Patent application number | Description | Published |
20120330715 | ENHANCED SYSTEMS, PROCESSES, AND USER INTERFACES FOR VALUATION MODELS AND PRICE INDICES ASSOCIATED WITH A POPULATION OF DATA - Enhanced systems, processes, and user interfaces are provided for targeted marketing associated with a population of assets, such as but not limited to any of real estate or solar power markets. For example, the enhanced system and process may create an ordered list from a population of data, wherein the list may be optimized by the likelihood of a given event, such as but not limited to any of the selling of a home by owner, the transition of a property from non-distressed to distressed, or the purchase of solar equipment. In some embodiments, enhanced valuation models and price indices are provided for one or more assets that are associated with a population of data. As well, enhanced scoring systems and processes are provided for one or more assets that are associated with a population of data. | 12-27-2012 |
20120330719 | ENHANCED SYSTEMS, PROCESSES, AND USER INTERFACES FOR SCORING ASSETS ASSOCIATED WITH A POPULATION OF DATA - Enhanced systems, processes, and user interfaces are provided for targeted marketing associated with a population of assets, such as but not limited to any of real estate or solar power markets. For example, the enhanced system and process may create an ordered list from a population of data, wherein the list may be optimized by the likelihood of a given event, such as but not limited to any of the selling of a home by owner, the transition of a property from non-distressed to distressed, or the purchase of solar equipment. In some embodiments, enhanced valuation models and price indices are provided for one or more assets that are associated with a population of data. As well, enhanced scoring systems and processes are provided for one or more assets that are associated with a population of data. | 12-27-2012 |
Patent application number | Description | Published |
20090204765 | DATA BLOCK FREQUENCY MAP DEPENDENT CACHING - A method for increasing the performance and utilization of cache memory by combining the data block frequency map generated by data de-duplication mechanism and page prefetching and eviction algorithms like Least Recently Used (LRU) policy. The data block frequency map provides weight directly proportional to the frequency count of the block in the dataset. This weight is used to influence the caching algorithms like LRU. Data blocks that have lesser frequency count in the dataset are evicted before those with higher frequencies, even though they may not have been the topmost blocks for page eviction by caching algorithms. The method effectively combines the weight of the block in the frequency map and its eviction status by caching algorithms like LRU to get an improved performance and utilization of the cache memory. | 08-13-2009 |
20110258378 | Optimizing a File System for Different Types of Applications in a Compute Cluster Using Dynamic Block Size Granularity - Embodiments of the invention relate to optimizing a file system for different types of applications in a compute cluster using dynamic block size granularity. An exemplary embodiment includes reserving a predetermined number of storage allocation regions for each node in a cluster, wherein each storage allocation region comprises a set of contiguous data blocks on a single storage disk of locally attached storage; using a contiguous set of data blocks on a single storage disk of locally attached storage as a file system's block allocation granularity for striping data to be stored in the file system for a compute operation in the cluster; and using a single data block of a shared storage subsystem as the file system's block allocation granularity for striping data to be stored in the file system for a data access operation in the cluster. | 10-20-2011 |
20120137094 | SNAPSHOT BASED REPLICATION - Embodiments of the invention relate to data replication and block allocation in a file system to support write transactions. Regions in a cluster file system are defined to support a block allocation. Blocks in the defined regions are allocated to support the data replication. A pipeline manager is provided to schedule population of the blocks in the allocated region(s) based upon network characteristics. | 05-31-2012 |
20120198269 | METHOD AND APPARATUS FOR APPLICATION RECOVERY IN A FILE SYSTEM - Embodiments of the invention relate to block layout and block allocation in a file system to support transparency of application processing. At least one copy of an application is replicated in a write affinity region of a secondary server, and at least one copy of the application is replicated in a wide striping region across a cluster file system. When the application is subject to failure, application processing is transferred from the failure location to the write affinity copy. At the same time, the failed application is rebuilt using the wide striping replication of the application. Once the application is rebuilt, processing may return to the failed location employing the rebuilt application. | 08-02-2012 |
20120284472 | SNAPSHOT BASED REPLICATION - Embodiments of the invention relate to data replication and block allocation in a file system to support write transactions. Regions in a cluster file system are defined to support a block allocation. Blocks in the defined regions are allocated to support the data replication. A pipeline manager is provided to schedule population of the blocks in the allocated region(s) based upon network characteristics. | 11-08-2012 |
