Patent application number | Description | Published |
20090072997 | Collaborative Environmental Reporting - Methods, systems, and computer-readable media provide for the reporting of an environmental condition to vehicles prior to encountering the environmental condition. According to various embodiments described herein, local environment data corresponding to the environmental condition is collected from sensors on a vehicle. The local environment data is used to determine that the environmental condition exists at the current location of the vehicle. A notification that includes the geographic location of the environmental condition is created and provided to one or more other vehicles in the vicinity of the environmental condition. | 03-19-2009 |
20090092142 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR DYNAMIC COMMUNICATION DATA ROUTING BY A MULTI-NETWORK REMOTE COMMUNICATION TERMINAL - Methods, systems and computer program products of dynamic communication data routing by a multi-network remote communication terminal across a plurality of networks are provided. The multi-network remote communication terminal is delivered to a locality to receive communication services. The terminal is communicatively connected to a first network, a second network, the second network having a communication characteristic different from the first network, and to a user endpoint device positioned in the locality. Communication data directed to a target device from the user endpoint device is received at the terminal. A characteristic of the received communication data is determined. Routing of received communication data to the target device is allocated across the first network and/or the second network based on the determined characteristic of the received communication data and the communication characteristics of the first and second network. Routing of the received communication data is dynamically re-allocated based on a detected change in the characteristic of the communication data. | 04-09-2009 |
20090267756 | Collaborative Incident Media Recording System and Related Methods - Methods for responding to a potential incident are provided in which data about the potential incident is received from a first remote sensing unit. Additional remote sensing units are identified that may have additional data about the potential incident, and additional data about the potential incident is received from at least some of these additional remote sensing units. The totality of the received data is then analyzed, and at least one remote entity is automatically notified regarding the occurrence of the potential incident. | 10-29-2009 |
20110012753 | Collaborative Environmental Reporting - Methods, systems, and computer-readable media provide for the reporting of an environmental condition to vehicles prior to encountering the environmental condition. According to various embodiments described herein, local environment data corresponding to the environmental condition is collected from sensors on a vehicle. The local environment data is used to determine that the environmental condition exists at the current location of the vehicle. A notification that includes the geographic location of the environmental condition is created and provided to one or more other vehicles in the vicinity of the environmental condition. | 01-20-2011 |
20120272291 | Methods, Communication Networks, and Computer Program Products for Monitoring, Examining, and/or Blocking Traffic Associated with a Network Element Based on Whether the Network Element can be Trusted - A communication network is operated by determining whether a network element can be trusted and monitoring traffic associated with the network element based on whether the network element can be trusted. At least some of the monitored traffic may be selected for examination based on the degree of trust for the network element. At least some of the monitored and/or examined traffic is selected to be blocked based on the degree of trust for the network element. | 10-25-2012 |
20120302231 | COMPUTATIONAL SYNDROME DETECTOR - Example methods disclosed herein to monitor wireless system operation include processing a plurality of session records describing characteristics of wireless sessions in a coverage area of a wireless system to determine a first time interval for a first wireless device to propagate from a first access point in the coverage area to a second access point in the coverage area, determining a coverage area traversal rate for the first wireless device based on the first time interval, the coverage area traversal rate corresponding to a rate at which the first wireless device is traversing the coverage area, and providing a wireless service advisory for the coverage area to a second wireless device based on the coverage area traversal rate for the first wireless device. | 11-29-2012 |
20130013188 | PERSONAL WIRELESS COVERAGE MAP - Methods and systems respectively provide for receiving a wireless signal coverage map request from a wireless device. A map is generated in accordance with the request and provided to the wireless device. The map includes symbology keyed to wireless signal services within a particular geographic area. Such symbology can be indicative of recommended areas and travel routes having particular types of wireless signal coverage, regions of poor or non-existent wireless signal service, areas presently experiencing heavy wireless signal usage, and so on. In this way, a wireless device user can seek to access specific wireless services and/or avoid suspect trouble regions within a geographic area. | 01-10-2013 |
20130132264 | Bid-Based Control of Networks - Service by a packet switched network is controlled based on bids from consumer equipment. The bids may be compared to historical bids previously received from each of the consumer equipment. A low bid from one of the consumer equipment may be disregarded, based on a history of high bids. | 05-23-2013 |
