Patent application number | Description | Published |
20090271177 | EXTRACTING TREELET TRANSLATION PAIRS - In one embodiment of the present invention, a decoder receives a dependency tree as a source language input and accesses a set of statistical models that produce outputs combined in a log linear framework. The decoder also accesses a table of treelet translation pairs and returns a target dependency tree based on the source dependency tree, based on access to the table of treelet translation pairs, and based on the application of the statistical models. | 10-29-2009 |
20090326911 | MACHINE TRANSLATION USING LANGUAGE ORDER TEMPLATES - Many machine translation scenarios involve the generation of a language translation rule set based on parallel training corpuses (e.g., sentences in a first language and word-for-word translations into a second language.) However, the translation of a source corpus in a source language to a target corpus in a target language involves at least two aspects: selecting elements of the target language to match the elements of the source corpus, and ordering the target elements according to the semantic organization of the source corpus and the grammatic rules of the target language. The breadth of generalization of the translation rules derived from the training may be improved, while retaining contextual information, by formulating language order templates that specify orderings of small sets of target elements according to target element types. These language order templates may be represented with varying degrees of association with the alignment rules derived from the training in order to improve the scope of target elements to which the ordering rules and alignment rules may be applied. | 12-31-2009 |
20100223049 | MACHINE LANGUAGE TRANSLATION WITH TRANSFER MAPPINGS HAVING VARYING CONTEXT - A computer-implemented machine translation system translates text from a first language to a second language. The system includes a plurality of mappings, each mapping indicative of associating a dependency structure of the first language with a dependency structure of the second language, wherein at least some of the mappings correspond to dependency structures of the first language having varying context with some common elements, and associated dependency structures of the second language to the dependency structures of the first language. A module receives input text in a first language and outputs output text in a second language based on accessing the plurality of mappings. | 09-02-2010 |
20140173200 | NON-BLOCKING CACHING TECHNIQUE - The described implementations relate to processing of electronic data. One implementation is manifested as a system that can include a cache module and at least one processing device configured to execute the cache module. The cache module can be configured to store data items in slots of a cache structure, receive a request for an individual data item that maps to an individual slot of the cache structure, and, when the individual slot of the cache structure is not available, return without further processing the request. For example, the request can be received from a calling application or thread that can proceed without blocking irrespective of whether the request is fulfilled by the cache module. | 06-19-2014 |
20150347399 | In-Call Translation - Call audio of a call between a source user speaking a source language and a target user speaking a target language is received from a remote source user device of a source user via a communication network of a communication system, the call audio comprising speech of the source user in the source language. An automatic speech recognition procedure is performed on the call audio. A translation of the source user's speech is generated in the target language using the results of the speech recognition procedure. A translated synthetic speech audio version of the source user's speech is mixed with the source user's call audio and/or with translated audio of the target user's speech in the source language. The mixed audio signal is transmitted to a remote target user device of the target user via the communication network for outputting to at least the target user during the call. | 12-03-2015 |
20150350451 | In-Call Translation - The disclosure pertains to a communication system for effecting a voice or video call between at least a source user speaking a source language and a target user speaking a target language. A translation procedure is performed on call audio of the call to generate an audio translation of the source user's speech in the target language for outputting to the target user. A notification is outputted to the target user to notify the target user of a change in the behaviour of the translation procedure, the change relating to the generation of the translation. | 12-03-2015 |
Patent application number | Description | Published |
20100228962 | OFFLOADING CRYPTOGRAPHIC PROTECTION PROCESSING - Some embodiments are directed to processing packet data sent according to a security protocol between a first computer and a second computer via a forwarding device. The forwarding device performs a portion of the processing, and forwards the packet data to a third computer, connected to the forwarding device, for other processing. The third computer may support non-standard extensions to the security protocol, such as extensions used in authorizing and establishing a connection over the secure protocol. The packet data may be subject to policies, such as firewall policies or security policies, that may be detected by the third computer. The third computer sends the results of its processing, such as a cryptographic key, or a detected access control policy, to the forwarding device. | 09-09-2010 |
20100318799 | DISCOVERY OF SECURE NETWORK ENCLAVES - A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located. | 12-16-2010 |
20100318800 | KEY MANAGEMENT IN SECURE NETWORK ENCLAVES - A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located. | 12-16-2010 |
