Presentation Description (MPD) file; determining a name parameter from the MPD file; determining a value parameter associated with the name parameter; determining a request type in which to include the name parameter and the value parameter; sending a request of the determined request type, wherein the request comprises an HTTP header including the name parameter and value parameter; and receiving the streaming content. 2. The method of claim 1, wherein the name parameter is specified in the MPD file. 3. The method of claim 1, wherein the value parameter is specified in the MPD file. 4. The method of claim 1, wherein the value parameter is derived. 5. The method of claim 1, wherein the value parameter is retrieved. 6. The method of claim 1, wherein determining a request type in which to include the name parameter and the value parameter comprises determining from among a plurality of request types in which the name parameter and value parameter are included. 7. The method of claim 1, wherein the determined request type is an XLink GET request. 8. The method of claim 1, wherein the determined request type is an MPD GET request. 9. The method of claim 1, wherein the determined request type is an event GET request. 10. The method of claim 1, wherein the determined request results in at least one of retrieval of at least one of a subsegment, a segment, or an MPD, re-referencing of remote elements, or triggering an event. 11.-12. (canceled) 13. The method of claim 1, wherein the name parameter and the value parameter are used to at least one of authenticate a user, target content for a user, or indicate the location of a user. 14. A device comprising: a processor configured to: receive a Media Presentation Description (MPD) file; determine a name parameter from the MPD file; determine a value parameter associated with the name; determine a request type in which to include the name parameter and the value parameter; and send a request of the determined request type, wherein the request comprises an HTTP header including the name parameter and the value parameter. 15. The device of claim 14, wherein the name parameter is specified in the MPD file. 16. The device of claim 14, wherein the value parameter is specified in the MPD file. 17. The device of claim 14, wherein the value parameter is derived. 18. The device of claim 14, wherein the value parameter is retrieved. 19. The device of claim 14, wherein the processor is further configured to determine from among a plurality of request types in which the name parameter and value parameter are included. 20. The device of claim 14, wherein the determined request type is an XLink GET request. 21. The device of claim 14, wherein the determined request type is an MPD GET request. 22. The device of claim 14, wherein the determined request type is an event GET request. 23. The device of claim 14, wherein the determined request results in at least one of retrieval of at least one of a subsegment, a segment, or an MPD, re-referencing of remote elements, or triggering an event. 24.-25. (canceled) 26. The device of claim 14, wherein the name parameter and the value parameter are used to at least one of authenticate a user, target content for a user, or indicate the location of a user.
2,400
9,369
9,369
16,201,578
2,426
A system including a third-party server and a live-view server is disclosed. The live-view server receives, from the third-party server, a request for a live view of each location, structure, or point of interest; identifies at least one vehicle positioned at each location, structure, or point of interest; obtains each requested live view from a live-view camera of the at least one identified vehicle; and transmits, to the third-party server, a dynamic hyperlink associated with each requested live view. The third-party server receives, from a request device, a request for a live view of a specific location, structure, or point of interest; identifies at least one live view, from a live-view database, associated with the specific location, structure, or point of interest; and serves to the request device, via the dynamic hyperlink, the at least one live view.
1. A system for serving live views captured by a plurality of vehicles having live-view cameras to request devices, the system comprising: a third-party server comprising a live-view database; and a live-view server communicatively coupled with the third-party server, wherein the live-view server comprises a live-view application, the live-view application executable by the live-view server to: receive, from the third-party server, a request for a live view of each location of a plurality of locations, each structure of a plurality of structures, or each point of interest of a plurality of points of interest to be tracked or monitored by the live-view server on behalf of the third-party server; identify at least one vehicle of a plurality of vehicles positioned at each location, each structure, or each point of interest, wherein a live-view camera of the at least one identified vehicle captures each requested live view; obtain each requested live view from the live-view camera of the at least one identified vehicle; and transmit, to the third-party server, a dynamic hyperlink associated with each requested live view for storage in the live-view database; wherein the third-party server: receives, from a request device, a request for a live view of a specific location, a specific structure, or a specific point of interest; identifies at least one live view, from the live-view database, associated with the specific location, the specific structure, or the specific point of interest requested by the request device; and serves to the request device, via the dynamic hyperlink, the at least one live view associated with the specific location, the specific structure, or the specific point of interest. 2. The system of claim 1, wherein the third-party server comprises a plurality of third-party servers, wherein the live-view server comprises a link database, and wherein the live-view application is further executable by the live-view server to: segregate, in the link database, requested live views for each of the plurality of third-party servers. 3. The system of claim 1, wherein the request device is not associated with a vehicle of the plurality of vehicles. 4. The system of claim 1, wherein the request device comprises a vehicle of the plurality of vehicles. 5. The system of claim 1, wherein the live-view application is further executable by the live-view server to: identify more than one vehicle positioned at each location, each structure, or each point of interest, wherein a live-view camera of the more than one identified vehicle captures each requested live view; obtain each requested live view from each live-view camera of the more than one identified vehicle; determine a requested live view, captured by one of the more than one identified vehicle, to transmit, via the dynamic hyperlink to the third-party server; and transmit the dynamic hyperlink, associated with the requested live view captured by the one of the more than one identified vehicle, to the third-party server for storage in the live-view database. 6. The system of claim 5, wherein the live-view application is further executable by the live-view server to: determine the requested live view to transmit, via the dynamic hyperlink, to the third-party server based on a network connection speed between the live-view server and the more than one identified vehicle. 7. The system of claim 5, wherein the live-view application is further executable by the live-view server to: determine the requested live view to transmit, via the dynamic hyperlink, to the third-party server based on a quality metric associated with each requested live view obtained from each live-view camera of the more than one identified vehicle. 8. The system of claim 1, wherein the live-view application is further executable by the live-view server to: obtain a live view from any live-view camera of any of the plurality of identified vehicles on demand. 9. The system of claim 1, wherein the specific location, the specific structure, or the specific point of interest is associated with global positioning system (GPS) coordinates; wherein the live-view application is further executable by the live-view server to: identify the at least one vehicle of the plurality of vehicles positioned at each location, each structure, or each point of interest based on location information provided by a GPS receiver associated with each of the plurality of vehicles; and associate the dynamic hyperlink with the location information; and wherein the third-party server further: identifies the at least one live view associated with the specific location, the specific structure, or the specific point of interest requested by the request device based on the location information associated with the dynamic hyperlink and the GPS coordinates associated with the live view request. 10. The system of claim 1, wherein the live-view application is further executable by the live-view server to: update a live view associated with each dynamic hyperlink. 11. A computer-implemented method for serving live views captured by a plurality of vehicles having live-view cameras to request devices, the method comprising: receiving from a third-party server, by a live-view server communicatively coupled to the third-party server, a request for a live view of each location of a plurality of locations, each structure of a plurality of structures, or each point of interest of a plurality of points of interest to be tracked or monitored by the live-view server on behalf of the third-party server; identifying, by the live-view server, at least one vehicle of a plurality of vehicles positioned at each location, each structure, or each point of interest, wherein a live-view camera of the at least one identified vehicle captures each requested live view; obtaining, by the live-view server, each requested live view from the live-view camera of the at least one identified vehicle; transmitting to the third-party server, by the live-view server, a dynamic hyperlink associated with each requested live view for storage in a live-view database of the third-party server; receiving from a request device, by the third-party server, a request for a live view of a specific location, a specific structure, or a specific point of interest; identifying from the live-view database, by the third-party server, at least one live view associated with the specific location, the specific structure, or the specific point of interest requested by the request device; and serving to the request device, by the third-party server, the at least one live view associated with the specific location, the specific structure, or the specific point of interest via the dynamic hyperlink. 12. The computer-implemented method of claim 11, further comprising: identifying, by the live-view server, more than one vehicle positioned at each location, each structure, or each point of interest, wherein a live-view camera of the more than one identified vehicle captures each requested live view; obtaining, by the live-view server, each requested live view from each live-view camera of the more than one identified vehicle; determining, by the live-view server, a requested live view, captured by one of the more than one identified vehicle, to transmit, via the dynamic hyperlink to the third-party server; and transmitting, by the live-view server, the dynamic hyperlink, associated with the requested live view captured by the one of the more than one identified vehicle, to the third-party server for storage in the live-view database. 13. The computer-implemented method of claim 12, further comprising: determining, by the live-view server, the requested live view to transmit, via the dynamic hyperlink, to the third-party server based on a network connection speed between the live-view server and the more than one identified vehicle. 14. The computer-implemented method of claim 12, further comprising: determining, by the live-view server, the requested live view to transmit, via the dynamic hyperlink, to the third-party server based on a quality metric associated with each requested live view obtained from each live-view camera of the more than one identified vehicle. 15. The computer-implemented method of claim 11, further comprising: obtaining, by the live-view server, a live view from any live-view camera of any of the plurality of identified vehicles on demand. 16. The computer-implemented method of claim 11, further comprising: updating, by the live-view server, a live view associated with each dynamic hyperlink. 17. A system for serving live views captured by a plurality of vehicles having live-view cameras to request devices, the system comprising: a first processing device communicatively coupled to a live-view database; and a second processing device communicatively coupled with the first processing device, wherein the second processing device comprises a non-transitory processor-readable storage medium comprising programming instructions that, when executed, cause the second processing device to: receive, from the first processing device, a request for a live view of each location of a plurality of locations, each structure of a plurality of structures, or each point of interest of a plurality of points of interest to be tracked or monitored by the second processing device on behalf of the first processing device; identify at least one vehicle of a plurality of vehicles positioned at each location, each structure, or each point of interest, wherein a live-view camera of the at least one identified vehicle captures each requested live view; obtain each requested live view from the live-view camera of the at least one identified vehicle; and transmit to the first processing device, a dynamic hyperlink associated with each requested live view for storage in the live-view database; wherein the first processing device comprises a non-transitory processor-readable storage medium comprising programming instructions that, when executed, cause the first processing device to: receive, from a request device, a request for a live view of a specific location, a specific structure, or a specific point of interest; identify at least one live view, from the live-view database, associated with the specific location, the specific structure, or the specific point of interest requested by the request device; and serve to the request device, via the dynamic hyperlink, the at least one live view associated with the specific location, the specific structure, or the specific point of interest. 18. The system of claim 17, wherein the first processing device comprises a plurality of third-party processing devices, wherein the second processing device comprises a link database, and wherein the programming instructions, when executed, further cause the second processing device to: segregate, in the link database, requested live views for each of the plurality of third-party processing devices. 19. The system of claim 17, wherein the request device is not associated with a vehicle of the plurality of vehicles. 20. The system of claim 17, wherein the request device comprises a vehicle of the plurality of vehicles.
A system including a third-party server and a live-view server is disclosed. The live-view server receives, from the third-party server, a request for a live view of each location, structure, or point of interest; identifies at least one vehicle positioned at each location, structure, or point of interest; obtains each requested live view from a live-view camera of the at least one identified vehicle; and transmits, to the third-party server, a dynamic hyperlink associated with each requested live view. The third-party server receives, from a request device, a request for a live view of a specific location, structure, or point of interest; identifies at least one live view, from a live-view database, associated with the specific location, structure, or point of interest; and serves to the request device, via the dynamic hyperlink, the at least one live view.1. A system for serving live views captured by a plurality of vehicles having live-view cameras to request devices, the system comprising: a third-party server comprising a live-view database; and a live-view server communicatively coupled with the third-party server, wherein the live-view server comprises a live-view application, the live-view application executable by the live-view server to: receive, from the third-party server, a request for a live view of each location of a plurality of locations, each structure of a plurality of structures, or each point of interest of a plurality of points of interest to be tracked or monitored by the live-view server on behalf of the third-party server; identify at least one vehicle of a plurality of vehicles positioned at each location, each structure, or each point of interest, wherein a live-view camera of the at least one identified vehicle captures each requested live view; obtain each requested live view from the live-view camera of the at least one identified vehicle; and transmit, to the third-party server, a dynamic hyperlink associated with each requested live view for storage in the live-view database; wherein the third-party server: receives, from a request device, a request for a live view of a specific location, a specific structure, or a specific point of interest; identifies at least one live view, from the live-view database, associated with the specific location, the specific structure, or the specific point of interest requested by the request device; and serves to the request device, via the dynamic hyperlink, the at least one live view associated with the specific location, the specific structure, or the specific point of interest. 2. The system of claim 1, wherein the third-party server comprises a plurality of third-party servers, wherein the live-view server comprises a link database, and wherein the live-view application is further executable by the live-view server to: segregate, in the link database, requested live views for each of the plurality of third-party servers. 3. The system of claim 1, wherein the request device is not associated with a vehicle of the plurality of vehicles. 4. The system of claim 1, wherein the request device comprises a vehicle of the plurality of vehicles. 5. The system of claim 1, wherein the live-view application is further executable by the live-view server to: identify more than one vehicle positioned at each location, each structure, or each point of interest, wherein a live-view camera of the more than one identified vehicle captures each requested live view; obtain each requested live view from each live-view camera of the more than one identified vehicle; determine a requested live view, captured by one of the more than one identified vehicle, to transmit, via the dynamic hyperlink to the third-party server; and transmit the dynamic hyperlink, associated with the requested live view captured by the one of the more than one identified vehicle, to the third-party server for storage in the live-view database. 6. The system of claim 5, wherein the live-view application is further executable by the live-view server to: determine the requested live view to transmit, via the dynamic hyperlink, to the third-party server based on a network connection speed between the live-view server and the more than one identified vehicle. 7. The system of claim 5, wherein the live-view application is further executable by the live-view server to: determine the requested live view to transmit, via the dynamic hyperlink, to the third-party server based on a quality metric associated with each requested live view obtained from each live-view camera of the more than one identified vehicle. 8. The system of claim 1, wherein the live-view application is further executable by the live-view server to: obtain a live view from any live-view camera of any of the plurality of identified vehicles on demand. 9. The system of claim 1, wherein the specific location, the specific structure, or the specific point of interest is associated with global positioning system (GPS) coordinates; wherein the live-view application is further executable by the live-view server to: identify the at least one vehicle of the plurality of vehicles positioned at each location, each structure, or each point of interest based on location information provided by a GPS receiver associated with each of the plurality of vehicles; and associate the dynamic hyperlink with the location information; and wherein the third-party server further: identifies the at least one live view associated with the specific location, the specific structure, or the specific point of interest requested by the request device based on the location information associated with the dynamic hyperlink and the GPS coordinates associated with the live view request. 10. The system of claim 1, wherein the live-view application is further executable by the live-view server to: update a live view associated with each dynamic hyperlink. 11. A computer-implemented method for serving live views captured by a plurality of vehicles having live-view cameras to request devices, the method comprising: receiving from a third-party server, by a live-view server communicatively coupled to the third-party server, a request for a live view of each location of a plurality of locations, each structure of a plurality of structures, or each point of interest of a plurality of points of interest to be tracked or monitored by the live-view server on behalf of the third-party server; identifying, by the live-view server, at least one vehicle of a plurality of vehicles positioned at each location, each structure, or each point of interest, wherein a live-view camera of the at least one identified vehicle captures each requested live view; obtaining, by the live-view server, each requested live view from the live-view camera of the at least one identified vehicle; transmitting to the third-party server, by the live-view server, a dynamic hyperlink associated with each requested live view for storage in a live-view database of the third-party server; receiving from a request device, by the third-party server, a request for a live view of a specific location, a specific structure, or a specific point of interest; identifying from the live-view database, by the third-party server, at least one live view associated with the specific location, the specific structure, or the specific point of interest requested by the request device; and serving to the request device, by the third-party server, the at least one live view associated with the specific location, the specific structure, or the specific point of interest via the dynamic hyperlink. 12. The computer-implemented method of claim 11, further comprising: identifying, by the live-view server, more than one vehicle positioned at each location, each structure, or each point of interest, wherein a live-view camera of the more than one identified vehicle captures each requested live view; obtaining, by the live-view server, each requested live view from each live-view camera of the more than one identified vehicle; determining, by the live-view server, a requested live view, captured by one of the more than one identified vehicle, to transmit, via the dynamic hyperlink to the third-party server; and transmitting, by the live-view server, the dynamic hyperlink, associated with the requested live view captured by the one of the more than one identified vehicle, to the third-party server for storage in the live-view database. 13. The computer-implemented method of claim 12, further comprising: determining, by the live-view server, the requested live view to transmit, via the dynamic hyperlink, to the third-party server based on a network connection speed between the live-view server and the more than one identified vehicle. 14. The computer-implemented method of claim 12, further comprising: determining, by the live-view server, the requested live view to transmit, via the dynamic hyperlink, to the third-party server based on a quality metric associated with each requested live view obtained from each live-view camera of the more than one identified vehicle. 15. The computer-implemented method of claim 11, further comprising: obtaining, by the live-view server, a live view from any live-view camera of any of the plurality of identified vehicles on demand. 16. The computer-implemented method of claim 11, further comprising: updating, by the live-view server, a live view associated with each dynamic hyperlink. 17. A system for serving live views captured by a plurality of vehicles having live-view cameras to request devices, the system comprising: a first processing device communicatively coupled to a live-view database; and a second processing device communicatively coupled with the first processing device, wherein the second processing device comprises a non-transitory processor-readable storage medium comprising programming instructions that, when executed, cause the second processing device to: receive, from the first processing device, a request for a live view of each location of a plurality of locations, each structure of a plurality of structures, or each point of interest of a plurality of points of interest to be tracked or monitored by the second processing device on behalf of the first processing device; identify at least one vehicle of a plurality of vehicles positioned at each location, each structure, or each point of interest, wherein a live-view camera of the at least one identified vehicle captures each requested live view; obtain each requested live view from the live-view camera of the at least one identified vehicle; and transmit to the first processing device, a dynamic hyperlink associated with each requested live view for storage in the live-view database; wherein the first processing device comprises a non-transitory processor-readable storage medium comprising programming instructions that, when executed, cause the first processing device to: receive, from a request device, a request for a live view of a specific location, a specific structure, or a specific point of interest; identify at least one live view, from the live-view database, associated with the specific location, the specific structure, or the specific point of interest requested by the request device; and serve to the request device, via the dynamic hyperlink, the at least one live view associated with the specific location, the specific structure, or the specific point of interest. 18. The system of claim 17, wherein the first processing device comprises a plurality of third-party processing devices, wherein the second processing device comprises a link database, and wherein the programming instructions, when executed, further cause the second processing device to: segregate, in the link database, requested live views for each of the plurality of third-party processing devices. 19. The system of claim 17, wherein the request device is not associated with a vehicle of the plurality of vehicles. 20. The system of claim 17, wherein the request device comprises a vehicle of the plurality of vehicles.
2,400
9,370
9,370
15,075,163
2,449
A method is provided in one example embodiment and includes, for each of a plurality of individual storage units collectively comprising a virtual storage unit, mapping an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receiving from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translating the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and performing the requested operation on the at least one of the data storage units.
1. A method comprising: for each of a plurality of individual storage units collectively comprising a virtual storage unit, mapping an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receiving from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translating the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and performing the requested operation on the at least one of the data storage units. 2. The method of claim 1, wherein an IP prefix comprising a plurality of most significant bits (“MSBs”) of each of the IP addresses identifies a storage domain of the data storage units. 3. The method of claim 2, wherein a plurality of least significant bits (“LSBs”) of each of the IP addresses comprises a storage address space defining a storage space comprising the data storage units. 4. The method of claim 3, wherein a plurality of MSBs of the storage address space comprises the virtual unit number. 5. The method of claim 4, wherein the virtual unit number and the IP prefix collectively comprise a virtual unit prefix. 6. The method of claim 3, wherein a plurality of LSBs of the storage address space comprises a unit address space comprising an address of the associated data storage unit. 7. The method of claim 3, wherein the storage address space includes an m-bit replication factor for enabling 2m replicas. 8. The method of claim 7, wherein the requested operation is a read operation, the method further comprising: sending a get timestamps request to each of the m replicas, wherein the get timestamps request includes a number of requested blocks; receiving a get timestamps reply, wherein the get timestamps reply contains a number of returned timestamps a listing of returned timestamps; if the get timestamps reply contains timestamps for fewer than all of number of requested blocks, sending a second get timestamps request to the first block for which a timestamp has not been received; upon receipt of all of the requested timestamps, sending a get data request to the replica with the most recent timestamp, wherein the get data request includes a number of requested blocks; and receiving a get data reply that contains data from the requested blocks. 9. The method of claim 7, wherein the requested operation is a WRITE operation, the method further comprising: sending a set blocks request to each of the m replicas in parallel, wherein the set blocks request comprises a number of blocks to write and data associated with each block to write; and receiving a set blocks reply from one of the m replicas. 10. One or more non-transitory tangible media having encoded thereon logic that includes code for execution and when executed by a processor is operable to perform operations comprising: for each of a plurality of individual storage units collectively comprising a virtual storage unit, mapping an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receiving from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translating the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and performing the requested operation on the at least one of the data storage units. 11. The media of claim 10, wherein an IP prefix comprising a plurality of most significant bits (“MSBs”) of each of the IP addresses identifies a storage domain of the data storage units. 12. The media of claim 11, wherein a plurality of least significant bits (“LSBs”) of each of the IP addresses comprises a storage address space defining a storage space comprising the data storage units. 13. The media of claim 12, wherein a plurality of MSBs of the storage address space comprises the virtual unit number and wherein the virtual unit number and the IP prefix collectively comprise a virtual unit prefix. 14. The media of claim 10, wherein a plurality of LSBs of the storage address space comprises a unit address space comprising an address of the associated data storage unit and wherein the storage address space includes an m-bit replication factor for enabling 2m replicas. 15. An apparatus comprising: a memory element configured to store data; a processor operable to execute instructions associated with the data; and a virtual unit network driver configured to: for each of a plurality of individual storage units collectively comprising a virtual storage unit, map an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receive from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translate the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and perform the requested operation on the at least one of the data storage units. 16. The apparatus of claim 15, wherein an IP prefix comprising a plurality of most significant bits (“MSBs”) of each of the IP addresses identifies a storage domain of the data storage units. 17. The apparatus of claim 16, wherein a plurality of least significant bits (“LSBs”) of each of the IP addresses comprises a storage address space defining a storage space comprising the data storage units. 18. The apparatus of claim 17, wherein a plurality of MSBs of the storage address space comprises the virtual unit number. 19. The apparatus of claim 18, wherein the virtual unit number and the IP prefix collectively comprise a virtual unit prefix. 20. The apparatus of claim 16, wherein a plurality of LSBs of the storage address space comprises a unit address space comprising an address of the associated data storage unit.
A method is provided in one example embodiment and includes, for each of a plurality of individual storage units collectively comprising a virtual storage unit, mapping an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receiving from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translating the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and performing the requested operation on the at least one of the data storage units.1. A method comprising: for each of a plurality of individual storage units collectively comprising a virtual storage unit, mapping an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receiving from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translating the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and performing the requested operation on the at least one of the data storage units. 2. The method of claim 1, wherein an IP prefix comprising a plurality of most significant bits (“MSBs”) of each of the IP addresses identifies a storage domain of the data storage units. 3. The method of claim 2, wherein a plurality of least significant bits (“LSBs”) of each of the IP addresses comprises a storage address space defining a storage space comprising the data storage units. 4. The method of claim 3, wherein a plurality of MSBs of the storage address space comprises the virtual unit number. 5. The method of claim 4, wherein the virtual unit number and the IP prefix collectively comprise a virtual unit prefix. 6. The method of claim 3, wherein a plurality of LSBs of the storage address space comprises a unit address space comprising an address of the associated data storage unit. 7. The method of claim 3, wherein the storage address space includes an m-bit replication factor for enabling 2m replicas. 8. The method of claim 7, wherein the requested operation is a read operation, the method further comprising: sending a get timestamps request to each of the m replicas, wherein the get timestamps request includes a number of requested blocks; receiving a get timestamps reply, wherein the get timestamps reply contains a number of returned timestamps a listing of returned timestamps; if the get timestamps reply contains timestamps for fewer than all of number of requested blocks, sending a second get timestamps request to the first block for which a timestamp has not been received; upon receipt of all of the requested timestamps, sending a get data request to the replica with the most recent timestamp, wherein the get data request includes a number of requested blocks; and receiving a get data reply that contains data from the requested blocks. 9. The method of claim 7, wherein the requested operation is a WRITE operation, the method further comprising: sending a set blocks request to each of the m replicas in parallel, wherein the set blocks request comprises a number of blocks to write and data associated with each block to write; and receiving a set blocks reply from one of the m replicas. 10. One or more non-transitory tangible media having encoded thereon logic that includes code for execution and when executed by a processor is operable to perform operations comprising: for each of a plurality of individual storage units collectively comprising a virtual storage unit, mapping an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receiving from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translating the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and performing the requested operation on the at least one of the data storage units. 11. The media of claim 10, wherein an IP prefix comprising a plurality of most significant bits (“MSBs”) of each of the IP addresses identifies a storage domain of the data storage units. 12. The media of claim 11, wherein a plurality of least significant bits (“LSBs”) of each of the IP addresses comprises a storage address space defining a storage space comprising the data storage units. 13. The media of claim 12, wherein a plurality of MSBs of the storage address space comprises the virtual unit number and wherein the virtual unit number and the IP prefix collectively comprise a virtual unit prefix. 14. The media of claim 10, wherein a plurality of LSBs of the storage address space comprises a unit address space comprising an address of the associated data storage unit and wherein the storage address space includes an m-bit replication factor for enabling 2m replicas. 15. An apparatus comprising: a memory element configured to store data; a processor operable to execute instructions associated with the data; and a virtual unit network driver configured to: for each of a plurality of individual storage units collectively comprising a virtual storage unit, map an internal address of the storage unit to a unique IP address, wherein each of the storage units comprises a block of storage on one of a plurality of physical storage devices and wherein the IP address includes a virtual storage unit number identifying the virtual storage unit; receive from a client a request to perform an operation on at least one of the data storage units, wherein the request identifies the internal address of the at least one of the data storage units; translate the internal address of the at least one of the data storage unit to the unique IP address of the at least one of the data storage units; and perform the requested operation on the at least one of the data storage units. 16. The apparatus of claim 15, wherein an IP prefix comprising a plurality of most significant bits (“MSBs”) of each of the IP addresses identifies a storage domain of the data storage units. 17. The apparatus of claim 16, wherein a plurality of least significant bits (“LSBs”) of each of the IP addresses comprises a storage address space defining a storage space comprising the data storage units. 18. The apparatus of claim 17, wherein a plurality of MSBs of the storage address space comprises the virtual unit number. 19. The apparatus of claim 18, wherein the virtual unit number and the IP prefix collectively comprise a virtual unit prefix. 20. The apparatus of claim 16, wherein a plurality of LSBs of the storage address space comprises a unit address space comprising an address of the associated data storage unit.
2,400
9,371
9,371
15,748,471
2,433
A computing device includes at least one processor and a machine-readable storage medium storing instructions. The instructions may be executable by the hardware processor to execute a guest domain comprising a guest operating system and a frontend wireless device driver; execute a control domain comprising a backend wireless device driver; transmit wireless network commands and network packets across a dedicated data path from the frontend wireless device driver in the guest domain to a backend wireless device driver in the control domain; and scan, using in the backend wireless device driver, the network packets transmitted across the dedicated data path to detect a possible malware attack in the guest domain.
1. A computing device comprising: a hardware processor; and a machine-readable storage medium storing instructions, the instructions executable by the hardware processor to: execute a guest domain comprising a guest operating system and a frontend wireless device driver; execute a control domain comprising a backend wireless device driver; transmit wireless network commands and network packets across a dedicated data path from the frontend wireless device driver in the guest domain to a backend wireless device driver in the control domain; and scan, using in the backend wireless device driver, the network packets transmitted across the dedicated data path to detect a possible malware attack in the guest domain. 2. The computing device of claim 1, further comprising a physical wireless interface device. 3. The computing device of claim 2, the instructions further executable to: send, by the backend wireless device driver in the command domain, the network packets to the physical wireless interface device; and transmitting, by the physical wireless interface device, the network packets across a wireless connection to a wireless access point. 4. The computing device of claim 1, wherein the control domain is the only domain that has direct access to hardware resources of the computing device. 5. The computing device of claim 1, wherein the frontend wireless device driver receives the wireless network commands and the network packets from the guest operating system. 6. The computing device of claim 1, wherein the control domain further comprises a management agent, wherein the management agent is to scan inbound and outbound network packets transmitted across the dedicated data path. 7. The computing device of claim 1, wherein the dedicated data path uses shared memory pages of a hypervisor. 8. A method comprising: receiving, by a frontend wireless device driver in a guest domain, a set of commands and a set of network packets; transmitting the set of commands and the set of network packets across a dedicated data path from the frontend wireless device driver in the guest domain to a backend wireless device driver in a control domain; scanning, using the backend wireless device driver in the control domain, the set of network packets transmitted across the dedicated data path to detect a possible malware attack in the guest domain; and controlling, by the backend wireless device driver in the control domain, a physical wireless device to transmit the set of network packets based on the set of commands received from the frontend wireless device driver in the guest domain. 9. The method of claim 8, further comprising: controlling, by the backend wireless device driver, the physical wireless device to establish a wireless connection based on the set of commands received from the frontend wireless device driver in the guest domain. 10. The method of claim 9, wherein the control domain comprises a management agent, wherein the method further comprises: scanning, by the management agent in the control domain, inbound and outbound network packets transmitted across the dedicated data path. 11. The method of claim 9, wherein the frontend wireless device driver receives the set of commands and the set of network packets from a guest operating system of the guest domain. 12. An article comprising a machine-readable storage medium storing instructions that upon execution cause a processor to: execute a control domain comprising a management agent and a backend wireless device driver; receive, by the backend wireless device driver, a set of network commands and a set of network packets transmitted across a dedicated data path from a frontend wireless device driver in a guest domain; monitor, using the backend wireless device driver, the set of network packets transmitted across the dedicated data path from the frontend wireless device driver; and identify, by the management agent, a possible malware attack in the guest domain based on an inspection of the set of network packets in the backend wireless device driver. 13. The article of claim 12, wherein the management agent uses an application programming interface (API) of the backend wireless device driver to monitor inbound and outbound network packets transmitted via the dedicated data path. 14. The article of claim 12, wherein the instructions further cause the processor to: execute a plurality of domains in a virtualized environment, wherein the control domain and the guest domain are included in the plurality of domains. 15. The article of claim 14, wherein the instructions further cause the processor to: transmitting, by a physical wireless device, the set of network packets to a wireless access point.
A computing device includes at least one processor and a machine-readable storage medium storing instructions. The instructions may be executable by the hardware processor to execute a guest domain comprising a guest operating system and a frontend wireless device driver; execute a control domain comprising a backend wireless device driver; transmit wireless network commands and network packets across a dedicated data path from the frontend wireless device driver in the guest domain to a backend wireless device driver in the control domain; and scan, using in the backend wireless device driver, the network packets transmitted across the dedicated data path to detect a possible malware attack in the guest domain.1. A computing device comprising: a hardware processor; and a machine-readable storage medium storing instructions, the instructions executable by the hardware processor to: execute a guest domain comprising a guest operating system and a frontend wireless device driver; execute a control domain comprising a backend wireless device driver; transmit wireless network commands and network packets across a dedicated data path from the frontend wireless device driver in the guest domain to a backend wireless device driver in the control domain; and scan, using in the backend wireless device driver, the network packets transmitted across the dedicated data path to detect a possible malware attack in the guest domain. 2. The computing device of claim 1, further comprising a physical wireless interface device. 3. The computing device of claim 2, the instructions further executable to: send, by the backend wireless device driver in the command domain, the network packets to the physical wireless interface device; and transmitting, by the physical wireless interface device, the network packets across a wireless connection to a wireless access point. 4. The computing device of claim 1, wherein the control domain is the only domain that has direct access to hardware resources of the computing device. 5. The computing device of claim 1, wherein the frontend wireless device driver receives the wireless network commands and the network packets from the guest operating system. 6. The computing device of claim 1, wherein the control domain further comprises a management agent, wherein the management agent is to scan inbound and outbound network packets transmitted across the dedicated data path. 7. The computing device of claim 1, wherein the dedicated data path uses shared memory pages of a hypervisor. 8. A method comprising: receiving, by a frontend wireless device driver in a guest domain, a set of commands and a set of network packets; transmitting the set of commands and the set of network packets across a dedicated data path from the frontend wireless device driver in the guest domain to a backend wireless device driver in a control domain; scanning, using the backend wireless device driver in the control domain, the set of network packets transmitted across the dedicated data path to detect a possible malware attack in the guest domain; and controlling, by the backend wireless device driver in the control domain, a physical wireless device to transmit the set of network packets based on the set of commands received from the frontend wireless device driver in the guest domain. 9. The method of claim 8, further comprising: controlling, by the backend wireless device driver, the physical wireless device to establish a wireless connection based on the set of commands received from the frontend wireless device driver in the guest domain. 10. The method of claim 9, wherein the control domain comprises a management agent, wherein the method further comprises: scanning, by the management agent in the control domain, inbound and outbound network packets transmitted across the dedicated data path. 11. The method of claim 9, wherein the frontend wireless device driver receives the set of commands and the set of network packets from a guest operating system of the guest domain. 12. An article comprising a machine-readable storage medium storing instructions that upon execution cause a processor to: execute a control domain comprising a management agent and a backend wireless device driver; receive, by the backend wireless device driver, a set of network commands and a set of network packets transmitted across a dedicated data path from a frontend wireless device driver in a guest domain; monitor, using the backend wireless device driver, the set of network packets transmitted across the dedicated data path from the frontend wireless device driver; and identify, by the management agent, a possible malware attack in the guest domain based on an inspection of the set of network packets in the backend wireless device driver. 13. The article of claim 12, wherein the management agent uses an application programming interface (API) of the backend wireless device driver to monitor inbound and outbound network packets transmitted via the dedicated data path. 14. The article of claim 12, wherein the instructions further cause the processor to: execute a plurality of domains in a virtualized environment, wherein the control domain and the guest domain are included in the plurality of domains. 15. The article of claim 14, wherein the instructions further cause the processor to: transmitting, by a physical wireless device, the set of network packets to a wireless access point.
2,400
9,372
9,372
16,074,742
2,493
Examples disclosed herein provide the ability for a docking station to authorize a user to utilize the docking station. In one example method, the docking station determines whether a computing device is docked to the docking station and, upon determining the computing device is docked to the docking station, the docking station determines whether a user associated with the computing device is an authorized user of the docking station. As an example, if the user is an authorized user of the docking station, the docking station enables ports of the docking station for access by the computing device.
1. A method performed by a docking station, the method comprising: determining whether a computing device is docked to the docking station; upon determining the computing device is docked to the docking station, determining whether a user associated with the computing device is an authorized user of the docking station; and if the user is an authorized user of the docking station, enabling ports of the docking station for access by the computing device. 2. The method of claim 1, wherein if the user is not an authorized user of the docking station, preventing access, by the computing device, to peripherals connected to the ports of the docking station. 3. The method of claim 1, wherein if the user is an authorized user of the docking station, locking the computing device to the docking station until the user is to authenticate release of the computing device from the docking station. 4. The method of 3, comprising preventing unlocking of the computing device from the docking station when an unauthorized user is to attempt access to the computing device. 5. The method of claim 3, comprising logging attempts to lock and unlock the computing device to and from the docking station. 6. The method of claim 1, wherein determining whether the user is an authorized user of the docking station comprises looking up a database to determine whether the database includes information concerning the user. 7. The method of claim 6, comprising modifying the database to include other users that are authorized to use the docking station. 8. The method of claim 6, wherein the database comprises set of the ports of the docking station each authorized user has access to. 9. The method of claim 1, wherein the ports enabled is based on multi-factor authentication provided by the user. 10. A docking station comprising: general-purpose input/output (GPIO) pins; a radio; a database; and an authenticator to: determine whether a computing device is docked to the docking station; upon determining the computing device is docked to the docking station, use the radio determine whether a user associated with the computing device is an authorized user of the docking station, wherein determining whether the user is an authorized user comprises looking up the database to determine whether the database includes information concerning the user; and if the user is an authorized user of the docking station, enable at least a set of the GPIO pins to enable ports of the docking station for access by the computing device. 11. The docking station of claim 10, wherein if the user is not an authorized user of the docking station, the authenticator to disable the GPIO pins to prevent access, by the computing device, to peripherals connected to the ports of the docking station. 12. The docking station of claim 10, wherein if the user is an authorized user of the docking station, the authenticator to enable one of the GPIO pins to lock the computing device to the docking station until the user is to authenticate release of the computing device from the docking station. 13. The docking station of claim 10, the authenticator to log attempts to lock and unlock the computing device to and from the docking station. 14. A non-transitory computer-readable storage medium of a docking station comprising program instructions which, when executed by a processor, to cause the processor to: determine whether a computing device is docked to the docking station; upon determining the computing device is docked to the docking station, determine whether a user associated with the computing device is an authorized user of the docking station; and if the user is an authorized user of the docking station: enable ports of the docking station for access by the computing device; and lock the computing device to the docking station until the user is to authenticate release of the computing device from the docking station. 15. The non-transitory computer-readable storage medium of claim 14, wherein when an unauthorized user is to attempt access to the computing device, the processor to: prevent access, by the computing device, to peripherals connected to the ports of the docking station; and prevent unlocking of the computing device from the docking station.
Examples disclosed herein provide the ability for a docking station to authorize a user to utilize the docking station. In one example method, the docking station determines whether a computing device is docked to the docking station and, upon determining the computing device is docked to the docking station, the docking station determines whether a user associated with the computing device is an authorized user of the docking station. As an example, if the user is an authorized user of the docking station, the docking station enables ports of the docking station for access by the computing device.1. A method performed by a docking station, the method comprising: determining whether a computing device is docked to the docking station; upon determining the computing device is docked to the docking station, determining whether a user associated with the computing device is an authorized user of the docking station; and if the user is an authorized user of the docking station, enabling ports of the docking station for access by the computing device. 2. The method of claim 1, wherein if the user is not an authorized user of the docking station, preventing access, by the computing device, to peripherals connected to the ports of the docking station. 3. The method of claim 1, wherein if the user is an authorized user of the docking station, locking the computing device to the docking station until the user is to authenticate release of the computing device from the docking station. 4. The method of 3, comprising preventing unlocking of the computing device from the docking station when an unauthorized user is to attempt access to the computing device. 5. The method of claim 3, comprising logging attempts to lock and unlock the computing device to and from the docking station. 6. The method of claim 1, wherein determining whether the user is an authorized user of the docking station comprises looking up a database to determine whether the database includes information concerning the user. 7. The method of claim 6, comprising modifying the database to include other users that are authorized to use the docking station. 8. The method of claim 6, wherein the database comprises set of the ports of the docking station each authorized user has access to. 9. The method of claim 1, wherein the ports enabled is based on multi-factor authentication provided by the user. 10. A docking station comprising: general-purpose input/output (GPIO) pins; a radio; a database; and an authenticator to: determine whether a computing device is docked to the docking station; upon determining the computing device is docked to the docking station, use the radio determine whether a user associated with the computing device is an authorized user of the docking station, wherein determining whether the user is an authorized user comprises looking up the database to determine whether the database includes information concerning the user; and if the user is an authorized user of the docking station, enable at least a set of the GPIO pins to enable ports of the docking station for access by the computing device. 11. The docking station of claim 10, wherein if the user is not an authorized user of the docking station, the authenticator to disable the GPIO pins to prevent access, by the computing device, to peripherals connected to the ports of the docking station. 12. The docking station of claim 10, wherein if the user is an authorized user of the docking station, the authenticator to enable one of the GPIO pins to lock the computing device to the docking station until the user is to authenticate release of the computing device from the docking station. 13. The docking station of claim 10, the authenticator to log attempts to lock and unlock the computing device to and from the docking station. 14. A non-transitory computer-readable storage medium of a docking station comprising program instructions which, when executed by a processor, to cause the processor to: determine whether a computing device is docked to the docking station; upon determining the computing device is docked to the docking station, determine whether a user associated with the computing device is an authorized user of the docking station; and if the user is an authorized user of the docking station: enable ports of the docking station for access by the computing device; and lock the computing device to the docking station until the user is to authenticate release of the computing device from the docking station. 15. The non-transitory computer-readable storage medium of claim 14, wherein when an unauthorized user is to attempt access to the computing device, the processor to: prevent access, by the computing device, to peripherals connected to the ports of the docking station; and prevent unlocking of the computing device from the docking station.
2,400
9,373
9,373
16,678,469
2,484
Systems, methods and devices are provided for managing media content storage priority and retention in a single- or multi-user environment. Indications of previous user activity are received regarding multiple portions of content stored via one or more storage devices. The previous user activity may include previous user deletion selections and/or previous user viewing selections of one or more of the multiple portions of content. A retention priority may be assigned to portions of media content based on the previous user activity. Responsive to receiving an indication of low available storage space on the one or more storage devices, a quantity of storage space on the one or more storage devices to make available is determined based on the previous user activity. Deletion of one or more portions of currently stored content is initiated based on the determined quantity of storage space to make available.