20130151202 | COLLABORATIVE INCIDENT MEDIA RECORDING SYSTEM - Methods for responding to a potential incident are provided in which data about the potential incident is received from a first remote sensing unit. Additional remote sensing units are identified that may have additional data about the potential incident, and additional data about the potential incident is received from at least some of these additional remote sensing units. The totality of the received data is then analyzed, and at least one remote entity is automatically notified regarding the occurrence of the potential incident. | 06-13-2013 |
20130204530 | PERSONAL WIRELESS COVERAGE MAP - Methods and systems respectively provide for receiving a wireless signal coverage map request from a wireless device. A map is generated in accordance with the request and provided to the wireless device. The map includes symbology keyed to wireless signal services within a particular geographic area. Such symbology can be indicative of recommended areas and travel routes having particular types of wireless signal coverage, regions of poor or non-existent wireless signal service, areas presently experiencing heavy wireless signal usage, and so on. In this way, a wireless device user can seek to access specific wireless services and/or avoid suspect trouble regions within a geographic area. | 08-08-2013 |
Patent application number | Description | Published |
20100287609 | CONTENT PROTECTION MANAGEMENT SYSTEM - A content protection management system that enables interoperability with other Content Protection and DRM technologies. A managed security domain provides a simple, consistent and reliable experience to whole-home network subscribers. The architectural concept for the whole-home network includes an underlying control plane with an overlaying content security control plane running a particular DRM technology. | 11-11-2010 |
20110040894 | Side Loading - Side loading of content elements is provided. A selection of a content element from a terminal device may be received and a content format associated with the terminal device may be identified. If the content element is not available in the identified content format, the content element may be transcoded from a current content format to the identified content format and the content element may be transferred to the terminal device in the identified content format. | 02-17-2011 |
20110265111 | Broadcast Remote Control - Identifying user behaviors via remote control signal broadcasts may be provided. A content element such as a video may be displayed on a display device. During display of the content, a control signal may be received and deciphered. The deciphered control signal may be used to determine whether the content is being consumed by a user, and this determination may be logged and/or reported to the content provider. | 10-27-2011 |
20110267945 | Parameterized Quality of Service for Multimedia in a Coaxial Network - Parameterized Quality of Service (QoS) may be provided. In response to receiving a registration request from a device, a determination of resource availability may be made. If resources are available to satisfy data flows to the device, a flow priority may be established and the device may be added to the priority queue configuration. If the device later requests establishment of a data flow, the data flow may be transmitted at the established flow priority. | 11-03-2011 |
20110280249 | Service Gateways for Providing Broadband Communication - Systems, methods, and apparatus for providing broadband communication are described. A service gateway may be situated outside of one or more households. The service gateway may include a termination component and a broadband modem. The termination component may be configured to connect to a source of a broadband data signal and receive the signal from the source. The broadband modem may be configured to receive the signal from the termination component and output at least a portion of the signal for receipt by a remote device situated within a household. Additionally, the service gateway may optionally include a router in communication with the broadband modem. The router may be configured to function as an intermediary between the modem and the remote device. | 11-17-2011 |
20120008665 | Secured Broadband Device - Secured broadband devices and methods for providing broadband communication are provided. A broadband device may include a housing, at least one broadband component, and a securing mechanism. The at least one broadband component may be situated within the housing and configured to receive a broadband signal. Additionally, the at least one broadband component may be configured to output at least a portion of the broadband signal for receipt by one or more external devices. The securing mechanism configured to secure the housing to an electrical outlet. | 01-12-2012 |
20120086851 | SIDE LOADING - Side loading of content elements is provided. A selection of a content element from a terminal device may be received and a content format associated with the terminal device may be identified. If the content element is not available in the identified content format, the content element may be transcoded from a current content format to the identified content format and the content element may be transferred to the terminal device in the identified content format. | 04-12-2012 |
20120090020 | SIDE LOADING - Side loading of content elements is provided. A selection of a content element from a terminal device may be received and a content format associated with the terminal device may be identified. If the content element is not available in the identified content format, the content element may be transcoded from a current content format to the identified content format and the content element may be transferred to the terminal device in the identified content format. | 04-12-2012 |
