Patent application number | Description | Published |
20100063732 | NAVIGATION COMMUNICATION WITH SELF-IDENTIFYING ELEMENTS - A navigation device includes a communication subsystem and a navigation subsystem. The communication subsystem communicates with a remote navigation database via a gateway using variable-size data payloads. Each variable-size data payload is accompanied by a content-identifier and a size-identifier. The navigation subsystem determines a current position of the navigation device and encodes the current position of the navigation device as one or more position payloads that are sent from the communication subsystem to the remote navigation database via the gateway. Each position payload is sent with an accompanying content-identifier and size-identifier. | 03-11-2010 |
20100293033 | DELIVERING CONTEXTUAL ADVERTISING TO A VEHICLE - Systems and methods are provided for delivering contextual advertising to a vehicle. An example system may include a profiler module executed by an onboard computing device of the vehicle, and configured to aggregate vehicle event data from a plurality of vehicle-based event sources, and to develop user profile data based on the vehicle event data. A communication agent may also be executed by the onboard computing device, and configured to transmit the user profile data to an advertising service executed on an advertising server via a communication network. The communication agent may also be configured to retrieve an advertisement from the advertising service. The advertisement may be selected based on content of the user profile data. The system may also include an interface module executed by the onboard computing device, and configured to present the advertisement via a display, and/or speaker associated with the onboard computing device. | 11-18-2010 |
20100293607 | LINKING WEB IDENTITY AND ACCESS TO DEVICES - Systems and methods are provided for linking a web identity and a portable device to provide web access to a user from a vehicle. An example system includes a presence agent that may be configured to validate the presence of the portable device in the vehicle by recognizing a device identifier saved on the portable device. After the presence of the portable device is validated, a security manager may receive a user identifier, and to verify if the user identifier corresponds with a known user value. Then, the security manager may send a user identity secure proxy to a credential manager. The credential manager may be configured to receive the user identity secure proxy, and in response, pass one or more credentials to a computing device onboard the vehicle. The credentials may indicate that the user is authorized to access one or more web services from the computing device. | 11-18-2010 |
Patent application number | Description | Published |
20120151008 | Real-Time Media Optimization Over Remoted Sessions - Real-time media optimization may be provided. First, a remote session may be established with a remote computing device. Then, during the remote session, non-real-time media data may be exchanged with the remote computing device over a server path. Moreover, real-time media data may be exchanged with the remote computing device over a media path during the remote session. | 06-14-2012 |
20150078332 | VOICE CALL CONTINUITY IN HYBRID NETWORKS - Voice call continuity is provided for calls that are carried over a hybrid network infrastructure in which access connections are distributed over loosely coupled network portions including a backend network such as a core VoIP (Voice over Internet Protocol) service network, one or more cellular mobile networks, and a public switched telephone network (“PSTN”). The calls are routed through the core VoIP network regardless of their points of origination or termination in other network portions so that signaling and call context are anchored in the core VoIP network. The conditions under which user equipment operate are continuously monitored so that when a connection is determined to have been unacceptably degraded or is likely to be interrupted, and/or a more optimal connection is available, a handover of the call to another connection is initiated so that call continuity is maintained using the lowest cost connection that provides acceptable call quality. | 03-19-2015 |
20150188727 | TUNNELING VOIP CALL CONTROL ON CELLULAR NETWORKS - Signaling from a mobile device is transparently tunneled through a cellular voice network to a Voice over Internet Protocol (“VoIP”) core network so that multi-party calls, including conference calls and call waiting, can be managed entirely within the VoIP core network. The tunneled signals enable call control to be implemented in the VoIP core network and also establish a way to communicate requests, instructions, and call state. The signaling is transparent to the cellular network because that network does not receive and interpret the signaling. Instead, the cellular network's existing and unmodified control plane is repurposed by the mobile device by placing new, brief outgoing calls through the cellular network to the VoIP core network where the called party number (i.e., the caller-ID) encodes specific information. The VoIP core network immediately releases the new cellular call once the caller-ID is received and the encoded information is interpreted. | 07-02-2015 |