1. A method, comprising: receiving one or more indications of previous user activity regarding multiple portions of content stored via one or more storage devices of a content management system, the previous user activity including previous user deletion selections of one or more of the multiple portions of content; receiving an indication of low available storage space on the one or more storage devices; responsive to receiving the indication of low available storage space and based at least in part on the previous user deletion selections, determining a quantity of storage space on the one or more storage devices to make available; and based at least in part on the determined quantity of storage space to make available, initiating deletion of at least one portion of content currently stored via the one or more storage devices. 2. The method of claim 1, wherein receiving the indication of low available storage space includes determining that a quantity of available storage space on the one or more storage devices is below a selected threshold. 3. The method of claim 1, wherein determining a quantity of storage space on the one or more storage devices to make available based at least in part on the previous user deletion selections includes determining a quantity of storage space to make available based on a frequency of the previous user deletion selections. 4. The method of claim 1 wherein the previous user activity further includes previous user viewing selections of one or more of the multiple portions of content, and wherein the method further comprises assigning, based at least in part on the previous user activity, a retention priority to one or more portions of content currently stored via the one or more storage devices. 5. The method of claim 4, further comprising maintaining information regarding previous user activity with respect to multiple users of the content management system, and wherein assigning a retention priority to the one or more portions of currently stored content is further based at least in part on a respective priority level associated with each of the multiple users. 6. The method of claim 5, further comprising assigning the respective priority level to each of at least some users of the multiple users based at least in part on the previous user activities associated with each of the at least some users. 7. The method of claim 4, wherein initiating deletion of the at least one portion of currently stored content is further based on the retention priority assigned to the one or more portions of currently stored content. 8. A content management system, comprising: one or more processors; one or more storage devices; a computer-readable storage medium having stored instructions that, when executed by the one or more processors, cause the one or more processors to: receive one or more indications of previous user activity regarding multiple portions of content stored via one or more storage devices of a content management system, the previous user activity including previous user deletion selections of one or more of the multiple portions of content; receive an indication of low available storage space on the one or more storage devices; responsive to receiving the indication of low available storage space and based at least in part on the previous user deletion selections, determine a quantity of storage space on the one or more storage devices to make available; and based at least in part on the determined quantity of storage space to make available, initiate deletion of at least one portion of content currently stored via the one or more storage devices. 9. The content management system of claim 8, wherein the stored instructions further cause the one or more processors to determine that a quantity of available storage space on the one or more storage devices is below a selected threshold. 10. The content management system of claim 8, wherein to determine a quantity of storage space on the one or more storage devices to make available based at least in part on the previous user deletion selections includes to determine a quantity of storage space to make available based on a frequency of the previous user deletion selections. 11. The content management system of claim 8, wherein the previous user activity further includes previous user viewing selections of one or more of the multiple portions of content, and wherein the stored instructions further cause the one or more processors to assign, based at least in part on the previous user activity, a retention priority to one or more portions of content currently stored via the one or more storage devices. 12. The content management system of claim 11, wherein the stored instructions further cause the one or more processors to maintain information regarding previous user activity with respect to multiple users of the content management system, and wherein to assign the retention priority to the one or more portions of currently stored content is further based at least in part on a respective priority level associated with each of the multiple users. 13. The content management system of claim 12, wherein to assign the respective priority level to each of at least some users of the multiple users is based at least in part on the previous user activities associated with each of the at least some users. 14. The content management system of claim 11, wherein to initiate deletion of the at least one portion of currently stored content includes to initiate deletion of the at least one portion based on the retention priority assigned to the one or more portions of currently stored content. 15. A non-transitory computer-readable storage medium having stored instructions that, when executed by one or more computer processors, cause the one or more computer processors to: receive one or more indications of previous user activity regarding multiple portions of content stored via one or more storage devices of a content management system, the previous user activity including previous user deletion selections of one or more of the multiple portions of content; receive an indication of low available storage space on the one or more storage devices; responsive to receiving the indication of low available storage space and based at least in part on the previous user deletion selections, determine a quantity of storage space on the one or more storage devices to make available; and based at least in part on the determined quantity of storage space to make available, initiate deletion of at least one portion of content currently stored via the one or more storage devices. 16. The non-transitory computer-readable storage medium of claim 15, wherein the stored instructions further cause the one or more computer processors to determine that a quantity of available storage space on the one or more storage devices is below a selected threshold. 17. The non-transitory computer-readable storage medium of claim 15, wherein to determine a quantity of storage space on the one or more storage devices to make available based at least in part on the previous user deletion selections includes to determine a quantity of storage space to make available based on a frequency of the previous user deletion selections 18. The non-transitory computer-readable storage medium of claim 15, wherein the previous user activity further includes previous user viewing selections of one or more of the multiple portions of content, and wherein the stored instructions further cause the one or more computer processors to assign, based at least in part on the previous user activity, a retention priority to one or more portions of content currently stored via the one or more storage devices. 19. The non-transitory computer-readable storage medium of claim 18, wherein the stored instructions further cause the one or more computer processors to maintain information regarding previous user activity with respect to multiple users of the non-transitory computer-readable storage medium, and wherein to assign the retention priority to the one or more portions of currently stored content is further based at least in part on a respective priority level associated with each of the multiple users. 20. The non-transitory computer-readable storage medium of claim 19, wherein to assign the respective priority level to each of at least some users of the multiple users is based at least in part on the previous user activities associated with each of the at least some users. 21. The non-transitory computer-readable storage medium of claim 18, wherein to initiate deletion of the at least one portion of currently stored content includes to initiate deletion of the at least one portion based on the retention priority assigned to the one or more portions of currently stored content.
Systems, methods and devices are provided for managing media content storage priority and retention in a single- or multi-user environment. Indications of previous user activity are received regarding multiple portions of content stored via one or more storage devices. The previous user activity may include previous user deletion selections and/or previous user viewing selections of one or more of the multiple portions of content. A retention priority may be assigned to portions of media content based on the previous user activity. Responsive to receiving an indication of low available storage space on the one or more storage devices, a quantity of storage space on the one or more storage devices to make available is determined based on the previous user activity. Deletion of one or more portions of currently stored content is initiated based on the determined quantity of storage space to make available.1. A method, comprising: receiving one or more indications of previous user activity regarding multiple portions of content stored via one or more storage devices of a content management system, the previous user activity including previous user deletion selections of one or more of the multiple portions of content; receiving an indication of low available storage space on the one or more storage devices; responsive to receiving the indication of low available storage space and based at least in part on the previous user deletion selections, determining a quantity of storage space on the one or more storage devices to make available; and based at least in part on the determined quantity of storage space to make available, initiating deletion of at least one portion of content currently stored via the one or more storage devices. 2. The method of claim 1, wherein receiving the indication of low available storage space includes determining that a quantity of available storage space on the one or more storage devices is below a selected threshold. 3. The method of claim 1, wherein determining a quantity of storage space on the one or more storage devices to make available based at least in part on the previous user deletion selections includes determining a quantity of storage space to make available based on a frequency of the previous user deletion selections. 4. The method of claim 1 wherein the previous user activity further includes previous user viewing selections of one or more of the multiple portions of content, and wherein the method further comprises assigning, based at least in part on the previous user activity, a retention priority to one or more portions of content currently stored via the one or more storage devices. 5. The method of claim 4, further comprising maintaining information regarding previous user activity with respect to multiple users of the content management system, and wherein assigning a retention priority to the one or more portions of currently stored content is further based at least in part on a respective priority level associated with each of the multiple users. 6. The method of claim 5, further comprising assigning the respective priority level to each of at least some users of the multiple users based at least in part on the previous user activities associated with each of the at least some users. 7. The method of claim 4, wherein initiating deletion of the at least one portion of currently stored content is further based on the retention priority assigned to the one or more portions of currently stored content. 8. A content management system, comprising: one or more processors; one or more storage devices; a computer-readable storage medium having stored instructions that, when executed by the one or more processors, cause the one or more processors to: receive one or more indications of previous user activity regarding multiple portions of content stored via one or more storage devices of a content management system, the previous user activity including previous user deletion selections of one or more of the multiple portions of content; receive an indication of low available storage space on the one or more storage devices; responsive to receiving the indication of low available storage space and based at least in part on the previous user deletion selections, determine a quantity of storage space on the one or more storage devices to make available; and based at least in part on the determined quantity of storage space to make available, initiate deletion of at least one portion of content currently stored via the one or more storage devices. 9. The content management system of claim 8, wherein the stored instructions further cause the one or more processors to determine that a quantity of available storage space on the one or more storage devices is below a selected threshold. 10. The content management system of claim 8, wherein to determine a quantity of storage space on the one or more storage devices to make available based at least in part on the previous user deletion selections includes to determine a quantity of storage space to make available based on a frequency of the previous user deletion selections. 11. The content management system of claim 8, wherein the previous user activity further includes previous user viewing selections of one or more of the multiple portions of content, and wherein the stored instructions further cause the one or more processors to assign, based at least in part on the previous user activity, a retention priority to one or more portions of content currently stored via the one or more storage devices. 12. The content management system of claim 11, wherein the stored instructions further cause the one or more processors to maintain information regarding previous user activity with respect to multiple users of the content management system, and wherein to assign the retention priority to the one or more portions of currently stored content is further based at least in part on a respective priority level associated with each of the multiple users. 13. The content management system of claim 12, wherein to assign the respective priority level to each of at least some users of the multiple users is based at least in part on the previous user activities associated with each of the at least some users. 14. The content management system of claim 11, wherein to initiate deletion of the at least one portion of currently stored content includes to initiate deletion of the at least one portion based on the retention priority assigned to the one or more portions of currently stored content. 15. A non-transitory computer-readable storage medium having stored instructions that, when executed by one or more computer processors, cause the one or more computer processors to: receive one or more indications of previous user activity regarding multiple portions of content stored via one or more storage devices of a content management system, the previous user activity including previous user deletion selections of one or more of the multiple portions of content; receive an indication of low available storage space on the one or more storage devices; responsive to receiving the indication of low available storage space and based at least in part on the previous user deletion selections, determine a quantity of storage space on the one or more storage devices to make available; and based at least in part on the determined quantity of storage space to make available, initiate deletion of at least one portion of content currently stored via the one or more storage devices. 16. The non-transitory computer-readable storage medium of claim 15, wherein the stored instructions further cause the one or more computer processors to determine that a quantity of available storage space on the one or more storage devices is below a selected threshold. 17. The non-transitory computer-readable storage medium of claim 15, wherein to determine a quantity of storage space on the one or more storage devices to make available based at least in part on the previous user deletion selections includes to determine a quantity of storage space to make available based on a frequency of the previous user deletion selections 18. The non-transitory computer-readable storage medium of claim 15, wherein the previous user activity further includes previous user viewing selections of one or more of the multiple portions of content, and wherein the stored instructions further cause the one or more computer processors to assign, based at least in part on the previous user activity, a retention priority to one or more portions of content currently stored via the one or more storage devices. 19. The non-transitory computer-readable storage medium of claim 18, wherein the stored instructions further cause the one or more computer processors to maintain information regarding previous user activity with respect to multiple users of the non-transitory computer-readable storage medium, and wherein to assign the retention priority to the one or more portions of currently stored content is further based at least in part on a respective priority level associated with each of the multiple users. 20. The non-transitory computer-readable storage medium of claim 19, wherein to assign the respective priority level to each of at least some users of the multiple users is based at least in part on the previous user activities associated with each of the at least some users. 21. The non-transitory computer-readable storage medium of claim 18, wherein to initiate deletion of the at least one portion of currently stored content includes to initiate deletion of the at least one portion based on the retention priority assigned to the one or more portions of currently stored content.
2,400
9,374
9,374
13,771,415
2,439
Embodiments described herein provide systems and method for implementing privacy control in a co-browsing environment. In a particular embodiment, a method provides receiving an instruction in a co-browsing server to initiate a co-browsing session for a website with a first client and a second client. The method further provides receiving first privacy settings from the first client, wherein the first privacy settings indicate how the website should be presented at the second client. The method further provides presenting the website at the first client and presenting the website at the second client based on the first privacy settings.
1. A method of operating a co-browsing system, comprising: receiving an instruction in a co-browsing server to initiate a co-browsing session for a website with a first client and a second client; receiving first privacy settings from the first client, wherein the first privacy settings indicate how the website should be presented at the second client; presenting the website at the first client; and presenting the website at the second client based on the first privacy settings. 2. The method of claim 1, further comprising: in the first client, receiving user input indicating the first privacy settings. 3. The method of claim 1, wherein the first privacy settings indicate at least one portion of the website that should be obscured when viewed at the second client and wherein presenting the website on the second client based on the first privacy settings comprises: in the second client, displaying the website and obscuring the at least one portion of the website that should be obscured. 4. The method of claim 1, wherein the privacy setting indicate at least one portion of the website that should not accept user input at the second client and wherein presenting the website on the second client based on the first privacy settings comprises: in the second client, displaying the website and not accepting user input into the at least one portion of the website that should not accept user input. 5. The method of claim 1, further comprising: in the first client, displaying an indication of possible privacy settings for the website. 6. The method of claim 5, wherein the indication of possible privacy settings includes user selectable privacy levels for each portion of the website subject to the possible privacy settings, and further comprising: in the first client, receiving user input selecting the user selectable privacy levels and transferring the first privacy settings to the co-browsing server based on the user input. 7. The method of claim 6, wherein the indication of possible privacy settings further includes a default configuration of the user selectable privacy levels. 8. The method of claim 1, further comprising: storing the first privacy settings for use with other websites. 9. The method of claim 1, further comprising: receiving second privacy settings from the first client after receiving the first privacy settings, wherein the second privacy settings indicate how the website should be presented at the second client; and presenting the website at the second client based on the second privacy settings. 10. The method of claim 1, further comprising: rendering the website in the co-browsing server to generate a rendered image of the website; generating a first copy of the rendered image and a second copy of the rendered image; applying the privacy settings to the second copy of the rendered image; transferring the first copy of the rendered image to the first client and the second copy of the rendered image to the second client; wherein presenting the website at the first client comprises displaying the first copy of the rendered image at the first client; and wherein presenting the website at the second client based on the first privacy settings comprises displaying the second copy of the rendered image at the second client. 11. A co-browsing server, comprising: a communication interface configured to receive an instruction in a co-browsing server to initiate a co-browsing session for a website with a first client and a second client and receive first privacy settings from the first client, wherein the first privacy settings indicate how the website should be presented at the second client; a processing system configured to enable presentation of the website at the first client and presentation of the website at the second client based on the first privacy settings. 12. The co-browsing server of claim 11, wherein the first client receives user input indicating the first privacy settings. 13. The co-browsing server of claim 11, wherein the first privacy settings indicate at least one portion of the website that should be obscured when viewed at the second client and wherein the second client displays the website and obscures the at least one portion of the website that should be obscured. 14. The co-browsing server of claim 11, wherein the privacy setting indicate at least one portion of the website that should not accept user input at the second client and wherein the second client displays the website and does not accept user input into the at least one portion of the website that should not accept user input. 15. The co-browsing server of claim 11, wherein the first client displays an indication of possible privacy settings for the website. 16. The co-browsing server of claim 15, wherein the indication of possible privacy settings includes user selectable privacy levels for each portion of the website subject to the possible privacy settings and wherein the first client receives user input selecting the user selectable privacy levels and transfers the first privacy settings to the co-browsing server based on the user input. 17. The co-browsing server of claim 16, wherein the indication of possible privacy settings further includes a default configuration of the user selectable privacy levels. 18. The co-browsing server of claim 11, further comprising: a storage system configured to store the first privacy settings for use with other websites. 19. The co-browsing server of claim 11, further comprising: receiving second privacy settings from the first client after receiving the first privacy settings, wherein the second privacy settings indicate how the website should be presented at the second client; and presenting the website at the second client based on the second privacy settings. 20. The co-browsing server of claim 11, further comprising: the processing system configured to render the website in the co-browsing server to generate a rendered image of the website, generate a first copy of the rendered image and a second copy of the rendered image, and apply the privacy settings to the second copy of the rendered image; the communication interface configured to transfer the first copy of the rendered image to the first client and the second copy of the rendered image to the second client, wherein the first client displays the first copy of the rendered image and the second client displays the second copy of the rendered image.
Embodiments described herein provide systems and method for implementing privacy control in a co-browsing environment. In a particular embodiment, a method provides receiving an instruction in a co-browsing server to initiate a co-browsing session for a website with a first client and a second client. The method further provides receiving first privacy settings from the first client, wherein the first privacy settings indicate how the website should be presented at the second client. The method further provides presenting the website at the first client and presenting the website at the second client based on the first privacy settings.1. A method of operating a co-browsing system, comprising: receiving an instruction in a co-browsing server to initiate a co-browsing session for a website with a first client and a second client; receiving first privacy settings from the first client, wherein the first privacy settings indicate how the website should be presented at the second client; presenting the website at the first client; and presenting the website at the second client based on the first privacy settings. 2. The method of claim 1, further comprising: in the first client, receiving user input indicating the first privacy settings. 3. The method of claim 1, wherein the first privacy settings indicate at least one portion of the website that should be obscured when viewed at the second client and wherein presenting the website on the second client based on the first privacy settings comprises: in the second client, displaying the website and obscuring the at least one portion of the website that should be obscured. 4. The method of claim 1, wherein the privacy setting indicate at least one portion of the website that should not accept user input at the second client and wherein presenting the website on the second client based on the first privacy settings comprises: in the second client, displaying the website and not accepting user input into the at least one portion of the website that should not accept user input. 5. The method of claim 1, further comprising: in the first client, displaying an indication of possible privacy settings for the website. 6. The method of claim 5, wherein the indication of possible privacy settings includes user selectable privacy levels for each portion of the website subject to the possible privacy settings, and further comprising: in the first client, receiving user input selecting the user selectable privacy levels and transferring the first privacy settings to the co-browsing server based on the user input. 7. The method of claim 6, wherein the indication of possible privacy settings further includes a default configuration of the user selectable privacy levels. 8. The method of claim 1, further comprising: storing the first privacy settings for use with other websites. 9. The method of claim 1, further comprising: receiving second privacy settings from the first client after receiving the first privacy settings, wherein the second privacy settings indicate how the website should be presented at the second client; and presenting the website at the second client based on the second privacy settings. 10. The method of claim 1, further comprising: rendering the website in the co-browsing server to generate a rendered image of the website; generating a first copy of the rendered image and a second copy of the rendered image; applying the privacy settings to the second copy of the rendered image; transferring the first copy of the rendered image to the first client and the second copy of the rendered image to the second client; wherein presenting the website at the first client comprises displaying the first copy of the rendered image at the first client; and wherein presenting the website at the second client based on the first privacy settings comprises displaying the second copy of the rendered image at the second client. 11. A co-browsing server, comprising: a communication interface configured to receive an instruction in a co-browsing server to initiate a co-browsing session for a website with a first client and a second client and receive first privacy settings from the first client, wherein the first privacy settings indicate how the website should be presented at the second client; a processing system configured to enable presentation of the website at the first client and presentation of the website at the second client based on the first privacy settings. 12. The co-browsing server of claim 11, wherein the first client receives user input indicating the first privacy settings. 13. The co-browsing server of claim 11, wherein the first privacy settings indicate at least one portion of the website that should be obscured when viewed at the second client and wherein the second client displays the website and obscures the at least one portion of the website that should be obscured. 14. The co-browsing server of claim 11, wherein the privacy setting indicate at least one portion of the website that should not accept user input at the second client and wherein the second client displays the website and does not accept user input into the at least one portion of the website that should not accept user input. 15. The co-browsing server of claim 11, wherein the first client displays an indication of possible privacy settings for the website. 16. The co-browsing server of claim 15, wherein the indication of possible privacy settings includes user selectable privacy levels for each portion of the website subject to the possible privacy settings and wherein the first client receives user input selecting the user selectable privacy levels and transfers the first privacy settings to the co-browsing server based on the user input. 17. The co-browsing server of claim 16, wherein the indication of possible privacy settings further includes a default configuration of the user selectable privacy levels. 18. The co-browsing server of claim 11, further comprising: a storage system configured to store the first privacy settings for use with other websites. 19. The co-browsing server of claim 11, further comprising: receiving second privacy settings from the first client after receiving the first privacy settings, wherein the second privacy settings indicate how the website should be presented at the second client; and presenting the website at the second client based on the second privacy settings. 20. The co-browsing server of claim 11, further comprising: the processing system configured to render the website in the co-browsing server to generate a rendered image of the website, generate a first copy of the rendered image and a second copy of the rendered image, and apply the privacy settings to the second copy of the rendered image; the communication interface configured to transfer the first copy of the rendered image to the first client and the second copy of the rendered image to the second client, wherein the first client displays the first copy of the rendered image and the second client displays the second copy of the rendered image.
2,400
9,375
9,375
15,820,075
2,465
Described herein are systems, methods, and software to enhance the implementation of communication rules in a computing network. In one example, a method of operating a communication settings system maintains communication rules for a plurality of networks, wherein the communication rules define forwarding actions for ingress and egress packets to and from applications in the plurality of computing networks. The service further identifies a configuration request from a computing network with applications executing in the computing network, identifies a subset of the communication rules based on the plurality of applications, and provides the subset of the communication rules to the computing network.
1. A method of managing communication rules for a computing network, the method comprising: maintaining communication rules for a plurality of computing networks, wherein the communication rules define forwarding actions for ingress and egress packets to and from applications executing in virtual nodes in the plurality of computing networks; identifying a configuration request from a computing network, wherein the configuration request indicates a plurality of applications executing in the computing network; identifying a subset of the communication rules based on the plurality of applications; and providing the subset of the communication rules to the computing network. 2. The method of claim 1, wherein identifying the configuration request from the computing network comprises receiving the configuration request from a management system associated with the computing network. 3. The method of claim 1, wherein the virtual nodes comprise virtual machines and/or containers. 4. The method of claim 1, wherein each of the communication rules define a source, a destination, and a forwarding action. 5. The method of claim 4, wherein at least one of the source or the destination comprises at least one application group. 6. The method of claim 1, wherein providing the subset of the communication rules to the computing network comprises initiating an implementation of the communication rules in the computing network. 7. The method of claim 1, wherein providing the subset of the communication rules to the computing network comprises transferring the subset of the communication rules to a management system of the computing system for selection by an administrator of the computing network. 8. The method of claim 7 further comprising prioritizing the subset of the communication rules based on a quantity of computing networks that have implemented each communication rule in the subset of the communication rules, and wherein transferring the subset of the communication rules to the management system comprises transferring the prioritized subset of the communication rules to the management system. 9. The method of claim 1, wherein identifying the subset of the communication rules based on the plurality of applications comprises: identifying a subset of the computing networks that meet similarity criteria to the computing network; and identifying the subset of the communication rules from the subset of the computing networks based on the plurality of applications. 10. The method of claim 9, wherein the similarity criteria comprise application types and network size. 11. A computing apparatus comprising: one or more non-transitory computer readable storage media; a processing system operatively coupled to the one or more non-transitory computer readable media; program instructions stored on the one or more non-transitory computer readable storage media to manage communication rules for a plurality of computing networks that, when read and executed by the processing system, direct the processing system to at least: maintain communication rules for the plurality of computing networks, wherein the communication rules define forwarding actions for ingress and egress packets to and from applications executing in virtual nodes in the plurality of computing networks; identify a configuration request from a computing network, wherein the configuration request indicates a plurality of applications executing in the computing network; identify a subset of the communication rules based on the plurality of applications; provide the subset of the communication rules to the computing network. 12. The computing apparatus of claim 11, wherein identifying the configuration request from the computing network comprises receiving the configuration request from a management system associated with the computing network. 13. The computing apparatus of claim 11, wherein the virtual nodes comprise virtual machines and/or containers. 14. The computing apparatus of claim 11, wherein each of the communication rules define a source, a destination, and a forwarding action. 15. The computing apparatus of claim 14, wherein at least one of the source or the destination comprises at least one application group. 16. The computing apparatus of claim 11, wherein providing the subset of the communication rules to the computing network comprises initiating an implementation of the communication rules in the computing network. 17. The computing apparatus of claim 11, wherein providing the subset of the communication rules to the computing network comprises transferring the subset of the communication rules to a management system of the computing system for selection by an administrator of the computing network. 18. The computing apparatus of claim 17, wherein the program instructions further direct the processing system to prioritize the subset of the communication rules based on a quantity of computing networks that have implemented each communication rule in the subset of the communication rules and wherein transferring the subset of the communication rules to the management system comprises transferring the prioritized subset of the communication rules to the management system. 19. The computing apparatus of claim 11, wherein identifying the subset of the communication rules based on the plurality of applications comprises: identifying a subset of the computing networks that meet similarity criteria to the computing network; and identifying the subset of the communication rules from the subset of the computing networks based on the plurality of applications. 20. The computing apparatus of claim 19, wherein the similarity criteria comprise application types and network size.
Described herein are systems, methods, and software to enhance the implementation of communication rules in a computing network. In one example, a method of operating a communication settings system maintains communication rules for a plurality of networks, wherein the communication rules define forwarding actions for ingress and egress packets to and from applications in the plurality of computing networks. The service further identifies a configuration request from a computing network with applications executing in the computing network, identifies a subset of the communication rules based on the plurality of applications, and provides the subset of the communication rules to the computing network.1. A method of managing communication rules for a computing network, the method comprising: maintaining communication rules for a plurality of computing networks, wherein the communication rules define forwarding actions for ingress and egress packets to and from applications executing in virtual nodes in the plurality of computing networks; identifying a configuration request from a computing network, wherein the configuration request indicates a plurality of applications executing in the computing network; identifying a subset of the communication rules based on the plurality of applications; and providing the subset of the communication rules to the computing network. 2. The method of claim 1, wherein identifying the configuration request from the computing network comprises receiving the configuration request from a management system associated with the computing network. 3. The method of claim 1, wherein the virtual nodes comprise virtual machines and/or containers. 4. The method of claim 1, wherein each of the communication rules define a source, a destination, and a forwarding action. 5. The method of claim 4, wherein at least one of the source or the destination comprises at least one application group. 6. The method of claim 1, wherein providing the subset of the communication rules to the computing network comprises initiating an implementation of the communication rules in the computing network. 7. The method of claim 1, wherein providing the subset of the communication rules to the computing network comprises transferring the subset of the communication rules to a management system of the computing system for selection by an administrator of the computing network. 8. The method of claim 7 further comprising prioritizing the subset of the communication rules based on a quantity of computing networks that have implemented each communication rule in the subset of the communication rules, and wherein transferring the subset of the communication rules to the management system comprises transferring the prioritized subset of the communication rules to the management system. 9. The method of claim 1, wherein identifying the subset of the communication rules based on the plurality of applications comprises: identifying a subset of the computing networks that meet similarity criteria to the computing network; and identifying the subset of the communication rules from the subset of the computing networks based on the plurality of applications. 10. The method of claim 9, wherein the similarity criteria comprise application types and network size. 11. A computing apparatus comprising: one or more non-transitory computer readable storage media; a processing system operatively coupled to the one or more non-transitory computer readable media; program instructions stored on the one or more non-transitory computer readable storage media to manage communication rules for a plurality of computing networks that, when read and executed by the processing system, direct the processing system to at least: maintain communication rules for the plurality of computing networks, wherein the communication rules define forwarding actions for ingress and egress packets to and from applications executing in virtual nodes in the plurality of computing networks; identify a configuration request from a computing network, wherein the configuration request indicates a plurality of applications executing in the computing network; identify a subset of the communication rules based on the plurality of applications; provide the subset of the communication rules to the computing network. 12. The computing apparatus of claim 11, wherein identifying the configuration request from the computing network comprises receiving the configuration request from a management system associated with the computing network. 13. The computing apparatus of claim 11, wherein the virtual nodes comprise virtual machines and/or containers. 14. The computing apparatus of claim 11, wherein each of the communication rules define a source, a destination, and a forwarding action. 15. The computing apparatus of claim 14, wherein at least one of the source or the destination comprises at least one application group. 16. The computing apparatus of claim 11, wherein providing the subset of the communication rules to the computing network comprises initiating an implementation of the communication rules in the computing network. 17. The computing apparatus of claim 11, wherein providing the subset of the communication rules to the computing network comprises transferring the subset of the communication rules to a management system of the computing system for selection by an administrator of the computing network. 18. The computing apparatus of claim 17, wherein the program instructions further direct the processing system to prioritize the subset of the communication rules based on a quantity of computing networks that have implemented each communication rule in the subset of the communication rules and wherein transferring the subset of the communication rules to the management system comprises transferring the prioritized subset of the communication rules to the management system. 19. The computing apparatus of claim 11, wherein identifying the subset of the communication rules based on the plurality of applications comprises: identifying a subset of the computing networks that meet similarity criteria to the computing network; and identifying the subset of the communication rules from the subset of the computing networks based on the plurality of applications. 20. The computing apparatus of claim 19, wherein the similarity criteria comprise application types and network size.
2,400
9,376
9,376
16,382,362
2,437
A computer-implemented method includes obtaining, by a processor, existing security information for static application security testing (SAST). The method also includes using, by the processor, the existing security information to discover, by a machine capable of learning, new security information. The method also includes improving, by the processor, security of a computer using the new security information.
1. A computer-implemented method comprising: obtaining, by a processor, existing security information for static application security testing (SAST); using, by the processor, the existing security information to discover, by a machine capable of learning, new security information; and improving, by the processor, security of a computer using the new security information by identifying, by the processor and using the new security information, a malicious code attempting to access an application programming interface (API) and preventing, by the processor, access by the malicious code to the computer. 2. The computer-implemented method of claim 1, wherein the existing security information includes existing markup information including source information, sink information, and taint propagator information. 3. The computer-implemented method of claim 2, wherein the source information includes an entry point of untrusted data. 4. The computer-implemented method of claim 2, wherein the sink information includes where untrusted data exits a system in original form. 5. The computer-implemented method of claim 2, wherein the taint propagator information includes a pathway of malicious data flowing through a system. 6. The computer-implemented method of claim 1, further comprising: providing the new security information to a static analysis analyzer, wherein the new security information includes new markup information. 7. The computer-implemented method of claim 1, wherein the new security information is for a new application programming interface (API), and further comprising: extracting features from the new API, wherein the features include whether the new API is static, a type of technology to which the new API relates, a method name, an argument type, a likelihood of exploitation, a return type of the new API, a class, a package, a setter, a class specific feature, and a method description. 8. The computer-implemented method of claim 1, wherein improving, by the processor, security of the computer using the new security information further comprises: identifying, by the processor and using the new security information, a corrupted application programming interface (API); and isolating, by the processor, the corrupted API. 9. A computer-implemented method of improving security of a tangible computer, the method comprising: training, by the processor, a machine learning algorithm by providing to the machine learning algorithm known security information placed on currently understood second APIs in a plurality of application programming interfaces (APIs); normalizing, by a processor, the plurality of application programming interfaces (APIs) to form a plurality of normalized APIs, wherein the plurality of APIs include first APIs with unknown security information; analyzing, by the processor using the machine learning algorithm, the plurality of normalized APIs by identifying a subset of the plurality of APIs that have semantics of a feature, wherein the feature is selected from the group consisting of a source, a sink, and a taint propagator; performing, by the processor, static analysis security testing only on the subset of the plurality of APIs; identifying, by the processor, a compromised API from the subset of the plurality of APIs using the static analysis security testing; and improving, by the processor, security of the computer by taking an action on the computer as a result of identifying the compromised API. 10. The computer-implemented method of claim 9, wherein the action is selected from the group consisting of: isolating the compromised API, revising the compromised API into an originally drafted form of the API, removing unexpected code from the compromised API, isolating computers having the compromised API from a network to which the computers are connected. 11. The computer-implemented method of claim 9 further comprising: automatically marking-up, by the processor, the subset of the plurality of APIs, wherein marking-up highlights all sources of taint, all sinks, and all taint propagators. 12. The computer-implemented method of claim 9 wherein: the source comprises an entry point of one of untrusted or user controlled data into a particular API; the sink comprises an exit point of untrusted data in original form from the particular API; and the taint propagator comprises a pathway through which malicious data flows through a system. 13. The computer-implemented method of claim 12, wherein: the source comprises a query string from a uniform resource locator request; the sink comprises a database execute query call using untrusted data as an argument of the database execute query call; and the taint propagator comprises a “string.append”. 14. A computer program product for improving security of a tangible computer, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to: training, by the processor, a machine learning algorithm by providing to the machine learning algorithm known security information placed on currently understood second APIs in plurality of application programming interfaces (APIs); normalize the plurality of application programming interfaces (APIs) to form a plurality of normalized APIs, wherein the plurality of APIs include first APIs with unknown security information; analyze, using a machine learning algorithm, the plurality of normalized APIs by identifying a subset of the plurality of APIs that have semantics of a feature, wherein the feature is selected from the group consisting of a source, a sink, and a taint propagator; perform static analysis security testing only on the subset of the plurality of APIs; identify a compromised API from the subset of the plurality of APIs using the static analysis security testing; and improve security of the computer by taking an action on the computer as a result of identifying the compromised API. 15. The computer program product of claim 14, wherein the action is selected from the group consisting of: isolating the compromised API, revising the compromised API into an originally drafted form of the API, removing unexpected code from the compromised API, isolating computers having the compromised API from a network to which the computers are connected. 16. The computer program product of claim 14, wherein the program instructions are further executable by the processor to: automatically mark-up the subset of the plurality of APIs, wherein marking-up highlights all sources of taint, all sinks, and all taint propagators. 17. The computer program product of claim 14, wherein: the source comprises an entry point of one of untrusted or user controlled data into a particular API; the sink comprises an exit point of untrusted data in original form from the particular API; and the taint propagator comprises a pathway through which malicious data flows through a system. 18. The computer program product of claim 17, wherein: the source comprises a query string from a uniform resource locator request; the sink comprises a database execute query call using untrusted data as an argument of the database execute query call; and the taint propagator comprises a “string.append”.
A computer-implemented method includes obtaining, by a processor, existing security information for static application security testing (SAST). The method also includes using, by the processor, the existing security information to discover, by a machine capable of learning, new security information. The method also includes improving, by the processor, security of a computer using the new security information.1. A computer-implemented method comprising: obtaining, by a processor, existing security information for static application security testing (SAST); using, by the processor, the existing security information to discover, by a machine capable of learning, new security information; and improving, by the processor, security of a computer using the new security information by identifying, by the processor and using the new security information, a malicious code attempting to access an application programming interface (API) and preventing, by the processor, access by the malicious code to the computer. 2. The computer-implemented method of claim 1, wherein the existing security information includes existing markup information including source information, sink information, and taint propagator information. 3. The computer-implemented method of claim 2, wherein the source information includes an entry point of untrusted data. 4. The computer-implemented method of claim 2, wherein the sink information includes where untrusted data exits a system in original form. 5. The computer-implemented method of claim 2, wherein the taint propagator information includes a pathway of malicious data flowing through a system. 6. The computer-implemented method of claim 1, further comprising: providing the new security information to a static analysis analyzer, wherein the new security information includes new markup information. 7. The computer-implemented method of claim 1, wherein the new security information is for a new application programming interface (API), and further comprising: extracting features from the new API, wherein the features include whether the new API is static, a type of technology to which the new API relates, a method name, an argument type, a likelihood of exploitation, a return type of the new API, a class, a package, a setter, a class specific feature, and a method description. 8. The computer-implemented method of claim 1, wherein improving, by the processor, security of the computer using the new security information further comprises: identifying, by the processor and using the new security information, a corrupted application programming interface (API); and isolating, by the processor, the corrupted API. 9. A computer-implemented method of improving security of a tangible computer, the method comprising: training, by the processor, a machine learning algorithm by providing to the machine learning algorithm known security information placed on currently understood second APIs in a plurality of application programming interfaces (APIs); normalizing, by a processor, the plurality of application programming interfaces (APIs) to form a plurality of normalized APIs, wherein the plurality of APIs include first APIs with unknown security information; analyzing, by the processor using the machine learning algorithm, the plurality of normalized APIs by identifying a subset of the plurality of APIs that have semantics of a feature, wherein the feature is selected from the group consisting of a source, a sink, and a taint propagator; performing, by the processor, static analysis security testing only on the subset of the plurality of APIs; identifying, by the processor, a compromised API from the subset of the plurality of APIs using the static analysis security testing; and improving, by the processor, security of the computer by taking an action on the computer as a result of identifying the compromised API. 10. The computer-implemented method of claim 9, wherein the action is selected from the group consisting of: isolating the compromised API, revising the compromised API into an originally drafted form of the API, removing unexpected code from the compromised API, isolating computers having the compromised API from a network to which the computers are connected. 11. The computer-implemented method of claim 9 further comprising: automatically marking-up, by the processor, the subset of the plurality of APIs, wherein marking-up highlights all sources of taint, all sinks, and all taint propagators. 12. The computer-implemented method of claim 9 wherein: the source comprises an entry point of one of untrusted or user controlled data into a particular API; the sink comprises an exit point of untrusted data in original form from the particular API; and the taint propagator comprises a pathway through which malicious data flows through a system. 13. The computer-implemented method of claim 12, wherein: the source comprises a query string from a uniform resource locator request; the sink comprises a database execute query call using untrusted data as an argument of the database execute query call; and the taint propagator comprises a “string.append”. 14. A computer program product for improving security of a tangible computer, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to: training, by the processor, a machine learning algorithm by providing to the machine learning algorithm known security information placed on currently understood second APIs in plurality of application programming interfaces (APIs); normalize the plurality of application programming interfaces (APIs) to form a plurality of normalized APIs, wherein the plurality of APIs include first APIs with unknown security information; analyze, using a machine learning algorithm, the plurality of normalized APIs by identifying a subset of the plurality of APIs that have semantics of a feature, wherein the feature is selected from the group consisting of a source, a sink, and a taint propagator; perform static analysis security testing only on the subset of the plurality of APIs; identify a compromised API from the subset of the plurality of APIs using the static analysis security testing; and improve security of the computer by taking an action on the computer as a result of identifying the compromised API. 15. The computer program product of claim 14, wherein the action is selected from the group consisting of: isolating the compromised API, revising the compromised API into an originally drafted form of the API, removing unexpected code from the compromised API, isolating computers having the compromised API from a network to which the computers are connected. 16. The computer program product of claim 14, wherein the program instructions are further executable by the processor to: automatically mark-up the subset of the plurality of APIs, wherein marking-up highlights all sources of taint, all sinks, and all taint propagators. 17. The computer program product of claim 14, wherein: the source comprises an entry point of one of untrusted or user controlled data into a particular API; the sink comprises an exit point of untrusted data in original form from the particular API; and the taint propagator comprises a pathway through which malicious data flows through a system. 18. The computer program product of claim 17, wherein: the source comprises a query string from a uniform resource locator request; the sink comprises a database execute query call using untrusted data as an argument of the database execute query call; and the taint propagator comprises a “string.append”.
2,400
9,377
9,377
15,956,632
2,468
The present disclosure describes techniques and systems for user device-initiated bandwidth requests. In some aspects, a user device determines conditions related to communicating with a base station over a wireless connection. The user device selects, based on the determined conditions, a frequency bandwidth for communicating with the base station. The user device then transmits, to the base station, a request to communicate over the selected frequency bandwidth. In some implementations, the user device may receive, in response to transmitting the request, a resource grant allocating at least a portion of the selected frequency bandwidth for communicating over the wireless connection.
1. A method performed by a user device for user-device-initiated bandwidth requests, the method comprising: establishing a wireless connection with a base station of a wireless network; receiving a first resource grant from the base station, the first resource grant identifying a first frequency bandwidth for communicating with the base station over the wireless connection; determining conditions related to communicating with the base station over the first frequency bandwidth identified in the first resource grant; selecting, by the user device, a second frequency bandwidth for communicating with the base station, the selecting based on the determined conditions of the communication over the first frequency bandwidth; transmitting, to the base station, a request to communicate with the base station over the second frequency bandwidth; and receiving a second resource grant from the base station, the second resource grant allowing communication with the base station over the second frequency bandwidth or an alternate frequency bandwidth based on the second frequency bandwidth. 2-9. (canceled) 10. A user device comprising: a processor; a hardware-based transceiver; and a computer-readable storage medium having stored thereon instructions that, responsive to execution by the processor, cause the processor to perform operations comprising: receive, via the hardware-based transceiver, a first resource grant from a base station, the first resource grant identifying a first frequency bandwidth for communicating with the base station over a wireless connection; determine conditions related to communicating with the base station over the first frequency bandwidth identified in the first resource grant; select, based on the determined conditions of the communication with the base station over the first frequency bandwidth, a second frequency bandwidth for communicating with the base station; transmit, to the base station and via the hardware-based transceiver, a request to communicate over the second frequency bandwidth; and receive, via the hardware-based transceiver, a second resource grant from the base station, the second resource grant granting communication with the base station over the second frequency bandwidth or an alternate frequency bandwidth based on the second frequency bandwidth. 11-14. (canceled) 15. A base station of a wireless network comprising: a processor; a hardware-based transceiver: and a computer-readable storage medium having stored thereon instructions that, responsive to execution by the processor, cause the processor to perform operations comprising: establish, via the hardware-based transceiver, a wireless connection with a user device of a wireless network; transmit, to the user device and via the hardware-based transceiver, a first resource grant, the first resource grant identifying a first frequency bandwidth for communicating with the base station over the wireless connection; receive, from the user device and via the hardware-based transceiver, a request to communicate over the wireless connection using a second frequency bandwidth; compare the request with an availability of communication resources within the second frequency bandwidth; and transmit, to the user device and via the hardware-based transceiver, a second resource grant allocating communication resources for communicating with the base station over the wireless connection, the second resource grant based on the request and the comparison of the request with the availability of communication resources within the second frequency bandwidth. 16-20. (canceled) 21. The method as recited in claim 1, wherein the second frequency bandwidth is a portion of a total bandwidth of the wireless network, the total bandwidth including a range of frequencies over which the wireless network can operate. 22. (canceled) 23. The method as recited in claim 1, wherein the conditions include wireless signals detected at the user device, the wireless signals not included in the wireless connection. 24. The method as recited in claim 1, wherein the conditions include: a power status of the user device; or a thermal status of the user device. 25. The method as recited in claim 1, wherein the conditions include: an amount of data to be transmitted to, or received from, the base station; or a type of data to be transmitted to, or received from, the base station. 26. The method as recited in claim 1, wherein the request includes a requested amount of communication resources within the second frequency bandwidth for communicating with the base station. 27. The method as recited in claim 26, wherein the requested amount of communication resources identifies a requested amount of uplink communication resources and a requested amount of downlink communication resources. 28. The method as recited in claim 1, wherein the user device transmits the request as a radio resource control message or as a medium access control message, the request transmitted over a currently allocated communication resource of the first resource grant, over a physical random access channel of the first resource grant, or over a supplemental uplink of the first resource grant. 29. The method as recited in claim 1, wherein the request includes a requested increasing or a decreasing of communication resources that are allocated to one or both of an uplink or a downlink in the first resource grant. 30. The method as recited in claim 1, wherein the request identifies: a requested frequency hopping pattern comprising a change in a location of the second frequency bandwidth; or a requested schedule for changing elements of the second frequency bandwidth. 31. The user device as recited in claim 10, wherein the first frequency bandwidth and the second frequency bandwidth are portions of a total bandwidth of the wireless connection, the total bandwidth including a range of frequencies over which the wireless connection can operate. 32. The user device as recited in claim 10, wherein the second frequency bandwidth is: spaced, in a frequency domain, from the first frequency bandwidth identified in the first resource grant; or narrower than the first frequency bandwidth identified in the first resource grant. 33. The user device as recited in claim 10, wherein the request identifies a duration of time for which the user device requests to communicate over the second frequency bandwidth. 34. The user device as recited in claim 10, wherein the request identifies a requested hopping pattern for communication over the second frequency bandwidth. 35. The base station as recited in claim 15, wherein the second frequency bandwidth is a portion of a total bandwidth of the wireless network, the total bandwidth including a range of frequencies over which the wireless network can operate. 36. The base station as recited in claim 15, wherein: the request includes a requested amount of communication resources within the second frequency bandwidth for communicating with the base station; an amount of available communication resources within the second frequency bandwidth meets or exceeds the requested amount of communication resources; and the second resource grant allocates an amount of communication resources within the second frequency bandwidth that is based on the requested amount of communication resources and the amount of available communication resources. 37. The base station as recited in claim 36, wherein the operations further include transmitting, based on the amount of requested communication resources exceeding the amount of available communication resources within the second frequency bandwidth, a proposed alternate frequency bandwidth to the user device. 38. The base station as recited in claim 15, wherein: the request identifies a requested amount of uplink communication resources and a requested amount of downlink communication resources; and the second resource grant is based on the requested amount of uplink communication resources and a requested amount of downlink communication resources. 39. The base station as recited in claim 15, wherein: the request identifies a type of data to be transmitted to, or received from, the user device; and the second resource grant allocates the communication resources for communicating with the base station based on the type of data to be transmitted to, or received from, the user device. 40. The base station as recited in claim 15, wherein: the request includes a requested amount of communication resources within the second frequency bandwidth for communicating with the base station; an amount of requested communication resources exceeds an amount of available communication resources within the second frequency bandwidth; the second resource grant allocates an amount of communication resources that is based on the requested amount of communication resources; and at least a portion of the allocated communication resources are outside of the second frequency bandwidth. 41. The method as recited in claim 1, further comprising communicating with the base station over the wireless connection using the second frequency bandwidth or the alternate frequency bandwidth.