20120131629 | SYSTEMS, METHODS, AND APPARATUS FOR RECORDING BROADBAND CONTENT - Systems, methods, and apparatus for recording broadband content are provided. A user command to record desired content included in broadband content output by a service provider may be received by a programming processing component configured to receive the output broadband content. The programming processing component may determine whether the desired content will be recorded by the programming processing component. If it is determined that the desired content will be recorded by the programming processing component, then the desired content may be stored by the programming processing component in at least one memory. If it is determined that the desired content will not be recorded by the programming processing component, then a request to record the desired content may be communicated by the programming processing component to a content recording server. | 05-24-2012 |
20120135684 | SYSTEMS AND METHODS FOR CUSTOMIZING BROADBAND CONTENT BASED UPON PASSIVE PRESENCE DETECTION OF USERS - Systems and methods for customizing broadband content based upon passive presence detection of users are provided. A user device in proximity to a customer premise device may be detected. The customer premise device may be configured to output programming content received from a service provider. An identifier of the detected user device may be determined. Based at least in part on the identifier, an identity of a user may be determined. Based at least in part on the identity of the user, content that is output by the customer premise device may be customized. | 05-31-2012 |
20120136658 | SYSTEMS AND METHODS FOR CUSTOMIZING BROADBAND CONTENT BASED UPON PASSIVE PRESENCE DETECTION OF USERS - Systems and methods for customizing broadband content based upon passive presence detection of users are provided. A sample of ambient audio may be collected by a customer premise device configured to output programming content received from a service provider. One or more audio components associated with the output of the customer premise device may be removed. Following the removal, a remainder of the collected sample may be compared to one or more stored user voice samples. Based at least in part on the comparison, one of an identity of a user or one or more user characteristics may be determined. Based at least in part on the determination, the content output by the customer premise device may be customized. | 05-31-2012 |
20140025769 | INTELLIGENT CACHING OF CONTENT ITEMS - Systems, methods, and computer-readable media for intelligent caching of content items are provided. A content item may be received by a caching device from a content provider based at least in part on a first request from a user. The caching device may determine a content viewing profile. The caching device may direct storage of the received content item for later retrieval. Additionally, the caching device may provide the stored content item to the user in response to a second request for the content. | 01-23-2014 |
20140026160 | SYSTEMS, METHODS, AND APPARATUS FOR DELIVERING CONTENT - Systems, methods, and apparatus for delivering content are provided. A request for desired content may be received by a content management server from a customer device associated with a customer. The content management server may include one or more computers. Additionally, the content management server may determine whether the customer device is in communication with one or more additional devices associated with the customer. Based at least in part upon the communication determination, the content management server may determine whether the customer device is located within a subscription area for the customer. Based at least in part upon the determination of whether the customer device is located within the subscription area, the content management server may determine access rights to the desired content. | 01-23-2014 |
Patent application number | Description | Published |
20110302236 | DYNAMIC CONTENT STREAM MANAGEMENT - Dynamic content stream management of may be provided. A selection of a content element may be received and an encoding scheme may be selected. The content element may be transmitted to the requesting client in the selected encoding scheme. During transmission, a different encoding scheme may be selected according to changing conditions, such as network congestion. The client may be switched over to receive the content element in the new encoding scheme instead of the originally selected encoding scheme. | 12-08-2011 |
20120230438 | TRANSPARENT SCALABLE VIDEO CODING - Transparent scalable video coding may be provided. Upon receiving a request for a content asset, such as from a subscriber's premises, a quality level associated with the content asset may be identified. A video coding layer and/or a plurality of layers associated with the content asset may be selected according to the identified quality level. The selected video coding layer(s) may be encoded into a video stream and provided to a display device (e.g., a television) associated with the request for the content asset. | 09-13-2012 |
20140116772 | SECURED BROADBAND DEVICE - Secured broadband devices and methods for providing broadband communication are provided. A broadband device may include a housing, at least one broadband component, and a securing mechanism. The at least one broadband component may be situated within the housing and configured to receive a broadband signal. Additionally, the at least one broadband component may be configured to output at least a portion of the broadband signal for receipt by one or more external devices. The securing mechanism configured to secure the housing to an electrical outlet. | 05-01-2014 |
Patent application number | Description | Published |
20090060177 | SIGNATURE SPECIFICATION FOR ENCRYPTED PACKET STREAMS - Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents. | 03-05-2009 |