20150189556 | CALL HANDOFF INITIATION IN HYBRID NETWORKS - A continual learning process is applied to a class of risk estimate-based algorithms and associated risk thresholds used for deciding when to initiate a handoff between different types of network connections that are available to a mobile device having telephony functionality. The process is implemented as a virtuous loop providing ongoing tuning and adjustment to improve call handoff algorithms and risk thresholds so that handoffs can be performed with the goals of minimizing dropped calls and unacceptable degradation in call quality as well as avoiding premature handoffs. Device characteristics, environmental context, connection measurements, and outcomes of call handoff decisions are crowd-sourced from a population of mobile devices into a cloud-based handoff decision enabling service. The service evaluates potentially usable handoff decision algorithms and risk thresholds against archived crowd-sourced data to determine how they would have performed in real world situations and delivers improved algorithms and risk thresholds to the mobile devices. | 07-02-2015 |
20160112468 | Real-Time Media Optimization Over Remoted Sessions - Real-time media optimization may be provided. First, a remote session may be established with a remote computing device. Then, during the remote session, non-real-time media data may be exchanged with the remote computing device over a server path. Moreover, real-time media data may be exchanged with the remote computing device over a media path during the remote session. | 04-21-2016 |
20160112941 | CONNECTION SELECTION IN HYBRID NETWORKS - A methodology for automatic selection of a connection, on behalf of a device user, to a hybrid network for calls is provided in which a combination of a variety of inputs is utilized to populate a filtered list of available connections that is sorted by connection cost in which the least costly connection is at the top of the list. The methodology is executed periodically, or in response to event occurrence such as a call event, and the connection at the top of the filtered sorted list is utilized as the preferred connection for calls. Preferred status may be persisted until the next execution of the methodology when a potentially different connection is selected as preferred. | 04-21-2016 |
Patent application number | Description | Published |
20100165840 | Triggering animation actions and media object actions - Technologies are described herein for detecting and managing congestion on a shared network link. A determination is made whether the shared network link is congested based on loss rate and round-trip time (RTT) between a computer and a receiver operatively coupled by the shared network link. Upon determining that the shared network link is congested, a back-off operation is performed on the computer. The back-off operation may reduce an allocated bandwidth of the computer on the shared network link by transforming a higher allocated bandwidth into a lower allocated bandwidth. | 07-01-2010 |
20100165976 | HANDLING EARLY MEDIA IN VOIP COMMUNICATION WITH MULTIPLE ENDPOINTS - Technologies for handling early media in VoIP communications with multiple endpoints are provided. A calling device sends an initial VoIP call request to multiple destination devices, or endpoints. The calling device then receives a provisional response from one or more of the destination devices that includes media streaming parameters regarding the destination device. The calling device creates a media context associated with the destination device that contains the media streaming parameters and stores the media context. The calling device uses the media context to establish a media connection with the destination. One of the destination devices returning a provisional response is selected to exchange early media over the media connection established with the destination device. | 07-01-2010 |
20110149751 | Estimating Communication Conditions - Embodiments are configured to provide communication features, including providing channel condition estimates for a communication path, such as packet loss, jitter, and/or available bandwidth, but are not so limited. In an embodiment, a method uses aspects of in-band data packets to provide channel condition estimates. In one embodiment, a system includes a bandwidth estimation component that operates to classify payload packets as part of performing capacity estimation and available bandwidth estimation operations. | 06-23-2011 |
20110153863 | DISTRIBUTING BANDWIDTH ACROSS COMMUNICATION MODALITIES - Embodiments are configured to provide communication environments to communicating participants using a number of modality control features, but are not so limited. In an embodiment, a system includes a communications manager to manage an amount of available communication bandwidth to a number of communication modalities that include an audio modality, a video modality, an application sharing modality, and/or a file transfer modality. In one embodiment, available bandwidth can be distributed by controlling an audio state, a video state, an application sharing state, and/or a file transfer state, including using first and second distribution ratios as part of allocating available bandwidth. | 06-23-2011 |
20110205894 | TRAFFIC SHAPING FOR REAL TIME MEDIA STREAMS - A traffic shaper spaces out bursts of non-audio data traffic while allowing audio packets to be delivered in a more timely manner. The packets of bursts of non-audio packets are spaced such that audio packets are delivered at approximately the same spacing as before a burst of non-audio packets are submitted to be delivered. The packets for the non-audio data packets are scheduled based on the currently available bandwidth. | 08-25-2011 |
20110208802 | DISTRIBUTED CONNECTIVITY POLICY ENFORCEMENT WITH ICE - Instead of utilizing a centralized server or hardware (routers/gateways) to enforce connectivity policy restrictions, the policy connectivity restrictions for media session traffic are enforced by an endpoint that is involved in the media communication. Based on the policy requirements, the client enforces the policy restrictions by restricting the candidates that may be selected for the establishment of the media path. For example, the enforcement may result in the client selecting a path from available candidates that avoids congested Wide Area Network (WAN) links, avoiding a low bandwidth link, or possibly even failing the communication completely. The clients may also provide periodic updates to the policy server to allow tracking of the utilization of managed WAN links. | 08-25-2011 |