20120284558 | APPLICATION RECOVERY IN A FILE SYSTEM - Embodiments of the invention relate to block layout and block allocation in a file system to support transparency of application processing. At least one copy of an application is replicated in a write affinity region of a secondary server, and at least one copy of the application is replicated in a wide striping region across a cluster file system. When the application is subject to failure, application processing is transferred from the failure location to the write affinity copy. At the same time, the failed application is rebuilt using the wide striping replication of the application. Once the application is rebuilt, processing may return to the failed location employing the rebuilt application. | 11-08-2012 |
20130138615 | SYNCHRONIZING UPDATES ACROSS CLUSTER FILESYSTEMS - Embodiments of the invention relate to synchronization of data in a shared pool of configurable computer resources. An image of the filesystem changes, including data and metadata, is captured in the form of a consistency point. Sequential consistency points are created, with changes to data and metadata in the filesystem between sequential consistency captured and placed in a queue for communication to a target filesystem at a target site. The changes are communicated as a filesystem operation, with the communication limited to the changes captured and reflected in the consistency point. | 05-30-2013 |
20130138616 | SYNCHRONIZING UPDATES ACROSS CLUSTER FILESYSTEMS - Embodiments of the invention relate to synchronization of data in a shared pool of configurable computer resources. An image of the filesystem changes, including data and metadata, is captured in the form of a consistency point. Sequential consistency points are created, with changes to data and metadata in the filesystem between sequential consistency captured and placed in a queue for communication to a target filesystem at a target site. The changes are communicated as a filesystem operation, with the communication limited to the changes captured and reflected in the consistency point. | 05-30-2013 |
20130227379 | EFFICIENT CHECKSUMS FOR SHARED NOTHING CLUSTERED FILESYSTEMS - Embodiments of the invention relate to efficiently employing checksums for shared nothing clustered filesystems. Tools are provided to compute the checksum in response to a read transaction and to utilize the computed checksum to prevent serving corrupted data. Multiple levels of data replication are provided. The checksum computation functions within the multiple levels and addresses a specified data block that is the subject of the read transaction. | 08-29-2013 |
20140122823 | GENERALIZED STORAGE ALLOCATION FOR MULTIPLE ARCHITECTURES - Embodiments of the invention relate to storage allocation in a storage system. One embodiment includes generating a request for storage space allocation in a particular storage device by a first node. An owner node associated with the particular storage device is determined by a first allocation client associated with the first node. The request is sent by the first allocation client to a second allocation client associated with the owner node. A storage device allocation region of the particular storage device is created, the allocation region comprising a height proportional to storage devices the owner node and the second allocation client are coupled with, and a width that is inversely proportional to a number of nodes sharing the particular storage device. | 05-01-2014 |
20140173185 | Write Performance in Fault-Tolerant Clustered Storage Systems - Embodiments of the invention relate to supporting transaction data committed to a stable storage. Committed data in the cluster is stored in the persistent cache layer and replicated and stored in the cache layer of one or more secondary nodes. One copy is designated as a master copy and all other copies are designated as replica, with an exclusive write lock assigned to the master and a shared write lock extended to the replica. An acknowledgement of receiving the data is communicated following confirmation that the data has been replicated to each node designated to receive the replica. Managers and a director are provided to support management of the master copy and the replicas within the file system, including invalidation of replicas, fault tolerance associated with failure of a node holding a master copy, recovery from a failed node, recovered of the file system from a power failure, and transferring master and replica copies within the file system. | 06-19-2014 |
20140173199 | Enhancing Analytics Performance Using Distributed Multi-Tiering - Embodiments of the invention relate to cluster-centric tiered storage with a flexible tier definition to support performance of transactions. Object data is distributed in a multi-tiered shared-nothing cluster. Hierarchical tiers of data storage are assigned different roles within the hierarchy. The tiers are managed globally across the cluster and objects are placed in tiers according to a flexible tier definition. The probability of object access is computed for objects, and objects are moved to different tiers responsive to the computation to minimize system runtime. The location of an object is further optimized in response to an access request. | 06-19-2014 |
20140173326 | Write Performance in Fault-Tolerant Clustered Storage Systems - Embodiments of the invention relate to supporting transaction data committed to a stable storage. Committed data in the cluster is stored in the persistent cache layer and replicated and stored in the cache layer of one or more secondary nodes. One copy is designated as a master copy and all other copies are designated as replica, with an exclusive write lock assigned to the master and a shared write lock extended to the replica. An acknowledgement of receiving the data is communicated following confirmation that the data has been replicated to each node designated to receive the replica. Managers and a director are provided to support management of the master copy and the replicas within the file system, including invalidation of replicas, fault tolerance associated with failure of a node holding a master copy, recovery from a failed node, recovered of the file system from a power failure, and transferring master and replica copies within the file system. | 06-19-2014 |