The present disclosure describes techniques and systems for user device-initiated bandwidth requests. In some aspects, a user device determines conditions related to communicating with a base station over a wireless connection. The user device selects, based on the determined conditions, a frequency bandwidth for communicating with the base station. The user device then transmits, to the base station, a request to communicate over the selected frequency bandwidth. In some implementations, the user device may receive, in response to transmitting the request, a resource grant allocating at least a portion of the selected frequency bandwidth for communicating over the wireless connection.1. A method performed by a user device for user-device-initiated bandwidth requests, the method comprising: establishing a wireless connection with a base station of a wireless network; receiving a first resource grant from the base station, the first resource grant identifying a first frequency bandwidth for communicating with the base station over the wireless connection; determining conditions related to communicating with the base station over the first frequency bandwidth identified in the first resource grant; selecting, by the user device, a second frequency bandwidth for communicating with the base station, the selecting based on the determined conditions of the communication over the first frequency bandwidth; transmitting, to the base station, a request to communicate with the base station over the second frequency bandwidth; and receiving a second resource grant from the base station, the second resource grant allowing communication with the base station over the second frequency bandwidth or an alternate frequency bandwidth based on the second frequency bandwidth. 2-9. (canceled) 10. A user device comprising: a processor; a hardware-based transceiver; and a computer-readable storage medium having stored thereon instructions that, responsive to execution by the processor, cause the processor to perform operations comprising: receive, via the hardware-based transceiver, a first resource grant from a base station, the first resource grant identifying a first frequency bandwidth for communicating with the base station over a wireless connection; determine conditions related to communicating with the base station over the first frequency bandwidth identified in the first resource grant; select, based on the determined conditions of the communication with the base station over the first frequency bandwidth, a second frequency bandwidth for communicating with the base station; transmit, to the base station and via the hardware-based transceiver, a request to communicate over the second frequency bandwidth; and receive, via the hardware-based transceiver, a second resource grant from the base station, the second resource grant granting communication with the base station over the second frequency bandwidth or an alternate frequency bandwidth based on the second frequency bandwidth. 11-14. (canceled) 15. A base station of a wireless network comprising: a processor; a hardware-based transceiver: and a computer-readable storage medium having stored thereon instructions that, responsive to execution by the processor, cause the processor to perform operations comprising: establish, via the hardware-based transceiver, a wireless connection with a user device of a wireless network; transmit, to the user device and via the hardware-based transceiver, a first resource grant, the first resource grant identifying a first frequency bandwidth for communicating with the base station over the wireless connection; receive, from the user device and via the hardware-based transceiver, a request to communicate over the wireless connection using a second frequency bandwidth; compare the request with an availability of communication resources within the second frequency bandwidth; and transmit, to the user device and via the hardware-based transceiver, a second resource grant allocating communication resources for communicating with the base station over the wireless connection, the second resource grant based on the request and the comparison of the request with the availability of communication resources within the second frequency bandwidth. 16-20. (canceled) 21. The method as recited in claim 1, wherein the second frequency bandwidth is a portion of a total bandwidth of the wireless network, the total bandwidth including a range of frequencies over which the wireless network can operate. 22. (canceled) 23. The method as recited in claim 1, wherein the conditions include wireless signals detected at the user device, the wireless signals not included in the wireless connection. 24. The method as recited in claim 1, wherein the conditions include: a power status of the user device; or a thermal status of the user device. 25. The method as recited in claim 1, wherein the conditions include: an amount of data to be transmitted to, or received from, the base station; or a type of data to be transmitted to, or received from, the base station. 26. The method as recited in claim 1, wherein the request includes a requested amount of communication resources within the second frequency bandwidth for communicating with the base station. 27. The method as recited in claim 26, wherein the requested amount of communication resources identifies a requested amount of uplink communication resources and a requested amount of downlink communication resources. 28. The method as recited in claim 1, wherein the user device transmits the request as a radio resource control message or as a medium access control message, the request transmitted over a currently allocated communication resource of the first resource grant, over a physical random access channel of the first resource grant, or over a supplemental uplink of the first resource grant. 29. The method as recited in claim 1, wherein the request includes a requested increasing or a decreasing of communication resources that are allocated to one or both of an uplink or a downlink in the first resource grant. 30. The method as recited in claim 1, wherein the request identifies: a requested frequency hopping pattern comprising a change in a location of the second frequency bandwidth; or a requested schedule for changing elements of the second frequency bandwidth. 31. The user device as recited in claim 10, wherein the first frequency bandwidth and the second frequency bandwidth are portions of a total bandwidth of the wireless connection, the total bandwidth including a range of frequencies over which the wireless connection can operate. 32. The user device as recited in claim 10, wherein the second frequency bandwidth is: spaced, in a frequency domain, from the first frequency bandwidth identified in the first resource grant; or narrower than the first frequency bandwidth identified in the first resource grant. 33. The user device as recited in claim 10, wherein the request identifies a duration of time for which the user device requests to communicate over the second frequency bandwidth. 34. The user device as recited in claim 10, wherein the request identifies a requested hopping pattern for communication over the second frequency bandwidth. 35. The base station as recited in claim 15, wherein the second frequency bandwidth is a portion of a total bandwidth of the wireless network, the total bandwidth including a range of frequencies over which the wireless network can operate. 36. The base station as recited in claim 15, wherein: the request includes a requested amount of communication resources within the second frequency bandwidth for communicating with the base station; an amount of available communication resources within the second frequency bandwidth meets or exceeds the requested amount of communication resources; and the second resource grant allocates an amount of communication resources within the second frequency bandwidth that is based on the requested amount of communication resources and the amount of available communication resources. 37. The base station as recited in claim 36, wherein the operations further include transmitting, based on the amount of requested communication resources exceeding the amount of available communication resources within the second frequency bandwidth, a proposed alternate frequency bandwidth to the user device. 38. The base station as recited in claim 15, wherein: the request identifies a requested amount of uplink communication resources and a requested amount of downlink communication resources; and the second resource grant is based on the requested amount of uplink communication resources and a requested amount of downlink communication resources. 39. The base station as recited in claim 15, wherein: the request identifies a type of data to be transmitted to, or received from, the user device; and the second resource grant allocates the communication resources for communicating with the base station based on the type of data to be transmitted to, or received from, the user device. 40. The base station as recited in claim 15, wherein: the request includes a requested amount of communication resources within the second frequency bandwidth for communicating with the base station; an amount of requested communication resources exceeds an amount of available communication resources within the second frequency bandwidth; the second resource grant allocates an amount of communication resources that is based on the requested amount of communication resources; and at least a portion of the allocated communication resources are outside of the second frequency bandwidth. 41. The method as recited in claim 1, further comprising communicating with the base station over the wireless connection using the second frequency bandwidth or the alternate frequency bandwidth.
2,400
9,378
9,378
14,998,171
2,443
In various embodiments, an IoT device may provide selective reporting of collected data measurements. The IoT device may report the data via a network connection to an aggregator device. The IoT device may detect when the network connection has been interrupted, during which messages containing measurements may be cached. Later, when the network connection has been restored, the IoT device may “replay” the cached messages. The IoT device may selectively report cached messages based on an entropy analysis which may detect which measurements exhibit a higher entropy. The entropy analysis may determine which measurements show a higher rate of change or which have a value outside of a set of thresholds. The IoT device may select measurements based on a history of measurements obtained by the IoT device. Other embodiments may be described and/or claimed.
1. An Internet of Things (IoT) device, comprising: one or more sensors to obtain one or more measurements; one or more computing processors coupled with the one or more sensors; and a measurement reporter to operate on the one or more computer processors to: identify a measurement obtained by the sensor that is to be reported from the IoT device to an external device; perform an analysis, based at least in part on the measurement as well as a one or more previous measurements, on whether to report the measurement to the external device; and selectively report the measurement based at least in part on a result from the analysis. 2. The IoT device of claim 1, further comprising a connection status detector to detect a status of a network connection between the IoT device and the external device. 3. The IoT device of claim 2, wherein the measurement reporter is to report measurements upon detection of restoration of a previously broken network connection by the connection status detector. 4. The IoT device of claim 3, wherein the measurement reporter is to report measurements that were cached during a period in which the network connection was broken. 5. The IoT device of claim 4, further comprising a cache to maintain measurements during the period in which the network connection was broken and wherein the measurement reporter is to report measurements from the cache. 6. The IoT device of claim 2, wherein the measurement reporter is to report measurements upon detection of an increase in bandwidth of the connection by the connection status detector. 7. The IoT device of claim 1, wherein the measurement reporter is to perform the analysis by determining whether entropy of the measurement is higher than a threshold, based on the measurement history. 8. The IoT device of claim 1, wherein the measurement reporter is to perform the analysis by determining a rate of change of measurements obtained by the sensor at a time contemporaneous with a time when the sensor obtained the measurement. 9. The IoT device of claim 8, wherein the measurement reporter is to determine whether the rate of change is above a threshold. 10. The IoT device of claim 1, wherein the measurement reporter is to perform the analysis through determination of whether the measurement is outside of a non-reporting band. 11. The IoT device of claim 10, wherein the measurement reporter is to determine whether the measurement is outside of a non-reporting band described by direct measurement values. 12. The IoT device of claim 10, wherein the measurement reporter is to determine if the measurement is outside of a non-reporting band described by statistical values. 13. The IoT device of claim 1, wherein the measurement reporter is to perform the analysis based on a measurement history comprising a history over a lifetime of the IoT device. 14. The IoT device of claim 1, wherein the measurement reporter is to perform the analysis based on a measurement history comprising a history taken over a window of time that is less than a lifetime of the IoT device. 15. One or more computer-readable media containing instructions written thereon that, in response to execution by an Internet of Things (IoT) device, cause the IoT device to: obtain one or more measurements; identify an obtained measurement that is to be reported from the IoT device to an external device; perform an analysis, based at least in part on the measurement as well as a one or more previous measurements, on whether to report the measurement to the external device; and selectively report the measurement based at least in part on a result from the analysis. 16. The one or more computer-readable media of claim 15, wherein selectively report the measurement comprises report the measurement upon detection of restoration of a previously broken network connection. 17. The one or more computer-readable media of claim 16, wherein selectively report the measurement comprises report the measurement from a cache of the IoT device into which the measurement was cached during a period in which the network connection was broken. 18. The one or more computer-readable media of claim 15, wherein perform the analysis comprises determine whether entropy of the measurement is higher than a threshold, based on the measurement history. 19. The one or more computer-readable media of claim 15, wherein perform the analysis comprises determine a rate of change of obtained measurements at a time contemporaneous with a time when the measurement was obtained is above a threshold. 20. The one or more computer-readable media of claim 15, wherein perform the analysis comprises determine whether the measurement is outside of a non-reporting band. 21. A computer-implemented method, comprising: obtaining, by an Internet of Things (IoT) device, one or more measurements; identifying, by the IoT device, an obtained measurement that is to be reported from the IoT device to an external device; performing, by the IoT device, an analysis based at least in part on the measurement as well as a one or more previous measurements, on whether to report the measurement to the external device; and selectively reporting, by the IoT device, the measurement based at least in part on a result from the analysis. 22. The method of claim 21, wherein selectively reporting the measurement comprises reporting the measurement upon detection of restoration of a previously broken network connection. 23. The method of claim 21, wherein performing the analysis comprises determining whether entropy of the measurement is higher than a threshold, based on the measurement history. 24. The method of claim 21, wherein performing the analysis comprises determining whether a rate of change of obtained measurements at a time contemporaneous with a time when the measurement was obtained is above a threshold.
In various embodiments, an IoT device may provide selective reporting of collected data measurements. The IoT device may report the data via a network connection to an aggregator device. The IoT device may detect when the network connection has been interrupted, during which messages containing measurements may be cached. Later, when the network connection has been restored, the IoT device may “replay” the cached messages. The IoT device may selectively report cached messages based on an entropy analysis which may detect which measurements exhibit a higher entropy. The entropy analysis may determine which measurements show a higher rate of change or which have a value outside of a set of thresholds. The IoT device may select measurements based on a history of measurements obtained by the IoT device. Other embodiments may be described and/or claimed.1. An Internet of Things (IoT) device, comprising: one or more sensors to obtain one or more measurements; one or more computing processors coupled with the one or more sensors; and a measurement reporter to operate on the one or more computer processors to: identify a measurement obtained by the sensor that is to be reported from the IoT device to an external device; perform an analysis, based at least in part on the measurement as well as a one or more previous measurements, on whether to report the measurement to the external device; and selectively report the measurement based at least in part on a result from the analysis. 2. The IoT device of claim 1, further comprising a connection status detector to detect a status of a network connection between the IoT device and the external device. 3. The IoT device of claim 2, wherein the measurement reporter is to report measurements upon detection of restoration of a previously broken network connection by the connection status detector. 4. The IoT device of claim 3, wherein the measurement reporter is to report measurements that were cached during a period in which the network connection was broken. 5. The IoT device of claim 4, further comprising a cache to maintain measurements during the period in which the network connection was broken and wherein the measurement reporter is to report measurements from the cache. 6. The IoT device of claim 2, wherein the measurement reporter is to report measurements upon detection of an increase in bandwidth of the connection by the connection status detector. 7. The IoT device of claim 1, wherein the measurement reporter is to perform the analysis by determining whether entropy of the measurement is higher than a threshold, based on the measurement history. 8. The IoT device of claim 1, wherein the measurement reporter is to perform the analysis by determining a rate of change of measurements obtained by the sensor at a time contemporaneous with a time when the sensor obtained the measurement. 9. The IoT device of claim 8, wherein the measurement reporter is to determine whether the rate of change is above a threshold. 10. The IoT device of claim 1, wherein the measurement reporter is to perform the analysis through determination of whether the measurement is outside of a non-reporting band. 11. The IoT device of claim 10, wherein the measurement reporter is to determine whether the measurement is outside of a non-reporting band described by direct measurement values. 12. The IoT device of claim 10, wherein the measurement reporter is to determine if the measurement is outside of a non-reporting band described by statistical values. 13. The IoT device of claim 1, wherein the measurement reporter is to perform the analysis based on a measurement history comprising a history over a lifetime of the IoT device. 14. The IoT device of claim 1, wherein the measurement reporter is to perform the analysis based on a measurement history comprising a history taken over a window of time that is less than a lifetime of the IoT device. 15. One or more computer-readable media containing instructions written thereon that, in response to execution by an Internet of Things (IoT) device, cause the IoT device to: obtain one or more measurements; identify an obtained measurement that is to be reported from the IoT device to an external device; perform an analysis, based at least in part on the measurement as well as a one or more previous measurements, on whether to report the measurement to the external device; and selectively report the measurement based at least in part on a result from the analysis. 16. The one or more computer-readable media of claim 15, wherein selectively report the measurement comprises report the measurement upon detection of restoration of a previously broken network connection. 17. The one or more computer-readable media of claim 16, wherein selectively report the measurement comprises report the measurement from a cache of the IoT device into which the measurement was cached during a period in which the network connection was broken. 18. The one or more computer-readable media of claim 15, wherein perform the analysis comprises determine whether entropy of the measurement is higher than a threshold, based on the measurement history. 19. The one or more computer-readable media of claim 15, wherein perform the analysis comprises determine a rate of change of obtained measurements at a time contemporaneous with a time when the measurement was obtained is above a threshold. 20. The one or more computer-readable media of claim 15, wherein perform the analysis comprises determine whether the measurement is outside of a non-reporting band. 21. A computer-implemented method, comprising: obtaining, by an Internet of Things (IoT) device, one or more measurements; identifying, by the IoT device, an obtained measurement that is to be reported from the IoT device to an external device; performing, by the IoT device, an analysis based at least in part on the measurement as well as a one or more previous measurements, on whether to report the measurement to the external device; and selectively reporting, by the IoT device, the measurement based at least in part on a result from the analysis. 22. The method of claim 21, wherein selectively reporting the measurement comprises reporting the measurement upon detection of restoration of a previously broken network connection. 23. The method of claim 21, wherein performing the analysis comprises determining whether entropy of the measurement is higher than a threshold, based on the measurement history. 24. The method of claim 21, wherein performing the analysis comprises determining whether a rate of change of obtained measurements at a time contemporaneous with a time when the measurement was obtained is above a threshold.
2,400
9,379
9,379
16,240,742
2,412
A system, method and apparatus for configuring a node in a sensor network. A sensor service can enable sensor applications to customize the collection and processing of sensor data from a monitoring location. In one embodiment, sensor applications can customize the operation of nodes in the sensor network via a sensor data control system.
1. (canceled) 2. A method, comprising: storing, by a network node at a monitored location, a control schedule based on control schedule information generated by a management system remote from the monitored location, the stored control schedule identifying a transition time for a next control action when a control command is generated by the network node; determining, by the network node, when a timestamp indicates the transition time identified by the stored control schedule; and generating, by the network node based on the determination, the control command for control of an actuator connected to the network node. 3. The method of claim 2, wherein the timestamp is a universal time coordinated (UTC) timestamp. 4. The method of claim 3, further comprising adjusting a UTC timestamp using a time offset provided to the network node. 5. The method of claim 4, further comprising receiving, by the network node, a new time offset to account for a daylight savings time event. 6. The method of claim 2, wherein the control schedule information is based on a schedule start time and a time duration parameter usable to identify a duration of an actuator state that begins at the schedule start time. 7. The method of claim 2, further comprising receiving, by the network node, the control schedule information wirelessly. 8. The method of claim 2, further comprising receiving, by the network node, the control schedule information from a gateway device at the monitored location. 9. The method of claim 2, further comprising receiving, by the network node, an override control command that overrides an actuator state indicated by the control schedule. 10. A non-transitory computer-readable medium having an actuator control tool stored thereon for use by a network node at a monitored location, the actuator control tool including: a first section that when executed, causes the actuator control tool to store a control schedule based on control schedule information generated by a management system remote from the monitored location, the stored control schedule identifying a transition time for a next control action when a control command is generated by the network node; a second section that when executed, causes the actuator control tool to determine when a timestamp indicates the transition time identified by the stored control schedule; and a third section that when executed, causes the actuator control tool to generate the control command for control of an actuator connected to the network node. 11. The non-transitory computer-readable medium of claim 10, wherein the timestamp is a universal time coordinated (UTC) timestamp. 12. The non-transitory computer-readable medium of claim 11, further comprising adjusting a UTC timestamp using a time offset provided to the network node. 13. The non-transitory computer-readable medium of claim 12, further comprising receiving, by the network node, a new time offset to account for a daylight savings time event. 14. The non-transitory computer-readable medium of claim 10, wherein the control schedule information is based on a schedule start time and a time duration parameter usable to identify a duration of an actuator state that begins at the schedule start time. 15. The non-transitory computer-readable medium of claim 10, wherein the control schedule information is received by the network node wirelessly. 16. The non-transitory computer-readable medium of claim 10, wherein the control schedule information is received by the network node from a gateway device at the monitored location. 17. The non-transitory computer-readable medium of claim 10, wherein the actuator control tool further comprises an override control section that when executed, causes the actuator control tool to override an actuator state indicated by the control schedule. 18. A device, comprising: a memory for storing a control schedule based on control schedule information generated by a management system remote from a monitored location at which the device is installed, the stored control schedule identifying a transition time for a next control action when a control command is generated by the network node; and a controller configured to determine when a timestamp indicates the transition time identified by the stored control schedule, and to generate the control command for control of an actuator connected to the device. 19. The device of claim 18, wherein the timestamp is a universal time coordinated (UTC) timestamp. 20. The device of claim 19, wherein the controller is further configured to adjust a UTC timestamp using a time offset provided to the network node. 21. The device of claim 20, wherein the device is further configured to receive a new time offset to account for a daylight savings time event.
A system, method and apparatus for configuring a node in a sensor network. A sensor service can enable sensor applications to customize the collection and processing of sensor data from a monitoring location. In one embodiment, sensor applications can customize the operation of nodes in the sensor network via a sensor data control system.1. (canceled) 2. A method, comprising: storing, by a network node at a monitored location, a control schedule based on control schedule information generated by a management system remote from the monitored location, the stored control schedule identifying a transition time for a next control action when a control command is generated by the network node; determining, by the network node, when a timestamp indicates the transition time identified by the stored control schedule; and generating, by the network node based on the determination, the control command for control of an actuator connected to the network node. 3. The method of claim 2, wherein the timestamp is a universal time coordinated (UTC) timestamp. 4. The method of claim 3, further comprising adjusting a UTC timestamp using a time offset provided to the network node. 5. The method of claim 4, further comprising receiving, by the network node, a new time offset to account for a daylight savings time event. 6. The method of claim 2, wherein the control schedule information is based on a schedule start time and a time duration parameter usable to identify a duration of an actuator state that begins at the schedule start time. 7. The method of claim 2, further comprising receiving, by the network node, the control schedule information wirelessly. 8. The method of claim 2, further comprising receiving, by the network node, the control schedule information from a gateway device at the monitored location. 9. The method of claim 2, further comprising receiving, by the network node, an override control command that overrides an actuator state indicated by the control schedule. 10. A non-transitory computer-readable medium having an actuator control tool stored thereon for use by a network node at a monitored location, the actuator control tool including: a first section that when executed, causes the actuator control tool to store a control schedule based on control schedule information generated by a management system remote from the monitored location, the stored control schedule identifying a transition time for a next control action when a control command is generated by the network node; a second section that when executed, causes the actuator control tool to determine when a timestamp indicates the transition time identified by the stored control schedule; and a third section that when executed, causes the actuator control tool to generate the control command for control of an actuator connected to the network node. 11. The non-transitory computer-readable medium of claim 10, wherein the timestamp is a universal time coordinated (UTC) timestamp. 12. The non-transitory computer-readable medium of claim 11, further comprising adjusting a UTC timestamp using a time offset provided to the network node. 13. The non-transitory computer-readable medium of claim 12, further comprising receiving, by the network node, a new time offset to account for a daylight savings time event. 14. The non-transitory computer-readable medium of claim 10, wherein the control schedule information is based on a schedule start time and a time duration parameter usable to identify a duration of an actuator state that begins at the schedule start time. 15. The non-transitory computer-readable medium of claim 10, wherein the control schedule information is received by the network node wirelessly. 16. The non-transitory computer-readable medium of claim 10, wherein the control schedule information is received by the network node from a gateway device at the monitored location. 17. The non-transitory computer-readable medium of claim 10, wherein the actuator control tool further comprises an override control section that when executed, causes the actuator control tool to override an actuator state indicated by the control schedule. 18. A device, comprising: a memory for storing a control schedule based on control schedule information generated by a management system remote from a monitored location at which the device is installed, the stored control schedule identifying a transition time for a next control action when a control command is generated by the network node; and a controller configured to determine when a timestamp indicates the transition time identified by the stored control schedule, and to generate the control command for control of an actuator connected to the device. 19. The device of claim 18, wherein the timestamp is a universal time coordinated (UTC) timestamp. 20. The device of claim 19, wherein the controller is further configured to adjust a UTC timestamp using a time offset provided to the network node. 21. The device of claim 20, wherein the device is further configured to receive a new time offset to account for a daylight savings time event.
2,400
9,380
9,380
12,189,055
2,492
A near field communication system can include a near field generator configured to generate a near field detectable information signal. The near field generator and supporting circuitry also produces incidental electromagnetic radiation. A masking signal transmitter is used with the near field generator and radiates a masking electromagnetic signal. The masking electromagnetic signal may substantially mask the incidental electromagnetic radiation.
1. A near field communication system having enhanced security, comprising: a near field generator configured to generate a near field detectable signal having information encoded therein, wherein incidental electromagnetic radiation correlated to the information is produced when the near field detectable signal is generated; and a masking signal transmitter configured to radiate a masking electromagnetic signal and to mask the incidental electromagnetic radiation. 2. The system of claim 1, wherein the masking electromagnetic signal reduces at least one of detectability, decodability and extractability of the information from the incidental electromagnetic radiation. 3. The system of claim 1, wherein the radiated masking electromagnetic signal reduces the detectability of the incidental electromagnetic radiation. 4. The system of claim 1, wherein the masking electromagnetic signal comprises at least one characteristic substantially similar to at least one characteristic of the incidental electromagnetic radiation. 5. The system of claim 1, wherein the radiated masking electromagnetic signal is substantially uncorrelated to the information. 6. The system of claim 1, wherein the masking signal transmitter is coupled to the near field generator and the masking electromagnetic signal is generated using the information. 7. The system of claim 1, wherein the masking signal transmitter is decoupled from the near field generator and the masking electromagnetic signal is generated without using the information. 8. The system of claim 1, wherein the masking signal transmitter is independent from the from the near field generator. 9. The system of claim 1, wherein a timing associated with the near field generator is different than a timing associated with the masking signal transmitter. 10. The system of claim 1, wherein the masking signal transmitter is configured to radiate a plurality of masking electromagnetic signals. 11. The system of claim 1, wherein the masking signal transmitter is configured to radiate at least one masking electromagnetic signal configured to mask the incidental electromagnetic radiation produced by the near field generator and incidental electromagnetic radiation produced by at least one other near field generator. 12. The system of claim 1, wherein the masking electromagnetic signal comprises substantially the same field strength as the incidental electromagnetic radiation. 13. The system of claim 1, wherein the masking electromagnetic signal is radiated in a direction similar to the incidental electromagnetic radiation. 14. The system of claim 1, wherein the masking electromagnetic signal is designed to spectrally match the incidental electromagnetic radiation. 15. The system of claim 1, wherein the masking electromagnetic signal is configured to occupy substantially the same bandwidth as the incidental electromagnetic radiation. 16. The system of claim 1, wherein the masking electromagnetic signal is configured to occupy a wider bandwidth than the incidental electromagnetic radiation. 17. The system of claim 1, wherein the near field detectable signal is propagated by way of magnetic induction. 18. The system of claim 1, wherein the near field detectable signal is propagated by way of capacitive coupling. 19. The system of claim 1, wherein the masking electromagnetic signal is generated using a random data generator. 20. The system of claim 1, wherein the masking electromagnetic signal comprises a similar modulation as the near field detectable signal that is modulated with encoded information. 21. The system of claim 1, wherein the masking electromagnetic signal and the incidental electromagnetic radiation have a combined noise level less than a defined noise level at a preset distance from the system. 22. The system of claim 1, wherein the masking electromagnetic signal is radiated using an antenna. 23. The system of claim 22, wherein the antenna is contained in the same housing as the near field generator. 24. The system of claim 1, wherein a timing signal is provided from the near field generator to the masking signal transmitter. 25. The system of claim 1, wherein the masking signal transmitter extracts a timing signal from the near field detectable signal. 26. A near field communication system having enhanced security, comprising: means for generating a near field detectable signal having information encoded therein, wherein incidental electromagnetic radiation correlated to the information is produced when the near field detectable signal is generated; and means for radiating a masking signal for masking the incidental electromagnetic radiation. 27. The system of claim 26, wherein the radiated masking electromagnetic signal reduces at least one of detectability, decodability and extractability of the information from the incidental electromagnetic radiation. 28. The system of claim 26, wherein the radiated masking electromagnetic signal reduces the detectability of the incidental electromagnetic radiation. 29. The system of claim 26, wherein the masking electromagnetic signal comprises at least one characteristic substantially similar to at least one characteristic of the incidental electromagnetic radiation. 30. The system of claim 26, wherein the radiated masking electromagnetic signal is substantially uncorrelated to the information. 31. A method for enhancing security of near field communications system, comprising: forming an energy field for transmission of information via near field communications techniques; radiating incidental electromagnetic radiation correlated to the information; generating a masking electromagnetic signal for masking the incidental electromagnetic radiation; and radiating the masking electromagnetic signal. 32. The method of claim 31, wherein the radiating of the incidental electromagnetic radiation comprises varying a load in the energy field. 33. The method of claim 31, wherein the radiated masking electromagnetic signal reduces at least one of detectability, decodability and extractability of the information from the incidental electromagnetic radiation. 34. The method of claim 31, wherein the radiated masking electromagnetic signal reduces the detectability of the incidental electromagnetic radiation. 35. The method of claim 31, wherein the masking electromagnetic signal comprises at least one characteristic substantially similar to at least one characteristic of the incidental electromagnetic radiation. 36. The method of claim 31, wherein the radiated masking electromagnetic signal is substantially uncorrelated to the information. 37. The method of claim 31, wherein the generating of the masking electromagnetic signal comprises generating a plurality of masking electromagnetic signals, further wherein the radiating of the masking electromagnetic signal comprises radiating the plurality of masking electromagnetic signals. 38. The method of claim 31, wherein the masking electromagnetic signal comprises substantially the same field strength as the incidental electromagnetic radiation. 39. The method of claim 31, wherein the masking electromagnetic signal spectrally matches the incidental electromagnetic radiation. 40. The method of claim 31, wherein the masking electromagnetic signal occupies substantially the same bandwidth as the incidental electromagnetic radiation. 41. The method of claim 31, wherein the masking electromagnetic signal occupies a wider bandwidth than the incidental electromagnetic radiation. 42. The method of claim 31, wherein the masking electromagnetic signal is generated using a random data generator. 43. The method of claim 31, wherein the masking electromagnetic signal and the incidental electromagnetic radiation have a combined noise level less than a defined noise level. 44. The method of claim 31, further comprising encoding information in the near field using a digital modulation technique. 45. The method of claim 31, further comprising directing the masking signal in the same direction as the incidental electromagnetic radiation. 46. The method of claim 31, further comprising shielding an energy field generator that is creating the energy field to reduce the level of incidental electromagnetic radiation. 47. The method of claim 31, further comprising providing a timing signal to the masking signal transmitter. 48. The method of claim 31, further comprising extracting a timing signal from the near field detectable signal for use with the masking signal transmitter. 49. A near field communication system having enhanced security for a near field generator, the system comprising: a masking signal transmitter configured to radiate a masking electromagnetic signal for masking incidental electromagnetic radiation produced when a near field detectable signal having information encoded therein is generated by a near field generator. 50. The system of claim 49, wherein the radiated masking electromagnetic signal reduces at least one of detectability, decodability and extractability of the information from the incidental electromagnetic radiation. 51. The system of claim 49, wherein the radiated masking electromagnetic signal reduces the detectability of the incidental electromagnetic radiation. 52. The system of claim 49, wherein the masking electromagnetic signal comprises at least one characteristic substantially similar to at least one characteristic of the incidental electromagnetic radiation. 53. The system of claim 49, wherein the radiated masking electromagnetic signal is substantially uncorrelated to the information.
A near field communication system can include a near field generator configured to generate a near field detectable information signal. The near field generator and supporting circuitry also produces incidental electromagnetic radiation. A masking signal transmitter is used with the near field generator and radiates a masking electromagnetic signal. The masking electromagnetic signal may substantially mask the incidental electromagnetic radiation.1. A near field communication system having enhanced security, comprising: a near field generator configured to generate a near field detectable signal having information encoded therein, wherein incidental electromagnetic radiation correlated to the information is produced when the near field detectable signal is generated; and a masking signal transmitter configured to radiate a masking electromagnetic signal and to mask the incidental electromagnetic radiation. 2. The system of claim 1, wherein the masking electromagnetic signal reduces at least one of detectability, decodability and extractability of the information from the incidental electromagnetic radiation. 3. The system of claim 1, wherein the radiated masking electromagnetic signal reduces the detectability of the incidental electromagnetic radiation. 4. The system of claim 1, wherein the masking electromagnetic signal comprises at least one characteristic substantially similar to at least one characteristic of the incidental electromagnetic radiation. 5. The system of claim 1, wherein the radiated masking electromagnetic signal is substantially uncorrelated to the information. 6. The system of claim 1, wherein the masking signal transmitter is coupled to the near field generator and the masking electromagnetic signal is generated using the information. 7. The system of claim 1, wherein the masking signal transmitter is decoupled from the near field generator and the masking electromagnetic signal is generated without using the information. 8. The system of claim 1, wherein the masking signal transmitter is independent from the from the near field generator. 9. The system of claim 1, wherein a timing associated with the near field generator is different than a timing associated with the masking signal transmitter. 10. The system of claim 1, wherein the masking signal transmitter is configured to radiate a plurality of masking electromagnetic signals. 11. The system of claim 1, wherein the masking signal transmitter is configured to radiate at least one masking electromagnetic signal configured to mask the incidental electromagnetic radiation produced by the near field generator and incidental electromagnetic radiation produced by at least one other near field generator. 12. The system of claim 1, wherein the masking electromagnetic signal comprises substantially the same field strength as the incidental electromagnetic radiation. 13. The system of claim 1, wherein the masking electromagnetic signal is radiated in a direction similar to the incidental electromagnetic radiation. 14. The system of claim 1, wherein the masking electromagnetic signal is designed to spectrally match the incidental electromagnetic radiation. 15. The system of claim 1, wherein the masking electromagnetic signal is configured to occupy substantially the same bandwidth as the incidental electromagnetic radiation. 16. The system of claim 1, wherein the masking electromagnetic signal is configured to occupy a wider bandwidth than the incidental electromagnetic radiation. 17. The system of claim 1, wherein the near field detectable signal is propagated by way of magnetic induction. 18. The system of claim 1, wherein the near field detectable signal is propagated by way of capacitive coupling. 19. The system of claim 1, wherein the masking electromagnetic signal is generated using a random data generator. 20. The system of claim 1, wherein the masking electromagnetic signal comprises a similar modulation as the near field detectable signal that is modulated with encoded information. 21. The system of claim 1, wherein the masking electromagnetic signal and the incidental electromagnetic radiation have a combined noise level less than a defined noise level at a preset distance from the system. 22. The system of claim 1, wherein the masking electromagnetic signal is radiated using an antenna. 23. The system of claim 22, wherein the antenna is contained in the same housing as the near field generator. 24. The system of claim 1, wherein a timing signal is provided from the near field generator to the masking signal transmitter. 25. The system of claim 1, wherein the masking signal transmitter extracts a timing signal from the near field detectable signal. 26. A near field communication system having enhanced security, comprising: means for generating a near field detectable signal having information encoded therein, wherein incidental electromagnetic radiation correlated to the information is produced when the near field detectable signal is generated; and means for radiating a masking signal for masking the incidental electromagnetic radiation. 27. The system of claim 26, wherein the radiated masking electromagnetic signal reduces at least one of detectability, decodability and extractability of the information from the incidental electromagnetic radiation. 28. The system of claim 26, wherein the radiated masking electromagnetic signal reduces the detectability of the incidental electromagnetic radiation. 29. The system of claim 26, wherein the masking electromagnetic signal comprises at least one characteristic substantially similar to at least one characteristic of the incidental electromagnetic radiation. 30. The system of claim 26, wherein the radiated masking electromagnetic signal is substantially uncorrelated to the information. 31. A method for enhancing security of near field communications system, comprising: forming an energy field for transmission of information via near field communications techniques; radiating incidental electromagnetic radiation correlated to the information; generating a masking electromagnetic signal for masking the incidental electromagnetic radiation; and radiating the masking electromagnetic signal. 32. The method of claim 31, wherein the radiating of the incidental electromagnetic radiation comprises varying a load in the energy field. 33. The method of claim 31, wherein the radiated masking electromagnetic signal reduces at least one of detectability, decodability and extractability of the information from the incidental electromagnetic radiation. 34. The method of claim 31, wherein the radiated masking electromagnetic signal reduces the detectability of the incidental electromagnetic radiation. 35. The method of claim 31, wherein the masking electromagnetic signal comprises at least one characteristic substantially similar to at least one characteristic of the incidental electromagnetic radiation. 36. The method of claim 31, wherein the radiated masking electromagnetic signal is substantially uncorrelated to the information. 37. The method of claim 31, wherein the generating of the masking electromagnetic signal comprises generating a plurality of masking electromagnetic signals, further wherein the radiating of the masking electromagnetic signal comprises radiating the plurality of masking electromagnetic signals. 38. The method of claim 31, wherein the masking electromagnetic signal comprises substantially the same field strength as the incidental electromagnetic radiation. 39. The method of claim 31, wherein the masking electromagnetic signal spectrally matches the incidental electromagnetic radiation. 40. The method of claim 31, wherein the masking electromagnetic signal occupies substantially the same bandwidth as the incidental electromagnetic radiation. 41. The method of claim 31, wherein the masking electromagnetic signal occupies a wider bandwidth than the incidental electromagnetic radiation. 42. The method of claim 31, wherein the masking electromagnetic signal is generated using a random data generator. 43. The method of claim 31, wherein the masking electromagnetic signal and the incidental electromagnetic radiation have a combined noise level less than a defined noise level. 44. The method of claim 31, further comprising encoding information in the near field using a digital modulation technique. 45. The method of claim 31, further comprising directing the masking signal in the same direction as the incidental electromagnetic radiation. 46. The method of claim 31, further comprising shielding an energy field generator that is creating the energy field to reduce the level of incidental electromagnetic radiation. 47. The method of claim 31, further comprising providing a timing signal to the masking signal transmitter. 48. The method of claim 31, further comprising extracting a timing signal from the near field detectable signal for use with the masking signal transmitter. 49. A near field communication system having enhanced security for a near field generator, the system comprising: a masking signal transmitter configured to radiate a masking electromagnetic signal for masking incidental electromagnetic radiation produced when a near field detectable signal having information encoded therein is generated by a near field generator. 50. The system of claim 49, wherein the radiated masking electromagnetic signal reduces at least one of detectability, decodability and extractability of the information from the incidental electromagnetic radiation. 51. The system of claim 49, wherein the radiated masking electromagnetic signal reduces the detectability of the incidental electromagnetic radiation. 52. The system of claim 49, wherein the masking electromagnetic signal comprises at least one characteristic substantially similar to at least one characteristic of the incidental electromagnetic radiation. 53. The system of claim 49, wherein the radiated masking electromagnetic signal is substantially uncorrelated to the information.
2,400
9,381
9,381
14,166,788
2,448
Methods and apparatus for retrieving and delivering content in a network. In one embodiment, unique data codes representative of content are generated by a network entity. The data codes are distributed to viewers either via a physical medium or on a display of similar content. The user device requests the content from the network by reading the data code. The requested content is delivered directly to the requesting device or provided to another device identified by the requesting device or user. In another alternative, the unique data code may be representative of the user or subscriber himself. This type of data code may be generated by the network or the device, and enables the user to access content he is entitled to via another device or terminal by delivery of information contained in the data code (or the code itself) to the network.