20160094586 | Media Session Between Network Endpoints - A media session between an initiating endpoint and a responding endpoint is effected, there being a plurality of available paths through a communication network via which the media session could be established. Type metrics associated with the available paths convey the directness of the available paths and are for making a selection of an available path for the media session. Network information indicative of the quality of the available paths and collected from a plurality of network nodes comprises contributions from network nodes other than the initiating and receiving endpoints which have current and/or have had past visibility of at least parts of the available paths. Said selection is influenced so as to cause the endpoints to select for the media session a higher quality but less direct available path in favour of a more direct but lower quality available path. | 03-31-2016 |
20160094589 | Media Session Between Network Endpoints - A media session between an initiating endpoint and a responding endpoint is established via a communication network. A set of candidate pairs is generated, each comprising a respective network address available to the initiating endpoint and a respective network address available to the responding endpoint by exchanging network addresses between the initiating endpoint and the responding endpoint. The media session is established using a candidate pair of the set determined to be valid. Connectivity checks are performed for at least one candidate pair of the set to determine whether or not the candidate pair is valid. The at least one candidate pair is selected in dependence on selection data pertaining to at least one of the network addresses and indicative of the quality of a path through the network that would be traversed were that network address to be used for the media session. | 03-31-2016 |
20160112466 | DISTRIBUTED CONNECTIVITY POLICY ENFORCEMENT WITH ICE - Instead of utilizing a centralized server or hardware (routers/gateways) to enforce connectivity policy restrictions, the policy connectivity restrictions for media session traffic are enforced by an endpoint that is involved in the media communication. Based on the policy requirements, the client enforces the policy restrictions by restricting the candidates that may be selected for the establishment of the media path. For example, the enforcement may result in the client selecting a path from available candidates that avoids congested Wide Area Network (WAN) links, avoiding a low bandwidth link, or possibly even failing the communication completely. The clients may also provide periodic updates to the policy server to allow tracking of the utilization of managed WAN links. | 04-21-2016 |
Patent application number | Description | Published |
20110276619 | DESKTOP SCREEN SHARING OVER HTTP - Sharing a desktop screen is implemented on a Hypertext Transfer Protocol (HTTP) web server using variable interval GET and POST requests. Connection to a web server bypasses firewall or shared IP limitations. In the described HTTP/HTTPS only solution, an existing web server is used to allow one or more clients to view a remote computer's screen and control it (remoting). The web server can act as an intermediary to enable one computer to “take control” of a second computer by enabling the first computer (a client) to view the desktop session of the second computer (a host) and enable the first computer to act as master for input device input (e.g., keyboard input, mouse input, stylus input, etc.) for the second computer. | 11-10-2011 |
20110276900 | USING DOUBLE BUFFERING FOR SCREEN SHARING - Remote desktop sharing allows a user to access applications and data on a remote computer over a network. An intermediary computer can communicate with a host computer and one or more client computers to facilitate remote desktop sharing. The host can send the intermediary computer an encoded key frame and encoded updates. The intermediary computer can decode the host screen data, and apply subsequent updates to the decoded image so that the intermediary computer has a near live host screen image in a first buffer. A second buffer on the intermediary computer can store an instance of a screen encoder for each client computer that has joined the session and the most current host image that the client computer has. The encoder compares the near live screen image and the stored client computer host image to create an encoded differential screen image update to pass to the client computer. | 11-10-2011 |
20150365468 | DESKTOP SCREEN SHARING OVER HTTP - Sharing a desktop screen is implemented on a Hypertext Transfer Protocol (HTTP) web server using variable interval GET and POST requests. Connection to a web server bypasses firewall or shared IP limitations. In the described HTTP/HTTPS only solution, an existing web server is used to allow one or more clients to view a remote computer's screen and control it (remoting). The web server can act as an intermediary to enable one computer to “take control” of a second computer by enabling the first computer (a client) to view the desktop session of the second computer (a host) and enable the first computer to act as master for input device input (e.g., keyboard input, mouse input, stylus input, etc.) for the second computer. | 12-17-2015 |
Patent application number | Description | Published |