20150286415 | GENERALIZED STORAGE ALLOCATION FOR MULTIPLE ARCHITECTURES - Embodiments of the invention relate to storage allocation in a storage system. One embodiment includes adaptively determining, by a storage device processor, a region height across disk spaces of a group of storage devices that is proportional to a number of connected storage devices. The storage device processor adaptively determines a region width across the disk spaces for the group of storage devices that is inversely proportional to a number of nodes sharing a particular storage device. | 10-08-2015 |
20150331925 | Write Performance in Fault-Tolerant Clustered Storage Systems - Embodiments relate to supporting transaction data committed to a stable storage. Committed data in the cluster is stored in the persistent cache layer and replicated and stored in the cache layer of one or more secondary nodes. One copy is designated as a master copy and all other copies are designated as replica, with an exclusive write lock assigned to the master and a shared write lock extended to the replica. An acknowledgement of receiving the data is communicated following confirmation that the data has been replicated to each node designated to receive the replica. Managers and a director are provided to support management of the master copy and the replicas within the file system, including invalidation of replicas, fault tolerance associated with failure of a node holding a master copy, recovery from a failed node, recovered of the file system from a power failure, and transferring master and replica copies within the file system. | 11-19-2015 |
20160103850 | Synchronizing Updates Across Cluster Filesystems - The embodiments described herein relate to synchronization of data in a shared pool of configurable computer resources. One or more consistency points are created in a source filesystem. A first consistency point is compared with a second consistency point to detect a directory change at the source filesystem, which includes identifying at least one difference between the first and second consistency points. A file level change associated with an established directory at a target filesystem is identified responsive to the detection of the directory change. A link is established between the source filesystem and the target filesystem, and the established directory is updated based on the file level change. | 04-14-2016 |
Patent application number | Description | Published |
20080270395 | Relevance Bar for Content Listings - A client computer receives a set of search results ordered based on scheduled time of broadcast associated with respective listings of content. The listings of content include data representing time-bounded events. The client computer displays or otherwise presents a set of objects along an axis of a display bar, the objects corresponding to subsets of the search results. For example, the axis is associated with a unit of time or a unit of relevance. | 10-30-2008 |
20080270446 | Virtual Channels - A method and system for providing listings of multimedia events and for allowing a user to create virtual channels from the listings is described. The user can specify a headend or zip code and enter a search query to find multimedia events that are of interest to the user. In response, the system provides a list of multimedia events as the results of the user's search query. If the user so desires, the user can create a virtual channel based on the search results, according to certain embodiments of the invention. | 10-30-2008 |
20080270449 | Program Guide User Interface - A computer-implemented method includes receiving a search request related to media programming and generating a search. The result has a list of one or more collections of episodes responsive to the search request, and a schedule grid displaying a plurality of episodes on a plurality of different channels for a time period, including at least one program responsive to the search request. | 10-30-2008 |
20080270886 | Hiding Portions of Display Content - A computer-implemented method includes generating code for displaying a two-dimensional media programming schedule grid, receiving a command to compress the grid at a first location along a first dimension, and generating code for displaying the grid with visible graphical fold marks defining a fold area near the first location along the first dimension. | 10-30-2008 |
20080271078 | Momentary Electronic Program Guide - A computer-implemented method includes determining a time relative to a playing media program to insert a user notification, automatically generating a suggestion regarding a media program other than the playing media program to be presented to an audience member of the playing media program, providing, in a format for presentation on a user-related media player, the generated suggestion at the location in the playing media program, and causing the generation of a control that, when selected, performs an action related to the non-playing media program. | 10-30-2008 |
20080271080 | Customizable Media Channels - A computer-implemented method includes receiving an identification of a media program from a broadcast channel on an electronic program guide for inclusion in a personalized channel, adding the identified program to a personalized channel at a first time, and adding one or more additional programs to the personalized channel at times other than the first time. | 10-30-2008 |