1. A method for accessing and delivering content in a managed network, said method comprising: associating individual ones of a plurality of content elements to respective ones of a plurality of unique data codes, said plurality of content elements being stored at a storage entity of said managed network; enabling distribution of at least one of said plurality of unique data codes, said distribution enabling at least one user device to read said unique data code; receiving at a server entity of said managed network, in response to said at least one user device reading said unique data code, a request for a content element associated to said unique data code; utilizing information in said request to identify said content element in said storage entity; and delivering said content element. 2. The method of claim 1, further comprising generating said plurality of unique data codes at said server entity of said managed network. 3. The method of claim 1, further comprising providing said plurality of unique data codes to respective individual ones of a plurality of content sources associated with said respective individual ones of said plurality of content elements. 4. The method of claim 3, wherein said act of enabling distribution of said at least one of said plurality of unique data codes comprises enabling distribution thereof on a physical medium by said respective individual ones of said plurality of content sources. 5. The method of claim 1, wherein said act of enabling distribution of said at least one of said plurality unique data codes comprises enabling distribution thereof as an overlay to a display of said content element. 6. The method of claim 5, wherein said display of said content element comprises display associated with a content delivery network other than said managed network. 7. The method of claim 1, wherein said act of delivering said content element comprises delivery to said at least one user device. 8. The method of claim 1, wherein said act of delivering said content element comprises delivery to a second device, said second device being identified in said request. 9. The method of claim 1, wherein said act of delivering said content element comprises delivery to a second device, said second device being previously identified to said managed network. 10. A method for accessing and delivering content in a managed network, said method comprising: providing data to a subscriber apparatus, said data enabling said subscriber apparatus to generate a unique data code representative of a subscriber associated thereto; receiving a request for content from a terminal apparatus, said request comprising at least information obtained by said terminal apparatus from reading said unique data code from a display device associated with said subscriber apparatus; utilizing said information obtained by said terminal apparatus to verify that said subscriber is entitled to receive said requested content; and when it is determined that said subscriber is entitled to receive said requested content, providing said requested content to said terminal apparatus. 11. The method of claim 10, wherein said act of receiving said request comprises receiving a communication from said terminal apparatus at a server entity of said managed network via an internet connection therebetween. 12. The method of claim 10, wherein said act of receiving said request comprises receiving a communication from said terminal apparatus at a server entity of said managed network via a Data Over Cable Services Interface Specification (DOCSIS) connection therebetween. 13. The method of claim 10, wherein said terminal comprises a display apparatus configured to display said requested content and managed by an entity of said managed network. 14. The method of claim 10, wherein said information obtained by said terminal apparatus from reading said unique data code comprises information identifying said subscriber and/or a subscriber account associated to said subscriber. 15. The method of claim 10, further comprising applying at least one mechanism for protecting said content prior to said act of providing said content to said terminal apparatus. 16. The method of claim 10, further comprising authenticating said subscriber as a subscriber to said managed network using said information obtained by said terminal apparatus from reading said unique data code. 17. A client device configured for use in a content delivery network, said client device comprising: a first interface configured for communication to said content delivery network; a storage apparatus; and a processor, said processor configured to execute at least one computer program thereon, said at least one computer program comprising a plurality of instructions which are configured to, when executed, utilize information contained in a unique data code to request a particular media content stored at a storage entity of said content delivery network for delivery either to said client device or to another device in communication with or associated to said client device. 18. The client device of claim 17, wherein said unique data code comprises data configured to uniquely identify said media content; and wherein said computer program is further configured to, when executed: read said unique data code via a scanner associated with said client device; process information contained in said unique data code; and use said information contained in said unique data code to request said media content. 19. The client device of claim 18, wherein said unique data code is read from at least one of a physical medium or a display apparatus. 20. The client device of claim 17, wherein said unique data code comprises data configured to uniquely identify a subscriber associated to said client device; and wherein said computer program is further configured to, when executed, generate and display said unique data code for reading thereof by a terminal apparatus configured to utilize said unique data code to authenticate said subscriber and validate a right of said subscriber to said media content.
Methods and apparatus for retrieving and delivering content in a network. In one embodiment, unique data codes representative of content are generated by a network entity. The data codes are distributed to viewers either via a physical medium or on a display of similar content. The user device requests the content from the network by reading the data code. The requested content is delivered directly to the requesting device or provided to another device identified by the requesting device or user. In another alternative, the unique data code may be representative of the user or subscriber himself. This type of data code may be generated by the network or the device, and enables the user to access content he is entitled to via another device or terminal by delivery of information contained in the data code (or the code itself) to the network.1. A method for accessing and delivering content in a managed network, said method comprising: associating individual ones of a plurality of content elements to respective ones of a plurality of unique data codes, said plurality of content elements being stored at a storage entity of said managed network; enabling distribution of at least one of said plurality of unique data codes, said distribution enabling at least one user device to read said unique data code; receiving at a server entity of said managed network, in response to said at least one user device reading said unique data code, a request for a content element associated to said unique data code; utilizing information in said request to identify said content element in said storage entity; and delivering said content element. 2. The method of claim 1, further comprising generating said plurality of unique data codes at said server entity of said managed network. 3. The method of claim 1, further comprising providing said plurality of unique data codes to respective individual ones of a plurality of content sources associated with said respective individual ones of said plurality of content elements. 4. The method of claim 3, wherein said act of enabling distribution of said at least one of said plurality of unique data codes comprises enabling distribution thereof on a physical medium by said respective individual ones of said plurality of content sources. 5. The method of claim 1, wherein said act of enabling distribution of said at least one of said plurality unique data codes comprises enabling distribution thereof as an overlay to a display of said content element. 6. The method of claim 5, wherein said display of said content element comprises display associated with a content delivery network other than said managed network. 7. The method of claim 1, wherein said act of delivering said content element comprises delivery to said at least one user device. 8. The method of claim 1, wherein said act of delivering said content element comprises delivery to a second device, said second device being identified in said request. 9. The method of claim 1, wherein said act of delivering said content element comprises delivery to a second device, said second device being previously identified to said managed network. 10. A method for accessing and delivering content in a managed network, said method comprising: providing data to a subscriber apparatus, said data enabling said subscriber apparatus to generate a unique data code representative of a subscriber associated thereto; receiving a request for content from a terminal apparatus, said request comprising at least information obtained by said terminal apparatus from reading said unique data code from a display device associated with said subscriber apparatus; utilizing said information obtained by said terminal apparatus to verify that said subscriber is entitled to receive said requested content; and when it is determined that said subscriber is entitled to receive said requested content, providing said requested content to said terminal apparatus. 11. The method of claim 10, wherein said act of receiving said request comprises receiving a communication from said terminal apparatus at a server entity of said managed network via an internet connection therebetween. 12. The method of claim 10, wherein said act of receiving said request comprises receiving a communication from said terminal apparatus at a server entity of said managed network via a Data Over Cable Services Interface Specification (DOCSIS) connection therebetween. 13. The method of claim 10, wherein said terminal comprises a display apparatus configured to display said requested content and managed by an entity of said managed network. 14. The method of claim 10, wherein said information obtained by said terminal apparatus from reading said unique data code comprises information identifying said subscriber and/or a subscriber account associated to said subscriber. 15. The method of claim 10, further comprising applying at least one mechanism for protecting said content prior to said act of providing said content to said terminal apparatus. 16. The method of claim 10, further comprising authenticating said subscriber as a subscriber to said managed network using said information obtained by said terminal apparatus from reading said unique data code. 17. A client device configured for use in a content delivery network, said client device comprising: a first interface configured for communication to said content delivery network; a storage apparatus; and a processor, said processor configured to execute at least one computer program thereon, said at least one computer program comprising a plurality of instructions which are configured to, when executed, utilize information contained in a unique data code to request a particular media content stored at a storage entity of said content delivery network for delivery either to said client device or to another device in communication with or associated to said client device. 18. The client device of claim 17, wherein said unique data code comprises data configured to uniquely identify said media content; and wherein said computer program is further configured to, when executed: read said unique data code via a scanner associated with said client device; process information contained in said unique data code; and use said information contained in said unique data code to request said media content. 19. The client device of claim 18, wherein said unique data code is read from at least one of a physical medium or a display apparatus. 20. The client device of claim 17, wherein said unique data code comprises data configured to uniquely identify a subscriber associated to said client device; and wherein said computer program is further configured to, when executed, generate and display said unique data code for reading thereof by a terminal apparatus configured to utilize said unique data code to authenticate said subscriber and validate a right of said subscriber to said media content.
2,400
9,382
9,382
15,449,387
2,484
A media playback component includes a demultiplexer for receiving a data stream and for demultiplexing media content items provided at a first demultiplexer output and at least one type of non-media content items provided at a second demultiplexer output. The media playback component includes playback queue, a queue input of which is connected to the first demultiplexer output. A bypass input of a queue bypass is connected to the second demultiplexer output. The media playback component includes a decoder including a first decoder input connected to a queue output of the playback queue and a second decoder input connected to a bypass output of the queue bypass. The decoder is configured for decoding the media content items in accordance with commands contained within the at least one type of non-media content items. Further embodiments relate to a method for (distributed) media playback, and to a server component for distributed playback architecture for media data.
1. Media playback component comprising: a demultiplexer for receiving a data stream and for demultiplexing media content items and at least one type of non-media content items, wherein the media content items are provided at a first demultiplexer output and wherein the at least one type of non-media content items are provided at a second demultiplexer output; a playback queue, wherein a queue input of the playback queue is connected to the first demultiplexer output, and wherein the playback queue (1920) has a queue output; a queue bypass, wherein a bypass input of the queue bypass is connected to the second demultiplexer output, and wherein the queue bypass (1930) has a bypass output; and a decoder comprising a multiplexer and a decoding subunit, wherein a first input of the multiplexer is connected to the queue output of the playback queue, wherein a second input of the multiplexer is connected to the bypass output of the queue bypass, wherein the multiplexer is configured for merging the media content items arriving at the first input of the multiplexer and the at least one type of non-media items arriving at the second input of the multiplexer to form an interleaved data stream, and wherein the interleaved data stream is forwarded to the decoding subunit being configured for decoding the media content items in accordance with commands contained within the at least one type of non-media content items in the interleaved data stream to obtain decoded media content items. 2. A method for media playback comprising: receiving a data stream; demultiplexing media content items and at least one type of non-media content items contained in the data stream; appending the media content items to a playback queue; enabling the at least one type of non-media content items to bypass the playback queue via a queue bypass; and decoding the media content items provided by a queue output of the playback queue using a decoder, the decoder comprising a multiplexer and a decoding subunit, wherein a first input of the multiplexer is connected to a queue output of the playback queue, wherein a second input of the multiplexer is connected to a bypass output of the queue bypass, wherein the multiplexer merges the media content items arriving at the first input of the multiplexer and the at least one type of non-media items arriving at the second input of the multiplexer to form an interleaved data stream, and wherein the interleaved data stream is forwarded to the decoding subunit, the decoding subunit decoding the media content items in accordance with commands contained within the at least one type of non-media content items in the interleaved data stream to obtain decoded media content items. 3. A non-transitory storage medium having stored thereon a computer readable digital storage medium having stored thereon a computer program having a program code for performing, when running on a computer, a method for media playback, the method comprising: receiving a data stream; demultiplexing media content items and at least one type of non-media content items contained in the data stream; appending the media content items to a playback queue; enabling the at least one type of non-media content items to bypass the playback queue via a queue bypass; and decoding the media content items provided by a queue output of the playback queue, using a decoder, the decoder comprising a multiplexer and a decoding subunit, wherein a first input of the multiplexer is connected to a queue output of the playback queue, wherein a second input of the multiplexer is connected to a bypass output of the queue bypass, wherein the multiplexer merges the media content items arriving at the first input of the multiplexer and the at least one type of non-media items arriving at the second input of the multiplexer to form an interleaved data stream, and wherein the interleaved data stream is forwarded to the decoding subunit, the decoding subunit decoding the media content items in accordance with commands contained within the at least one type of non-media content items in the interleaved data stream to obtain decoded media content items. 4. A server component for a distributed playback architecture for media data, the server component comprising: a media source interface; a virtual file system connected to the media source interface and for providing a transparent access to a media source accessible via the media source interface; and a playback interface for providing media content stored in the media source to a playback component; wherein the virtual file system comprises a buffer for buffering recent media content recently provided to the playback component in order to provide the recent media content to at least one further playback component when adding the at least one further playback component for synchronized playback at the playback component and the at least one further playback component. 5. The server component according to claim 4, wherein the at least one further playback component is connected to the virtual file system by means of a further playback interface, and wherein at least one of the playback interface and the further playback interface is a network interface for connecting at least one of the playback component and the further playback component to the server component via a network. 6. The server component according to claim 4, further comprising a navigator for accessing selected media content supplied by the virtual file system in accordance with playback control commands provided to the navigator. 7. The server component according to claim 6, further comprising a playback control command receiver for receiving playback control commands from the at least one further playback component. 8. A method for distributed playback of media data, the method comprising: accessing a media source via a virtual file system; providing media content stored in the media source and accessed via the virtual file system to a playback component for playback; buffering recent media content that has recently been provided for playback; receiving a request for synchronized playback from at least one further playback component; and providing the buffered, recent media content to the at least one further playback component. 9. The method according to claim 8, wherein the playback component is connected to the virtual file system by means of a playback interface, wherein the at least one further playback component is connected to the virtual file system by means of a further playback interface, and wherein at least one of the playback interface and the further playback interface is a network interface for connecting at least one of the playback component and the further playback component to the server component via a network. 10. The method according to claim 8, further comprising: receiving at least one playback control command at a navigator component interconnected between the virtual file system and the playback component; accessing selected media content supplied by the virtual file system in accordance with playback control commands provided to the navigator component. 11. The method according to claim 10, wherein the at least one playback control command is received from the at least one further playback component. 12. A computer readable digital storage medium having stored thereon a computer program having a program code for performing, when running on a computer, a method for distributed playback of media data, the method comprising: accessing a media source via a virtual file system; providing media content stored in the media source and accessed via the virtual file system to a playback component for playback; buffering recent media content that has recently been provided for playback; receiving a request for synchronized playback from at least one further playback component; and providing the buffered, recent media content to the at least one further playback component.
A media playback component includes a demultiplexer for receiving a data stream and for demultiplexing media content items provided at a first demultiplexer output and at least one type of non-media content items provided at a second demultiplexer output. The media playback component includes playback queue, a queue input of which is connected to the first demultiplexer output. A bypass input of a queue bypass is connected to the second demultiplexer output. The media playback component includes a decoder including a first decoder input connected to a queue output of the playback queue and a second decoder input connected to a bypass output of the queue bypass. The decoder is configured for decoding the media content items in accordance with commands contained within the at least one type of non-media content items. Further embodiments relate to a method for (distributed) media playback, and to a server component for distributed playback architecture for media data.1. Media playback component comprising: a demultiplexer for receiving a data stream and for demultiplexing media content items and at least one type of non-media content items, wherein the media content items are provided at a first demultiplexer output and wherein the at least one type of non-media content items are provided at a second demultiplexer output; a playback queue, wherein a queue input of the playback queue is connected to the first demultiplexer output, and wherein the playback queue (1920) has a queue output; a queue bypass, wherein a bypass input of the queue bypass is connected to the second demultiplexer output, and wherein the queue bypass (1930) has a bypass output; and a decoder comprising a multiplexer and a decoding subunit, wherein a first input of the multiplexer is connected to the queue output of the playback queue, wherein a second input of the multiplexer is connected to the bypass output of the queue bypass, wherein the multiplexer is configured for merging the media content items arriving at the first input of the multiplexer and the at least one type of non-media items arriving at the second input of the multiplexer to form an interleaved data stream, and wherein the interleaved data stream is forwarded to the decoding subunit being configured for decoding the media content items in accordance with commands contained within the at least one type of non-media content items in the interleaved data stream to obtain decoded media content items. 2. A method for media playback comprising: receiving a data stream; demultiplexing media content items and at least one type of non-media content items contained in the data stream; appending the media content items to a playback queue; enabling the at least one type of non-media content items to bypass the playback queue via a queue bypass; and decoding the media content items provided by a queue output of the playback queue using a decoder, the decoder comprising a multiplexer and a decoding subunit, wherein a first input of the multiplexer is connected to a queue output of the playback queue, wherein a second input of the multiplexer is connected to a bypass output of the queue bypass, wherein the multiplexer merges the media content items arriving at the first input of the multiplexer and the at least one type of non-media items arriving at the second input of the multiplexer to form an interleaved data stream, and wherein the interleaved data stream is forwarded to the decoding subunit, the decoding subunit decoding the media content items in accordance with commands contained within the at least one type of non-media content items in the interleaved data stream to obtain decoded media content items. 3. A non-transitory storage medium having stored thereon a computer readable digital storage medium having stored thereon a computer program having a program code for performing, when running on a computer, a method for media playback, the method comprising: receiving a data stream; demultiplexing media content items and at least one type of non-media content items contained in the data stream; appending the media content items to a playback queue; enabling the at least one type of non-media content items to bypass the playback queue via a queue bypass; and decoding the media content items provided by a queue output of the playback queue, using a decoder, the decoder comprising a multiplexer and a decoding subunit, wherein a first input of the multiplexer is connected to a queue output of the playback queue, wherein a second input of the multiplexer is connected to a bypass output of the queue bypass, wherein the multiplexer merges the media content items arriving at the first input of the multiplexer and the at least one type of non-media items arriving at the second input of the multiplexer to form an interleaved data stream, and wherein the interleaved data stream is forwarded to the decoding subunit, the decoding subunit decoding the media content items in accordance with commands contained within the at least one type of non-media content items in the interleaved data stream to obtain decoded media content items. 4. A server component for a distributed playback architecture for media data, the server component comprising: a media source interface; a virtual file system connected to the media source interface and for providing a transparent access to a media source accessible via the media source interface; and a playback interface for providing media content stored in the media source to a playback component; wherein the virtual file system comprises a buffer for buffering recent media content recently provided to the playback component in order to provide the recent media content to at least one further playback component when adding the at least one further playback component for synchronized playback at the playback component and the at least one further playback component. 5. The server component according to claim 4, wherein the at least one further playback component is connected to the virtual file system by means of a further playback interface, and wherein at least one of the playback interface and the further playback interface is a network interface for connecting at least one of the playback component and the further playback component to the server component via a network. 6. The server component according to claim 4, further comprising a navigator for accessing selected media content supplied by the virtual file system in accordance with playback control commands provided to the navigator. 7. The server component according to claim 6, further comprising a playback control command receiver for receiving playback control commands from the at least one further playback component. 8. A method for distributed playback of media data, the method comprising: accessing a media source via a virtual file system; providing media content stored in the media source and accessed via the virtual file system to a playback component for playback; buffering recent media content that has recently been provided for playback; receiving a request for synchronized playback from at least one further playback component; and providing the buffered, recent media content to the at least one further playback component. 9. The method according to claim 8, wherein the playback component is connected to the virtual file system by means of a playback interface, wherein the at least one further playback component is connected to the virtual file system by means of a further playback interface, and wherein at least one of the playback interface and the further playback interface is a network interface for connecting at least one of the playback component and the further playback component to the server component via a network. 10. The method according to claim 8, further comprising: receiving at least one playback control command at a navigator component interconnected between the virtual file system and the playback component; accessing selected media content supplied by the virtual file system in accordance with playback control commands provided to the navigator component. 11. The method according to claim 10, wherein the at least one playback control command is received from the at least one further playback component. 12. A computer readable digital storage medium having stored thereon a computer program having a program code for performing, when running on a computer, a method for distributed playback of media data, the method comprising: accessing a media source via a virtual file system; providing media content stored in the media source and accessed via the virtual file system to a playback component for playback; buffering recent media content that has recently been provided for playback; receiving a request for synchronized playback from at least one further playback component; and providing the buffered, recent media content to the at least one further playback component.
2,400
9,383
9,383
15,718,583
2,459
Systems and methods described herein provide a high availability DHCP server capable of serving multiple tenants in a data center. The DHCP server may use a different logical DHCP server instance for each tenant, and may be implemented as one process without the use of namespaces. A DHCP server is executed on a gateway virtual machine (VM) that is capable of hosting a plurality of logical DHCP servers. For each tenant in a data center, a logical network and a corresponding logical DHCP server instance are implemented. The DHCP server may service requests for DHCP services from VMs via their physical host by determining the tenant that the VM originates from and leasing a DHCP resource from that tenant's corresponding logical DHCP server instance.
1. A method for providing dynamic host configuration protocol (DHCP) services to one or more logical networks by using a single DHCP process, the method comprising: defining a plurality of gateway virtual machines (VMs), wherein each of the plurality of gateway VMs is configured to execute a separate DHCP server that runs the single DHCP process, thereby creating a plurality of DHCP servers; creating a profile indicating a first gateway VM and a second gateway VM from the plurality of gateway VMs from which a first DHCP server and a second DHCP server will be executed respectively; assigning each of the one or more logical networks to a logical forwarding element (LFE) configured to route one or more packets between the one or more logical networks and the first DHCP server; for each LFE: defining, within each of the first and second DHCP servers, a respective logical DHCP server instance based, at least in part, on the created profile, wherein each of the logical DHCP server instances includes one or more static bindings or internet protocol (IP) addresses for lease to one or more VMs of the one or more logical networks; and defining a LFE port configured to connect the LFE to the first DHCP server, wherein the first DHCP server identifies a logical network of the one or more logical networks that a packet of the one or more packets originates from based on a LFE port identification (ID) of the packet; and periodically synchronizing IP address lease information between the first DHCP server and at least one other DHCP server from the plurality of DHCP servers. 2. The method of claim 1, wherein defining a logical DHCP server instance within each of the first and second DHCP servers comprises storing, in a database of the first DHCP server and a database of the second DHCP server, a mapping between the logical DHCP server instance and its associated LFE as well as the one or more static bindings or IP pools of the logical DHCP server instance. 3. The method of claim 2, further comprising: in response to receiving from a VM of the logical network, a packet indicating a request for DHCP services at the first DHCP server, looking up, using the single DHCP process, the static bindings or IP addresses of the logical DHCP server instance connected to an LFE the request packet originated from; determining a static binding or IP address to lease to the requesting VM; transmitting the static binding or IP address lease to the requesting VM; and updating the database with the lease information. 4. The method of claim 3, wherein synchronizing IP address lease information comprises: performing a first synchronization between the first DHCP server and at least one other DHCP server from the plurality of DHCP servers while the first DHCP server is actively serving requests for DHCP services; halting the first DHCP server's service of requests for DHCP services; and performing a second synchronization between the first DHCP server and the at least one other DHCP server from the plurality of DHCP servers. 5. The method of claim 4, further comprising: in response to detecting that the first gateway VM has suffered a termination of service: using one or more gateway VMs from the plurality of gateway VMs to provide DHCP services to the at least one logical network; and transmitting one or more indications of the new gateway VM each logical DHCP server instance is executing on. 6. The method of claim 4, further comprising verifying the at least one other DHCP server. 7. The method of claim 1, further comprising monitoring the one or more static bindings or IP addresses for lease and transmitting a warning when the number of static bindings or IP addresses that have not been leased falls below a threshold. 8. A non-transitory computer readable storage medium, having instructions stored thereon that, when executed by a processor, configures a physical machine to provide dynamic host configuration protocol (DHCP) services to at least one logical network using a single DHCP process by performing operations comprising: defining a plurality of gateway virtual machines (VMs), wherein each of the plurality of gateway VMs is configured to execute a separate DHCP server that runs the single DHCP process, thereby creating a plurality of DHCP servers; creating a profile indicating a first gateway VM and a second gateway VM from the plurality of gateway VMs from which a first DHCP server and a second DHCP server will be executed respectively; assigning each of the one or more logical networks to a logical forwarding element (LFE) configured to route one or more packets between the one or more logical networks and the first DHCP server; for each LFE: defining, within each of the first and second DHCP servers, a respective logical DHCP server instance based, at least in part, on the created profile, wherein each of the logical DHCP server instances includes one or more static bindings or internet protocol (IP) addresses for lease to one or more VMs of the one or more logical networks; and defining a LFE port configured to connect the LFE to the first DHCP server, wherein the first DHCP server identifies a logical network of the one or more logical networks that a packet of the one or more packets originates from based on a LFE port identification (ID) of the packet; and periodically synchronizing IP address lease information between the first DHCP server and one or more other DHCP servers from the plurality of DHCP servers. 9. The non-transitory computer readable medium of claim 8, wherein defining a logical DHCP server instance within each of the first and second DHCP servers comprises storing, in a database of the first DHCP server and a database of the second DHCP server, a mapping between the logical DHCP server instance and its associated LFE as well as the one or more static bindings or IP addresses of the logical DHCP server instance. 10. The non-transitory computer readable medium of claim 9, wherein execution of the instructions causes the physical machine to perform operations further comprising: in response to receiving from a VM of the logical network, a packet indicating a request for DHCP services at the first DHCP server, looking up, using the single DHCP process, the static bindings or IP pools of the logical DHCP server instance connected with a LFE the request packet originated from; determining a static binding or IP address to lease to the requesting VM; transmitting the static binding or IP address lease to the requesting VM; and updating the database with the lease information. 11. The non-transitory computer readable medium of claim 10, wherein the synchronizing comprises: performing a first synchronization between the first DHCP server and at least one other DHCP server from the plurality of DHCP servers while the first DHCP server is actively serving requests for DHCP services; halting the first DHCP server's service of requests for DHCP services; and performing a second synchronization between the first and the at least one other DHCP server from the plurality of DHCP servers. 12. The non-transitory computer readable medium of claim 11, wherein execution of the instructions causes the physical machine to perform operations further comprising: in response to detecting that the first gateway VM has suffered a termination of service; using one or more gateway VMs from the plurality of gateway VMs to provide DHCP services to the at least one logical network; and transmitting one or more indications of the new gateway VM each logical DHCP server instance is executing on. 13. The non-transitory computer readable medium of claim 8, wherein execution of the instructions causes the physical machine to perform operations further comprising monitoring the one or more static bindings or IP addresses for lease and transmitting a warning when the number of static bindings or IP addresses that have not been leased falls below a threshold. 14. A system for providing dynamic host configuration protocol (DHCP) services to one or more logical networks by using a single DHCP process, the system comprising: a management cluster configured to: define a plurality of gateway virtual machines (VMs), wherein each of the plurality of gateway VMs is configured to execute a separate DHCP server that runs the single DHCP process, thereby creating a plurality of DHCP servers; create a profile indicating a first gateway VM and a second gateway VM from the plurality of gateway VMs from which a first DHCP server and a second DHCP server will be executed respectively; assigning each of the one or more logical networks to a logical forwarding element (LFE) configured to route one or more packets between the one or more logical networks and the first DHCP server; for each LFE: define, within each of the first and second DHCP servers, a respective logical DHCP server instance based, at least in part, on the created profile, wherein each of the logical DHCP server instances includes one or more static bindings or internet protocol (IP) addresses for lease to one or more VMs of the one or more logical networks; and define a LFE port configured to connect the LFE to the first DHCP server, wherein the first DHCP server identifies a logical network of the one or more logical networks that a packet of the one or more packets originates from based on a LFE port identification (ID) of the packet. 15. The system of claim 14, wherein the first DHCP server is further configured to periodically synchronize IP address lease information between the first DHCP server and at least one other DHCP server from the plurality of DHCP servers. 16. The system of claim 15, wherein defining a logical DHCP server instance within each of the first and second DHCP servers comprises storing, in a database of the first DHCP server and a database of the second DHCP server, a mapping between the logical DHCP server instance and its associated LFE as well as the one or more static bindings or IP addresses of the logical DHCP server instance. 17. The system of claim 16, wherein the first DHCP server is further configured to: in response to receiving from a VM of the logical network, a packet indicating a request for DHCP services, looking up, using the single DHCP process, the static bindings or IP addresses of the logical DHCP server instance connected to the LFE that the request packet originated from; determining a static binding or IP address to lease to the requesting VM; transmitting the static binding or IP address lease to the requesting VM; and updating the database with the lease information. 18. The system of claim 17, wherein synchronizing IP address lease information comprises: performing a first synchronization between the first DHCP server and at least one other DHCP server from the plurality of DHCP servers while the first DHCP server is actively serving requests for DHCP services; halting the first DHCP server's service of requests for DHCP services; and performing a second synchronization between the first and the at least one other DHCP server from the plurality of DHCP servers. 19. The system of claim 18, wherein the management cluster is further configured to: in response to detecting that the first gateway VM has suffered a termination of service; use one or more gateway VMs from the plurality of gateway VMs to provide DHCP services to the at least one logical network; and transmit one or more indications of the new gateway VM each logical DHCP server instance is executing on. 20. The system of claim 14, wherein the first DHCP server is further configured to monitor the one or more static bindings or IP addresses for lease and transmitting a warning when the number of static bindings or IP addresses that have not been leased falls below a threshold.
Systems and methods described herein provide a high availability DHCP server capable of serving multiple tenants in a data center. The DHCP server may use a different logical DHCP server instance for each tenant, and may be implemented as one process without the use of namespaces. A DHCP server is executed on a gateway virtual machine (VM) that is capable of hosting a plurality of logical DHCP servers. For each tenant in a data center, a logical network and a corresponding logical DHCP server instance are implemented. The DHCP server may service requests for DHCP services from VMs via their physical host by determining the tenant that the VM originates from and leasing a DHCP resource from that tenant's corresponding logical DHCP server instance.1. A method for providing dynamic host configuration protocol (DHCP) services to one or more logical networks by using a single DHCP process, the method comprising: defining a plurality of gateway virtual machines (VMs), wherein each of the plurality of gateway VMs is configured to execute a separate DHCP server that runs the single DHCP process, thereby creating a plurality of DHCP servers; creating a profile indicating a first gateway VM and a second gateway VM from the plurality of gateway VMs from which a first DHCP server and a second DHCP server will be executed respectively; assigning each of the one or more logical networks to a logical forwarding element (LFE) configured to route one or more packets between the one or more logical networks and the first DHCP server; for each LFE: defining, within each of the first and second DHCP servers, a respective logical DHCP server instance based, at least in part, on the created profile, wherein each of the logical DHCP server instances includes one or more static bindings or internet protocol (IP) addresses for lease to one or more VMs of the one or more logical networks; and defining a LFE port configured to connect the LFE to the first DHCP server, wherein the first DHCP server identifies a logical network of the one or more logical networks that a packet of the one or more packets originates from based on a LFE port identification (ID) of the packet; and periodically synchronizing IP address lease information between the first DHCP server and at least one other DHCP server from the plurality of DHCP servers. 2. The method of claim 1, wherein defining a logical DHCP server instance within each of the first and second DHCP servers comprises storing, in a database of the first DHCP server and a database of the second DHCP server, a mapping between the logical DHCP server instance and its associated LFE as well as the one or more static bindings or IP pools of the logical DHCP server instance. 3. The method of claim 2, further comprising: in response to receiving from a VM of the logical network, a packet indicating a request for DHCP services at the first DHCP server, looking up, using the single DHCP process, the static bindings or IP addresses of the logical DHCP server instance connected to an LFE the request packet originated from; determining a static binding or IP address to lease to the requesting VM; transmitting the static binding or IP address lease to the requesting VM; and updating the database with the lease information. 4. The method of claim 3, wherein synchronizing IP address lease information comprises: performing a first synchronization between the first DHCP server and at least one other DHCP server from the plurality of DHCP servers while the first DHCP server is actively serving requests for DHCP services; halting the first DHCP server's service of requests for DHCP services; and performing a second synchronization between the first DHCP server and the at least one other DHCP server from the plurality of DHCP servers. 5. The method of claim 4, further comprising: in response to detecting that the first gateway VM has suffered a termination of service: using one or more gateway VMs from the plurality of gateway VMs to provide DHCP services to the at least one logical network; and transmitting one or more indications of the new gateway VM each logical DHCP server instance is executing on. 6. The method of claim 4, further comprising verifying the at least one other DHCP server. 7. The method of claim 1, further comprising monitoring the one or more static bindings or IP addresses for lease and transmitting a warning when the number of static bindings or IP addresses that have not been leased falls below a threshold. 8. A non-transitory computer readable storage medium, having instructions stored thereon that, when executed by a processor, configures a physical machine to provide dynamic host configuration protocol (DHCP) services to at least one logical network using a single DHCP process by performing operations comprising: defining a plurality of gateway virtual machines (VMs), wherein each of the plurality of gateway VMs is configured to execute a separate DHCP server that runs the single DHCP process, thereby creating a plurality of DHCP servers; creating a profile indicating a first gateway VM and a second gateway VM from the plurality of gateway VMs from which a first DHCP server and a second DHCP server will be executed respectively; assigning each of the one or more logical networks to a logical forwarding element (LFE) configured to route one or more packets between the one or more logical networks and the first DHCP server; for each LFE: defining, within each of the first and second DHCP servers, a respective logical DHCP server instance based, at least in part, on the created profile, wherein each of the logical DHCP server instances includes one or more static bindings or internet protocol (IP) addresses for lease to one or more VMs of the one or more logical networks; and defining a LFE port configured to connect the LFE to the first DHCP server, wherein the first DHCP server identifies a logical network of the one or more logical networks that a packet of the one or more packets originates from based on a LFE port identification (ID) of the packet; and periodically synchronizing IP address lease information between the first DHCP server and one or more other DHCP servers from the plurality of DHCP servers. 9. The non-transitory computer readable medium of claim 8, wherein defining a logical DHCP server instance within each of the first and second DHCP servers comprises storing, in a database of the first DHCP server and a database of the second DHCP server, a mapping between the logical DHCP server instance and its associated LFE as well as the one or more static bindings or IP addresses of the logical DHCP server instance. 10. The non-transitory computer readable medium of claim 9, wherein execution of the instructions causes the physical machine to perform operations further comprising: in response to receiving from a VM of the logical network, a packet indicating a request for DHCP services at the first DHCP server, looking up, using the single DHCP process, the static bindings or IP pools of the logical DHCP server instance connected with a LFE the request packet originated from; determining a static binding or IP address to lease to the requesting VM; transmitting the static binding or IP address lease to the requesting VM; and updating the database with the lease information. 11. The non-transitory computer readable medium of claim 10, wherein the synchronizing comprises: performing a first synchronization between the first DHCP server and at least one other DHCP server from the plurality of DHCP servers while the first DHCP server is actively serving requests for DHCP services; halting the first DHCP server's service of requests for DHCP services; and performing a second synchronization between the first and the at least one other DHCP server from the plurality of DHCP servers. 12. The non-transitory computer readable medium of claim 11, wherein execution of the instructions causes the physical machine to perform operations further comprising: in response to detecting that the first gateway VM has suffered a termination of service; using one or more gateway VMs from the plurality of gateway VMs to provide DHCP services to the at least one logical network; and transmitting one or more indications of the new gateway VM each logical DHCP server instance is executing on. 13. The non-transitory computer readable medium of claim 8, wherein execution of the instructions causes the physical machine to perform operations further comprising monitoring the one or more static bindings or IP addresses for lease and transmitting a warning when the number of static bindings or IP addresses that have not been leased falls below a threshold. 14. A system for providing dynamic host configuration protocol (DHCP) services to one or more logical networks by using a single DHCP process, the system comprising: a management cluster configured to: define a plurality of gateway virtual machines (VMs), wherein each of the plurality of gateway VMs is configured to execute a separate DHCP server that runs the single DHCP process, thereby creating a plurality of DHCP servers; create a profile indicating a first gateway VM and a second gateway VM from the plurality of gateway VMs from which a first DHCP server and a second DHCP server will be executed respectively; assigning each of the one or more logical networks to a logical forwarding element (LFE) configured to route one or more packets between the one or more logical networks and the first DHCP server; for each LFE: define, within each of the first and second DHCP servers, a respective logical DHCP server instance based, at least in part, on the created profile, wherein each of the logical DHCP server instances includes one or more static bindings or internet protocol (IP) addresses for lease to one or more VMs of the one or more logical networks; and define a LFE port configured to connect the LFE to the first DHCP server, wherein the first DHCP server identifies a logical network of the one or more logical networks that a packet of the one or more packets originates from based on a LFE port identification (ID) of the packet. 15. The system of claim 14, wherein the first DHCP server is further configured to periodically synchronize IP address lease information between the first DHCP server and at least one other DHCP server from the plurality of DHCP servers. 16. The system of claim 15, wherein defining a logical DHCP server instance within each of the first and second DHCP servers comprises storing, in a database of the first DHCP server and a database of the second DHCP server, a mapping between the logical DHCP server instance and its associated LFE as well as the one or more static bindings or IP addresses of the logical DHCP server instance. 17. The system of claim 16, wherein the first DHCP server is further configured to: in response to receiving from a VM of the logical network, a packet indicating a request for DHCP services, looking up, using the single DHCP process, the static bindings or IP addresses of the logical DHCP server instance connected to the LFE that the request packet originated from; determining a static binding or IP address to lease to the requesting VM; transmitting the static binding or IP address lease to the requesting VM; and updating the database with the lease information. 18. The system of claim 17, wherein synchronizing IP address lease information comprises: performing a first synchronization between the first DHCP server and at least one other DHCP server from the plurality of DHCP servers while the first DHCP server is actively serving requests for DHCP services; halting the first DHCP server's service of requests for DHCP services; and performing a second synchronization between the first and the at least one other DHCP server from the plurality of DHCP servers. 19. The system of claim 18, wherein the management cluster is further configured to: in response to detecting that the first gateway VM has suffered a termination of service; use one or more gateway VMs from the plurality of gateway VMs to provide DHCP services to the at least one logical network; and transmit one or more indications of the new gateway VM each logical DHCP server instance is executing on. 20. The system of claim 14, wherein the first DHCP server is further configured to monitor the one or more static bindings or IP addresses for lease and transmitting a warning when the number of static bindings or IP addresses that have not been leased falls below a threshold.
2,400
9,384
9,384
16,056,815
2,458
A mechanism for determining a chat distance associated with an environmental chat based on the chat amount within an area of a virtual universe associated with the environmental chat. An environmental chat distance may be determined based on the number of words or characters in a text chat or voice chat between avatars within the area of the virtual universe. The environmental chat distance may be inversely proportional to the detected words or characters in the environmental chat.
1. A method comprising: determining a chat amount within a time window in an area of a virtual universe associated with an environmental chat associated with an avatar; determining a chat distance associated with the environmental chat based on the chat amount; and modifying the chat distance in response to a change in the chat amount in the area of the virtual universe associated with the environmental chat. 2. The method of claim 1, wherein the area of the virtual universe associated with the environmental chat associated with the avatar comprises the area of the virtual universe displayed on a computer system associated with the avatar. 3. The method of claim 1, wherein said determining the chat amount within the time window comprises determining a number of characters associated with conversations between avatars within the time window. 4. The method of claim 1, wherein the environmental chat is a voice chat, and wherein said determining the chat amount within the time window comprises determining a number of words associated with conversations between avatars within the time window. 5. The method of claim 1, wherein the chat distance is inversely proportional to the chat amount detected within the time window. 6. The method of claim 1, wherein, if the chat amount is within a first predefined range of chat amounts, selecting a first chat distance from a plurality of predefined chat distances, wherein, if the chat amount is within a second predefined range of chat amounts that is higher than the first predefined range of chat amounts, selecting a second chat distance that is less than the first chat distance from the plurality of predefined chat distances. 7. The method of claim 1, wherein the avatar associated with the environmental chat is controlled by a user, and wherein the user associated with the avatar initiates determination of the chat amount. 8. The method of claim 1, wherein the environmental chat is an environmental text chat, an environmental voice chat, or both an environmental voice and text chat. 9. The method of claim 1, wherein said determining the chat distance comprises selecting the chat distance from a plurality of predefined chat distances based on the chat amount such that the chat distance is inversely proportional to the chat amount. 10. A computer program product comprising a machine readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to: determine a chat amount within a time window in an area of a virtual universe associated with an environmental chat associated with an avatar; determine a chat distance associated with the environmental chat based on the chat amount; and modify the chat distance in response to a change in the chat amount in the area of the virtual universe associated with the environmental chat. 11. The computer program product of claim 10, wherein the area of the virtual universe associated with the environmental chat associated with the avatar comprises the area of the virtual universe displayed on a computer system associated with the avatar. 12. The computer program product of claim 10, wherein the program instructions to determine the chat amount within the time window include program instructions to determine a number of words associated with conversations between avatars within the time window. 13. The computer program product of claim 10, wherein the environmental chat is a voice chat, and wherein the program instructions to determine the chat amount within the time window include program instructions to determine a number of words associated with conversations between avatars within the time window. 14. The computer program product of claim 10, wherein the chat distance is inversely proportional to the chat amount detected within the time window. 15. The computer program product of claim 10, wherein the program instructions further include program instructions to cause the processor to select a first chat distance from a plurality of predefined chat distances if the chat amount is within a first predefined range of chat amounts, and select a second chat distance that is less than the first chat distance if the chat amount is within a second predefined range of chat amounts that is higher than the first predefined range of chat amounts. 16. The computer program product of claim 10, wherein the environmental chat is an environmental text chat, an environmental voice chat, or both an environmental voice and text chat. 17. An apparatus comprising: one or more processors; and a memory unit coupled to the one or more processors, the memory unit having stored therein program instructions that are executable by the one or more processors to cause the one or more processors to: determine a chat amount within a time window in an area of a virtual universe associated with an environmental chat associated with an avatar; determine a chat distance associated with the environmental chat based on the chat amount; and modify the chat distance in response to a change in the chat amount in the area of the virtual universe associated with the environmental chat. 18. The apparatus of claim 17, wherein the program instructions to determine the chat amount within the time window include program instructions to determine a number of words associated with conversations between avatars within the time window. 19. The apparatus of claim 17, wherein the environmental chat is a voice chat, and wherein the program instructions to determine the chat amount within the time window include program instructions to determine a number of words associated with conversations between avatars within the time window. 20. The apparatus of claim 17, wherein the program instructions further include program instructions to cause the one or more processors to select a first chat distance from a plurality of predefined chat distances if the chat amount is within a first predefined range of chat amounts, and select a second chat distance that is less than the first chat distance if the chat amount is within a second predefined range of chat amounts that is higher than the first predefined range of chat amounts.