20110307798 | Merging Modifications to User Interface Components While Preserving User Customizations - An application displays a user interface (UI) component. A client can apply customizations to this UI component. After the client applies customizations to the UI component, the client modifies a solution set containing solutions that modify the UI component. After the client modifies the solution set, the application displays a new version of the UI component. Modifications provided by the solutions in the solution set are applied to the new version of the UI component. In addition, the customizations remain applied to the UI component without the client manually re-applying the customizations to the UI component. | 12-15-2011 |
20130303190 | REQUESTING A LOCATION OF A USER - A user sends a location request to a user of a group that requests the user's current location. For example, one family member may send a location request to another family member that is part of their family group for their current location. The user receiving the request may accept the location request or reject the location request. When the location request is reject, the requesting user is not provided with the current location information of the user. When the location request is accepted, the requesting user is provided with the current location information of the user. In addition to providing the location information to the requesting user, the location may also be shared with other members of the group. For example, a message may be sent to each of the family members that are part of the group that informs them that a member has updated their location. | 11-14-2013 |
20150327015 | LOCATION TRACKING BASED ON OVERLAPPING GEO-FENCES - A system for controlling a device to track the location of the device is provided. The system identifies an initial location of the device. The system then identifies a plurality of areas having different sizes. Each area encompasses the identified location. For each of the areas, the system registers the area with a location provider to receive a notification when the location provider detects that the device has left the area. Upon receiving a notification that the device has left an area, the system may repeat the process of identifying the location and the areas and registering the areas to continue tracking the location of the device. | 11-12-2015 |
Patent application number | Description | Published |
20120154283 | CREATION, EDITING AND NAVIGATION OF DIAGRAMS - Organizing data where the data has spatial significance. A method includes, at a user interface, displaying to a user a representation of spatially structured data. User input is received at a computer implemented user interface through one or more hardware user interface devices. The user input is domain agnostic, but has a spatial connotation. Based on pre-existing structured data displayed at the user interface, a domain is determined for the user input. Based on the determined domain, the user input is interpreted into a domain specific response. The domain specific response is consistent with the spatial connotation across a plurality of domains. | 06-21-2012 |
20120159434 | CODE CLONE NOTIFICATION AND ARCHITECTURAL CHANGE VISUALIZATION - A code verification system is described herein that provides augmented code review with code clone analysis and visualization to help software developers automatically identify similar instances of the same code and to visualize differences in versions of software code over time. The system uses code clone search technology to identify code clones and to present the user with information about similar code as the developer makes changes. The system may provide automated notification to the developer or to other teams as changes are made to code segments with one or more related clones. The code verification system also helps the developer to understand architectural evolution of a body of software code. The code verification system provides an analysis component for determining architectural differences based on the code clone detection result between the two versions of the software code base. The code verification system also provides a user interface component for displaying identified differences to developers and others involved with the software development process in intuitive and useful ways. | 06-21-2012 |
20120324423 | NAVIGATION HISTORY VISUALIZATION IN INTEGRATED DEVELOPMENT ENVIRONMENT - An integrated development environment displays a diagram that indicates relationships between code elements navigated by a user. The diagram provides a visualization of the navigation history of the user to allow the user to understand the code structure and flow of a program. A navigation history engine extracts the navigation history, generates the diagram, and displays the diagram adjacent to code displayed by a code editor. | 12-20-2012 |
20130268513 | ANNOTATIONS BASED ON HIERARCHICAL CATEGORIES AND GROUPS - Systems and methods for recommending entities to a user are presented. In at least one embodiment, a user is identified as belonging to one or more groups of users, or to a hierarchy of groups. A category of entities, preferred by at least of the hierarchy of identified groups, is identified. The category of entities preferred by the at least one identified group corresponds to the category of a user-preferred entity preferred by the user. An entity from the category of entities is selected; the selected entity is not the user-preferred entity. The selected entity is provided to the user as a recommended entity to the user. | 10-10-2013 |
20140179358 | MESSAGES AUGMENTED WITH STRUCTURED ENTITIES - Messages containing structured entities may be sent between devices in a way that leverages the existing Short Message Service (SMS) protocol. On the message sender's device, the sender may author a message indicating specific entities such as people, places, dates, or times. When the message is to be sent, an SMS representation of the message is sent to the recipient, and a full representation of the message, including the included entities, is sent to a server. If the SMS message is received at a device that is equipped with software that can retrieve and render the rich representation, then the device queries the server to determine whether there is a rich message that corresponds to the SMS message. If such a message exists, then the message is communicated to the recipient's device and is rendered in place of the SMS message. | 06-26-2014 |