20120254159 | System and Method for Displaying and Searching Multimedia Events Scheduling Information - A system for displaying information may include memory, one or more processors, and one or more modules stored in memory. The one or more modules are configured for execution by the one or more processors and may include instructions for: presenting a subset of a collection of data on a first grid having a first axis corresponding to units of time and a second axis, the collection of data comprising data representing time-bounded events; presenting a second grid having, first and second axes corresponding to the first and second axes of the first grid, the second grid corresponding to a larger portion of the collection of data than the subset presented on the first grid; and presenting a user moveable window for selecting a portion of the second grid, and selecting the subset presented on the first grid in accordance with a current position of the window. | 10-04-2012 |
20140007164 | System and Method for Displaying Multimedia Events Scheduling Information | 01-02-2014 |
20160088357 | System and Method for Displaying Multimedia Events Scheduling Information - Systems and methods for displaying program guide information are disclosed. In some implementations a method includes, at a computing device having one or more processors and memory storing one or more programs for execution by the one or more processors, formatting, for display, program guide data on a grid. The grid includes (i) a first axis representing units of time and (ii) a second axis representing multimedia channels. The program guide data comprises information representing a set of multimedia events. Responsive to a user-supplied selection of a multimedia event in the set of multimedia events a panel is overlaid on a portion of the grid. The panel provides additional data regarding the multimedia event. | 03-24-2016 |
Patent application number | Description | Published |
20130096971 | Facilitation of Multi-Project Management Using Critical Chain Methodology - A method on a computer for providing critical chain-based project management across a plurality of projects is disclosed. The method includes generating a plurality of plans, each of the plurality of plans corresponding to one of the plurality of projects, wherein a project comprises at least one task. The method further includes generating buffers for each of the plurality of projects and reconciling project resources among the plurality of projects. The method further includes executing the plurality of project plans, including allowing a user to manage the buffers across the plurality of projects. The user is further provided with information associated with buffers for the plurality of projects, so as to evaluate the status of the plurality of projects. Additionally, the user is provided with task prioritization for any task of the plurality of projects, wherein task prioritization is calculated across the plurality of projects. | 04-18-2013 |
20140122161 | WORKFLOW-BASED PROJECT MANAGEMENT - Systems and techniques are described for performing workflow-based project management. An embodiment can receive a scope tree and a sequence of steps, stages, and/or phases that one or more items in the scope tree go through. The embodiment can then generate a set of subprojects, streams, and/or tasks based on the received scope tree and the sequence of steps, stages, and/or phases. Note that each subproject, stream, or task is associated with an item in the scope tree and an item in the sequence of steps, stages, and/or phases. Next, the embodiment can generate a set of interdependencies between the set of subprojects, streams, and/or tasks based on the scope tree and the sequence of steps, stages, and/or phases. The embodiment can then create the project plan that includes the set of subprojects, streams, and/or tasks and the set of interdependencies between the set of subprojects, streams, and/or tasks. | 05-01-2014 |
Patent application number | Description | Published |
20140189331 | SYSTEM OF IMPROVED LOOP DETECTION AND EXECUTION - An method may include identifying loop information corresponding to a plurality of loop instructions. The loop instructions are stored into a queue. The loop instructions are replayed from the queue for execution. Loop iteration is counted based on the identified loop information. A determination of whether the last iteration of the loop is done. If the last iteration is not done, then continue replaying the loop instructions, until the last iteration is done. | 07-03-2014 |
20150278126 | Instruction and Logic for a Binary Translation Mechanism for Control-Flow Security - A processor includes a front end, an execution pipeline, and a binary translator. The front end includes logic to receive an instruction and to dispatch the instruction to a binary translator. The binary translator includes logic to determine whether the instruction includes a control-flow instruction, identify a source address of the instruction, identify a target address of the instruction, determine whether the target address is a known destination based upon the source address, and determine whether to route the instruction to the execution pipeline based upon the determination whether the target address is a known destination based upon the source address. The target address includes an address to which execution would indirectly branch upon execution of the instruction. | 10-01-2015 |
20160085287 | Performing Local Power Gating In A Processor - In an embodiment, the present invention includes an execution unit to execute instructions of a first type, a local power gate circuit coupled to the execution unit to power gate the execution unit while a second execution unit is to execute instructions of a second type, and a controller coupled to the local power gate circuit to cause it to power gate the execution unit when an instruction stream does not include the first type of instructions. Other embodiments are described and claimed. | 03-24-2016 |
Patent application number | Description | Published |