A mechanism for determining a chat distance associated with an environmental chat based on the chat amount within an area of a virtual universe associated with the environmental chat. An environmental chat distance may be determined based on the number of words or characters in a text chat or voice chat between avatars within the area of the virtual universe. The environmental chat distance may be inversely proportional to the detected words or characters in the environmental chat.1. A method comprising: determining a chat amount within a time window in an area of a virtual universe associated with an environmental chat associated with an avatar; determining a chat distance associated with the environmental chat based on the chat amount; and modifying the chat distance in response to a change in the chat amount in the area of the virtual universe associated with the environmental chat. 2. The method of claim 1, wherein the area of the virtual universe associated with the environmental chat associated with the avatar comprises the area of the virtual universe displayed on a computer system associated with the avatar. 3. The method of claim 1, wherein said determining the chat amount within the time window comprises determining a number of characters associated with conversations between avatars within the time window. 4. The method of claim 1, wherein the environmental chat is a voice chat, and wherein said determining the chat amount within the time window comprises determining a number of words associated with conversations between avatars within the time window. 5. The method of claim 1, wherein the chat distance is inversely proportional to the chat amount detected within the time window. 6. The method of claim 1, wherein, if the chat amount is within a first predefined range of chat amounts, selecting a first chat distance from a plurality of predefined chat distances, wherein, if the chat amount is within a second predefined range of chat amounts that is higher than the first predefined range of chat amounts, selecting a second chat distance that is less than the first chat distance from the plurality of predefined chat distances. 7. The method of claim 1, wherein the avatar associated with the environmental chat is controlled by a user, and wherein the user associated with the avatar initiates determination of the chat amount. 8. The method of claim 1, wherein the environmental chat is an environmental text chat, an environmental voice chat, or both an environmental voice and text chat. 9. The method of claim 1, wherein said determining the chat distance comprises selecting the chat distance from a plurality of predefined chat distances based on the chat amount such that the chat distance is inversely proportional to the chat amount. 10. A computer program product comprising a machine readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to: determine a chat amount within a time window in an area of a virtual universe associated with an environmental chat associated with an avatar; determine a chat distance associated with the environmental chat based on the chat amount; and modify the chat distance in response to a change in the chat amount in the area of the virtual universe associated with the environmental chat. 11. The computer program product of claim 10, wherein the area of the virtual universe associated with the environmental chat associated with the avatar comprises the area of the virtual universe displayed on a computer system associated with the avatar. 12. The computer program product of claim 10, wherein the program instructions to determine the chat amount within the time window include program instructions to determine a number of words associated with conversations between avatars within the time window. 13. The computer program product of claim 10, wherein the environmental chat is a voice chat, and wherein the program instructions to determine the chat amount within the time window include program instructions to determine a number of words associated with conversations between avatars within the time window. 14. The computer program product of claim 10, wherein the chat distance is inversely proportional to the chat amount detected within the time window. 15. The computer program product of claim 10, wherein the program instructions further include program instructions to cause the processor to select a first chat distance from a plurality of predefined chat distances if the chat amount is within a first predefined range of chat amounts, and select a second chat distance that is less than the first chat distance if the chat amount is within a second predefined range of chat amounts that is higher than the first predefined range of chat amounts. 16. The computer program product of claim 10, wherein the environmental chat is an environmental text chat, an environmental voice chat, or both an environmental voice and text chat. 17. An apparatus comprising: one or more processors; and a memory unit coupled to the one or more processors, the memory unit having stored therein program instructions that are executable by the one or more processors to cause the one or more processors to: determine a chat amount within a time window in an area of a virtual universe associated with an environmental chat associated with an avatar; determine a chat distance associated with the environmental chat based on the chat amount; and modify the chat distance in response to a change in the chat amount in the area of the virtual universe associated with the environmental chat. 18. The apparatus of claim 17, wherein the program instructions to determine the chat amount within the time window include program instructions to determine a number of words associated with conversations between avatars within the time window. 19. The apparatus of claim 17, wherein the environmental chat is a voice chat, and wherein the program instructions to determine the chat amount within the time window include program instructions to determine a number of words associated with conversations between avatars within the time window. 20. The apparatus of claim 17, wherein the program instructions further include program instructions to cause the one or more processors to select a first chat distance from a plurality of predefined chat distances if the chat amount is within a first predefined range of chat amounts, and select a second chat distance that is less than the first chat distance if the chat amount is within a second predefined range of chat amounts that is higher than the first predefined range of chat amounts.
2,400
9,385
9,385
15,189,971
2,478
Methods, systems, and devices for wireless communication are described. A wireless device may identify multiple regions within a subframe, such as one or more uplink regions, one or more downlink regions, and a guard region. The wireless device may identify and communicate during each region based on a timing relationship between the downlink region and the uplink region. For example, the device may expect hybrid automated repeat request (HARQ) feedback for one downlink region in the same subframe based on the proximity to the next uplink region. Another downlink region may not have HARQ feedback in the same subframe. Similarly, uplink regions may or may not be scheduled within the same subframe.
1. A method of wireless communication comprising: identifying a downlink (DL) region of a subframe, wherein the subframe comprises the DL region, an uplink (UL) region, a guard region, and an additional region; identifying the UL region of the subframe, wherein a transmission on resources of the UL region is based at least in part on a timing relationship between the DL region and the UL region; and communicating during the DL region and the UL region according to the timing relationship. 2. The method of claim 1, further comprising: identifying the additional region of the subframe, wherein the additional region comprises an additional DL region or an additional UL region. 3. The method of claim 2, wherein a transmission on resources of the additional region is based at least in part on a timing relationship between the DL region or the UL region and the additional region. 4. The method of claim 1, further comprising: receiving a DL control message during the DL region. 5. The method of claim 4, further comprising: receiving DL data during the DL region, wherein resources of the DL region are scheduled by the DL control message. 6. The method of claim 5, further comprising: transmitting an UL control message during the UL region, wherein the UL control message comprises acknowledgment (ACK) information for the DL data received during the DL region. 7. The method of claim 4, further comprising: receiving DL data during the additional region, wherein the additional region follows the DL region and precedes the UL region, and wherein the additional region comprises an additional DL region comprising resources scheduled by the DL control message. 8. The method of claim 7, further comprising: transmitting an UL control message during a subsequent subframe, wherein the UL control message comprises acknowledgment (ACK) information for the DL data received during the additional DL region. 9. The method of claim 4, further comprising: transmitting UL data or an UL control message, or both, during the UL region, wherein the resources of the UL region are scheduled by the DL control message. 10. The method of claim 4, further comprising: transmitting UL data or an UL control message, or both, during the additional region, wherein the additional region follows the DL region and precedes the UL region, and wherein the additional region comprises an additional UL region comprising resources scheduled by another DL control message in a preceding subframe. 11. The method of claim 1, wherein the timing relationship between the DL region and the UL region is based at least in part on a capability of a user equipment (UE) scheduled for communication during the subframe or a serving cell that schedules communications during the subframe, or both. 12. The method of claim 1, wherein the timing relationship between the DL region and the UL region is identified using a system information (SI) broadcast, radio resource control (RRC) signaling, or a grant of resources in a DL control message, or any combination thereof. 13. The method of claim 1, wherein the timing relationship between the DL region and the UL region comprises a minimum time duration used for subframes having separate regions for UL and DL communications, and wherein a first duration of the DL region and a second duration of the UL region are based at least in part on the minimum time duration. 14. The method of claim 1, further comprising: identifying the guard region of the subframe, wherein the timing relationship between the DL region and the UL region is based at least in part on a location of the guard region within the subframe or a duration of the guard region, or both. 15. The method of claim 14, wherein the duration of the guard region of the subframe is different from a guard period of a special subframe of a time division duplex (TDD) configured carrier, wherein the TDD configured carrier comprises the subframe and the special subframe. 16. The method of claim 15, wherein the guard period of the special subframe is configured according to a common capability of each user equipment (UE) in a set of UEs within a system, and wherein the guard region of the subframe is configured according to a different capability of a subset of the set of UEs within the system. 17. The method of claim 1, wherein a DL hybrid automatic repeat request (HARQ) timing or a UL scheduling timing, or both, for the subframe are different from a DL HARQ timing or a UL scheduling timing for a subsequent subframe or a preceding subframe. 18. An apparatus for wireless communication comprising: means for identifying a downlink (DL) region of a subframe, wherein the subframe comprises the DL region, an uplink (UL) region, a guard region, and an additional region; means for identifying the UL region of the subframe, wherein a transmission on resources of the UL region is based at least in part on a timing relationship between the DL region and the UL region; and means for communicating during the DL region and the UL region according to the timing relationship. 19. An apparatus for wireless communication, comprising: a processor; memory in electronic communication with the processor; and instructions stored in the memory and operable, when executed by the processor, to cause the apparatus to: identify a downlink (DL) region of a subframe, wherein the subframe comprises the DL region, an uplink (UL) region, a guard region, and an additional region; identify the UL region of the subframe, wherein a transmission on resources of the UL region is based at least in part on a timing relationship between the DL region and the UL region; and communicate during the DL region and the UL region according to the timing relationship. 20. The apparatus of claim 19, wherein the instructions are further operable to cause the apparatus to: identify the additional region of the subframe, wherein the additional region comprises an additional DL region or an additional UL region. 21. The apparatus of claim 19, wherein the instructions are further operable to cause the apparatus to: receive a DL control message during the DL region. 22. The apparatus of claim 21, wherein the instructions are further operable to cause the apparatus to: receive DL data during the DL region, wherein resources of the DL region are scheduled by the DL control message. 23. The apparatus of claim 22, wherein the instructions are further operable to cause the apparatus to: transmit an UL control message during the UL region, wherein the UL control message comprises acknowledgment (ACK) information for the DL data received during the DL region. 24. The apparatus of claim 21, wherein the instructions are further operable to cause the apparatus to: receive DL data during the additional region, wherein the additional region follows the DL region and precedes the UL region, and wherein the additional region comprises an additional DL region comprising resources scheduled by the DL control message. 25. The apparatus of claim 24, wherein the instructions are further operable to cause the apparatus to: transmit an UL control message during a subsequent subframe, wherein the UL control message comprises acknowledgment (ACK) information for the DL data received during the additional DL region. 26. The apparatus of claim 21, wherein the instructions are further operable to cause the apparatus to: transmit UL data or an UL control message, or both, during the UL region, wherein the resources of the UL region are scheduled by the DL control message. 27. The apparatus of claim 21, wherein the instructions are further operable to cause the apparatus to: transmit UL data or an UL control message, or both, during the additional region, wherein the additional region follows the DL region and precedes the UL region, and wherein the additional region comprises an additional UL region comprising resources scheduled by another DL control message in a preceding subframe. 28. The apparatus of claim 19, wherein the timing relationship between the DL region and the UL region is based at least in part on a capability of a user equipment (UE) scheduled for communication during the subframe or a serving cell that schedules communications during the subframe, or both. 29. The apparatus of claim 19, wherein the instructions are further operable to cause the apparatus to: identify the guard region of the subframe, wherein the timing relationship between the DL region and the UL region is based at least in part on a location of the guard region within the subframe or a duration of the guard region, or both. 30. A non-transitory computer-readable medium storing code for wireless communication, the code comprising instructions executable to: identify a downlink (DL) region of a subframe, wherein the subframe comprises the DL region, an uplink (UL) region, a guard region, and an additional region; identify the UL region of the subframe, wherein a transmission on resources of the UL region is based at least in part on a timing relationship between the DL region and the UL region; and communicate during the DL region and the UL region according to the timing relationship.
Methods, systems, and devices for wireless communication are described. A wireless device may identify multiple regions within a subframe, such as one or more uplink regions, one or more downlink regions, and a guard region. The wireless device may identify and communicate during each region based on a timing relationship between the downlink region and the uplink region. For example, the device may expect hybrid automated repeat request (HARQ) feedback for one downlink region in the same subframe based on the proximity to the next uplink region. Another downlink region may not have HARQ feedback in the same subframe. Similarly, uplink regions may or may not be scheduled within the same subframe.1. A method of wireless communication comprising: identifying a downlink (DL) region of a subframe, wherein the subframe comprises the DL region, an uplink (UL) region, a guard region, and an additional region; identifying the UL region of the subframe, wherein a transmission on resources of the UL region is based at least in part on a timing relationship between the DL region and the UL region; and communicating during the DL region and the UL region according to the timing relationship. 2. The method of claim 1, further comprising: identifying the additional region of the subframe, wherein the additional region comprises an additional DL region or an additional UL region. 3. The method of claim 2, wherein a transmission on resources of the additional region is based at least in part on a timing relationship between the DL region or the UL region and the additional region. 4. The method of claim 1, further comprising: receiving a DL control message during the DL region. 5. The method of claim 4, further comprising: receiving DL data during the DL region, wherein resources of the DL region are scheduled by the DL control message. 6. The method of claim 5, further comprising: transmitting an UL control message during the UL region, wherein the UL control message comprises acknowledgment (ACK) information for the DL data received during the DL region. 7. The method of claim 4, further comprising: receiving DL data during the additional region, wherein the additional region follows the DL region and precedes the UL region, and wherein the additional region comprises an additional DL region comprising resources scheduled by the DL control message. 8. The method of claim 7, further comprising: transmitting an UL control message during a subsequent subframe, wherein the UL control message comprises acknowledgment (ACK) information for the DL data received during the additional DL region. 9. The method of claim 4, further comprising: transmitting UL data or an UL control message, or both, during the UL region, wherein the resources of the UL region are scheduled by the DL control message. 10. The method of claim 4, further comprising: transmitting UL data or an UL control message, or both, during the additional region, wherein the additional region follows the DL region and precedes the UL region, and wherein the additional region comprises an additional UL region comprising resources scheduled by another DL control message in a preceding subframe. 11. The method of claim 1, wherein the timing relationship between the DL region and the UL region is based at least in part on a capability of a user equipment (UE) scheduled for communication during the subframe or a serving cell that schedules communications during the subframe, or both. 12. The method of claim 1, wherein the timing relationship between the DL region and the UL region is identified using a system information (SI) broadcast, radio resource control (RRC) signaling, or a grant of resources in a DL control message, or any combination thereof. 13. The method of claim 1, wherein the timing relationship between the DL region and the UL region comprises a minimum time duration used for subframes having separate regions for UL and DL communications, and wherein a first duration of the DL region and a second duration of the UL region are based at least in part on the minimum time duration. 14. The method of claim 1, further comprising: identifying the guard region of the subframe, wherein the timing relationship between the DL region and the UL region is based at least in part on a location of the guard region within the subframe or a duration of the guard region, or both. 15. The method of claim 14, wherein the duration of the guard region of the subframe is different from a guard period of a special subframe of a time division duplex (TDD) configured carrier, wherein the TDD configured carrier comprises the subframe and the special subframe. 16. The method of claim 15, wherein the guard period of the special subframe is configured according to a common capability of each user equipment (UE) in a set of UEs within a system, and wherein the guard region of the subframe is configured according to a different capability of a subset of the set of UEs within the system. 17. The method of claim 1, wherein a DL hybrid automatic repeat request (HARQ) timing or a UL scheduling timing, or both, for the subframe are different from a DL HARQ timing or a UL scheduling timing for a subsequent subframe or a preceding subframe. 18. An apparatus for wireless communication comprising: means for identifying a downlink (DL) region of a subframe, wherein the subframe comprises the DL region, an uplink (UL) region, a guard region, and an additional region; means for identifying the UL region of the subframe, wherein a transmission on resources of the UL region is based at least in part on a timing relationship between the DL region and the UL region; and means for communicating during the DL region and the UL region according to the timing relationship. 19. An apparatus for wireless communication, comprising: a processor; memory in electronic communication with the processor; and instructions stored in the memory and operable, when executed by the processor, to cause the apparatus to: identify a downlink (DL) region of a subframe, wherein the subframe comprises the DL region, an uplink (UL) region, a guard region, and an additional region; identify the UL region of the subframe, wherein a transmission on resources of the UL region is based at least in part on a timing relationship between the DL region and the UL region; and communicate during the DL region and the UL region according to the timing relationship. 20. The apparatus of claim 19, wherein the instructions are further operable to cause the apparatus to: identify the additional region of the subframe, wherein the additional region comprises an additional DL region or an additional UL region. 21. The apparatus of claim 19, wherein the instructions are further operable to cause the apparatus to: receive a DL control message during the DL region. 22. The apparatus of claim 21, wherein the instructions are further operable to cause the apparatus to: receive DL data during the DL region, wherein resources of the DL region are scheduled by the DL control message. 23. The apparatus of claim 22, wherein the instructions are further operable to cause the apparatus to: transmit an UL control message during the UL region, wherein the UL control message comprises acknowledgment (ACK) information for the DL data received during the DL region. 24. The apparatus of claim 21, wherein the instructions are further operable to cause the apparatus to: receive DL data during the additional region, wherein the additional region follows the DL region and precedes the UL region, and wherein the additional region comprises an additional DL region comprising resources scheduled by the DL control message. 25. The apparatus of claim 24, wherein the instructions are further operable to cause the apparatus to: transmit an UL control message during a subsequent subframe, wherein the UL control message comprises acknowledgment (ACK) information for the DL data received during the additional DL region. 26. The apparatus of claim 21, wherein the instructions are further operable to cause the apparatus to: transmit UL data or an UL control message, or both, during the UL region, wherein the resources of the UL region are scheduled by the DL control message. 27. The apparatus of claim 21, wherein the instructions are further operable to cause the apparatus to: transmit UL data or an UL control message, or both, during the additional region, wherein the additional region follows the DL region and precedes the UL region, and wherein the additional region comprises an additional UL region comprising resources scheduled by another DL control message in a preceding subframe. 28. The apparatus of claim 19, wherein the timing relationship between the DL region and the UL region is based at least in part on a capability of a user equipment (UE) scheduled for communication during the subframe or a serving cell that schedules communications during the subframe, or both. 29. The apparatus of claim 19, wherein the instructions are further operable to cause the apparatus to: identify the guard region of the subframe, wherein the timing relationship between the DL region and the UL region is based at least in part on a location of the guard region within the subframe or a duration of the guard region, or both. 30. A non-transitory computer-readable medium storing code for wireless communication, the code comprising instructions executable to: identify a downlink (DL) region of a subframe, wherein the subframe comprises the DL region, an uplink (UL) region, a guard region, and an additional region; identify the UL region of the subframe, wherein a transmission on resources of the UL region is based at least in part on a timing relationship between the DL region and the UL region; and communicate during the DL region and the UL region according to the timing relationship.
2,400
9,386
9,386
13,828,372
2,454
Systems, methods, apparatuses, and computer readable media may be configured for transferring of state data of a network connection established by a first device. In an example, a front end device of a cache cluster may establish a network connection with a client device and generate state data associated with the network connection. The front end device may receive a content request from the client device via the network connection and select one of a plurality of back end devices to provide the content item.
1. A method comprising establishing, by a first of a plurality of back end devices of a cache cluster, a network connection with a device and generating state data associated with the network connection; receiving, by the first back end device, a content request from the device via the network connection; communicating the content request to a front end device of the cache cluster; receiving, by the first back end device, a network address of a selected one of the plurality of back end devices from the front end device; and transferring, by the first back end device, the state data of the network connection to the selected back end device and instructing the selected back end device to reply upon the state data at least in part when responding to the content request via the network connection. 2. The method of claim 1, further comprising extracting a content identifier from the content request. 3. The method of claim 2, further comprising determining, by the selected back end device, a storage location of a content item associated with the content identifier. 4. The method of claim 3, further comprising storing, by the selected back end device, the content item in a local storage device in response to determining that the content item is not locally stored. 5. The method of claim 3, further comprising providing, by the selected back end device, the content item to the client device via the network connection using the state data. 6. The method of claim 1, wherein the first backend device comprises an edge server. 7. The method of claim 1, wherein the first backend device comprises a webserver. 8. The method of claim 1, wherein the state data comprises transmission control protocol state data. 9. One or more non-transitory computer readable media storing instructions that, when executed, cause an apparatus at least to perform: establishing a network connection with a client device and generating state data associated with the network connection; receiving a content request from the client device via the network connection; processing the content request to select one of a plurality of back end devices to service the content request; and transferring the state data of the network connection to the selected back end device and instructing the selected back end device to rely upon the state data at least in part when responding to the content request via the network connection. 10. The one or more non-transitory computer readable media of claim 9, wherein the instructions, when executed, cause the apparatus at least to perform extracting a content identifier from the content request. 11. The one or more non-transitory computer readable media of claim 9, wherein the network connection is a transmission control protocol connection. 12. The one or more non-transitory computer readable media of claim 9, wherein the content request is a hypertext transfer protocol request. 13. The one or more non-transitory computer readable media of claim 9, wherein the state data comprises transmission control protocol state data. 14. A method comprising: establishing, by a first device, a network connection with a device and generating state data associated with the network connection; receiving a content request from the device via the network connection, wherein the content request identifies a content item; processing, by the first device, the content request to select one of a plurality of back end devices to provide the content item; transferring, by the first device, the state data and the content request to the selected back end device and instructing the selected back end device to provide the content item to the client device via the network connection. 15. The method of claim 14, wherein a network address associated with the network connection is a virtual network address. 16. The method of claim 14, wherein communications addressed to the virtual network address are forwarded to the first device. 17. The method of claim 15, wherein the selected back end device uses the virtual network address to communicate with the client via the network connection. 18. The method of claim 14, further comprising determining, by the selected back end device, a storage location of the content item. 19. The method of claim 14, further comprising storing, by the selected back end device, the content item in a local storage device in response to determining that the content item is not locally stored. 20. The method of claim 14, further comprising providing, by the selected back end device, the content item to the client device via the network connection using the state data.
Systems, methods, apparatuses, and computer readable media may be configured for transferring of state data of a network connection established by a first device. In an example, a front end device of a cache cluster may establish a network connection with a client device and generate state data associated with the network connection. The front end device may receive a content request from the client device via the network connection and select one of a plurality of back end devices to provide the content item.1. A method comprising establishing, by a first of a plurality of back end devices of a cache cluster, a network connection with a device and generating state data associated with the network connection; receiving, by the first back end device, a content request from the device via the network connection; communicating the content request to a front end device of the cache cluster; receiving, by the first back end device, a network address of a selected one of the plurality of back end devices from the front end device; and transferring, by the first back end device, the state data of the network connection to the selected back end device and instructing the selected back end device to reply upon the state data at least in part when responding to the content request via the network connection. 2. The method of claim 1, further comprising extracting a content identifier from the content request. 3. The method of claim 2, further comprising determining, by the selected back end device, a storage location of a content item associated with the content identifier. 4. The method of claim 3, further comprising storing, by the selected back end device, the content item in a local storage device in response to determining that the content item is not locally stored. 5. The method of claim 3, further comprising providing, by the selected back end device, the content item to the client device via the network connection using the state data. 6. The method of claim 1, wherein the first backend device comprises an edge server. 7. The method of claim 1, wherein the first backend device comprises a webserver. 8. The method of claim 1, wherein the state data comprises transmission control protocol state data. 9. One or more non-transitory computer readable media storing instructions that, when executed, cause an apparatus at least to perform: establishing a network connection with a client device and generating state data associated with the network connection; receiving a content request from the client device via the network connection; processing the content request to select one of a plurality of back end devices to service the content request; and transferring the state data of the network connection to the selected back end device and instructing the selected back end device to rely upon the state data at least in part when responding to the content request via the network connection. 10. The one or more non-transitory computer readable media of claim 9, wherein the instructions, when executed, cause the apparatus at least to perform extracting a content identifier from the content request. 11. The one or more non-transitory computer readable media of claim 9, wherein the network connection is a transmission control protocol connection. 12. The one or more non-transitory computer readable media of claim 9, wherein the content request is a hypertext transfer protocol request. 13. The one or more non-transitory computer readable media of claim 9, wherein the state data comprises transmission control protocol state data. 14. A method comprising: establishing, by a first device, a network connection with a device and generating state data associated with the network connection; receiving a content request from the device via the network connection, wherein the content request identifies a content item; processing, by the first device, the content request to select one of a plurality of back end devices to provide the content item; transferring, by the first device, the state data and the content request to the selected back end device and instructing the selected back end device to provide the content item to the client device via the network connection. 15. The method of claim 14, wherein a network address associated with the network connection is a virtual network address. 16. The method of claim 14, wherein communications addressed to the virtual network address are forwarded to the first device. 17. The method of claim 15, wherein the selected back end device uses the virtual network address to communicate with the client via the network connection. 18. The method of claim 14, further comprising determining, by the selected back end device, a storage location of the content item. 19. The method of claim 14, further comprising storing, by the selected back end device, the content item in a local storage device in response to determining that the content item is not locally stored. 20. The method of claim 14, further comprising providing, by the selected back end device, the content item to the client device via the network connection using the state data.
2,400
9,387
9,387
14,211,343
2,448
Disclosed is a web-based dashboard notification application for real-time presentation and remote management of mobile devices connected to a management console. A method for providing dashboard notifications during a remote control session includes establishing a remote control session between a management console and a mobile device. The management console requests device information and sends the device information to a dashboard execution service. A dashboard model is requested based on the device information, where the dashboard model is a set of workflows. A set of workflows is executed on the device information to verify the device information against predetermined values. The output data model is bound to a view to create a dashboard notification, which is displayed on the management console. The dashboard notification is a visual representation of a health of the mobile device.
1. A method for providing dashboard notifications during a remote control session, the method comprising: establishing a remote control session between a management console and a mobile device; requesting device information from the mobile device; sending the device information to a dashboard execution service; requesting a dashboard model based on the device information, wherein the dashboard model is a set of workflows; executing the set of workflows on the device information to verify the device information against predetermined values; binding an output data model to a view to create a dashboard notification; and displaying the dashboard notification on the management console on a condition that the device information does not meet the predetermined values, wherein the dashboard notification is a visual representation of a health of the mobile device. 2. The method of claim 1, wherein the dashboard notification includes corrective actions that can be performed on the mobile device. 3. The method of claim 2, wherein the corrective actions are automatically performed on the mobile device. 4. The method of claim 1, wherein a plurality of dashboard models, a plurality of views and data analysis rules are generated and stored in respective caches. 5. The method of claim 1, further comprising: applying statistical data and predictive techniques to influence execution and behavior of workflow as applied to the device information. 6. The method of claim 1, further comprising: tracking re-occurring issues on the mobile device; tracking the corrective actions taken to correct the issues; tracking the results from the corrective actions; and learning from tracked issues, corrective actions and results to provide intelligence based corrective actions to the issues. 7. The method of claim 1, further comprising: maintaining statistical records of executed dashboard models and workflows; and employing predictive analytics to the statistical records to analyze which mobile device components are prone to issues. 8. The method of claim 7, further comprising: applying rules to dictate how the statistical records are used to generate dashboard models and views. 9. The method of claim 1, further comprising: detecting other issues not associated with the remote control session; and providing actions to correct the other issues to mitigate additional remote control sessions. 10. A remote management system, comprising: a management console configured to establish a remote control session between the management console and a mobile device; the management console configured to request device information from the mobile device; the management console configured to send the device information to a dashboard execution service; the dashboard execution service configured to request a dashboard model from a dashboard model service, the dashboard model based on the device information, wherein the dashboard model is a set of workflows; the dashboard model service configured to execute the set of workflows on the device information to verify the device information against predetermined values; the dashboard execution service configured to bind an output data model to a view to create a dashboard notification; and the management console configured to display the dashboard notification on the management console on a condition that the device information does not meet the predetermined values, wherein the dashboard notification is a visual representation of a health of the mobile device. 11. The remote management system of claim 10, wherein the dashboard notification includes corrective actions that can be performed on the mobile device. 12. The remote management system of claim 11, wherein the corrective actions are automatically performed on the mobile device. 13. The remote management system of claim 10, wherein a plurality of dashboard models, a plurality of views and data analysis rules are generated and stored in respective caches. 14. The remote management system of claim 10, further comprising: the dashboard execution service configured to apply statistical data and predictive techniques to influence execution and behavior of workflow as applied to the device information. 15. The remote management system of claim 10, further comprising: a data point access system configured to track re-occurring issues on the mobile device; the data point access system configured to track the corrective actions taken to correct the issues; the data point access system configured to track the results from the corrective actions; and the data point access system configured to learn from tracked issues, corrective actions and results to provide intelligence based corrective actions to the issues. 16. The remote management system of claim 10, further comprising: a data point access system configured to maintain statistical records of executed dashboard models and workflows; and the data point access system configured to employ predictive analytics to the statistical records to analyze which mobile device components are prone to issues. 17. The remote management system of claim 16, further comprising: a data point access system configured to apply rules to dictate how the statistical records are used to generate dashboard models and views. 18. The remote management system of claim 10, further comprising: the dashboard execution service configured to detect other issues not associated with the remote control session; and the dashboard execution service configured to provide actions to correct the other issues to mitigate additional remote control sessions. 19. A dashboard notification system, comprising: a dashboard execution service configured to request a dashboard model from a dashboard model service, the dashboard model based on device information received from a management console in a remote control session with a mobile device, wherein the dashboard model is a set of workflows; the dashboard model service configured to execute the set of workflows on the device information to verify the device information against predetermined values; the dashboard execution service configured to bind an output data model to a view to create a dashboard notification; and the dashboard execution service configured to send the dashboard notification for display on the management console on a condition that the device information does not meet the predetermined values, wherein the dashboard notification is a visual representation of an issue with the mobile device. 20. The dashboard notification system of claim 19, further comprising: a data point access system configured to maintain statistical records of executed dashboard models and workflows; and the data point access system configured to employ predictive analytics to the statistical records to analyze which mobile device components are prone to issues.
Disclosed is a web-based dashboard notification application for real-time presentation and remote management of mobile devices connected to a management console. A method for providing dashboard notifications during a remote control session includes establishing a remote control session between a management console and a mobile device. The management console requests device information and sends the device information to a dashboard execution service. A dashboard model is requested based on the device information, where the dashboard model is a set of workflows. A set of workflows is executed on the device information to verify the device information against predetermined values. The output data model is bound to a view to create a dashboard notification, which is displayed on the management console. The dashboard notification is a visual representation of a health of the mobile device.1. A method for providing dashboard notifications during a remote control session, the method comprising: establishing a remote control session between a management console and a mobile device; requesting device information from the mobile device; sending the device information to a dashboard execution service; requesting a dashboard model based on the device information, wherein the dashboard model is a set of workflows; executing the set of workflows on the device information to verify the device information against predetermined values; binding an output data model to a view to create a dashboard notification; and displaying the dashboard notification on the management console on a condition that the device information does not meet the predetermined values, wherein the dashboard notification is a visual representation of a health of the mobile device. 2. The method of claim 1, wherein the dashboard notification includes corrective actions that can be performed on the mobile device. 3. The method of claim 2, wherein the corrective actions are automatically performed on the mobile device. 4. The method of claim 1, wherein a plurality of dashboard models, a plurality of views and data analysis rules are generated and stored in respective caches. 5. The method of claim 1, further comprising: applying statistical data and predictive techniques to influence execution and behavior of workflow as applied to the device information. 6. The method of claim 1, further comprising: tracking re-occurring issues on the mobile device; tracking the corrective actions taken to correct the issues; tracking the results from the corrective actions; and learning from tracked issues, corrective actions and results to provide intelligence based corrective actions to the issues. 7. The method of claim 1, further comprising: maintaining statistical records of executed dashboard models and workflows; and employing predictive analytics to the statistical records to analyze which mobile device components are prone to issues. 8. The method of claim 7, further comprising: applying rules to dictate how the statistical records are used to generate dashboard models and views. 9. The method of claim 1, further comprising: detecting other issues not associated with the remote control session; and providing actions to correct the other issues to mitigate additional remote control sessions. 10. A remote management system, comprising: a management console configured to establish a remote control session between the management console and a mobile device; the management console configured to request device information from the mobile device; the management console configured to send the device information to a dashboard execution service; the dashboard execution service configured to request a dashboard model from a dashboard model service, the dashboard model based on the device information, wherein the dashboard model is a set of workflows; the dashboard model service configured to execute the set of workflows on the device information to verify the device information against predetermined values; the dashboard execution service configured to bind an output data model to a view to create a dashboard notification; and the management console configured to display the dashboard notification on the management console on a condition that the device information does not meet the predetermined values, wherein the dashboard notification is a visual representation of a health of the mobile device. 11. The remote management system of claim 10, wherein the dashboard notification includes corrective actions that can be performed on the mobile device. 12. The remote management system of claim 11, wherein the corrective actions are automatically performed on the mobile device. 13. The remote management system of claim 10, wherein a plurality of dashboard models, a plurality of views and data analysis rules are generated and stored in respective caches. 14. The remote management system of claim 10, further comprising: the dashboard execution service configured to apply statistical data and predictive techniques to influence execution and behavior of workflow as applied to the device information. 15. The remote management system of claim 10, further comprising: a data point access system configured to track re-occurring issues on the mobile device; the data point access system configured to track the corrective actions taken to correct the issues; the data point access system configured to track the results from the corrective actions; and the data point access system configured to learn from tracked issues, corrective actions and results to provide intelligence based corrective actions to the issues. 16. The remote management system of claim 10, further comprising: a data point access system configured to maintain statistical records of executed dashboard models and workflows; and the data point access system configured to employ predictive analytics to the statistical records to analyze which mobile device components are prone to issues. 17. The remote management system of claim 16, further comprising: a data point access system configured to apply rules to dictate how the statistical records are used to generate dashboard models and views. 18. The remote management system of claim 10, further comprising: the dashboard execution service configured to detect other issues not associated with the remote control session; and the dashboard execution service configured to provide actions to correct the other issues to mitigate additional remote control sessions. 19. A dashboard notification system, comprising: a dashboard execution service configured to request a dashboard model from a dashboard model service, the dashboard model based on device information received from a management console in a remote control session with a mobile device, wherein the dashboard model is a set of workflows; the dashboard model service configured to execute the set of workflows on the device information to verify the device information against predetermined values; the dashboard execution service configured to bind an output data model to a view to create a dashboard notification; and the dashboard execution service configured to send the dashboard notification for display on the management console on a condition that the device information does not meet the predetermined values, wherein the dashboard notification is a visual representation of an issue with the mobile device. 20. The dashboard notification system of claim 19, further comprising: a data point access system configured to maintain statistical records of executed dashboard models and workflows; and the data point access system configured to employ predictive analytics to the statistical records to analyze which mobile device components are prone to issues.
2,400
9,388
9,388
11,608,859
2,455
A method of caching data at a processing node within a communication network can include predicting a future location of a user. A processing node within the communication network can be selected according to the future location. Data to be sent to the selected processing node can be selected. The selected data can be sent to the selected processing node.
1. A method of caching data at a processing node within a communication network comprising: determining a future location of a user; selecting a processing node within the communication network according to the future location; selecting data to be sent to the processing node; and sending the selected data to the selected processing node. 2. The method of claim 1, wherein determining a future location further comprises selecting a future location according to a location associated with at least one member of a social network to which the user belongs. 3. The method of claim 1, wherein determining a future location further comprises selecting a user-declared location as the future location. 4. The method of claim 1, wherein determining a future location further comprises selecting the future location according to previously visited locations of the user. 5. The method of claim 1, wherein determining a future location further comprises selecting the future location according to a heading of the user. 6. The method of claim 1, wherein identifying the processing node further comprises identifying a processing node within the communication network that is closest to the future location. 7. The method of claim 1, wherein selecting data to be sent further comprises selecting data that is frequently accessed by the user. 8. The method of claim 1, wherein selecting data to be sent further comprises selecting data that was recently accessed by the user. 9. The method of claim 1, wherein selecting data to be sent further comprises selecting data that was accessed by the user during a prior visit to the future location. 10. The method of claim 1, wherein selecting data to be sent further comprises receiving a user input specifying the data. 11. The method of claim 1, wherein sending data to the selected processing node further comprises sending the data at a transmission rate selected according to a distance between the user and the future location. 12. The method of claim 1, wherein sending data to the selected processing node further comprises sending the data at a transmission rate selected according to an expected arrival time of the user at the future location. 13. The method of claim 1, wherein sending data to the selected processing node further comprises sending the data at a transmission rate selected according to a level of service associated with the user. 14. A system for caching data at a processing node within a communication network comprising: a prediction module determining a future location of a user, wherein the prediction module selects the processing node within the communication network according to the future location; a data selection module that identifies data to be sent to the selected processing node; and a controller that pushes the selected data to the selected processing node. 15. The system of claim 14, wherein the prediction module determines the future location according to a location associated with a member of a social network of the user, a user-declared location, previously visited locations of the user, or a heading of the user. 16. The system of claim 14, wherein the prediction module selects the processing node within the network that is closest to the future location. 17. The system of claim 14, wherein data selection is performed according to data frequently accessed by the user, data recently accessed by the user, data accessed by the user during a prior visit to the future location, or a user input specifying the data. 18. The system of claim 14, wherein the controller varies a transmission rate of the data to the selected processing node according to a distance between the user and the future location or an expected arrival time of the user at the future location. 19. The system of claim 14, wherein the controller varies a transmission rate of the data to the selected processing node according to a level of service associated with the user. 20. A computer program product comprising: a computer-usable medium having computer-usable program code that pushes data to a processing node within a communication network, said computer program product including: computer-usable program code that predicts a future location of a user; computer-usable program code that selects a processing node within the communication network according to the future location; computer-usable program code that selects data to be sent to the selected processing node; and computer-usable program code that pushes the selected data to the selected processing node.
A method of caching data at a processing node within a communication network can include predicting a future location of a user. A processing node within the communication network can be selected according to the future location. Data to be sent to the selected processing node can be selected. The selected data can be sent to the selected processing node.1. A method of caching data at a processing node within a communication network comprising: determining a future location of a user; selecting a processing node within the communication network according to the future location; selecting data to be sent to the processing node; and sending the selected data to the selected processing node. 2. The method of claim 1, wherein determining a future location further comprises selecting a future location according to a location associated with at least one member of a social network to which the user belongs. 3. The method of claim 1, wherein determining a future location further comprises selecting a user-declared location as the future location. 4. The method of claim 1, wherein determining a future location further comprises selecting the future location according to previously visited locations of the user. 5. The method of claim 1, wherein determining a future location further comprises selecting the future location according to a heading of the user. 6. The method of claim 1, wherein identifying the processing node further comprises identifying a processing node within the communication network that is closest to the future location. 7. The method of claim 1, wherein selecting data to be sent further comprises selecting data that is frequently accessed by the user. 8. The method of claim 1, wherein selecting data to be sent further comprises selecting data that was recently accessed by the user. 9. The method of claim 1, wherein selecting data to be sent further comprises selecting data that was accessed by the user during a prior visit to the future location. 10. The method of claim 1, wherein selecting data to be sent further comprises receiving a user input specifying the data. 11. The method of claim 1, wherein sending data to the selected processing node further comprises sending the data at a transmission rate selected according to a distance between the user and the future location. 12. The method of claim 1, wherein sending data to the selected processing node further comprises sending the data at a transmission rate selected according to an expected arrival time of the user at the future location. 13. The method of claim 1, wherein sending data to the selected processing node further comprises sending the data at a transmission rate selected according to a level of service associated with the user. 14. A system for caching data at a processing node within a communication network comprising: a prediction module determining a future location of a user, wherein the prediction module selects the processing node within the communication network according to the future location; a data selection module that identifies data to be sent to the selected processing node; and a controller that pushes the selected data to the selected processing node. 15. The system of claim 14, wherein the prediction module determines the future location according to a location associated with a member of a social network of the user, a user-declared location, previously visited locations of the user, or a heading of the user. 16. The system of claim 14, wherein the prediction module selects the processing node within the network that is closest to the future location. 17. The system of claim 14, wherein data selection is performed according to data frequently accessed by the user, data recently accessed by the user, data accessed by the user during a prior visit to the future location, or a user input specifying the data. 18. The system of claim 14, wherein the controller varies a transmission rate of the data to the selected processing node according to a distance between the user and the future location or an expected arrival time of the user at the future location. 19. The system of claim 14, wherein the controller varies a transmission rate of the data to the selected processing node according to a level of service associated with the user. 20. A computer program product comprising: a computer-usable medium having computer-usable program code that pushes data to a processing node within a communication network, said computer program product including: computer-usable program code that predicts a future location of a user; computer-usable program code that selects a processing node within the communication network according to the future location; computer-usable program code that selects data to be sent to the selected processing node; and computer-usable program code that pushes the selected data to the selected processing node.
2,400
9,389
9,389
14,735,282
2,487
A system and method are described for providing improved bird feeders, especially self-contained bird feeders capable of providing streaming video. The system and method employ a novel design offering a streaming video from a self-contained feeding platform, described in the drawings and the detailed description.
1. A self-contained bird feeder configured to provide detailed images over a wireless network, comprising: a. a feeder housing; b. a feeder bottom; c. a feed port disposed on the feeder bottom; d. a camera disposed in close proximity to the feed port; e. a computer in communication with the camera; f. an internal power source; and a g. a WiFi adapter. 2. The self-contained bird feeder of claim 1 wherein the WiFi adapter is a WiFi dongle. 3. The self-contained bird feeder of claim 1 further comprising a feed compartment disposed in the feeder housing and a feed compartment separator disposed in the feed compartment. 4. The self-contained bird feeder of claim 1 wherein the computer comprises: a processor; a display connector; a multi-media interface; an audio/video jack; and an ethernet socket. 5. The self-contained bird feeder of claim 1 wherein the computer comprises a micro USB socket and a USB port. 6. The self-contained bird feeder of claim 4 wherein the multi-media interface comprises an HDMI port. 7. A method for transmitting images from a bird feeder comprising: equipping a feeder housing with a camera in close proximity to a feed port; providing a source of electrical power for a computer disposed within the bird feeder; configuring a computer disposed in the bird feeder to control the camera; operating the camera to capture images; and transmitting images to a WiFi network. 8. The method of claim 7 further comprising distributing the images from the WiFi network to the internet. 9. The method of claim 7 further comprising distributing streaming video to the WiFi network. 10. The method of claim 7 further comprising distributing streaming video to the internet. 11. The method of claim 7 further comprising generating electricity with a solar panel, and distributing solar-generated electricity to the computer. 12. The method of claim 11 further comprising distributing electricity from both the solar panel and a battery to the computer.