20110131417 | IDENTITY BASED NETWORK POLICY ENABLEMENT - Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between two endpoint peers individually having the capability to identify and authenticate one or both of the endpoint peers. Communication session establishment, endpoint peer identity processing and authentication and data traffic encryption protocols are modified to allow intermediaries to track the communications between endpoint peers for a particular communication session and obtain information to authenticate the endpoint peers and identify data traffic transmitted between them. Intermediaries can use the identities of one or both of the endpoint peers to enforce identity based rules for processing data traffic between the endpoint peers for a communication session. | 06-02-2011 |
20120157038 | OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS - A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network. | 06-21-2012 |
20130067042 | DYNAMICALLY ALLOCATING NETWORK RESOURCES FOR COMMUNICATION SESSION - A primary call admission controller (CAC) system receives a request from a client to allocate a network resource such as a network bandwidth. The primary CAC system may determine subordinate CAC to delegate the allocation and transfer the request to the subordinate CAC. Subsequently, the subordinate CAC analyzes the communication session attributes to determine an available network resource for the communication session. Upon a positive determination, the subordinate CAC allocates the network resource and signals the allocation up the network chain to the primary CAC and the client. | 03-14-2013 |
20130097424 | DISCOVERY OF SECURE NETWORK ENCLAVES - A hierarchical key generation and distribution mechanism for a computer system in which devices are organized into secure enclaves. The mechanism enables network access to be tailored to approximate minimum needed privileges for each device. At the lowest level of the hierarchy, keys are used to form security associations between devices. Keys at each level of the hierarchy are generated from keys at a higher level of the hierarchy and key derivation information. Key derivation information is readily ascertainable, either from identifiers for devices or from within messages, supporting hardware offload of cryptographic functions. Because keys may be generated based on the enclaves in which the hosts participating in a security association are located, the system includes a mechanism by which devices can discover the enclave in which they are located. | 04-18-2013 |
20130217357 | OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS - A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network. | 08-22-2013 |
20130254412 | UNIFIED COMMUNICATION AWARE NETWORKS - Unified Communication and Collaboration (UC&C) systems are enabled to dynamically enlighten a set of network elements (NEs) and/or network infrastructure with application awareness so that an accurate set of rules or actions can be applied for a given session without needing to lookup the payload of every packet or applying a somewhat ineffective expensive heuristic mechanisms. Taking advantage of typically longer communication session durations and separate control and media planes, a UC&C control point programs a set of NEs for a given UC&C media flow within a scalable and timely manner. Quality of Service (QoS), security, monitoring, and similar functionality may also be programmed into the NEs through the UC&C control point. | 09-26-2013 |
20140136718 | DETECTING QUALITY OF SERVICE FOR UNIFIED COMMUNICATION AND COLLABORATION (UC&C) ON INTERNETWORKS - QoS support is detected during discovery of potential media paths between a source and a destination by examining the markings of each available media path and selecting a more suitable media candidate based on a set of QoS prioritization rules. Optionally, each endpoint may update a UC&C monitoring service with the QoS results of the candidate list discovery process so that any automated diagnostic and auditing systems can be alerted to any misconfigured Network Elements. | 05-15-2014 |
20140149572 | MONITORING AND DIAGNOSTICS IN COMPUTER NETWORKS - Various techniques of network monitoring and diagnostics in computer networks are disclosed herein. In one embodiment, a method includes configuring a network session between a first client device and a second client device interconnected to each other by the computer network. The configured network session having one or more encrypted attributes. The method also includes transmitting one or more of the encrypted attributes of the configured network session to a network management system for collecting information from one or more network elements connecting the first client device to the second client device during the network session. | 05-29-2014 |
20140323084 | OPERATING SYSTEM SUPPORTING COST AWARE APPLICATIONS - A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over one or more networks may be made available to the cost-aware application components through an application programming interface supported by an operating system service. That service may receive a policy for charging for data usage over a network and may also obtain information defining data usage for the mobile computing device. Based on this information, the service may determine a current basis for charging for data usage. With this information, the application component can determine a manner for executing network operations that involve data transmission over the network, such as deferring the operation or selecting an alternative network. | 10-30-2014 |
Patent application number | Description | Published |
20150113164 | Path Routing for Communication Sessions - Techniques for path routing for communication sessions are described. In at least some embodiments, a communication session refers to an exchange of communication data between different nodes in a network. According to various embodiments, a routing path for a communication session includes peering points between different networks to enable communication sessions to be routed between devices connected to the different networks. In an event that performance degradation occurs in a communication session over a particular routing path, techniques discussed herein enable the communication session to be rerouted to a different routing path. The different routing path, for example, may be indicated as providing a higher quality data flow than the original routing path. Thus, rerouting the communication session can improve the quality of user experience during the communication session. | 04-23-2015 |