Patent application number | Description | Published |
20090006847 | Filtering kernel-mode network communications - Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system. | 01-01-2009 |
20130152186 | FILTERING KERNEL-MODE NETWORK COMMUNICATIONS - Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system. | 06-13-2013 |
20150058628 | FILTERING KERNEL-MODE NETWORK COMMUNICATIONS - Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system. | 02-26-2015 |
Patent application number | Description | Published |
20090007251 | Host firewall integration with edge traversal technology - A host firewall can determine and consider whether unsolicited traffic is inbound from beyond the edge of the network and allow or block such traffic based at least in part upon this characteristic. In one implementation, an edge traversal parameter can be set on a host firewall rule, which typically includes other parameters such as port, protocol, etc. If the unsolicited traffic received via an edge traversal interface matches a host firewall rule that has the edge traversal criterion, then the firewall does not block the traffic. On the other hand, if the unsolicited traffic received via an edge traversal interface fails to satisfy the edge traversal criterion on any firewall rule, then the firewall blocks the traffic. | 01-01-2009 |
20100088418 | EDGE TRAVERSAL SERVICE DORMANCY - A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons. | 04-08-2010 |
20110302314 | EDGE TRAVERSAL SERVICE DORMANCY - A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons. | 12-08-2011 |
Patent application number | Description | Published |
20100174921 | DEVICE SIDE HOST INTEGRITY VALIDATION - Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a host computer system. The device compares hashes of host system data against valid hashes maintained in protected storage of the device. The host data may be a file, data block, and/or memory contents. The device takes action when the host system data does not match the information in protected storage, such as to log information about the mismatch and/or provide an indication of validation failure, e.g., via an LED and/or display screen output. Further, the comparison may be part of a boot process validation, and the action may prevent the boot process from continuing, or replace an invalid file. Alternatively, the validation may take place at anytime. | 07-08-2010 |
20140351544 | DEVICE SIDE HOST INTEGRITY VALIDATION - Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a host computer system. The device compares hashes of host system data against valid hashes maintained in protected storage of the device. The host data may be a file, data block, and/or memory contents. The device takes action when the host system data does not match the information in protected storage, such as to log information about the mismatch and/or provide an indication of validation failure, e.g., via an LED and/or display screen output. Further, the comparison may be part of a boot process validation, and the action may prevent the boot process from continuing, or replace an invalid file. Alternatively, the validation may take place at anytime. | 11-27-2014 |
20140380058 | Process Authentication and Resource Permissions - The techniques and systems described herein present various implementations of a model for authenticating processes for execution and specifying and enforcing permission restrictions on system resources for processes and users. In some implementations, a binary file for an application, program, or process may be augmented to include a digital signature encrypted with a key such that an operating system may subsequently authenticate the digital signature. Once the binary file has been authenticated, the operating system may create a process and tag the process with metadata indicating the type of permissions that are allowed for the process. The metadata may correspond to a particular access level for specifying resource permissions. | 12-25-2014 |
Patent application number | Description | Published |
20090313266 | Model Based Distributed Application Management - Aspects of the subject matter described herein relate to model based application management. In aspects, models are defined that include structural and behavioral characteristics, rules, relations, and so forth between entities of an application. An instruction regarding a management function is received. The models are used to generate actions that when executed manage the application in accordance with the instruction. | 12-17-2009 |
20090327465 | Distributed Configuration Orchestration for Network Client Management - Described is a network configuration management technology in which an orchestration point coordinates client machines and/or other machines to each run an activity with respect to the client machines to perform management tasks. The orchestration point controls the start of the activity. A management point and server may report progress. The orchestration point coordinates running the activities, e.g., serially or in parallel among the clients, and/or based on percentage of total machines allowed to simultaneously run an activity and/or current workload. Activities may include a task sequencing activity, a desired configuration management activity, a command set-related activity and/or a custom activity generated from a script, e.g., a PowerShell™ script. Also described is a replicator activity, which may be limited (e.g., based on a percentage of the total machines) and/or throttled (e.g., based on current load). | 12-31-2009 |