A system and method are described for providing improved bird feeders, especially self-contained bird feeders capable of providing streaming video. The system and method employ a novel design offering a streaming video from a self-contained feeding platform, described in the drawings and the detailed description.1. A self-contained bird feeder configured to provide detailed images over a wireless network, comprising: a. a feeder housing; b. a feeder bottom; c. a feed port disposed on the feeder bottom; d. a camera disposed in close proximity to the feed port; e. a computer in communication with the camera; f. an internal power source; and a g. a WiFi adapter. 2. The self-contained bird feeder of claim 1 wherein the WiFi adapter is a WiFi dongle. 3. The self-contained bird feeder of claim 1 further comprising a feed compartment disposed in the feeder housing and a feed compartment separator disposed in the feed compartment. 4. The self-contained bird feeder of claim 1 wherein the computer comprises: a processor; a display connector; a multi-media interface; an audio/video jack; and an ethernet socket. 5. The self-contained bird feeder of claim 1 wherein the computer comprises a micro USB socket and a USB port. 6. The self-contained bird feeder of claim 4 wherein the multi-media interface comprises an HDMI port. 7. A method for transmitting images from a bird feeder comprising: equipping a feeder housing with a camera in close proximity to a feed port; providing a source of electrical power for a computer disposed within the bird feeder; configuring a computer disposed in the bird feeder to control the camera; operating the camera to capture images; and transmitting images to a WiFi network. 8. The method of claim 7 further comprising distributing the images from the WiFi network to the internet. 9. The method of claim 7 further comprising distributing streaming video to the WiFi network. 10. The method of claim 7 further comprising distributing streaming video to the internet. 11. The method of claim 7 further comprising generating electricity with a solar panel, and distributing solar-generated electricity to the computer. 12. The method of claim 11 further comprising distributing electricity from both the solar panel and a battery to the computer.
2,400
9,390
9,390
15,839,329
2,432
A first correspondence table in a terminal device stores a correspondence between an identifier of a process running on the terminal device and an identifier of a data stream created by the process, a second correspondence table stores a second correspondence between an identifier of an application and an identifier of a process created by the application. The terminal device receives an identifier, sent by a network security device, of a first data stream. The terminal device can find, in the first correspondence table, a first record storing the identifier of the first data stream to obtain an identifier of a process. The terminal device can find in the second correspondence table, a second record storing the identifier of the process in the first record to obtain an identifier of an application from the second record. The identifier of the application is then sent to the network security device.
1. A method for identifying application information in network traffic, wherein the method is executed by a terminal device, wherein a first correspondence table in the terminal device stores, in a record form, a correspondence between an identifier of a process running on the terminal device and an identifier of a data stream created by the process, wherein a second correspondence table in the terminal device stores, in a record form, a correspondence between an identifier of an application and an identifier of a process created by the application, and wherein the identifier of the data stream is a 5-tuple comprising a source address, a source port, a destination address, a destination port, and a protocol identifier, the method comprising: receiving an identifier of a first data stream from a network security device; obtaining an identifier of a process associated with the first data stream, wherein obtaining the identifier of the process comprises identifying in the first correspondence table, a process identifier included in a first record in which the received identifier of the first data stream is stored; obtaining an identifier of an application associated with the obtained identifier of the process included in the first record, wherein obtaining the identifier of the application comprises identifying, in the second correspondence table, an application identifier included in a second record in which the obtained identifier of the process in the first record is stored; and sending the obtained identifier of the application to the network security device. 2. The method according to claim 1, wherein the terminal device obtains the first correspondence table by performing operations comprising: obtaining, by the terminal device using an interface provided by an operating system, an identifier of at least one process running on the terminal device; and for each obtained identifier of a process: obtaining, by the terminal device, an identifier of a data stream created by the process; generating a record comprising the identifier of the process and the identifier of the data stream; and storing the record in the first correspondence table. 3. The method according to claim 1, wherein the terminal device obtains the first correspondence table by performing operations comprising: obtaining, by the terminal device using a hook function, an event indicating that the operating system creates a new process; obtaining an identifier of the newly created process from the event indicating that the operating system created a new process; obtaining an identifier of a data stream created by the newly created process; generating a record comprising the identifier of the newly created process and the identifier of the data stream created by the newly created process; and storing the record in the first correspondence table; wherein the terminal device obtains the first correspondence table by performing operations comprising: obtaining, by the terminal device by using the hook function, an event identifying that the operating system exits a process; and obtaining an identifier of the exited process from the event of exiting a process; and deleting, from the first correspondence table, a record comprising the identifier of the exited process. 4. The method according to claim 1, wherein a record in the first correspondence table further comprises a last activity time of a data stream, and wherein the method further comprises: determining, by the terminal device, an expired record in the first correspondence table, wherein the expired record is a record in which a time interval between a last activity time that is of a data stream and that is comprised in the expired record and a current time exceeds a predetermined time interval; and deleting the expired record. 5. The method according to claim 4, wherein after the terminal device obtains the first correspondence table, the method further comprises: obtaining, by the terminal device by using a hook function, a packet transmitted by the terminal device; obtaining, from the obtained packet, an identifier of a data stream to which the packet belongs; and updating a last activity time of a data stream in a record that is in the first correspondence table and that comprises the identifier of the data stream to which the packet belongs to the current time. 6. The method according to claim 1, wherein after the terminal device obtains the first correspondence table, the method further comprises: obtaining, by the terminal device by using a hook function, a packet transmitted by the terminal device; obtaining, from the obtained packet, a packet status identifier and an identifier of a data stream to which the packet belongs; and in response to determining that the packet status identifier is FIN, deleting, from the first correspondence table, a record comprising the identifier of the data stream to which the packet belongs. 7. The method according to claim 1, wherein after the obtaining an identifier of a process in the first record, the method further comprises: setting a packet collection flag for the identifier of the process, wherein the packet collection flag instructs the terminal device to obtain and store, after capturing a packet transmitted by the process by using an interface of the operating system, a complete data stream subsequently transmitted by the process. 8. A terminal device, wherein the terminal device comprises a memory, at least one processor, and a network interface, and the memory, the at least one processor, and the network interface communicate with each other by using a bus; wherein the memory is configured to store program code, a first correspondence table, and a second correspondence table, wherein the first correspondence table stores, in a record form, a correspondence between an identifier of a process running on the terminal device and an identifier of a data stream created by the process, the second correspondence table stores, in a record form, a correspondence between an identifier of an application and an identifier of a process created by the application, and the identifier of the data stream is a 5-tuple comprising a source address, a source port, a destination address, a destination port, and a protocol identifier; wherein the network interface is configured to receive an identifier of a first data stream send by a network security device; wherein the at least one processor is configured to execute the program code stored in the memory, to perform operations comprising: obtaining an identifier of a process associated with first data stream, wherein obtaining the identifier of the process comprises identifying, in the first correspondence table, a process identifier included in a first record in which the received identifier of the first data stream is stored; and obtaining an identifier of an application associated with the obtained identifier of the process included in the first record, wherein obtaining the identifier of the application comprises identifying, in the second correspondence table, an application identifier included in a second record in which the obtained identifier of the process in the first record is stored; and wherein the network interface is further configured to send the identifier of the application obtained by the processor to the network security device. 9. The terminal device according to claim 8, wherein the at least one processor is further configured to obtain the first correspondence table by using the following operations: obtaining, using an interface provided by an operating system, an identifier of at least one process running on the terminal device; and for each obtained identifier of a process: obtaining, by the terminal device, an identifier of a data stream created by the process; generating a record comprising the identifier of the process and the identifier of the data stream; and storing the record in the first correspondence table. 10. The terminal device according to claim 8, wherein the at least one processor is further configured to obtain the first correspondence table by using the following operations: obtaining, by using a hook function, an event indicating that the operating system creates a new process; obtaining an identifier of the newly created process from the event indicating that the operating system created the new process; obtaining an identifier of a data stream created by the newly created process; generating a record comprising the identifier of the newly created process and the identifier of the data stream created by the newly created process; storing the record in the first correspondence table; obtaining, by using the hook function, an event indicating that the operating system exits a process; obtaining an identifier of the exited process from the event indicating the exit of the process; and deleting, from the first correspondence table, a record comprising the identifier of the exited process. 11. The terminal device according to claim 8, wherein a record in the first correspondence table further comprises a last activity time of a data stream; and the at least one processor is further configured to: determine an expired record in the first correspondence table, wherein the expired record is a record in which a time interval between a last activity time that is of a data stream and that is comprised in the expired record and a current time exceeds a predetermined time interval; and delete the expired record. 12. The terminal device according to claim 11, wherein the at least one processor is further configured to execute the program code stored in the memory to perform the following operations comprising: after obtaining the first correspondence table, obtain, by the terminal device using a hook function, a packet transmitted by the terminal device; obtain, from the obtained packet, an identifier of a data stream to which the packet belongs; and update a last activity time of a data stream in a record that is in the first correspondence table and that comprises the identifier of the data stream to which the packet belongs to the current time. 13. The terminal device according to claim 8, wherein the at least one processor is further configured to execute the program code stored in the memory to perform the following operations comprising: after obtaining the first correspondence table, obtain, by the terminal device by using a hook function, a packet transmitted by the terminal device; obtain, from the obtained packet, a packet status identifier and an identifier of a data stream to which the packet belongs; and in response to determining that the packet status identifier is FIN, delete, from the first correspondence table, a record comprising the identifier of the data stream to which the packet belongs. 14. A method for identifying application information in network traffic, wherein the method is executed by a data processing device, the method comprising: receiving a first identification record from a network security device, wherein the first identification record comprises an identifier of a first data stream and an identifier of an application, and wherein the identifier of the first data stream is a 5-tuple comprising a source address, a source port, a destination address, a destination port, and a protocol identifier; receiving a second identification record and a correspondence table from a terminal device, wherein the second identification record comprises an identifier of a second data stream and an identifier of a process, and wherein each record in the correspondence table stores an identifier of an application and an identifier of a process created by the application; in response to determining that the identifier of the first data stream comprised in the first identification record is the same as the identifier of the second data stream comprised in the second identification record, querying whether a first association record exists in the correspondence table, wherein the first association record stores the identifier of the application comprised in the first identification record and the identifier of the process comprised in the second identification record; and in response to determining that the first association record does not exist, determining that the first identification record is an incorrect identification record. 15. The identification method according to claim 14, wherein in response to determining that the first association record does not exist, the method further comprising: sending, to the terminal device, the identifier of the process comprised in the second identification record, wherein the terminal device is configured to set a packet collection flag for the identifier of the process, wherein the packet collection flag instructs the terminal device to obtain and store, after capturing by using an interface of an operating system a packet transmitted by the process, a complete data stream subsequently transmitted by the process. 16. The identification method according to claim 14, wherein the first identification record further comprises an identifier of an identification manner, wherein the identification manner comprises association identification manner, feature identification manner, and heuristic identification manner; and in response to determining that the identifier of the identification manner in the first identification record is an identifier of an association identification manner, when the first association record does not exist, the method further comprising: sending a notification message to the network security device, wherein the notification message instructs the network security device to delete a first association identification rule or a second association identification rule, wherein the first association identification rule comprises a 3-tuple comprising the destination address, the destination port, and the protocol identifier of the first data stream, and wherein the second association identification rule comprises a 3-tuple comprising the source address, the source port, and the protocol identifier of the first data stream. 17. The identification method according to claim 14, wherein in response to determining that the first association record does not exist, the method further comprising: querying whether a second association record exists in the correspondence table, wherein the second association record stores an identifier of a process comprised in the second identification record and an identifier of a corresponding application; in response to determining that the second association record exists, generating a third association identification rule and a fourth association identification rule, wherein the third association identification rule comprises the identifier of the application in the second association record and a 3-tuple comprising the destination address, the destination port, and the protocol identifier of the first data stream, and wherein the fourth association identification rule comprises the identifier of the application in the second association record and a 3-tuple comprising the source address, the source port, and the protocol identifier of the first data stream; and sending the third association identification rule and the fourth association identification rule to the network security device. 18. The identification method according to claim 14, further comprising: receiving a third identification record from the network security device, wherein the third identification record comprises an identifier of a third data stream and an unidentified flag, and wherein the unidentified flag indicates that the network security device has not identified an application sending the third data stream; receiving a fourth identification record from the terminal device, wherein the fourth identification record comprises an identifier of a fourth data stream and an identifier of a process; in response to determining that the identifier of the third data stream comprised in the third identification record is the same as the identifier of the fourth data stream comprised in the fourth identification record, querying whether a third association record exists in the correspondence table, wherein the third association record stores the identifier of the process comprised in the fourth identification record; and in response to determining that the third association record exists, generating a fifth association identification rule and a sixth association identification rule, wherein the fifth association identification rule comprises an identifier of an application comprised in the third association record and a 3-tuple comprising a destination address, a destination port, and a protocol identifier of the third data stream, and wherein the sixth association identification rule comprises the identifier of the application comprised in the third association record and a 3-tuple comprising a source address, a source port, and the protocol identifier of the third data stream; and sending the fifth association identification rule and the sixth association identification rule to the network security device. 19. The identification method according to claim 14, further comprising: receiving a third identification record from the network security device, wherein the third identification record comprises an identifier of a third data stream and an unidentified flag, and wherein the unidentified flag is used to indicate that the network security device has not identified an application sending the third data stream; receiving a fourth identification record from the terminal device, wherein the fourth identification record comprises an identifier of a fourth data stream and an identifier of a process; in response to determining that the identifier of the third data stream comprised in the third identification record is the same as the identifier of the fourth data stream comprised in the fourth identification record, querying whether a third association record exists in the correspondence table, wherein the third association record stores the identifier of the process comprised in the fourth identification record; and in response to determining that the third association record exists, sending an identifier of an application comprised in the third association record and the identifier of the third data stream to the network security device. 20. A data processing device, wherein the data processing device comprises a memory, a at least one processor, and a network interface, and the memory, the at least one processor, and the network interface communicate with each other by using a bus; wherein the memory stores program code; wherein the network interface is configured to: receive a first identification record from a network security device, wherein the first identification record comprises an identifier of a first data stream and an identifier of an application, and wherein the identifier of the first data stream is a 5-tuple comprising a source address, a source port, a destination address, a destination port, and a protocol identifier; and receive a second identification record and a correspondence table from a terminal device, wherein the second identification record comprises an identifier of a second data stream and an identifier of a process, and wherein each record in the correspondence table stores an identifier of an application and an identifier of a process created by the application; and wherein the at least one processor is configured to execute the program code stored in the memory to perform the following operations comprising: in response to determining that the identifier of the first data stream comprised in the first identification record is the same as the identifier of the second data stream comprised in the second identification record, querying whether a first association record exists in the correspondence table, wherein the first association record stores the identifier of the application comprised in the first identification record and an identifier of a process comprised in the second identification record; and in response to determining that the first association record does not exist, determining that the first identification record is an incorrect identification record. 21. The data processing device according to claim 20, wherein the network interface is further configured to: send, to the terminal device, the identifier of the process comprised in the second identification record, wherein the terminal device is configured to set a packet collection flag for the identifier of the process, wherein the packet collection flag instructs the terminal device to obtain and store, after capturing by using an interface of an operating system a packet transmitted by the process, a complete data stream subsequently transmitted by the process. 22. The data processing device according to claim 20, wherein the first identification record further comprises an identifier of an identification manner, wherein the identification manner comprises association identification manner, feature identification manner, and heuristic identification manner; and the network interface is further configured to: in response to determining that the identifier of the identification manner in the first identification record is an identifier of an association identification manner, when the first association record does not exist, send a notification message to the network security device, wherein the notification message instructs the network security device to delete a first association identification rule or a second association identification rule, wherein the first association identification rule comprises a 3-tuple comprising the destination address, the destination port, and the protocol identifier of the first data stream, and wherein the second association identification rule comprises a 3-tuple comprising the source address, the source port, and the protocol identifier of the first data stream. 23. The data processing device according to claim 20, wherein in response to determining that the first association record does not exist: the at least one processor is further configured to: query whether a second association record exists in the correspondence table, wherein the second association record stores an identifier of a process comprised in the second identification record, and an identifier of a corresponding application; in response to determining that the second association record exists, generate a third association identification rule and a fourth association identification rule, wherein the third association identification rule comprises the identifier of the application in the second association record and a 3-tuple comprising the destination address, the destination port, and the protocol identifier of the first data stream, and wherein the fourth association identification rule comprises the identifier of the application in the second association record and a 3-tuple comprising the source address, the source port, and the protocol identifier of the first data stream; and the network interface is further configured to: send the third association identification rule and the fourth association identification rule to the network security device. 24. The data processing device according to claim 20, wherein the network interface is further configured to: receive a third identification record from the network security device, wherein the third identification record comprises an identifier of a third data stream and an unidentified flag, and wherein the unidentified flag indicates that the network security device has not identified an application sending the third data stream; and receive a fourth identification record from the terminal device, wherein the fourth identification record comprises an identifier of a fourth data stream and an identifier of a process; the processor is further configured to: determine whether the identifier of the third data stream comprised in the third identification record is the same as the identifier of the fourth data stream comprised in the fourth identification record; and in response to determining that the identifier of the third data stream included in the third identification record is the same as the identifier of the fourth data stream included in the fourth identification record, query whether a third association record exists in the correspondence table, wherein the third association record stores the identifier of the process comprised in the fourth identification record; and in response to determining that the third association record exists, generate a fifth association identification rule and a sixth association identification rule, wherein the fifth association identification rule comprises an identifier of an application comprised in the third association record and a 3-tuple comprising a destination address, a destination port, and a protocol identifier of the third data stream, and wherein the sixth association identification rule comprises the identifier of the application comprised in the third association record and a 3-tuple comprising a source address, a source port, and the protocol identifier of the third data stream; and the network interface is further configured to send the fifth association identification rule and the sixth association identification rule to the network security device. 25. The data processing device according to claim 20, wherein the network interface is further configured to: receive a third identification record from the network security device, wherein the third identification record comprises an identifier of a third data stream and an unidentified flag, and wherein the unidentified flag is used to indicate that the network security device has not identified an application sending the third data stream; and receive a fourth identification record from the terminal device, wherein the fourth identification record comprises an identifier of a fourth data stream and an identifier of a process; the processor is further configured to: determine whether the identifier of the third data stream comprised in the third identification record is the same as the identifier of the fourth data stream comprised in the fourth identification record; and in response to determining that the identifier of the third data stream comprised in the third identification record is the same as the identifier of the fourth data stream comprised in the fourth identification record, query whether a third association record exists in the correspondence table, wherein the third association record stores the identifier of the process comprised in the fourth identification record; and the network interface is further configured to: in response to determining that the third association record exists, send an identifier of an application comprised in the third association record and the identifier of the third data stream to the network security device.
A first correspondence table in a terminal device stores a correspondence between an identifier of a process running on the terminal device and an identifier of a data stream created by the process, a second correspondence table stores a second correspondence between an identifier of an application and an identifier of a process created by the application. The terminal device receives an identifier, sent by a network security device, of a first data stream. The terminal device can find, in the first correspondence table, a first record storing the identifier of the first data stream to obtain an identifier of a process. The terminal device can find in the second correspondence table, a second record storing the identifier of the process in the first record to obtain an identifier of an application from the second record. The identifier of the application is then sent to the network security device.1. A method for identifying application information in network traffic, wherein the method is executed by a terminal device, wherein a first correspondence table in the terminal device stores, in a record form, a correspondence between an identifier of a process running on the terminal device and an identifier of a data stream created by the process, wherein a second correspondence table in the terminal device stores, in a record form, a correspondence between an identifier of an application and an identifier of a process created by the application, and wherein the identifier of the data stream is a 5-tuple comprising a source address, a source port, a destination address, a destination port, and a protocol identifier, the method comprising: receiving an identifier of a first data stream from a network security device; obtaining an identifier of a process associated with the first data stream, wherein obtaining the identifier of the process comprises identifying in the first correspondence table, a process identifier included in a first record in which the received identifier of the first data stream is stored; obtaining an identifier of an application associated with the obtained identifier of the process included in the first record, wherein obtaining the identifier of the application comprises identifying, in the second correspondence table, an application identifier included in a second record in which the obtained identifier of the process in the first record is stored; and sending the obtained identifier of the application to the network security device. 2. The method according to claim 1, wherein the terminal device obtains the first correspondence table by performing operations comprising: obtaining, by the terminal device using an interface provided by an operating system, an identifier of at least one process running on the terminal device; and for each obtained identifier of a process: obtaining, by the terminal device, an identifier of a data stream created by the process; generating a record comprising the identifier of the process and the identifier of the data stream; and storing the record in the first correspondence table. 3. The method according to claim 1, wherein the terminal device obtains the first correspondence table by performing operations comprising: obtaining, by the terminal device using a hook function, an event indicating that the operating system creates a new process; obtaining an identifier of the newly created process from the event indicating that the operating system created a new process; obtaining an identifier of a data stream created by the newly created process; generating a record comprising the identifier of the newly created process and the identifier of the data stream created by the newly created process; and storing the record in the first correspondence table; wherein the terminal device obtains the first correspondence table by performing operations comprising: obtaining, by the terminal device by using the hook function, an event identifying that the operating system exits a process; and obtaining an identifier of the exited process from the event of exiting a process; and deleting, from the first correspondence table, a record comprising the identifier of the exited process. 4. The method according to claim 1, wherein a record in the first correspondence table further comprises a last activity time of a data stream, and wherein the method further comprises: determining, by the terminal device, an expired record in the first correspondence table, wherein the expired record is a record in which a time interval between a last activity time that is of a data stream and that is comprised in the expired record and a current time exceeds a predetermined time interval; and deleting the expired record. 5. The method according to claim 4, wherein after the terminal device obtains the first correspondence table, the method further comprises: obtaining, by the terminal device by using a hook function, a packet transmitted by the terminal device; obtaining, from the obtained packet, an identifier of a data stream to which the packet belongs; and updating a last activity time of a data stream in a record that is in the first correspondence table and that comprises the identifier of the data stream to which the packet belongs to the current time. 6. The method according to claim 1, wherein after the terminal device obtains the first correspondence table, the method further comprises: obtaining, by the terminal device by using a hook function, a packet transmitted by the terminal device; obtaining, from the obtained packet, a packet status identifier and an identifier of a data stream to which the packet belongs; and in response to determining that the packet status identifier is FIN, deleting, from the first correspondence table, a record comprising the identifier of the data stream to which the packet belongs. 7. The method according to claim 1, wherein after the obtaining an identifier of a process in the first record, the method further comprises: setting a packet collection flag for the identifier of the process, wherein the packet collection flag instructs the terminal device to obtain and store, after capturing a packet transmitted by the process by using an interface of the operating system, a complete data stream subsequently transmitted by the process. 8. A terminal device, wherein the terminal device comprises a memory, at least one processor, and a network interface, and the memory, the at least one processor, and the network interface communicate with each other by using a bus; wherein the memory is configured to store program code, a first correspondence table, and a second correspondence table, wherein the first correspondence table stores, in a record form, a correspondence between an identifier of a process running on the terminal device and an identifier of a data stream created by the process, the second correspondence table stores, in a record form, a correspondence between an identifier of an application and an identifier of a process created by the application, and the identifier of the data stream is a 5-tuple comprising a source address, a source port, a destination address, a destination port, and a protocol identifier; wherein the network interface is configured to receive an identifier of a first data stream send by a network security device; wherein the at least one processor is configured to execute the program code stored in the memory, to perform operations comprising: obtaining an identifier of a process associated with first data stream, wherein obtaining the identifier of the process comprises identifying, in the first correspondence table, a process identifier included in a first record in which the received identifier of the first data stream is stored; and obtaining an identifier of an application associated with the obtained identifier of the process included in the first record, wherein obtaining the identifier of the application comprises identifying, in the second correspondence table, an application identifier included in a second record in which the obtained identifier of the process in the first record is stored; and wherein the network interface is further configured to send the identifier of the application obtained by the processor to the network security device. 9. The terminal device according to claim 8, wherein the at least one processor is further configured to obtain the first correspondence table by using the following operations: obtaining, using an interface provided by an operating system, an identifier of at least one process running on the terminal device; and for each obtained identifier of a process: obtaining, by the terminal device, an identifier of a data stream created by the process; generating a record comprising the identifier of the process and the identifier of the data stream; and storing the record in the first correspondence table. 10. The terminal device according to claim 8, wherein the at least one processor is further configured to obtain the first correspondence table by using the following operations: obtaining, by using a hook function, an event indicating that the operating system creates a new process; obtaining an identifier of the newly created process from the event indicating that the operating system created the new process; obtaining an identifier of a data stream created by the newly created process; generating a record comprising the identifier of the newly created process and the identifier of the data stream created by the newly created process; storing the record in the first correspondence table; obtaining, by using the hook function, an event indicating that the operating system exits a process; obtaining an identifier of the exited process from the event indicating the exit of the process; and deleting, from the first correspondence table, a record comprising the identifier of the exited process. 11. The terminal device according to claim 8, wherein a record in the first correspondence table further comprises a last activity time of a data stream; and the at least one processor is further configured to: determine an expired record in the first correspondence table, wherein the expired record is a record in which a time interval between a last activity time that is of a data stream and that is comprised in the expired record and a current time exceeds a predetermined time interval; and delete the expired record. 12. The terminal device according to claim 11, wherein the at least one processor is further configured to execute the program code stored in the memory to perform the following operations comprising: after obtaining the first correspondence table, obtain, by the terminal device using a hook function, a packet transmitted by the terminal device; obtain, from the obtained packet, an identifier of a data stream to which the packet belongs; and update a last activity time of a data stream in a record that is in the first correspondence table and that comprises the identifier of the data stream to which the packet belongs to the current time. 13. The terminal device according to claim 8, wherein the at least one processor is further configured to execute the program code stored in the memory to perform the following operations comprising: after obtaining the first correspondence table, obtain, by the terminal device by using a hook function, a packet transmitted by the terminal device; obtain, from the obtained packet, a packet status identifier and an identifier of a data stream to which the packet belongs; and in response to determining that the packet status identifier is FIN, delete, from the first correspondence table, a record comprising the identifier of the data stream to which the packet belongs. 14. A method for identifying application information in network traffic, wherein the method is executed by a data processing device, the method comprising: receiving a first identification record from a network security device, wherein the first identification record comprises an identifier of a first data stream and an identifier of an application, and wherein the identifier of the first data stream is a 5-tuple comprising a source address, a source port, a destination address, a destination port, and a protocol identifier; receiving a second identification record and a correspondence table from a terminal device, wherein the second identification record comprises an identifier of a second data stream and an identifier of a process, and wherein each record in the correspondence table stores an identifier of an application and an identifier of a process created by the application; in response to determining that the identifier of the first data stream comprised in the first identification record is the same as the identifier of the second data stream comprised in the second identification record, querying whether a first association record exists in the correspondence table, wherein the first association record stores the identifier of the application comprised in the first identification record and the identifier of the process comprised in the second identification record; and in response to determining that the first association record does not exist, determining that the first identification record is an incorrect identification record. 15. The identification method according to claim 14, wherein in response to determining that the first association record does not exist, the method further comprising: sending, to the terminal device, the identifier of the process comprised in the second identification record, wherein the terminal device is configured to set a packet collection flag for the identifier of the process, wherein the packet collection flag instructs the terminal device to obtain and store, after capturing by using an interface of an operating system a packet transmitted by the process, a complete data stream subsequently transmitted by the process. 16. The identification method according to claim 14, wherein the first identification record further comprises an identifier of an identification manner, wherein the identification manner comprises association identification manner, feature identification manner, and heuristic identification manner; and in response to determining that the identifier of the identification manner in the first identification record is an identifier of an association identification manner, when the first association record does not exist, the method further comprising: sending a notification message to the network security device, wherein the notification message instructs the network security device to delete a first association identification rule or a second association identification rule, wherein the first association identification rule comprises a 3-tuple comprising the destination address, the destination port, and the protocol identifier of the first data stream, and wherein the second association identification rule comprises a 3-tuple comprising the source address, the source port, and the protocol identifier of the first data stream. 17. The identification method according to claim 14, wherein in response to determining that the first association record does not exist, the method further comprising: querying whether a second association record exists in the correspondence table, wherein the second association record stores an identifier of a process comprised in the second identification record and an identifier of a corresponding application; in response to determining that the second association record exists, generating a third association identification rule and a fourth association identification rule, wherein the third association identification rule comprises the identifier of the application in the second association record and a 3-tuple comprising the destination address, the destination port, and the protocol identifier of the first data stream, and wherein the fourth association identification rule comprises the identifier of the application in the second association record and a 3-tuple comprising the source address, the source port, and the protocol identifier of the first data stream; and sending the third association identification rule and the fourth association identification rule to the network security device. 18. The identification method according to claim 14, further comprising: receiving a third identification record from the network security device, wherein the third identification record comprises an identifier of a third data stream and an unidentified flag, and wherein the unidentified flag indicates that the network security device has not identified an application sending the third data stream; receiving a fourth identification record from the terminal device, wherein the fourth identification record comprises an identifier of a fourth data stream and an identifier of a process; in response to determining that the identifier of the third data stream comprised in the third identification record is the same as the identifier of the fourth data stream comprised in the fourth identification record, querying whether a third association record exists in the correspondence table, wherein the third association record stores the identifier of the process comprised in the fourth identification record; and in response to determining that the third association record exists, generating a fifth association identification rule and a sixth association identification rule, wherein the fifth association identification rule comprises an identifier of an application comprised in the third association record and a 3-tuple comprising a destination address, a destination port, and a protocol identifier of the third data stream, and wherein the sixth association identification rule comprises the identifier of the application comprised in the third association record and a 3-tuple comprising a source address, a source port, and the protocol identifier of the third data stream; and sending the fifth association identification rule and the sixth association identification rule to the network security device. 19. The identification method according to claim 14, further comprising: receiving a third identification record from the network security device, wherein the third identification record comprises an identifier of a third data stream and an unidentified flag, and wherein the unidentified flag is used to indicate that the network security device has not identified an application sending the third data stream; receiving a fourth identification record from the terminal device, wherein the fourth identification record comprises an identifier of a fourth data stream and an identifier of a process; in response to determining that the identifier of the third data stream comprised in the third identification record is the same as the identifier of the fourth data stream comprised in the fourth identification record, querying whether a third association record exists in the correspondence table, wherein the third association record stores the identifier of the process comprised in the fourth identification record; and in response to determining that the third association record exists, sending an identifier of an application comprised in the third association record and the identifier of the third data stream to the network security device. 20. A data processing device, wherein the data processing device comprises a memory, a at least one processor, and a network interface, and the memory, the at least one processor, and the network interface communicate with each other by using a bus; wherein the memory stores program code; wherein the network interface is configured to: receive a first identification record from a network security device, wherein the first identification record comprises an identifier of a first data stream and an identifier of an application, and wherein the identifier of the first data stream is a 5-tuple comprising a source address, a source port, a destination address, a destination port, and a protocol identifier; and receive a second identification record and a correspondence table from a terminal device, wherein the second identification record comprises an identifier of a second data stream and an identifier of a process, and wherein each record in the correspondence table stores an identifier of an application and an identifier of a process created by the application; and wherein the at least one processor is configured to execute the program code stored in the memory to perform the following operations comprising: in response to determining that the identifier of the first data stream comprised in the first identification record is the same as the identifier of the second data stream comprised in the second identification record, querying whether a first association record exists in the correspondence table, wherein the first association record stores the identifier of the application comprised in the first identification record and an identifier of a process comprised in the second identification record; and in response to determining that the first association record does not exist, determining that the first identification record is an incorrect identification record. 21. The data processing device according to claim 20, wherein the network interface is further configured to: send, to the terminal device, the identifier of the process comprised in the second identification record, wherein the terminal device is configured to set a packet collection flag for the identifier of the process, wherein the packet collection flag instructs the terminal device to obtain and store, after capturing by using an interface of an operating system a packet transmitted by the process, a complete data stream subsequently transmitted by the process. 22. The data processing device according to claim 20, wherein the first identification record further comprises an identifier of an identification manner, wherein the identification manner comprises association identification manner, feature identification manner, and heuristic identification manner; and the network interface is further configured to: in response to determining that the identifier of the identification manner in the first identification record is an identifier of an association identification manner, when the first association record does not exist, send a notification message to the network security device, wherein the notification message instructs the network security device to delete a first association identification rule or a second association identification rule, wherein the first association identification rule comprises a 3-tuple comprising the destination address, the destination port, and the protocol identifier of the first data stream, and wherein the second association identification rule comprises a 3-tuple comprising the source address, the source port, and the protocol identifier of the first data stream. 23. The data processing device according to claim 20, wherein in response to determining that the first association record does not exist: the at least one processor is further configured to: query whether a second association record exists in the correspondence table, wherein the second association record stores an identifier of a process comprised in the second identification record, and an identifier of a corresponding application; in response to determining that the second association record exists, generate a third association identification rule and a fourth association identification rule, wherein the third association identification rule comprises the identifier of the application in the second association record and a 3-tuple comprising the destination address, the destination port, and the protocol identifier of the first data stream, and wherein the fourth association identification rule comprises the identifier of the application in the second association record and a 3-tuple comprising the source address, the source port, and the protocol identifier of the first data stream; and the network interface is further configured to: send the third association identification rule and the fourth association identification rule to the network security device. 24. The data processing device according to claim 20, wherein the network interface is further configured to: receive a third identification record from the network security device, wherein the third identification record comprises an identifier of a third data stream and an unidentified flag, and wherein the unidentified flag indicates that the network security device has not identified an application sending the third data stream; and receive a fourth identification record from the terminal device, wherein the fourth identification record comprises an identifier of a fourth data stream and an identifier of a process; the processor is further configured to: determine whether the identifier of the third data stream comprised in the third identification record is the same as the identifier of the fourth data stream comprised in the fourth identification record; and in response to determining that the identifier of the third data stream included in the third identification record is the same as the identifier of the fourth data stream included in the fourth identification record, query whether a third association record exists in the correspondence table, wherein the third association record stores the identifier of the process comprised in the fourth identification record; and in response to determining that the third association record exists, generate a fifth association identification rule and a sixth association identification rule, wherein the fifth association identification rule comprises an identifier of an application comprised in the third association record and a 3-tuple comprising a destination address, a destination port, and a protocol identifier of the third data stream, and wherein the sixth association identification rule comprises the identifier of the application comprised in the third association record and a 3-tuple comprising a source address, a source port, and the protocol identifier of the third data stream; and the network interface is further configured to send the fifth association identification rule and the sixth association identification rule to the network security device. 25. The data processing device according to claim 20, wherein the network interface is further configured to: receive a third identification record from the network security device, wherein the third identification record comprises an identifier of a third data stream and an unidentified flag, and wherein the unidentified flag is used to indicate that the network security device has not identified an application sending the third data stream; and receive a fourth identification record from the terminal device, wherein the fourth identification record comprises an identifier of a fourth data stream and an identifier of a process; the processor is further configured to: determine whether the identifier of the third data stream comprised in the third identification record is the same as the identifier of the fourth data stream comprised in the fourth identification record; and in response to determining that the identifier of the third data stream comprised in the third identification record is the same as the identifier of the fourth data stream comprised in the fourth identification record, query whether a third association record exists in the correspondence table, wherein the third association record stores the identifier of the process comprised in the fourth identification record; and the network interface is further configured to: in response to determining that the third association record exists, send an identifier of an application comprised in the third association record and the identifier of the third data stream to the network security device.
2,400
9,391
9,391
16,707,333
2,422
The disclosure provides for a scanning apparatus. The scanning apparatus may be configured to capture identifying information of a user and may comprise one or more infrared emitters, at least one image sensor configured to capture image data in a field of view, and a controller in communication with the scanning apparatus. The controller may be configured to activate the one or more infrared emitters, control the at least one image sensor to capture a first image in the field of view, deactivate the one or more infrared emitters, and control the at least one image sensor to capture a second image in the field of view.
1. A scanning apparatus configured to capture identifying information of a user comprising: one or more infrared emitters; at least one image sensor configured to capture image data in a field of view; and a controller in communication with the scanning apparatus, wherein the controller is configured to: activate the one or more infrared emitters; control the at least one image sensor to capture a first image in the field of view; deactivate the one or more infrared emitters; control the at least one image sensor to capture a second image in the field of view; compare the first and second images; determine a set of pixels having a change from the first image to the second image; and process the set of pixels for identification of the user. 2. The scanning apparatus according to claim 1, wherein the change comprises a reflection from the one or more infrared emitters. 3. The scanning apparatus according to claim 1, wherein the controller is configured to subtract the set of pixels having the change to determine a location of the user. 4. The scanning apparatus according to claim 1, wherein processing the set of pixels having the change for identification of the user comprises an eye-scan-identification function. 5. The scanning apparatus according to claim 1, wherein the first image and the second image are captured over a predetermined temporal period. 6. The scanning apparatus according to claim 1, wherein the first image and the second image are consecutive images. 7. The scanning apparatus according to claim 1, wherein the scanning apparatus is incorporated in a vehicle. 8. The scanning apparatus according to claim 1, wherein comparing the first and second images includes the controller comparing a first set of pixels with a state of illumination and a second set of pixels with the state of illumination to determine a correlation of illumination. 9. The scanning apparatus according to claim 1, wherein comparing the first and second images includes the controller comparing a first set of pixels with a first state of illumination in the first image and a second set of pixels with a second state of illumination, having a lower intensity than the first state of illumination, in the second image to determine a correlation of illumination. 10. A scanning apparatus configured to capture identifying information of a user comprising: one or more infrared emitters; at least one image sensor configured to capture image data in a field of view; and a controller in communication with the scanning apparatus, wherein the controller is configured to: modulate the one or more infrared emitters to activate and deactivate; control the at least one image sensor to capture a series of images in the field of view; compare the series of images in coordination with the modulation of the one or more infrared emitters; determine a set of pixels having a correlation with the modulation; and process the set of pixels for identification of the user. 11. The scanning apparatus according to claim 10, wherein the correlation comprises a relationship of a reflection from the one or more infrared emitters with a state of illumination over the series of images. 12. The scanning apparatus according to claim 11, wherein processing the set of pixels for identification of the user includes subtracting the set of pixels having the reflection to determine a location of the user. 13. The scanning apparatus according to claim 12, wherein processing the set of pixels for identification of the user further comprises executing an eye-scan-identification function on the determined location of the user. 14. A scanning apparatus configured to capture identifying information of a user comprising: one or more infrared emitters; at least one image sensor configured to capture image data in a field of view; and a controller in communication with the scanning apparatus, wherein the controller is configured to: modulate the one or more infrared emitters to vary an intensity of illumination; control the at least one image sensor to capture a series of images in the field of view; compare the series of images in coordination with the modulation of the one or more infrared emitters; determine a set of pixels having a correlation with the modulation; and process the set of pixels for identification of the user. 15. The scanning apparatus according to claim 14, wherein varying the intensity of illumination of the one or more infrared emitters occurs over a period of time and determining a set of pixels having a correlation with the modulation includes having a correlation with a known state of illumination. 16. The scanning apparatus according to claim 15, wherein determining a set of pixels having a correlation with a known state of illumination includes determining a correlation greater than a predetermined threshold correlation. 17. The scanning apparatus according to claim 14, wherein varying the intensity of the illumination includes sinusoidally varying the intensity of illumination with a period of 4.5× that of a frame rate of the image sensor. 18. The scanning apparatus according to claim 14, wherein the scanning apparatus is incorporated in a vehicle. 19. The scanning apparatus according to claim 14, wherein the image sensor includes a graphic resolution of less than 10 megapixels. 20. The scanning apparatus according to claim 14, wherein the image sensor is disposed proximate a rear surface of an electro-optic device.