20150117198 | Service Policies for Communication Sessions - Techniques for service policies for communication sessions are described. According to various embodiments, a service policy specifies various rules and/or procedures for handling communication sessions. For instance, a service policy can specify service priority designations to be applied to communication sessions based on various attributes of the communication sessions. Techniques discussed herein provide for automated and dynamic management of service policies in a variety of communication scenarios, e.g., via per-session customization of service policies. In at least some embodiments, techniques may be employed to remedy problems that may occur during a communication session, such as via bandwidth reallocation, dynamic remapping of routing paths, and so forth. | 04-30-2015 |
20150304165 | Session-based Device Configuration - Techniques for session-based device configuration are described. According to one or more implementations, various settings of a wireless device are configured to optimize device performance while participating in a communication session via a wireless network. The settings, for instance, are configured dynamically and on a per-session basis. | 10-22-2015 |
20150373546 | Device Quarantine in a Wireless Network - Techniques for device quarantine in a wireless network are described. According to various implementations, a device (e.g., a mobile client device) that requests a connection to a wireless network is placed in a quarantine state in the wireless network. Attributes of the device are determined and connection parameters are specified based on the attributes. In at least some embodiments, the device can be released from the quarantine state subject to the connection parameters. | 12-24-2015 |
20160007394 | Tethering Parameters for a Tethering Connection - Techniques for tethering parameters for a tethering connection are described. Implementations, for example, enable a tethered connection between a tethered device and a host device to be provisioned in various ways. | 01-07-2016 |
20160028854 | Synthetic Transactions Between Communication Endpoints - Techniques for synthetic transactions between communication endpoints are described. According to various embodiments, a synthetic transaction represents a simulation of a communication session between different communication endpoints. In at least some embodiments, performance attributes of a synthetic transaction may be recorded during various stages of the synthetic transaction. Based on the performance attributes, various actions may be taken to mitigate errors and optimize communication session performance. | 01-28-2016 |
20160036692 | Propagating Routing Awareness for Autonomous Networks - Techniques for propagating routing awareness for autonomous networks are described. In at least some embodiments, routing awareness refers to attributes of autonomous networks that route communication sessions between different endpoints. According to various embodiments, routing awareness indicates whether a particular autonomous network supports a protocol for propagating routing awareness among different autonomous networks. Routing awareness may also include performance attributes of autonomous networks. Such routing awareness enables entities involved in routing communication sessions to make informed decisions regarding routing and handling of communication sessions. | 02-04-2016 |
20160036919 | Propagating Communication Awareness for Communication Sessions - Techniques for propagating communication awareness for communication sessions are described. In at least some embodiments, a communication session refers to an exchange of communication media between different communication endpoints. According to various embodiments, communication awareness of a communication session is propagated among various autonomous networks involved in routing the communication session. Communication awareness, for instance, is propagated out-of-band from a data stream that carries the communication session. | 02-04-2016 |
Patent application number | Description | Published |
20120167185 | REGISTRATION AND NETWORK ACCESS CONTROL - In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client device. In another embodiment, a network interface device can receive a network access request from a client device to access a secure network utilizing extensible authentication protocol (EAP), and the request is communicated to an authentication service to authenticate a user of the client device based on user credentials. In another embodiment, a network interface device can receive a network access request from a client device to access a Web site in a public network utilizing a universal access method (UAM), and the request is redirected to the authentication service to authenticate a user of the client device based on user credentials. | 06-28-2012 |
20140237250 | Registration and Network Access Control - In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client device. In another embodiment, a network interface device can receive a network access request from a client device to access a secure network utilizing extensible authentication protocol (EAP), and the request is communicated to an authentication service to authenticate a user of the client device based on user credentials. In another embodiment, a network interface device can receive a network access request from a client device to access a Web site in a public network utilizing a universal access method (UAM), and the request is redirected to the authentication service to authenticate a user of the client device based on user credentials. | 08-21-2014 |
20150326560 | REGISTRATION AND NETWORK ACCESS CONTROL - In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client device. In another embodiment, a network interface device can receive a network access request from a client device to access a secure network utilizing extensible authentication protocol (EAP), and the request is communicated to an authentication service to authenticate a user of the client device based on user credentials. In another embodiment, a network interface device can receive a network access request from a client device to access a Web site in a public network utilizing a universal access method (UAM), and the request is redirected to the authentication service to authenticate a user of the client device based on user credentials. | 11-12-2015 |