20090147792 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR MANAGING QUALITY OF SERVICE, SESSION AUTHENTICATION AND/OR BANDWIDTH ALLOCATION IN A REGIONAL/ACCESS NETWORK (RAN) - Quality of Service (QoS) and/or bandwidth allocation is managed in a Regional/Access Network (RAN) that provides end-to-end transport between a Network Service Provider (NSP) and/or an Application Service Provider (ASP), and a Customer Premises Network (CPN) that includes a Routing Gateway (RG). A first subsystem is configured to manage QoS and/or bandwidth allocation for an access session in the CPN. A second subsystem is configured to manage QoS and/or bandwidth allocation for an application flow in the CPN. Thus, the RAN can independently manage QoS, session authentication and/or bandwidth allocation for an access session and for an application flow. | 06-11-2009 |
20100232313 | DETECTION OF ENCRYPTED PACKET STREAMS USING FEEDBACK PROBING - Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. A probe stream having a known observable parameter is generated. The observable parameter exhibits a known characteristic of a known type of data encrypted within a stream of packets. The probe stream is communicated to a network element via a communications network. When the probe stream is received by the network element, the network element can compare the known observable parameter to an actual value. Any difference between the known observable parameter and the actual value can be used to correct for network-induced variation and other effects, thus ensuring accurate detection and identification of data types within encrypted streams of packets. | 09-16-2010 |
20120269195 | METHODS OF IMPLEMENTING DYNAMIC QUALITY OF SERVICE OR BANDWIDTH PROVISIONING - A method of operating a data network may include establishing a data path through the data network between a routing gateway and service provider equipment providing a data service. Moreover, the data service may be provided for use at the routing gateway over the data path during a data session. A request may be received from the service provider equipment where the request defines a data flow characteristic for the data path between the routing gateway and the service provider equipment providing the data service. The data flow characteristic may then be transmitted to a network element along the data path between the routing gateway and the service provider equipment. A request from service provider equipment can include an allowed bandwidth or prioritization. Related methods, data networks, data service providers, routing gateways, and computer program products are also discussed. | 10-25-2012 |
20120317413 | DETECTION OF ENCRYPTED PACKET STREAMS USING A TIMER - Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. The type of data within an encrypted stream of packets is inferred using an observable parameter. The observable parameter is observable despite encryption obscuring the contents of the encrypted stream of packets. A timer is established that maintains settings despite changes in the type of inferred data. | 12-13-2012 |
20130160118 | Methods, Communication Networks, and Computer Program Products for Monitoring, Examining, and/or Blocking Traffic Associated with a Network Element Based on Whether the Network Element Can be Trusted - A communication network is operated by determining whether a network element can be trusted and monitoring traffic associated with the network element based on whether the network element can be trusted. At least some of the monitored traffic may be selected for examination based on the degree of trust for the network element. At least some of the monitored and/or examined traffic is selected to be blocked based on the degree of trust for the network element. | 06-20-2013 |
20130167197 | Methods, Systems, and Computer Program Products for Invoking Trust-Controlled Services Via Application Programming Interfaces (APIs) Respectively Associated Therewith - A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially untrustworthy network element poses in the communication network. Application programming interfaces (APIs) may automate the invocation of trust-controlled services. An API for a trust-controlled service may be used to directly perform a function on one or more resources in the communication network or may be used to set up an ongoing function on one or more resources in the communication network that may continue until the API is used to terminate the function. | 06-27-2013 |
20140059233 | Methods, Systems, and Computer Program Products for Modifying Bandwidth and/or Quality of Service for a User Session in a Network - Bandwidth and/or Quality of Service (QoS) for a user session may be modified in a network that includes a Regional/Access Network (RAN) that facilitates differentiated end-to-end data transport between a Network Service Provider (NSP) and/or an Application Service Provider (ASP) and a Customer Premises Network (CPN) that includes a Customer Premises Equipment (CPE) by receiving a request at the NSP and/or the ASP to change the bandwidth and/or QoS associated with the user's session. An Application Programming Interface (API) is used at the NSP and/or the ASP to communicate with the RAN to modify the bandwidth and/or QoS associated with the user's session. | 02-27-2014 |
20150078164 | METHODS OF IMPLEMENTING DYNAMIC QUALITY OF SERVICE OR BANDWIDTH PROVISIONING - A method of operating a data network may include establishing a data path through the data network between a routing gateway and service provider equipment providing a data service. Moreover, the data service may be provided for use at the routing gateway over the data path during a data session. A request may be received from the service provider equipment where the request defines a data flow characteristic for the data path between the routing gateway and the service provider equipment providing the data service. The data flow characteristic may then be transmitted to a network element along the data path between the routing gateway and the service provider equipment. A request from service provider equipment can include an allowed bandwidth or prioritization. Related methods, data networks, data service providers, routing gateways, and computer program products are also discussed. | 03-19-2015 |