The disclosure provides for a scanning apparatus. The scanning apparatus may be configured to capture identifying information of a user and may comprise one or more infrared emitters, at least one image sensor configured to capture image data in a field of view, and a controller in communication with the scanning apparatus. The controller may be configured to activate the one or more infrared emitters, control the at least one image sensor to capture a first image in the field of view, deactivate the one or more infrared emitters, and control the at least one image sensor to capture a second image in the field of view.1. A scanning apparatus configured to capture identifying information of a user comprising: one or more infrared emitters; at least one image sensor configured to capture image data in a field of view; and a controller in communication with the scanning apparatus, wherein the controller is configured to: activate the one or more infrared emitters; control the at least one image sensor to capture a first image in the field of view; deactivate the one or more infrared emitters; control the at least one image sensor to capture a second image in the field of view; compare the first and second images; determine a set of pixels having a change from the first image to the second image; and process the set of pixels for identification of the user. 2. The scanning apparatus according to claim 1, wherein the change comprises a reflection from the one or more infrared emitters. 3. The scanning apparatus according to claim 1, wherein the controller is configured to subtract the set of pixels having the change to determine a location of the user. 4. The scanning apparatus according to claim 1, wherein processing the set of pixels having the change for identification of the user comprises an eye-scan-identification function. 5. The scanning apparatus according to claim 1, wherein the first image and the second image are captured over a predetermined temporal period. 6. The scanning apparatus according to claim 1, wherein the first image and the second image are consecutive images. 7. The scanning apparatus according to claim 1, wherein the scanning apparatus is incorporated in a vehicle. 8. The scanning apparatus according to claim 1, wherein comparing the first and second images includes the controller comparing a first set of pixels with a state of illumination and a second set of pixels with the state of illumination to determine a correlation of illumination. 9. The scanning apparatus according to claim 1, wherein comparing the first and second images includes the controller comparing a first set of pixels with a first state of illumination in the first image and a second set of pixels with a second state of illumination, having a lower intensity than the first state of illumination, in the second image to determine a correlation of illumination. 10. A scanning apparatus configured to capture identifying information of a user comprising: one or more infrared emitters; at least one image sensor configured to capture image data in a field of view; and a controller in communication with the scanning apparatus, wherein the controller is configured to: modulate the one or more infrared emitters to activate and deactivate; control the at least one image sensor to capture a series of images in the field of view; compare the series of images in coordination with the modulation of the one or more infrared emitters; determine a set of pixels having a correlation with the modulation; and process the set of pixels for identification of the user. 11. The scanning apparatus according to claim 10, wherein the correlation comprises a relationship of a reflection from the one or more infrared emitters with a state of illumination over the series of images. 12. The scanning apparatus according to claim 11, wherein processing the set of pixels for identification of the user includes subtracting the set of pixels having the reflection to determine a location of the user. 13. The scanning apparatus according to claim 12, wherein processing the set of pixels for identification of the user further comprises executing an eye-scan-identification function on the determined location of the user. 14. A scanning apparatus configured to capture identifying information of a user comprising: one or more infrared emitters; at least one image sensor configured to capture image data in a field of view; and a controller in communication with the scanning apparatus, wherein the controller is configured to: modulate the one or more infrared emitters to vary an intensity of illumination; control the at least one image sensor to capture a series of images in the field of view; compare the series of images in coordination with the modulation of the one or more infrared emitters; determine a set of pixels having a correlation with the modulation; and process the set of pixels for identification of the user. 15. The scanning apparatus according to claim 14, wherein varying the intensity of illumination of the one or more infrared emitters occurs over a period of time and determining a set of pixels having a correlation with the modulation includes having a correlation with a known state of illumination. 16. The scanning apparatus according to claim 15, wherein determining a set of pixels having a correlation with a known state of illumination includes determining a correlation greater than a predetermined threshold correlation. 17. The scanning apparatus according to claim 14, wherein varying the intensity of the illumination includes sinusoidally varying the intensity of illumination with a period of 4.5× that of a frame rate of the image sensor. 18. The scanning apparatus according to claim 14, wherein the scanning apparatus is incorporated in a vehicle. 19. The scanning apparatus according to claim 14, wherein the image sensor includes a graphic resolution of less than 10 megapixels. 20. The scanning apparatus according to claim 14, wherein the image sensor is disposed proximate a rear surface of an electro-optic device.
2,400
9,392
9,392
14,766,229
2,411
It is provided a method for managing backhaul resources, comprising accessing a radio network via a first radio technology 401 and providing first backhaul resources 404 allocated to the first radio technology 401. Moreover the method may comprise accessing the radio network via a second radio technology 402 and providing second backhaul resources 405 allocated to the second radio technology 402, wherein the second radio technology is based on Wi-Fi technology. Moreover, the method may comprise sharing the first backhaul resources 404 and the second backhaul resources 405 as common backhaul resources 408, detecting a criteria for triggering a backhaul resource management; and managing the common backhaul resources 408 by adapting the allocation for at least one of the first radio technology or the second radio technology.
1.-15. (canceled) 16. Method for managing backhaul resources, comprising accessing a radio network via a first radio technology and providing first backhaul resources allocated to the first radio technology; accessing the radio network via a second radio technology and providing second backhaul resources allocated to the second radio technology, wherein the second radio technology is based on Wi-Fi technology; sharing the first backhaul resources and the second backhaul resources as common backhaul resources; detecting a criteria for triggering a backhaul resource management; and managing the common backhaul resources by adapting the allocation for at least one of the first radio technology or the second radio technology. 17. Method according to claim 16, further comprising managing the common backhaul resources by adjusting bandwidth within the common backhaul resources. 18. Method according to claim 16, wherein the method further comprises managing the common backhaul resources by allocating at least one service requested by the first radio technology or by the second radio technology to another radio technology, which radio technology was not accessed initially for that service. 19. Method according to claim 16, wherein the first radio technology is provided by a first wireless base station and the second radio technology is provided by a second wireless base station, wherein the first wireless base station and the second wireless base station are part of a small cells base station. 20. Method according to claim 16, wherein the criteria for triggering a backhaul resource management is at least one criteria selected of the group consisting of a radio technology used as first radio technology, a radio technology used as a second radio technology, a congestion situation, bandwidth required for a radio technology, importance of users using a radio technology, priority of users using a radio technology, Quality of Service associated to users using a radio technology, Quality of Service associated to applications using a radio technology, data indicating quality of a user experience, data indicating network performance, applications used in a radio technology, services used in a radio technology, network element operability status, kind of user category and performance situation of a radio technology. 21. Method according to claim 16, further wherein managing the common backhaul resources is based at least on a radio usage of a base station, on a kind of base station technology, on an importance of a user, on a priority of users accessing a base station, on quality of service for a user, on quality of service of an application using a base station; on a network performance related to users accessing a base station, on an identity associated to a user, on an identity associated to a service on the backhaul, on a virtual LAN identity, on an SSID activation, an SSID deactivation or on a network element operability status. 22. Network element for managing backhaul resources, comprising: a processor configured to: observe accessing a radio network via a first radio technology and observe first backhaul resources allocated to the first radio technology; observe accessing the radio network via a second radio technology and observe second backhaul resources allocated to the second radio technology, wherein the second radio technology is based on Wi-Fi technology; observe a sharing of the first backhaul resources and the second backhaul resources as common backhaul resources; detect a criteria for triggering a backhaul resource management; and manage the common backhaul resources by adapting the allocation for at least one of the first radio technology or the second radio technology. 23. Network element according to claim 22, wherein the network element is installed in the communication network between the first and second backhaul resources and the common backhaul resources. 24. Network element according to claim 22, wherein the network element is a network controller, a network node, an eNB, a server, an RNC, a Wi-Fi access point, a Broadband Remote Access Server, a Border Network Gateway, a Security gateway, a Backhaul Resource Manager or a separate Hetnet Resource Manager entity. 25. Network element according to claim 22, wherein the first radio technology is provided by a first wireless base station and the second radio technology is provided by a second wireless base station, wherein the first wireless base station and the second wireless base station are part of a small cells base station. 26. Network element according to claim 22, wherein the network element is adapted to initiate a managing of the common backhaul resources. 27. Network element according to claim 22, wherein the processor is further configured to manage the common backhaul resources by adjusting bandwidth within the common backhaul resources. 28. Network element according to claim 22, wherein the processor is further configured to manage the common backhaul resources by allocating at least one service requested by the first radio technology or by the second radio technology to another radio technology, which radio technology was not accessed initially for that service. 29. Network element according to claim 22, wherein the first radio technology is provided by a first wireless base station and the second radio technology is provided by a second wireless base station, and wherein the first wireless base station and the second wireless base station are part of a small cells base station. 30. Network element according to claim 22, wherein the criteria for triggering a backhaul resource management is at least one criteria selected of the group including a radio technology used as first radio technology, a radio technology used as a second radio technology, a congestion situation, bandwidth required for a radio technology, importance of users using a radio technology, priority of users using a radio technology, Quality of Service associated to users using a radio technology, Quality of Service associated to applications using a radio technology, data indicating quality of a user experience, data indicating network performance, applications used in a radio technology, services used in a radio technology, network element operability status, kind of user category and performance situation of a radio technology. 31. Network element according to claim 22, wherein managing the common backhaul resources is based on at least one of: a radio usage of a base station, a kind of base station technology, an importance of a user, a priority of users accessing a base station, quality of service for a user, quality of service of an application using a base station; a network performance related to users accessing a base station, an identity associated to a user, an identity associated to a service on the backhaul, a virtual LAN identity, an SSID activation, an SSID deactivation, and a network element operability status. 32. Computer program product embodied on a non-transitory computer-readable medium, said product comprising code portions for causing a network element, on which the computer program is executed, to carry out the method according to claim 16.
It is provided a method for managing backhaul resources, comprising accessing a radio network via a first radio technology 401 and providing first backhaul resources 404 allocated to the first radio technology 401. Moreover the method may comprise accessing the radio network via a second radio technology 402 and providing second backhaul resources 405 allocated to the second radio technology 402, wherein the second radio technology is based on Wi-Fi technology. Moreover, the method may comprise sharing the first backhaul resources 404 and the second backhaul resources 405 as common backhaul resources 408, detecting a criteria for triggering a backhaul resource management; and managing the common backhaul resources 408 by adapting the allocation for at least one of the first radio technology or the second radio technology.1.-15. (canceled) 16. Method for managing backhaul resources, comprising accessing a radio network via a first radio technology and providing first backhaul resources allocated to the first radio technology; accessing the radio network via a second radio technology and providing second backhaul resources allocated to the second radio technology, wherein the second radio technology is based on Wi-Fi technology; sharing the first backhaul resources and the second backhaul resources as common backhaul resources; detecting a criteria for triggering a backhaul resource management; and managing the common backhaul resources by adapting the allocation for at least one of the first radio technology or the second radio technology. 17. Method according to claim 16, further comprising managing the common backhaul resources by adjusting bandwidth within the common backhaul resources. 18. Method according to claim 16, wherein the method further comprises managing the common backhaul resources by allocating at least one service requested by the first radio technology or by the second radio technology to another radio technology, which radio technology was not accessed initially for that service. 19. Method according to claim 16, wherein the first radio technology is provided by a first wireless base station and the second radio technology is provided by a second wireless base station, wherein the first wireless base station and the second wireless base station are part of a small cells base station. 20. Method according to claim 16, wherein the criteria for triggering a backhaul resource management is at least one criteria selected of the group consisting of a radio technology used as first radio technology, a radio technology used as a second radio technology, a congestion situation, bandwidth required for a radio technology, importance of users using a radio technology, priority of users using a radio technology, Quality of Service associated to users using a radio technology, Quality of Service associated to applications using a radio technology, data indicating quality of a user experience, data indicating network performance, applications used in a radio technology, services used in a radio technology, network element operability status, kind of user category and performance situation of a radio technology. 21. Method according to claim 16, further wherein managing the common backhaul resources is based at least on a radio usage of a base station, on a kind of base station technology, on an importance of a user, on a priority of users accessing a base station, on quality of service for a user, on quality of service of an application using a base station; on a network performance related to users accessing a base station, on an identity associated to a user, on an identity associated to a service on the backhaul, on a virtual LAN identity, on an SSID activation, an SSID deactivation or on a network element operability status. 22. Network element for managing backhaul resources, comprising: a processor configured to: observe accessing a radio network via a first radio technology and observe first backhaul resources allocated to the first radio technology; observe accessing the radio network via a second radio technology and observe second backhaul resources allocated to the second radio technology, wherein the second radio technology is based on Wi-Fi technology; observe a sharing of the first backhaul resources and the second backhaul resources as common backhaul resources; detect a criteria for triggering a backhaul resource management; and manage the common backhaul resources by adapting the allocation for at least one of the first radio technology or the second radio technology. 23. Network element according to claim 22, wherein the network element is installed in the communication network between the first and second backhaul resources and the common backhaul resources. 24. Network element according to claim 22, wherein the network element is a network controller, a network node, an eNB, a server, an RNC, a Wi-Fi access point, a Broadband Remote Access Server, a Border Network Gateway, a Security gateway, a Backhaul Resource Manager or a separate Hetnet Resource Manager entity. 25. Network element according to claim 22, wherein the first radio technology is provided by a first wireless base station and the second radio technology is provided by a second wireless base station, wherein the first wireless base station and the second wireless base station are part of a small cells base station. 26. Network element according to claim 22, wherein the network element is adapted to initiate a managing of the common backhaul resources. 27. Network element according to claim 22, wherein the processor is further configured to manage the common backhaul resources by adjusting bandwidth within the common backhaul resources. 28. Network element according to claim 22, wherein the processor is further configured to manage the common backhaul resources by allocating at least one service requested by the first radio technology or by the second radio technology to another radio technology, which radio technology was not accessed initially for that service. 29. Network element according to claim 22, wherein the first radio technology is provided by a first wireless base station and the second radio technology is provided by a second wireless base station, and wherein the first wireless base station and the second wireless base station are part of a small cells base station. 30. Network element according to claim 22, wherein the criteria for triggering a backhaul resource management is at least one criteria selected of the group including a radio technology used as first radio technology, a radio technology used as a second radio technology, a congestion situation, bandwidth required for a radio technology, importance of users using a radio technology, priority of users using a radio technology, Quality of Service associated to users using a radio technology, Quality of Service associated to applications using a radio technology, data indicating quality of a user experience, data indicating network performance, applications used in a radio technology, services used in a radio technology, network element operability status, kind of user category and performance situation of a radio technology. 31. Network element according to claim 22, wherein managing the common backhaul resources is based on at least one of: a radio usage of a base station, a kind of base station technology, an importance of a user, a priority of users accessing a base station, quality of service for a user, quality of service of an application using a base station; a network performance related to users accessing a base station, an identity associated to a user, an identity associated to a service on the backhaul, a virtual LAN identity, an SSID activation, an SSID deactivation, and a network element operability status. 32. Computer program product embodied on a non-transitory computer-readable medium, said product comprising code portions for causing a network element, on which the computer program is executed, to carry out the method according to claim 16.
2,400
9,393
9,393
15,670,760
2,416
Logic may enable client devices or access points to relay medium access control (MAC) frames. Logic may extend the range of IEEE 802.11 devices, such as IEEE 802.11 ah devices.
1-29. (canceled) 30. An apparatus comprising: a memory; and a processor coupled with the memory to implement medium access control (MAC) logic, the MAC logic configured to cause a relay device to wireles sly transmit a beacon or response to a probe, wherein the beacon or response to the probe comprises information to describe a connection between the relay device and an access point, the information comprising a data rate and a link budget for communication between the relay device and the access point, wherein the apparatus is part of the relay device; receive a MAC layer Service Data Unit (MSDU) from a station, the MSDU comprising an address for the access point as a destination address, wherein the relay device is associated with the access point; and generate a relay frame comprising the MSDU to transmit, wherein the relay frame comprises the address for the relay device as the transmitter address, the address for the station as the source address, the address for the access point as the receiver address, and the address for the access point as the destination address; and wherein the processor is further to implement physical layer (PHY) logic to cause the relay device to transmit the relay frame to the access point. 31. The apparatus of claim 30, wherein the MAC logic is configured to receive a MSDU from the access point, the MSDU from the access point comprising an address for the station, wherein the processor is to implement the PHY logic to cause the relay device to transmit the MSDU to the station. 32. The apparatus of claim 30, wherein the information comprises a traffic load for the connection between the relay device and the access point. 33. The apparatus of claim 30, wherein the MSDU is part of a second relay frame from the station. 34. The apparatus of claim 30, wherein the response to the probe comprises a service set identifier (SSID) of a network associated with the access point. 35. The apparatus of claim 30, wherein the beacon comprises a service set identifier (SSID) of a network associated with the access point. 36. The apparatus of claim 30, wherein the beacon frame comprises a frame control field, the address for the access point, and a frame check sequence (FCS). 37. The apparatus of claim 30, further comprising one or more antennas coupled with a physical layer device to transmit the relay frame. 38. A computer program product comprising a non-transitory computer-readable medium, comprising instructions, which when executed by a processor cause the processor to perform operations, the operations comprising: implementing medium access control (MAC) logic, the MAC logic configured to cause a relay device to wirelessly transmit a beacon or response to a probe, wherein the beacon or response to the probe comprises information to describe a connection between the relay device and an access point, the information comprising a data rate and a link budget for communication between the relay device and the access point, wherein the processor is part of the relay device; receive a MAC layer Service Data Unit (MSDU) from a station, the MSDU comprising an address for the access point as a destination address, wherein the relay device is associated with the access point; generate a relay frame comprising the MSDU to transmit, wherein the relay frame comprises the address for the relay device as the transmitter address, the address for the station as the source address, the address for the access point as the receiver address, and the address for the access point as the destination address; and implementing physical layer (PHY) logic to cause the relay device to transmit the relay frame to the access point. 39. The computer program product of claim 38, wherein the MAC logic is configured to cause the relay device to receive an MSDU from the access point, the MSDU from the access point comprising an address for the station as a destination address, wherein the processor is to implement the PHY logic to cause the relay device to transmit the MSDU from the access point to the station. 40. The computer program product of claim 38, wherein the information comprises a traffic load for the connection between the relay device and the access point. 41. The computer program product of claim 38, wherein the MSDU comprises a second relay frame. 42. The computer program product of claim 38, wherein the response to the probe comprises a service set identifier (SSID) of a network associated with the access point. 43. The computer program product of claim 38, wherein the beacon comprises a service set identifier (SSID) of a network associated with the access point. 44. The computer program product of claim 38, wherein the beacon frame comprises a frame control field, the address for the access point, and a frame check sequence (FCS). 45. An apparatus comprising: a memory; and a processor coupled with the memory to implement medium access control (MAC) logic, the MAC logic configured to cause a station to receive a beacon or response to a probe, wherein the beacon or response to the probe comprises information to describe a connection between a relay device and an access point, the information comprising a data rate and a link budget for communication between the relay device and the access point, wherein the apparatus is part of the station; process the beacon or response to the probe from the relay device to determine that the relay device is associated with the access point; generate a relay frame comprising an address for the station as a source address, an address for the relay device as a receiver address, and an address for the access point as a destination address, wherein the access point is associated with the relay device; and wherein the processor is further to implement physical layer (PHY) logic to cause the station to transmit the relay frame. 46. The apparatus of claim 45, wherein the information comprises a traffic load for the connection between the relay device and the access point. 47. The apparatus of claim 45, further comprising a radio and one or more antennas coupled with a physical layer device to transmit the frame. 48. The apparatus of claim 45, wherein the processor is further to implement physical layer (PHY) logic to cause the station to receive a second relay frame from the access point comprising a source address associated with the access point. 49. The apparatus of claim 45, wherein the MAC logic comprises logic configured to cause the station to receive the beacon or response to the probe from the relay device and process the beacon or response to the probe to determine an address of the access point. 50. A computer program product comprising a non-transitory computer-readable medium, comprising instructions, which when executed by a processor cause the processor to perform operations, the operations comprising: implementing medium access control (MAC) logic, the MAC logic configured to cause a station to receive a beacon or response to a probe, wherein the beacon or response to the probe comprises information to describe a connection between a relay device and an access point, the information comprising a data rate and a link budget for communication between the relay device and the access point, wherein the processor is part of the station; process the beacon or response to the probe from the relay device to determine that the relay device is associated with the access point; generate a relay frame comprising an address for the station as a source address, an address for the relay device as a receiver address, and an address for the access point as a destination address, wherein the access point is associated with the relay device; and implementing physical layer (PHY) logic to cause the station to transmit the relay frame to the relay device to transmit the relay frame. 51. The program product of claim 50, wherein the beacon or response to the probe comprises a service set identifier (SSID) of a network associated with the access point. 52. The program product of claim 50, wherein the beacon frame comprises a frame control field, the address for the access point, and a frame check sequence (FCS). 53. The program product of claim 50, wherein the beacon or the response to the probe comprises a traffic load for the connection between the relay device and the access point.
Logic may enable client devices or access points to relay medium access control (MAC) frames. Logic may extend the range of IEEE 802.11 devices, such as IEEE 802.11 ah devices.1-29. (canceled) 30. An apparatus comprising: a memory; and a processor coupled with the memory to implement medium access control (MAC) logic, the MAC logic configured to cause a relay device to wireles sly transmit a beacon or response to a probe, wherein the beacon or response to the probe comprises information to describe a connection between the relay device and an access point, the information comprising a data rate and a link budget for communication between the relay device and the access point, wherein the apparatus is part of the relay device; receive a MAC layer Service Data Unit (MSDU) from a station, the MSDU comprising an address for the access point as a destination address, wherein the relay device is associated with the access point; and generate a relay frame comprising the MSDU to transmit, wherein the relay frame comprises the address for the relay device as the transmitter address, the address for the station as the source address, the address for the access point as the receiver address, and the address for the access point as the destination address; and wherein the processor is further to implement physical layer (PHY) logic to cause the relay device to transmit the relay frame to the access point. 31. The apparatus of claim 30, wherein the MAC logic is configured to receive a MSDU from the access point, the MSDU from the access point comprising an address for the station, wherein the processor is to implement the PHY logic to cause the relay device to transmit the MSDU to the station. 32. The apparatus of claim 30, wherein the information comprises a traffic load for the connection between the relay device and the access point. 33. The apparatus of claim 30, wherein the MSDU is part of a second relay frame from the station. 34. The apparatus of claim 30, wherein the response to the probe comprises a service set identifier (SSID) of a network associated with the access point. 35. The apparatus of claim 30, wherein the beacon comprises a service set identifier (SSID) of a network associated with the access point. 36. The apparatus of claim 30, wherein the beacon frame comprises a frame control field, the address for the access point, and a frame check sequence (FCS). 37. The apparatus of claim 30, further comprising one or more antennas coupled with a physical layer device to transmit the relay frame. 38. A computer program product comprising a non-transitory computer-readable medium, comprising instructions, which when executed by a processor cause the processor to perform operations, the operations comprising: implementing medium access control (MAC) logic, the MAC logic configured to cause a relay device to wirelessly transmit a beacon or response to a probe, wherein the beacon or response to the probe comprises information to describe a connection between the relay device and an access point, the information comprising a data rate and a link budget for communication between the relay device and the access point, wherein the processor is part of the relay device; receive a MAC layer Service Data Unit (MSDU) from a station, the MSDU comprising an address for the access point as a destination address, wherein the relay device is associated with the access point; generate a relay frame comprising the MSDU to transmit, wherein the relay frame comprises the address for the relay device as the transmitter address, the address for the station as the source address, the address for the access point as the receiver address, and the address for the access point as the destination address; and implementing physical layer (PHY) logic to cause the relay device to transmit the relay frame to the access point. 39. The computer program product of claim 38, wherein the MAC logic is configured to cause the relay device to receive an MSDU from the access point, the MSDU from the access point comprising an address for the station as a destination address, wherein the processor is to implement the PHY logic to cause the relay device to transmit the MSDU from the access point to the station. 40. The computer program product of claim 38, wherein the information comprises a traffic load for the connection between the relay device and the access point. 41. The computer program product of claim 38, wherein the MSDU comprises a second relay frame. 42. The computer program product of claim 38, wherein the response to the probe comprises a service set identifier (SSID) of a network associated with the access point. 43. The computer program product of claim 38, wherein the beacon comprises a service set identifier (SSID) of a network associated with the access point. 44. The computer program product of claim 38, wherein the beacon frame comprises a frame control field, the address for the access point, and a frame check sequence (FCS). 45. An apparatus comprising: a memory; and a processor coupled with the memory to implement medium access control (MAC) logic, the MAC logic configured to cause a station to receive a beacon or response to a probe, wherein the beacon or response to the probe comprises information to describe a connection between a relay device and an access point, the information comprising a data rate and a link budget for communication between the relay device and the access point, wherein the apparatus is part of the station; process the beacon or response to the probe from the relay device to determine that the relay device is associated with the access point; generate a relay frame comprising an address for the station as a source address, an address for the relay device as a receiver address, and an address for the access point as a destination address, wherein the access point is associated with the relay device; and wherein the processor is further to implement physical layer (PHY) logic to cause the station to transmit the relay frame. 46. The apparatus of claim 45, wherein the information comprises a traffic load for the connection between the relay device and the access point. 47. The apparatus of claim 45, further comprising a radio and one or more antennas coupled with a physical layer device to transmit the frame. 48. The apparatus of claim 45, wherein the processor is further to implement physical layer (PHY) logic to cause the station to receive a second relay frame from the access point comprising a source address associated with the access point. 49. The apparatus of claim 45, wherein the MAC logic comprises logic configured to cause the station to receive the beacon or response to the probe from the relay device and process the beacon or response to the probe to determine an address of the access point. 50. A computer program product comprising a non-transitory computer-readable medium, comprising instructions, which when executed by a processor cause the processor to perform operations, the operations comprising: implementing medium access control (MAC) logic, the MAC logic configured to cause a station to receive a beacon or response to a probe, wherein the beacon or response to the probe comprises information to describe a connection between a relay device and an access point, the information comprising a data rate and a link budget for communication between the relay device and the access point, wherein the processor is part of the station; process the beacon or response to the probe from the relay device to determine that the relay device is associated with the access point; generate a relay frame comprising an address for the station as a source address, an address for the relay device as a receiver address, and an address for the access point as a destination address, wherein the access point is associated with the relay device; and implementing physical layer (PHY) logic to cause the station to transmit the relay frame to the relay device to transmit the relay frame. 51. The program product of claim 50, wherein the beacon or response to the probe comprises a service set identifier (SSID) of a network associated with the access point. 52. The program product of claim 50, wherein the beacon frame comprises a frame control field, the address for the access point, and a frame check sequence (FCS). 53. The program product of claim 50, wherein the beacon or the response to the probe comprises a traffic load for the connection between the relay device and the access point.
2,400
9,394
9,394
16,321,812
2,473
Devices, methods, user equipment (UE), evolved node B (eNB), and storage media are described suitable for coexistence operations for uplink communications on multiple unlicensed carriers. Various embodiments are implemented in LTE systems with license-assisted access (LAA) associated communications. In one embodiment, a UE processes one or more uplink grants from an eNB scheduling transmissions on multiple unlicensed carriers at a first time, and indicating a first channel access procedure. The UE then selects a first unlicensed carrier and performs the first channel access procedure, and performs a second channel access procedure on a second unlicensed carrier of the multiple unlicensed carriers.
1. An apparatus of a user equipment for uplink channel access in license-assisted access (LAA), the apparatus comprising: a memory; and processing circuitry coupled to the memory and configured to: process one or more uplink (UL) grants from an evolved node B (eNB) scheduling a plurality of physical uplink shared channel (PUSCH) transmissions on a plurality of unlicensed carriers at a first PUSCH starting position, the one or more UL grants indicating a first channel access procedure for the plurality of PUSCH transmissions; select a first unlicensed carrier of the plurality of unlicensed carriers for the first channel access procedure associated with the first PUSCH starting position; and select at least a second unlicensed carrier of the plurality of unlicensed carriers other than the first unlicensed carrier for a second channel access procedure associated with the first PUSCH starting position. 2. The apparatus of claim 1 wherein the memory is configured to store one or more channel access indications from the one or more uplink (UL) grants from the eNB scheduling the plurality of PUSCH transmissions on the plurality of unlicensed carriers at the first PUSCH starting position. 3. The apparatus of claim 1 wherein the first channel access procedure comprises a category-4 listen-before-talk (LBT) procedure. 4. The apparatus of claim 1 wherein the first channel access procedure comprises a random backoff counter. 5. The apparatus of claim 1 wherein the second channel access procedure comprises a fixed LBT sensing interval. 6. The apparatus of claim 5 wherein the fixed LBT sensing interval is set to 25 microseconds. 7. The apparatus of claim 1 wherein the processing circuitry is further configured to initiate a first PUSCH transmission on the first unlicensed carrier following successful completion of the first channel access procedure. 8. The apparatus of claim 7 wherein the processing circuitry is further configured to initiate an additional PUSCH transmission on each of the remaining unlicensed carriers of the plurality of unlicensed carriers that has succeeded with the second channel access procedure immediately before the first PUSCH transmission on the first unlicensed carrier. 9. The apparatus of claim 2 wherein the processing circuitry is configured to select the first unlicensed carrier randomly from the plurality of unlicensed carriers. 10. The apparatus of claim 1 wherein the apparatus comprises an integrated circuit, wherein the processing circuitry comprises baseband circuitry disposed in the integrated circuit, and wherein the integrated circuit further comprises the memory. 11. The apparatus of claim 1 further comprising: one or more antennas coupled to the processing circuitry via radio frequency front-end circuitry, wherein the one or more antennas are configured to transmit the plurality of PUSCH transmissions; application circuitry coupled to the processing circuitry; and a display coupled to the application circuitry. 12. A computer-readable storage medium comprising instructions for license-assisted access (LAA) uplink communication operations that, when executed by processing circuitry of an apparatus, configure the apparatus to: process one or more uplink (UL) grants from an evolved node B (eNB) scheduling a plurality of physical uplink shared channel (PUSCH) transmissions on a plurality of unlicensed carriers at a first PUSCH starting position, the one or more UL grants indicating a first channel access procedure for the plurality of PUSCH transmissions; autonomously select a first unlicensed carrier of the plurality of unlicensed carriers for the first channel access procedure associated with the first PUSCH starting position; and select remaining unlicensed carriers of the plurality of unlicensed carriers other than the first unlicensed carrier for a second channel access procedure associated with the first PUSCH starting position. 13. The computer-readable storage medium of claim 12 wherein the first channel access procedure comprises a listen-before-talk (LBT) procedure associated with a variable contention window (CW) updated based on hybrid automatic repeat request (HARQ) feedback for all carriers of the plurality of unlicensed carriers. 14. The computer-readable storage medium of claim 12 wherein the first channel access procedure comprises a random backoff counter. 15. The computer-readable storage medium of claim 12 wherein the second channel access procedure comprises a fixed LBT sensing interval. 16. The computer-readable storage medium of claim 15 wherein the fixed LBT sensing interval is set to 25 microseconds. 17. The computer-readable storage medium of claim 12 wherein the instructions further configure the apparatus to: initiate a first PUSCH transmission on the first unlicensed carrier following successful completion of the first channel access procedure. 18. The computer-readable storage medium of claim 17 wherein the instructions further configure the apparatus to: initiate an additional PUSCH transmission on each of the remaining unlicensed carriers of the plurality of unlicensed carriers that has succeeded with the second channel access procedure immediately before the first PUSCH transmission on the first unlicensed carrier. 19. The computer-readable storage medium of claim 13 wherein the instructions further configure the apparatus to: select the first unlicensed carrier randomly from the plurality of unlicensed carriers. 20. An apparatus of a user equipment (UE) configured to operate using a plurality of unlicensed carriers in a license-assisted access (LAA) system, the apparatus comprising: a communication interface configured to receive one or more channel access indications from one or more uplink (UL) grants from an evolved node B (eNB) scheduling a plurality of physical uplink shared channel (PUSCH) transmissions on the plurality of unlicensed carriers at a first PUSCH starting position; and processing circuitry coupled to the communication interface and configured to: process the one or more UL grants to identify the first PUSCH starting position for the plurality of PUSCH transmissions on the plurality of unlicensed carriers; process the one or more UL grants to identify a Type 1 channel access procedure for the plurality of PUSCH transmissions on the plurality of unlicensed carriers; select a first carrier of the plurality of unlicensed carriers; initiate the Type 1 channel access procedure on the first carrier in response to selection of the first carrier; initiate a first PUSCH transmission of the plurality of PUSCH transmissions on the first carrier of the plurality of unlicensed carriers in response to the Type 1 channel access procedure; and initiate Type 2 channel access procedures on one or more second carriers of the plurality of unlicensed carriers, wherein the one or more second carriers do not include the first carrier, and wherein the Type 2 channel access procedures are performed immediately before the first PUSCH transmission on the first carrier. 21. The apparatus of claim 20 wherein the Type 1 channel access procedure comprises a listen-before-talk (LBT) procedure associated with a variable contention window (CW) calculated independently for each carrier of the plurality of unlicensed carriers and a backup counter based on a largest CW of the variable CWs calculated for each carrier of the plurality of unlicensed carriers. 22. The apparatus of claim 20 wherein the Type 1 channel access procedure comprises a random backoff counter. 23. The apparatus of claim 20 wherein the Type 2 channel access procedure comprises a fixed LBT sensing interval. 24. The apparatus of claim 23 wherein the fixed LBT sensing interval is set to 25 microseconds. 25. The apparatus of claim 20 further comprising a memory coupled to the processing circuitry and configured to store the one or more channel access indications; and wherein the processing circuitry of the UE is configured to select the first carrier randomly from the plurality of unlicensed carriers.
Devices, methods, user equipment (UE), evolved node B (eNB), and storage media are described suitable for coexistence operations for uplink communications on multiple unlicensed carriers. Various embodiments are implemented in LTE systems with license-assisted access (LAA) associated communications. In one embodiment, a UE processes one or more uplink grants from an eNB scheduling transmissions on multiple unlicensed carriers at a first time, and indicating a first channel access procedure. The UE then selects a first unlicensed carrier and performs the first channel access procedure, and performs a second channel access procedure on a second unlicensed carrier of the multiple unlicensed carriers.1. An apparatus of a user equipment for uplink channel access in license-assisted access (LAA), the apparatus comprising: a memory; and processing circuitry coupled to the memory and configured to: process one or more uplink (UL) grants from an evolved node B (eNB) scheduling a plurality of physical uplink shared channel (PUSCH) transmissions on a plurality of unlicensed carriers at a first PUSCH starting position, the one or more UL grants indicating a first channel access procedure for the plurality of PUSCH transmissions; select a first unlicensed carrier of the plurality of unlicensed carriers for the first channel access procedure associated with the first PUSCH starting position; and select at least a second unlicensed carrier of the plurality of unlicensed carriers other than the first unlicensed carrier for a second channel access procedure associated with the first PUSCH starting position. 2. The apparatus of claim 1 wherein the memory is configured to store one or more channel access indications from the one or more uplink (UL) grants from the eNB scheduling the plurality of PUSCH transmissions on the plurality of unlicensed carriers at the first PUSCH starting position. 3. The apparatus of claim 1 wherein the first channel access procedure comprises a category-4 listen-before-talk (LBT) procedure. 4. The apparatus of claim 1 wherein the first channel access procedure comprises a random backoff counter. 5. The apparatus of claim 1 wherein the second channel access procedure comprises a fixed LBT sensing interval. 6. The apparatus of claim 5 wherein the fixed LBT sensing interval is set to 25 microseconds. 7. The apparatus of claim 1 wherein the processing circuitry is further configured to initiate a first PUSCH transmission on the first unlicensed carrier following successful completion of the first channel access procedure. 8. The apparatus of claim 7 wherein the processing circuitry is further configured to initiate an additional PUSCH transmission on each of the remaining unlicensed carriers of the plurality of unlicensed carriers that has succeeded with the second channel access procedure immediately before the first PUSCH transmission on the first unlicensed carrier. 9. The apparatus of claim 2 wherein the processing circuitry is configured to select the first unlicensed carrier randomly from the plurality of unlicensed carriers. 10. The apparatus of claim 1 wherein the apparatus comprises an integrated circuit, wherein the processing circuitry comprises baseband circuitry disposed in the integrated circuit, and wherein the integrated circuit further comprises the memory. 11. The apparatus of claim 1 further comprising: one or more antennas coupled to the processing circuitry via radio frequency front-end circuitry, wherein the one or more antennas are configured to transmit the plurality of PUSCH transmissions; application circuitry coupled to the processing circuitry; and a display coupled to the application circuitry. 12. A computer-readable storage medium comprising instructions for license-assisted access (LAA) uplink communication operations that, when executed by processing circuitry of an apparatus, configure the apparatus to: process one or more uplink (UL) grants from an evolved node B (eNB) scheduling a plurality of physical uplink shared channel (PUSCH) transmissions on a plurality of unlicensed carriers at a first PUSCH starting position, the one or more UL grants indicating a first channel access procedure for the plurality of PUSCH transmissions; autonomously select a first unlicensed carrier of the plurality of unlicensed carriers for the first channel access procedure associated with the first PUSCH starting position; and select remaining unlicensed carriers of the plurality of unlicensed carriers other than the first unlicensed carrier for a second channel access procedure associated with the first PUSCH starting position. 13. The computer-readable storage medium of claim 12 wherein the first channel access procedure comprises a listen-before-talk (LBT) procedure associated with a variable contention window (CW) updated based on hybrid automatic repeat request (HARQ) feedback for all carriers of the plurality of unlicensed carriers. 14. The computer-readable storage medium of claim 12 wherein the first channel access procedure comprises a random backoff counter. 15. The computer-readable storage medium of claim 12 wherein the second channel access procedure comprises a fixed LBT sensing interval. 16. The computer-readable storage medium of claim 15 wherein the fixed LBT sensing interval is set to 25 microseconds. 17. The computer-readable storage medium of claim 12 wherein the instructions further configure the apparatus to: initiate a first PUSCH transmission on the first unlicensed carrier following successful completion of the first channel access procedure. 18. The computer-readable storage medium of claim 17 wherein the instructions further configure the apparatus to: initiate an additional PUSCH transmission on each of the remaining unlicensed carriers of the plurality of unlicensed carriers that has succeeded with the second channel access procedure immediately before the first PUSCH transmission on the first unlicensed carrier. 19. The computer-readable storage medium of claim 13 wherein the instructions further configure the apparatus to: select the first unlicensed carrier randomly from the plurality of unlicensed carriers. 20. An apparatus of a user equipment (UE) configured to operate using a plurality of unlicensed carriers in a license-assisted access (LAA) system, the apparatus comprising: a communication interface configured to receive one or more channel access indications from one or more uplink (UL) grants from an evolved node B (eNB) scheduling a plurality of physical uplink shared channel (PUSCH) transmissions on the plurality of unlicensed carriers at a first PUSCH starting position; and processing circuitry coupled to the communication interface and configured to: process the one or more UL grants to identify the first PUSCH starting position for the plurality of PUSCH transmissions on the plurality of unlicensed carriers; process the one or more UL grants to identify a Type 1 channel access procedure for the plurality of PUSCH transmissions on the plurality of unlicensed carriers; select a first carrier of the plurality of unlicensed carriers; initiate the Type 1 channel access procedure on the first carrier in response to selection of the first carrier; initiate a first PUSCH transmission of the plurality of PUSCH transmissions on the first carrier of the plurality of unlicensed carriers in response to the Type 1 channel access procedure; and initiate Type 2 channel access procedures on one or more second carriers of the plurality of unlicensed carriers, wherein the one or more second carriers do not include the first carrier, and wherein the Type 2 channel access procedures are performed immediately before the first PUSCH transmission on the first carrier. 21. The apparatus of claim 20 wherein the Type 1 channel access procedure comprises a listen-before-talk (LBT) procedure associated with a variable contention window (CW) calculated independently for each carrier of the plurality of unlicensed carriers and a backup counter based on a largest CW of the variable CWs calculated for each carrier of the plurality of unlicensed carriers. 22. The apparatus of claim 20 wherein the Type 1 channel access procedure comprises a random backoff counter. 23. The apparatus of claim 20 wherein the Type 2 channel access procedure comprises a fixed LBT sensing interval. 24. The apparatus of claim 23 wherein the fixed LBT sensing interval is set to 25 microseconds. 25. The apparatus of claim 20 further comprising a memory coupled to the processing circuitry and configured to store the one or more channel access indications; and wherein the processing circuitry of the UE is configured to select the first carrier randomly from the plurality of unlicensed carriers.
2,400
9,395
9,395
16,205,907
2,483
A method is disclosed. In the method, color differences are calculated between a current video frame and a motion predicted version of the current video frame based on a human visual system's ability to perceive the color differences. Also, information in a difference frame is discarded based on the color differences. The difference frame includes differences between the current video frame and the motion predicted version of the current video frame.
1. A non-transitory computer-readable medium comprising instructions that, when executed by a processor, cause the processor to: calculate weights for a difference frame based on a human visual system's ability to perceive color differences between a current video frame and a motion predicted version of the current video frame, wherein the difference frame indicates differences between the current video frame and the motion predicted version of the current video frame; apply the weights to the difference frame to produce a weighted difference frame; determine spatial variances of the motion predicted version of the current video frame; and restore color differences in the weighted difference frame based on the determined spatial variances. 2. The non-transitory computer-readable medium of claim 1, wherein the instructions cause the processor to calculate the weights based on the difference in a perceptual color space between each pixel in the current video frame and each corresponding pixel in the motion predicted version of the current video frame. 3. The non-transitory computer-readable medium of claim 2, wherein the instructions cause the processor to calculate the weights based on a map from differences in the perceptual color space to values between zero and one. 4. The non-transitory computer-readable medium of claim 3, wherein the map relates differences below a first value to zero and differences above a second value to one. 5. The non-transitory computer-readable medium of claim 2, wherein the instructions cause the processor to convert the current video frame and the motion predicted version of the current video frame to the perceptual color space. 6. The non-transitory computer-readable medium of claim 1, wherein the instructions to determine the spatial variances and restore color differences include instructions that cause the processor to compute a variance map based on the motion predicted version of the current video frame, multiply the variance map by the difference between the difference frame and the weighted difference frame to produce a preservation frame, and add the preservation frame to the weighted difference frame. 7. A system comprising: a motion prediction module to: generate a prediction of a current video frame based on spatially shifting a previous frame, and compute a difference frame indicating differences between the current video frame and the prediction of the current video frame; a multiplication and summation module to discard information in the difference frame unlikely to be perceived by a human visual system based on an ability of the human visual system to sense color differences indicated by the difference frame; and transformation and encoding modules to transform, quantize, and encode the difference frame lacking the discarded information to produce an encoded, compressed frame. 8. The system of claim 7, further comprising a variance mapping module to determine information in the difference frame to preserve, wherein the multiplication and summation module is to preserve the determined information. 9. The system of claim 8, wherein the variance mapping module is to determine the information in the difference frame to preserve by multiplying a variance map by a frame indicating information to be discarded. 10. The system of claim 9, wherein the variance mapping module is to determine the variance map based on the prediction of the current video frame. 11. The system of claim 7, further comprising a color difference module to compute color differences in a perceptual color space, wherein the differences in the perceptual color space are indicative of the ability of the human visual system to sense the color differences, and wherein the multiplication and summation module is to discard the information in the difference frame unlikely to be perceived by the human visual system based on the color differences. 12. The system of claim 11, further comprising a tone map module to calculate weights to apply to the difference frame based on the color differences, wherein the multiplication and summation module is to discard the information in the difference frame unlikely to be perceived by the human visual system based on the weights. 13. The system of claim 12, wherein the tone map module calculates the weights based on a tone map including a zero-weight region, a linear region, and a fully preserved region. 14. The system of claim wherein the encoding module encodes the difference frame lacking the discarded information using lossless compression. 15. A method comprising: calculating color differences between a current video frame and a motion predicted version of the current video frame based on a human visual system's ability to perceive the color differences; and discarding information in a difference frame based on the color differences, the difference frame comprising differences between the current video frame and the motion predicted version of the current video frame. 16. The method of claim 15, further comprising calculating a spatial variance map based on the motion predicted version of the current video frame, and adding preservation information to the difference frame lacking the discarded information based on the spatial variance map. 17. The method of claim 16, further comprising multiplying the spatial variance map by the discarded information to determine the preservation information. 18. The method of claim 15, further comprising converting the current video frame and the motion predicted version of the current video frame to a perceptual color space, wherein calculating the color differences comprises calculating the color differences in the perceptual color space, and wherein differences in the perceptual color space are indicative of the human visual system's ability to perceive the differences. 19. The method of claim 15, further comprising calculating weights based on the color differences according to a tone map, wherein discarding the information in the difference frame comprises multiplying the difference frame by the weights to produce a weighted difference frame. 20. The method of claim 19, further comprising subtracting the weighted difference frame from the difference frame to determine discarded information, and calculating preservation information based on the discarded information and a spatial variance map.
A method is disclosed. In the method, color differences are calculated between a current video frame and a motion predicted version of the current video frame based on a human visual system's ability to perceive the color differences. Also, information in a difference frame is discarded based on the color differences. The difference frame includes differences between the current video frame and the motion predicted version of the current video frame.1. A non-transitory computer-readable medium comprising instructions that, when executed by a processor, cause the processor to: calculate weights for a difference frame based on a human visual system's ability to perceive color differences between a current video frame and a motion predicted version of the current video frame, wherein the difference frame indicates differences between the current video frame and the motion predicted version of the current video frame; apply the weights to the difference frame to produce a weighted difference frame; determine spatial variances of the motion predicted version of the current video frame; and restore color differences in the weighted difference frame based on the determined spatial variances. 2. The non-transitory computer-readable medium of claim 1, wherein the instructions cause the processor to calculate the weights based on the difference in a perceptual color space between each pixel in the current video frame and each corresponding pixel in the motion predicted version of the current video frame. 3. The non-transitory computer-readable medium of claim 2, wherein the instructions cause the processor to calculate the weights based on a map from differences in the perceptual color space to values between zero and one. 4. The non-transitory computer-readable medium of claim 3, wherein the map relates differences below a first value to zero and differences above a second value to one. 5. The non-transitory computer-readable medium of claim 2, wherein the instructions cause the processor to convert the current video frame and the motion predicted version of the current video frame to the perceptual color space. 6. The non-transitory computer-readable medium of claim 1, wherein the instructions to determine the spatial variances and restore color differences include instructions that cause the processor to compute a variance map based on the motion predicted version of the current video frame, multiply the variance map by the difference between the difference frame and the weighted difference frame to produce a preservation frame, and add the preservation frame to the weighted difference frame. 7. A system comprising: a motion prediction module to: generate a prediction of a current video frame based on spatially shifting a previous frame, and compute a difference frame indicating differences between the current video frame and the prediction of the current video frame; a multiplication and summation module to discard information in the difference frame unlikely to be perceived by a human visual system based on an ability of the human visual system to sense color differences indicated by the difference frame; and transformation and encoding modules to transform, quantize, and encode the difference frame lacking the discarded information to produce an encoded, compressed frame. 8. The system of claim 7, further comprising a variance mapping module to determine information in the difference frame to preserve, wherein the multiplication and summation module is to preserve the determined information. 9. The system of claim 8, wherein the variance mapping module is to determine the information in the difference frame to preserve by multiplying a variance map by a frame indicating information to be discarded. 10. The system of claim 9, wherein the variance mapping module is to determine the variance map based on the prediction of the current video frame. 11. The system of claim 7, further comprising a color difference module to compute color differences in a perceptual color space, wherein the differences in the perceptual color space are indicative of the ability of the human visual system to sense the color differences, and wherein the multiplication and summation module is to discard the information in the difference frame unlikely to be perceived by the human visual system based on the color differences. 12. The system of claim 11, further comprising a tone map module to calculate weights to apply to the difference frame based on the color differences, wherein the multiplication and summation module is to discard the information in the difference frame unlikely to be perceived by the human visual system based on the weights. 13. The system of claim 12, wherein the tone map module calculates the weights based on a tone map including a zero-weight region, a linear region, and a fully preserved region. 14. The system of claim wherein the encoding module encodes the difference frame lacking the discarded information using lossless compression. 15. A method comprising: calculating color differences between a current video frame and a motion predicted version of the current video frame based on a human visual system's ability to perceive the color differences; and discarding information in a difference frame based on the color differences, the difference frame comprising differences between the current video frame and the motion predicted version of the current video frame. 16. The method of claim 15, further comprising calculating a spatial variance map based on the motion predicted version of the current video frame, and adding preservation information to the difference frame lacking the discarded information based on the spatial variance map. 17. The method of claim 16, further comprising multiplying the spatial variance map by the discarded information to determine the preservation information. 18. The method of claim 15, further comprising converting the current video frame and the motion predicted version of the current video frame to a perceptual color space, wherein calculating the color differences comprises calculating the color differences in the perceptual color space, and wherein differences in the perceptual color space are indicative of the human visual system's ability to perceive the differences. 19. The method of claim 15, further comprising calculating weights based on the color differences according to a tone map, wherein discarding the information in the difference frame comprises multiplying the difference frame by the weights to produce a weighted difference frame. 20. The method of claim 19, further comprising subtracting the weighted difference frame from the difference frame to determine discarded information, and calculating preservation information based on the discarded information and a spatial variance map.
2,400
9,396
9,396
16,182,881
2,488
A display arrangement for a motor vehicle includes a camera capturing images of a scene in front of the motor vehicle. The camera transmits first video signals indicative of the captured images. A video processor is communicatively coupled to the camera and receives the first video signals. The video processor processes the first video signals to make objects in the first video signals easier to see, thereby producing second video signals. The video processor transmits the second video signals. A head up display system is communicatively coupled to the video processor and receives the second video signals. The head up display system reflects a light field off of a windshield of the motor vehicle such that the reflection is visible to a driver of the vehicle as a virtual image. The light field is dependent upon the second video signals.
1. A display arrangement for a motor vehicle, the arrangement comprising: a camera configured to: capture images of a scene in front of the motor vehicle; and transmit first video signals indicative of the captured images; a video processor communicatively coupled to the camera and configured to: receive the first video signals; process the first video signals to make objects in the first video signals easier to see, thereby producing second video signals; and transmit the second video signals; and a head up display system communicatively coupled to the video processor and configured to: receive the second video signals; and reflect a light field off of a windshield of the motor vehicle such that the reflection is visible to a driver of the vehicle as a virtual image, the light field being dependent upon the second video signals. 2. The display arrangement of claim 1 wherein the video processor is configured to: determine whether the objects in the first video signals would be difficult for a driver to see through a windshield of the vehicle; and if the video processor determines that the objects in the first video signals would be difficult for a driver to see through a windshield of the vehicle, then process the first video signals to make the objects in the first video signals easier to see, thereby producing the second video signals. 3. The display arrangement of claim 1 wherein the video processor is configured to enhance or highlight lane markings on a road in the first video signals to make the lane markings in the first video signals easier to see, thereby producing the second video signals. 4. The display arrangement of claim 1 wherein the video processor is configured to reduce glare in the first video signals, thereby producing the second video signals. 5. The display arrangement of claim 1 wherein the video processor is configured to enhance or highlight guardrails next to a road in the first video signals to make the guardrails in the first video signals easier to see, thereby producing the second video signals. 6. The display arrangement of claim 1 wherein the video processor is configured to enhance or highlight an obstacle in a road in the first video signals, thereby producing the second video signals. 7. The display arrangement of claim 6 wherein the video processor is configured to enhance or highlight the obstacle with a first color if the obstacle is less than a threshold distance away from the motor vehicle, and enhance or highlight the obstacle with a second color if the obstacle is more than the threshold distance away from the motor vehicle. 8. A display method for a motor vehicle, the method comprising: capturing first images of a scene in front of the motor vehicle; processing the first images to make objects in the first images easier to see, thereby producing second images; and reflecting a light field off of a windshield of the motor vehicle such that the reflection is visible to a driver of the vehicle as a virtual image, the light field being dependent upon the second images. 9. The display method of claim 8 further comprising; determining whether the objects in the first video signals would be difficult for a driver to see through a windshield of the vehicle; and if it is determined that the objects in the first video signals would be difficult for a driver to see through a windshield of the vehicle, then processing the first video signals to make the objects in the first video signals easier to see, thereby producing the second video signals. 10. The display method of claim 8 wherein the processing includes enhancing or highlighting lane markings on a road in the first video signals to make the lane markings in the first video signals easier to see, thereby producing the second video signals. 11. The display method of claim 8 wherein the processing includes reducing glare in the first video signals, thereby producing the second video signals. 12. The display method of claim 8 wherein the processing includes enhancing or highlighting guardrails next to a road in the first video signals to make the guardrails in the first video signals easier to see, thereby producing the second video signals. 13. The display method of claim 8 wherein the processing includes enhancing or highlighting an obstacle in a road in the first video signals, thereby producing the second video signals. 14. The display method of claim 13 wherein the processing includes enhancing or highlighting the obstacle with a first color if the obstacle is less than a threshold distance away from the motor vehicle, and enhancing or highlighting the obstacle with a second color if the obstacle is more than the threshold distance away from the motor vehicle. 15. A display arrangement for a motor vehicle, the arrangement comprising; a camera configured to: capture images of a scene in front of the motor vehicle; and transmit first video signals indicative of the captured images; a switch device configured to be turned ON or turned OFF by a driver of the motor vehicle; a video processor communicatively coupled to the camera and to the switch device, the video processor being configured to: receive the first video signals; if the switch is turned ON, process the first video signals to make objects in the first video signals easier to see, thereby producing second video signals; and transmit the second video signals; and a head up display system communicatively coupled to the video processor and configured to: receive the second video signals; and reflect a light field off of a windshield of the motor vehicle such that the reflection is visible to a driver of the vehicle as a virtual image, the light field being dependent upon the second video signals. 16. The display arrangement of claim 15 wherein, if the switch is turned OFF, the light field is dependent upon the first video signals and is independent of the second video signals. 17. The display arrangement of claim 15 wherein, if the switch is turned ON, the video processor is configured to enhance or highlight lane markings on a road in the first video signals to make the lane markings in the first video signals easier to see, thereby producing the second video signals. 18. The display arrangement of claim 15 wherein, if the switch is turned ON, the video processor is configured to reduce glare in the first video signals, thereby producing the second video signals. 19. The display arrangement of claim 15 wherein, if the switch is turned ON, the video processor is configured to enhance or highlight guardrails next to a road in the first video signals to make the guardrails in the first video signals easier to see, thereby producing the second video signals. 20. The display arrangement of claim 15 wherein, if the switch is turned ON, the video processor is configured to enhance or highlight an obstacle in a road in the first video signals, thereby producing the second video signals. 21. The display arrangement of claim 20 wherein, if the switch is turned ON, the video processor is configured to enhance or highlight the obstacle with a first color if the obstacle is less than a threshold distance away from the motor vehicle, and enhance or highlight the obstacle with a second color if the obstacle is more than the threshold distance away from the motor vehicle.
A display arrangement for a motor vehicle includes a camera capturing images of a scene in front of the motor vehicle. The camera transmits first video signals indicative of the captured images. A video processor is communicatively coupled to the camera and receives the first video signals. The video processor processes the first video signals to make objects in the first video signals easier to see, thereby producing second video signals. The video processor transmits the second video signals. A head up display system is communicatively coupled to the video processor and receives the second video signals. The head up display system reflects a light field off of a windshield of the motor vehicle such that the reflection is visible to a driver of the vehicle as a virtual image. The light field is dependent upon the second video signals.1. A display arrangement for a motor vehicle, the arrangement comprising: a camera configured to: capture images of a scene in front of the motor vehicle; and transmit first video signals indicative of the captured images; a video processor communicatively coupled to the camera and configured to: receive the first video signals; process the first video signals to make objects in the first video signals easier to see, thereby producing second video signals; and transmit the second video signals; and a head up display system communicatively coupled to the video processor and configured to: receive the second video signals; and reflect a light field off of a windshield of the motor vehicle such that the reflection is visible to a driver of the vehicle as a virtual image, the light field being dependent upon the second video signals. 2. The display arrangement of claim 1 wherein the video processor is configured to: determine whether the objects in the first video signals would be difficult for a driver to see through a windshield of the vehicle; and if the video processor determines that the objects in the first video signals would be difficult for a driver to see through a windshield of the vehicle, then process the first video signals to make the objects in the first video signals easier to see, thereby producing the second video signals. 3. The display arrangement of claim 1 wherein the video processor is configured to enhance or highlight lane markings on a road in the first video signals to make the lane markings in the first video signals easier to see, thereby producing the second video signals. 4. The display arrangement of claim 1 wherein the video processor is configured to reduce glare in the first video signals, thereby producing the second video signals. 5. The display arrangement of claim 1 wherein the video processor is configured to enhance or highlight guardrails next to a road in the first video signals to make the guardrails in the first video signals easier to see, thereby producing the second video signals. 6. The display arrangement of claim 1 wherein the video processor is configured to enhance or highlight an obstacle in a road in the first video signals, thereby producing the second video signals. 7. The display arrangement of claim 6 wherein the video processor is configured to enhance or highlight the obstacle with a first color if the obstacle is less than a threshold distance away from the motor vehicle, and enhance or highlight the obstacle with a second color if the obstacle is more than the threshold distance away from the motor vehicle. 8. A display method for a motor vehicle, the method comprising: capturing first images of a scene in front of the motor vehicle; processing the first images to make objects in the first images easier to see, thereby producing second images; and reflecting a light field off of a windshield of the motor vehicle such that the reflection is visible to a driver of the vehicle as a virtual image, the light field being dependent upon the second images. 9. The display method of claim 8 further comprising; determining whether the objects in the first video signals would be difficult for a driver to see through a windshield of the vehicle; and if it is determined that the objects in the first video signals would be difficult for a driver to see through a windshield of the vehicle, then processing the first video signals to make the objects in the first video signals easier to see, thereby producing the second video signals. 10. The display method of claim 8 wherein the processing includes enhancing or highlighting lane markings on a road in the first video signals to make the lane markings in the first video signals easier to see, thereby producing the second video signals. 11. The display method of claim 8 wherein the processing includes reducing glare in the first video signals, thereby producing the second video signals. 12. The display method of claim 8 wherein the processing includes enhancing or highlighting guardrails next to a road in the first video signals to make the guardrails in the first video signals easier to see, thereby producing the second video signals. 13. The display method of claim 8 wherein the processing includes enhancing or highlighting an obstacle in a road in the first video signals, thereby producing the second video signals. 14. The display method of claim 13 wherein the processing includes enhancing or highlighting the obstacle with a first color if the obstacle is less than a threshold distance away from the motor vehicle, and enhancing or highlighting the obstacle with a second color if the obstacle is more than the threshold distance away from the motor vehicle. 15. A display arrangement for a motor vehicle, the arrangement comprising; a camera configured to: capture images of a scene in front of the motor vehicle; and transmit first video signals indicative of the captured images; a switch device configured to be turned ON or turned OFF by a driver of the motor vehicle; a video processor communicatively coupled to the camera and to the switch device, the video processor being configured to: receive the first video signals; if the switch is turned ON, process the first video signals to make objects in the first video signals easier to see, thereby producing second video signals; and transmit the second video signals; and a head up display system communicatively coupled to the video processor and configured to: receive the second video signals; and reflect a light field off of a windshield of the motor vehicle such that the reflection is visible to a driver of the vehicle as a virtual image, the light field being dependent upon the second video signals. 16. The display arrangement of claim 15 wherein, if the switch is turned OFF, the light field is dependent upon the first video signals and is independent of the second video signals. 17. The display arrangement of claim 15 wherein, if the switch is turned ON, the video processor is configured to enhance or highlight lane markings on a road in the first video signals to make the lane markings in the first video signals easier to see, thereby producing the second video signals. 18. The display arrangement of claim 15 wherein, if the switch is turned ON, the video processor is configured to reduce glare in the first video signals, thereby producing the second video signals. 19. The display arrangement of claim 15 wherein, if the switch is turned ON, the video processor is configured to enhance or highlight guardrails next to a road in the first video signals to make the guardrails in the first video signals easier to see, thereby producing the second video signals. 20. The display arrangement of claim 15 wherein, if the switch is turned ON, the video processor is configured to enhance or highlight an obstacle in a road in the first video signals, thereby producing the second video signals. 21. The display arrangement of claim 20 wherein, if the switch is turned ON, the video processor is configured to enhance or highlight the obstacle with a first color if the obstacle is less than a threshold distance away from the motor vehicle, and enhance or highlight the obstacle with a second color if the obstacle is more than the threshold distance away from the motor vehicle.
2,400
9,397
9,397
16,221,149
2,414
Restoration procedures in a Multimedia Broadcast Multicast Service (MBMS) network (also referred to as evolved MBMS (eMBMS) network) in case of a path failure.
1. A method in a control plane node for restoring a Multimedia Broadcast Multicast Service (MBMS) session after path failure, comprising: receiving an MBMS session start request from a network node; sending an MBMS session start request to a Multi-cell/Multicast Coordination Entity, MCE; receiving an MBMS session start response from the MCE; and sending an MBMS session start response to the network node acknowledging the receipt of the MBMS session start request. 2. The method of claim 1, wherein the MBMS session start request sent to the MCE comprises a re-establishment flag enabling the MCE to differentiate the restoration procedure from other procedures. 3. The method of claim 1, wherein the MBMS session start request sent to the MCE comprises a re-establishment flag enabling the MCE to know that it may accept the MBMS session start request. 4. The method of claim 1, wherein the MBMS session start request sent to the MCE comprises a re-establishment flag enabling the MCE to differentiate whether it is an error so it may reject the MBMS session start request or whether it is a restoration procedure so it may accept the MBMS session start request. 5. The method of claim 2, wherein the MBMS session start request comprises a counter enabling handling of a latest MBMS session start request in case a subsequent same type of path failure takes place. 6. A method in a Multi-cell/Multicast Coordination Entity (MCE) for restoring a Multimedia Broadcast Multicast Service (MBMS) session after path failure where the MBMS session already exists on the MCE, the method comprising: receiving a MBMS session start request comprising a re-establishment flag for the MBMS session from an alternative control plane node; and re-establishing the MBMS session with the alternative control plane node. 7. The method of claim 6, comprising: sending a session start response to the alternative control plane node acknowledging the receipt of the MBMS session start request. 8. The method of claim 6, wherein the re-establishing comprises: stopping the existing MBMS session; and starting the MBMS session with the alternative control plane node. 9. The method of claim 6, wherein the MCE uses the re-establishment flag to differentiate the restoration procedure from other procedures. 10. The method of claim 6, wherein the MCE uses the re-establishment flag to know that it may accept the MBMS session start request. 11. The method of claim 6, wherein the MCE uses the re-establishment flag to differentiate whether it is an error so it may reject the MBMS session start request or whether it is a restoration procedure so it may accept the MBMS session start request. 12. The method of claim 6, wherein the MBMS session start request comprises a counter enabling handling of a latest MBMS session start request in case a subsequent same type of path failure takes place. 13. A control plane node configured to restore a Multimedia Broadcast Multicast Service (MBMS) session after path failure, comprising a processor and a memory, said memory containing software that when executed by said processor, the control plane node is operative to: receive an MBMS session start request from a network node; send an MBMS session start request to a Multi-cell/Multicast Coordination Entity, MCE; receive an MBMS session start response from the MCE; and send an MBMS session start response to the network node acknowledging the receipt of the MBMS session start request. 14. The control plane node of claim 13, wherein the control plane node is operative to send the MBMS session start request to the MCE comprising a re-establishment flag enabling the MCE to differentiate the restoration procedure from other procedures. 15. The control plane node of claim 13, wherein the control plane node is operative to send the MBMS session start request to the MCE comprising a re-establishment flag enabling the MCE to know that it may accept the MBMS session start request. 16. The control plane node of claim 13, wherein the control plane node is operative to send the MBMS session start request to the MCE comprising a re-establishment flag enabling the MCE to differentiate whether it is an error so it may reject the MBMS session start request or whether it is a restoration procedure so it may accept the MBMS session start request. 17. The control plane node of claim 13, wherein the control plane node is operative to send the MBMS session start request comprising a counter enabling handling of a latest MBMS session start request in case a subsequent same type of path failure takes place. 18. The control plane node of claim 13, said network node being one of: a Mobility Management Entity, MME, a Serving General Packet Radio Service, GPRS, Support Node, SGSN, and a Multimedia Broadcast Multicast Service Gateway, MBMS-GW. 19. A Multi-cell/Multicast Coordination Entity (MCE) configured to restore a Multimedia Broadcast Multicast Service (MBMS) session after path failure where the MBMS session already exists on the MCE, comprising a processor and a memory, said memory containing software that when executed by said processor, the MCE is operative to: receive a MBMS session start request comprising a re-establishment flag for the MBMS session from an alternative control plane node; and re-establish the MBMS session with the alternative control plane node. 20. The MCE of claim 19, further being operative to: send a session start response to the alternative control plane node acknowledging the receipt of the MBMS session start request. 21. The MCE of claim 19, further being operative to: stop the existing MBMS session; and start the MBMS session with the alternative control plane node. 22. The MCE of claim 19, wherein the MCE is operative to use the re-establishment flag to differentiate the restoration procedure from other procedures. 23. The MCE of claim 19, wherein the MCE is operative to use the re-establishment flag to know that it may accept the MBMS session start request. 24. The MCE of claim 19, wherein the MCE is operative to use the re-establishment flag to differentiate whether it is an error so it may reject the MBMS session start request or whether it is a restoration procedure so it may accept the MBMS session start request. 25. The MCE of claim 19, wherein the MBMS session start request comprises a counter enabling handling of a latest MBMS session start request in case a subsequent same type of path failure takes place.
Restoration procedures in a Multimedia Broadcast Multicast Service (MBMS) network (also referred to as evolved MBMS (eMBMS) network) in case of a path failure.1. A method in a control plane node for restoring a Multimedia Broadcast Multicast Service (MBMS) session after path failure, comprising: receiving an MBMS session start request from a network node; sending an MBMS session start request to a Multi-cell/Multicast Coordination Entity, MCE; receiving an MBMS session start response from the MCE; and sending an MBMS session start response to the network node acknowledging the receipt of the MBMS session start request. 2. The method of claim 1, wherein the MBMS session start request sent to the MCE comprises a re-establishment flag enabling the MCE to differentiate the restoration procedure from other procedures. 3. The method of claim 1, wherein the MBMS session start request sent to the MCE comprises a re-establishment flag enabling the MCE to know that it may accept the MBMS session start request. 4. The method of claim 1, wherein the MBMS session start request sent to the MCE comprises a re-establishment flag enabling the MCE to differentiate whether it is an error so it may reject the MBMS session start request or whether it is a restoration procedure so it may accept the MBMS session start request. 5. The method of claim 2, wherein the MBMS session start request comprises a counter enabling handling of a latest MBMS session start request in case a subsequent same type of path failure takes place. 6. A method in a Multi-cell/Multicast Coordination Entity (MCE) for restoring a Multimedia Broadcast Multicast Service (MBMS) session after path failure where the MBMS session already exists on the MCE, the method comprising: receiving a MBMS session start request comprising a re-establishment flag for the MBMS session from an alternative control plane node; and re-establishing the MBMS session with the alternative control plane node. 7. The method of claim 6, comprising: sending a session start response to the alternative control plane node acknowledging the receipt of the MBMS session start request. 8. The method of claim 6, wherein the re-establishing comprises: stopping the existing MBMS session; and starting the MBMS session with the alternative control plane node. 9. The method of claim 6, wherein the MCE uses the re-establishment flag to differentiate the restoration procedure from other procedures. 10. The method of claim 6, wherein the MCE uses the re-establishment flag to know that it may accept the MBMS session start request. 11. The method of claim 6, wherein the MCE uses the re-establishment flag to differentiate whether it is an error so it may reject the MBMS session start request or whether it is a restoration procedure so it may accept the MBMS session start request. 12. The method of claim 6, wherein the MBMS session start request comprises a counter enabling handling of a latest MBMS session start request in case a subsequent same type of path failure takes place. 13. A control plane node configured to restore a Multimedia Broadcast Multicast Service (MBMS) session after path failure, comprising a processor and a memory, said memory containing software that when executed by said processor, the control plane node is operative to: receive an MBMS session start request from a network node; send an MBMS session start request to a Multi-cell/Multicast Coordination Entity, MCE; receive an MBMS session start response from the MCE; and send an MBMS session start response to the network node acknowledging the receipt of the MBMS session start request. 14. The control plane node of claim 13, wherein the control plane node is operative to send the MBMS session start request to the MCE comprising a re-establishment flag enabling the MCE to differentiate the restoration procedure from other procedures. 15. The control plane node of claim 13, wherein the control plane node is operative to send the MBMS session start request to the MCE comprising a re-establishment flag enabling the MCE to know that it may accept the MBMS session start request. 16. The control plane node of claim 13, wherein the control plane node is operative to send the MBMS session start request to the MCE comprising a re-establishment flag enabling the MCE to differentiate whether it is an error so it may reject the MBMS session start request or whether it is a restoration procedure so it may accept the MBMS session start request. 17. The control plane node of claim 13, wherein the control plane node is operative to send the MBMS session start request comprising a counter enabling handling of a latest MBMS session start request in case a subsequent same type of path failure takes place. 18. The control plane node of claim 13, said network node being one of: a Mobility Management Entity, MME, a Serving General Packet Radio Service, GPRS, Support Node, SGSN, and a Multimedia Broadcast Multicast Service Gateway, MBMS-GW. 19. A Multi-cell/Multicast Coordination Entity (MCE) configured to restore a Multimedia Broadcast Multicast Service (MBMS) session after path failure where the MBMS session already exists on the MCE, comprising a processor and a memory, said memory containing software that when executed by said processor, the MCE is operative to: receive a MBMS session start request comprising a re-establishment flag for the MBMS session from an alternative control plane node; and re-establish the MBMS session with the alternative control plane node. 20. The MCE of claim 19, further being operative to: send a session start response to the alternative control plane node acknowledging the receipt of the MBMS session start request. 21. The MCE of claim 19, further being operative to: stop the existing MBMS session; and start the MBMS session with the alternative control plane node. 22. The MCE of claim 19, wherein the MCE is operative to use the re-establishment flag to differentiate the restoration procedure from other procedures. 23. The MCE of claim 19, wherein the MCE is operative to use the re-establishment flag to know that it may accept the MBMS session start request. 24. The MCE of claim 19, wherein the MCE is operative to use the re-establishment flag to differentiate whether it is an error so it may reject the MBMS session start request or whether it is a restoration procedure so it may accept the MBMS session start request. 25. The MCE of claim 19, wherein the MBMS session start request comprises a counter enabling handling of a latest MBMS session start request in case a subsequent same type of path failure takes place.
2,400
9,398
9,398
15,002,632
2,435
Techniques are disclosed herein for facilitating dynamic risk assessment and automated triggering of supplemental authentication for protected access resources. More specifically, the techniques described herein provide security mechanisms that can be triggered in response to a risk assessment determined in response to request to establish a connection between an access system and a protected resource. Alternatively or additionally, the security mechanisms can transparently monitor an authenticated connection between an access system and a resource and automatically trigger supplemental authentication based on a dynamic risk assessment. In some embodiments, a feature set of the authenticated connection and commands initiated over the authenticated connection are monitored and underlying information captured to dynamically generate the risk assessment or score. The supplemental authentication can be triggered when the risk score exceeds a risk threshold.
1. A transparent proxy system comprising: one or more processors; and one or more computer readable storage media having program instructions stored thereon which, when executed by the one or more processors, cause the transparent proxy system to: intercept a command initiated by a resource access system over an authenticated connection, wherein the command is initiated for delivery to and execution by a protected resource; generate a risk score based on a type of the command and a feature set corresponding to the authenticated connection; and trigger a supplemental authentication if the risk score exceeds a risk threshold. 2. The transparent proxy system of claim 1, wherein the instructions, when executed by the one or more processors, further cause the transparent proxy system to maintain records corresponding to each authenticated connection. 3. The transparent proxy system of claim 2, wherein the records include one or more of calendric and temporal data, executed command data, and one or more features of the feature set corresponding to the authenticated connection. 4. The transparent proxy system of claim 2, wherein the records comprises video data. 5. The transparent proxy system of claim 1, wherein the instructions, when executed by the one or more processors, further cause the transparent proxy system to perform the supplementation authentication. 6. The transparent proxy system of claim 5, wherein the instructions, when executed by the one or more processors, further cause the transparent proxy system to relay the command to the protected resource for execution when the supplemental authentication is satisfied. 7. The transparent proxy system of claim 5, wherein the instructions, when executed by the one or more processors, further cause the transparent proxy system to perform one or more pre-determined actions when the supplemental authentication is not satisfied. 8. The transparent proxy system of claim 5, wherein the supplemental authentication comprises authenticating the user via a second device associated with the user. 9. The transparent proxy system of claim 8, wherein to perform the supplementation authentication, the instructions, when executed by the one or more processors, further cause the transparent proxy system to request geolocation information including one or more of GPS information or Internet Protocol address information from the second device, wherein the supplemental authentication comprises a geofencing policy that is satisfied when the second device is determined to be located within a predetermined area. 10. The transparent proxy system of claim 8, wherein to perform the supplementation authentication, the instructions, when executed by the one or more processors, further cause the transparent proxy system to request proximity information indicating a proximity between the second device and the resource access system, wherein the supplemental authentication comprises a proximity policy that is satisfied when the second device is within a predetermined distance to the resource access system. 11. The transparent proxy system of claim 10, wherein an established Bluetooth connection is indicative of the second device and the resource access system being sufficiently proximate to satisfy the proximity policy. 12. The transparent proxy system of claim 8, wherein to perform the supplementation authentication, the instructions, when executed by the one or more processors, further cause the transparent proxy system to request fingerprint, retina, face, voice or biometric based identification from the user via the second device. 13. The transparent proxy system of claim 1, further comprising extracting the feature set in response to a resource connection request initiated by the resource access system. 14. The transparent proxy system of claim 1, wherein the command is initiated by the resource access system via one or more of Secure Shell (SSH) or File Transfer Protocol (FTP). 15. A method of operating a transparent proxy system, the method comprising: intercepting a command initiated by a resource access system over an authenticated connection, wherein the command is initiated for delivery to and execution by a protected resource; generating a risk score based on a type of the command and a feature set corresponding to the authenticated connection; and performing a supplemental authentication if the risk score exceeds a risk threshold. 16. The method of claim 14, further comprising maintain records corresponding to each authenticated connection, wherein the records include one or more of calendric and temporal data, executed command data, and one or more features of the feature set corresponding to the authenticated connection. 17. The method of claim 15, wherein the records comprises video data. 18. The method of claim 14, further comprising: relaying the command to the protected resource for execution when the supplemental authentication is satisfied. 19. The method of claim 14, wherein the supplemental authentication comprises authenticating the user via a second device associated with the user. 20. A computer readable storage media having program instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to: intercept a command initiated by a resource access system over an authenticated connection, wherein the command is initiated for delivery to and execution by a protected resource; generate a risk score based on a feature set corresponding to the authenticated connection and the command; and trigger a supplemental authentication if the risk score exceeds a risk threshold.
Techniques are disclosed herein for facilitating dynamic risk assessment and automated triggering of supplemental authentication for protected access resources. More specifically, the techniques described herein provide security mechanisms that can be triggered in response to a risk assessment determined in response to request to establish a connection between an access system and a protected resource. Alternatively or additionally, the security mechanisms can transparently monitor an authenticated connection between an access system and a resource and automatically trigger supplemental authentication based on a dynamic risk assessment. In some embodiments, a feature set of the authenticated connection and commands initiated over the authenticated connection are monitored and underlying information captured to dynamically generate the risk assessment or score. The supplemental authentication can be triggered when the risk score exceeds a risk threshold.1. A transparent proxy system comprising: one or more processors; and one or more computer readable storage media having program instructions stored thereon which, when executed by the one or more processors, cause the transparent proxy system to: intercept a command initiated by a resource access system over an authenticated connection, wherein the command is initiated for delivery to and execution by a protected resource; generate a risk score based on a type of the command and a feature set corresponding to the authenticated connection; and trigger a supplemental authentication if the risk score exceeds a risk threshold. 2. The transparent proxy system of claim 1, wherein the instructions, when executed by the one or more processors, further cause the transparent proxy system to maintain records corresponding to each authenticated connection. 3. The transparent proxy system of claim 2, wherein the records include one or more of calendric and temporal data, executed command data, and one or more features of the feature set corresponding to the authenticated connection. 4. The transparent proxy system of claim 2, wherein the records comprises video data. 5. The transparent proxy system of claim 1, wherein the instructions, when executed by the one or more processors, further cause the transparent proxy system to perform the supplementation authentication. 6. The transparent proxy system of claim 5, wherein the instructions, when executed by the one or more processors, further cause the transparent proxy system to relay the command to the protected resource for execution when the supplemental authentication is satisfied. 7. The transparent proxy system of claim 5, wherein the instructions, when executed by the one or more processors, further cause the transparent proxy system to perform one or more pre-determined actions when the supplemental authentication is not satisfied. 8. The transparent proxy system of claim 5, wherein the supplemental authentication comprises authenticating the user via a second device associated with the user. 9. The transparent proxy system of claim 8, wherein to perform the supplementation authentication, the instructions, when executed by the one or more processors, further cause the transparent proxy system to request geolocation information including one or more of GPS information or Internet Protocol address information from the second device, wherein the supplemental authentication comprises a geofencing policy that is satisfied when the second device is determined to be located within a predetermined area. 10. The transparent proxy system of claim 8, wherein to perform the supplementation authentication, the instructions, when executed by the one or more processors, further cause the transparent proxy system to request proximity information indicating a proximity between the second device and the resource access system, wherein the supplemental authentication comprises a proximity policy that is satisfied when the second device is within a predetermined distance to the resource access system. 11. The transparent proxy system of claim 10, wherein an established Bluetooth connection is indicative of the second device and the resource access system being sufficiently proximate to satisfy the proximity policy. 12. The transparent proxy system of claim 8, wherein to perform the supplementation authentication, the instructions, when executed by the one or more processors, further cause the transparent proxy system to request fingerprint, retina, face, voice or biometric based identification from the user via the second device. 13. The transparent proxy system of claim 1, further comprising extracting the feature set in response to a resource connection request initiated by the resource access system. 14. The transparent proxy system of claim 1, wherein the command is initiated by the resource access system via one or more of Secure Shell (SSH) or File Transfer Protocol (FTP). 15. A method of operating a transparent proxy system, the method comprising: intercepting a command initiated by a resource access system over an authenticated connection, wherein the command is initiated for delivery to and execution by a protected resource; generating a risk score based on a type of the command and a feature set corresponding to the authenticated connection; and performing a supplemental authentication if the risk score exceeds a risk threshold. 16. The method of claim 14, further comprising maintain records corresponding to each authenticated connection, wherein the records include one or more of calendric and temporal data, executed command data, and one or more features of the feature set corresponding to the authenticated connection. 17. The method of claim 15, wherein the records comprises video data. 18. The method of claim 14, further comprising: relaying the command to the protected resource for execution when the supplemental authentication is satisfied. 19. The method of claim 14, wherein the supplemental authentication comprises authenticating the user via a second device associated with the user. 20. A computer readable storage media having program instructions stored thereon which, when executed by the one or more processors, cause the one or more processors to: intercept a command initiated by a resource access system over an authenticated connection, wherein the command is initiated for delivery to and execution by a protected resource; generate a risk score based on a feature set corresponding to the authenticated connection and the command; and trigger a supplemental authentication if the risk score exceeds a risk threshold.
2,400
9,399
9,399
15,824,406
2,419
A vehicular-signage system includes a control unit electrically coupled to a vehicle. The control unit is adapted to receive signals from the vehicle related to the vehicle being placed in reverse. A display is electrically coupled to the control unit. The display is adapted to receive signals from the control unit related to the display of a message. A back-up camera is disposed with the display. The back-up camera is activated by the control unit responsive to the vehicle being placed in reverse. The back-up camera transmits a video to the control unit.
1. A system for vehicular signage, the system comprising: a control unit electrically coupled to a vehicle and adapted to receive signals from the vehicle related to the vehicle being placed in reverse; a display electrically coupled to the control unit, the display being adapted to receive signals from the control unit related to the display of a message; a back-up camera disposed with the display, the back-up camera being activated by the control unit responsive to the vehicle being placed in reverse; and wherein the back-up camera transmits a video to the control unit and the video is displayed to an operator of the vehicle. 2. The system of claim 1, wherein the back-up camera is downwardly angled. 3. The system of claim 1, where electrical power is supplied to the display and to the back-up camera via a first port. 4. The system of claim 3, wherein the first port is a seven-pin circular plastic connector. 5. The system of claim 1, wherein video data is delivered from the back-up camera to the control unit via a second port. 6. The system of claim 5, wherein the second port is a four-pin circular plastic connector. 7. The system of claim 1, wherein the display includes a louver assembly. 8. The system of claim 1, wherein the display includes a cover. 9. The system of claim 8, wherein the back-up camera is positioned on the cover. 10. A back-up camera for use in a vehicle, the back-up camera comprising: a base section that is selectively securable to the vehicle; a camera located on an exterior of the base section; and a wiring connection electrically coupled to the camera and coupled to a controller. 11. The back-up camera of claim 10, wherein the camera is downwardly angled. 12. The back-up camera of claim 10, wherein the wiring connection is a four pin circular plastic connector. 13. The back-up camera of claim 10, comprising a gasket disposed between the base section and the vehicle. 14. The back-up camera of claim 10, comprising mounting screws that secure the base section to the vehicle. 15. A method of arranging a vehicular back-up camera, the method comprising: electrically coupling a display to a vehicle controller; electrically coupling a camera to the vehicle controller, the camera being disposed with the display; electrically coupling the vehicle controller to a general purpose input/output port of the vehicle, the general purpose input/output port providing a signal when the vehicle is placed in reverse; and responsive to the vehicle being placed in reverse, activating, via the vehicle controller, the camera. 16. The method of claim 15, comprising displaying to a vehicle operator an area behind the vehicle. 17. The method of claim 15, comprising displaying exterior messages via the display. 18. The method of claim 15, wherein the electrically coupling the display to the vehicle controller comprises utilizing a circular plastic connector. 19. The method of claim 15, wherein the electrically coupling the camera to the vehicle controller comprises utilizing a circular plastic connector.
A vehicular-signage system includes a control unit electrically coupled to a vehicle. The control unit is adapted to receive signals from the vehicle related to the vehicle being placed in reverse. A display is electrically coupled to the control unit. The display is adapted to receive signals from the control unit related to the display of a message. A back-up camera is disposed with the display. The back-up camera is activated by the control unit responsive to the vehicle being placed in reverse. The back-up camera transmits a video to the control unit.1. A system for vehicular signage, the system comprising: a control unit electrically coupled to a vehicle and adapted to receive signals from the vehicle related to the vehicle being placed in reverse; a display electrically coupled to the control unit, the display being adapted to receive signals from the control unit related to the display of a message; a back-up camera disposed with the display, the back-up camera being activated by the control unit responsive to the vehicle being placed in reverse; and wherein the back-up camera transmits a video to the control unit and the video is displayed to an operator of the vehicle. 2. The system of claim 1, wherein the back-up camera is downwardly angled. 3. The system of claim 1, where electrical power is supplied to the display and to the back-up camera via a first port. 4. The system of claim 3, wherein the first port is a seven-pin circular plastic connector. 5. The system of claim 1, wherein video data is delivered from the back-up camera to the control unit via a second port. 6. The system of claim 5, wherein the second port is a four-pin circular plastic connector. 7. The system of claim 1, wherein the display includes a louver assembly. 8. The system of claim 1, wherein the display includes a cover. 9. The system of claim 8, wherein the back-up camera is positioned on the cover. 10. A back-up camera for use in a vehicle, the back-up camera comprising: a base section that is selectively securable to the vehicle; a camera located on an exterior of the base section; and a wiring connection electrically coupled to the camera and coupled to a controller. 11. The back-up camera of claim 10, wherein the camera is downwardly angled. 12. The back-up camera of claim 10, wherein the wiring connection is a four pin circular plastic connector. 13. The back-up camera of claim 10, comprising a gasket disposed between the base section and the vehicle. 14. The back-up camera of claim 10, comprising mounting screws that secure the base section to the vehicle. 15. A method of arranging a vehicular back-up camera, the method comprising: electrically coupling a display to a vehicle controller; electrically coupling a camera to the vehicle controller, the camera being disposed with the display; electrically coupling the vehicle controller to a general purpose input/output port of the vehicle, the general purpose input/output port providing a signal when the vehicle is placed in reverse; and responsive to the vehicle being placed in reverse, activating, via the vehicle controller, the camera. 16. The method of claim 15, comprising displaying to a vehicle operator an area behind the vehicle. 17. The method of claim 15, comprising displaying exterior messages via the display. 18. The method of claim 15, wherein the electrically coupling the display to the vehicle controller comprises utilizing a circular plastic connector. 19. The method of claim 15, wherein the electrically coupling the camera to the vehicle controller comprises utilizing a circular plastic connector.
2,400