20100183024 | SIMPLIFIED RDMA OVER ETHERNET AND FIBRE CHANNEL - A new transport protocol between the IP layer and the DDP layer for use with RDMA operations. The embodiments all operate on a CEE-compliant layer 2 Ethernet network to allow the new transport protocol to be simplified, providing higher performance and simpler implementation. The new protocol allows a CEE-compliant layer 2 Ethernet network to provide data networking using IP, storage using FCoE, and RDMA using IP and the new transport protocol, without suffering the previous performance penalties in any of these aspects. | 07-22-2010 |
20100246388 | REDUNDANT HOST CONNECTION IN A ROUTED NETWORK - One embodiment of the present invention provides a switch. The switch includes a management mechanism and a configuration mechanism. During operation, the management mechanism is configured to operate the switch in conjunction with the partner switch as a single logical switch. The configuration mechanism is configured to assign a virtual switch identifier to the logical switch. | 09-30-2010 |
20110093637 | Interrupt Moderation - A technique for interrupt moderation allows coalescing interrupts from a device into groups to be processed as a batch by a host processor. Receive and send completions may be processed differently. When the host is interrupted for receive completions, it may check for send completions, reducing the need for interrupts related to send completions. Timers and a counter allow coalescing interrupts into a single interrupt that can be used to signal the host to process multiple completions. The technique is suitable for both dedicated interrupt line and message-signaled interrupts. | 04-21-2011 |
20120163175 | INGRESS RATE LIMITING - A network device monitors the traffic of individual flows through one of its ingress ports and, if the traffic volume exceeds a predetermined threshold, signals for a reduction in data traffic volume transmitted to that ingress port from one or more source devices. Example signals may include without limitation a unicast congestion message sent to the source of a flow, an Explicit Congestion Notification to one or more source devices, and the dropping of packets by the receiving device. In response to such signals, one or more of the source devices decrease the transmission rate of data traffic to the receiving device. | 06-28-2012 |
20120278514 | Systems and Methods for Notification of Quality of Service Violation - A quality of service (QoS) notification module can provide detection and notification of violation of allocated QoS to a transmission queue. The QoS notification module can be located on a network adapter and send notifications to a host computer coupled to the network adapter. QoS notifications can indicate that one or more host transmission queues are being underserved, i.e., the bandwidth guaranteed to the one or more host queues is not being met despite the queues not being empty. Notification module can send notification to the host by writing to a memory location or a notification register in the memory of the host. Alternatively, the notification module can send an interrupt to the host processor, the interrupt including QoS notification information. The notification module can also be located in a switch for generating notifications of QoS violations of bandwidth guarantees for transmission queues associated with transmission ports of the switch. | 11-01-2012 |
20120284444 | Interrupt Moderation - A technique for interrupt moderation allows coalescing interrupts from a device into groups to be processed as a batch by a host processor. Receive and send completions may be processed differently. When the host is interrupted for receive completions, it may check for send completions, reducing the need for interrupts related to send completions. Timers and a counter allow coalescing interrupts into a single interrupt that can be used to signal the host to process multiple completions. The technique is suitable for both dedicated interrupt line and message-signaled interrupts. | 11-08-2012 |
20130151744 | Interrupt Moderation - A technique for interrupt moderation allows coalescing interrupts from a device into groups to be processed as a batch by a host processor. Receive and send completions may be processed differently. When the host is interrupted for receive completions, it may check for send completions, reducing the need for interrupts related to send completions. Timers and a counter allow coalescing interrupts into a single interrupt that can be used to signal the host to process multiple completions. The technique is suitable for both dedicated interrupt line and message-signaled interrupts. | 06-13-2013 |
20140153385 | REDUNDANT HOST CONNECTION IN A ROUTED NETWORK - One embodiment of the present invention provides a switch. The switch includes a management mechanism and a configuration mechanism. During operation, the management mechanism is configured to operate the switch in conjunction with the partner switch as a single logical switch. The configuration mechanism is configured to assign a virtual switch identifier to the logical switch. | 06-05-2014 |
Patent application number | Description | Published |
20140040504 | ESTABLISHING APPLICATION-BASED ROUTING POLICIES IN MULTI-MODE USER EQUIPMENT - Techniques for establishing and implementing application-based routing policies for multi-mode wireless communication devices such as a user equipment (UE) are generally described herein. In some examples, information particular to the profile and platform configuration of the UE is communicated to an Access Network Discovery Function (ANDSF) server. The ANDSF server may provide an inter-system routing policy (ISRP) to handle appropriate network offloading actions for the particular application and device configuration. In some examples, the ISRP may be specific to flow-based or non-seamless based traffic offloading from certain software applications. The techniques described herein may be propagated from the ANDSF server and implemented in a variety of multi-mode UE mobile computing devices in connection with offloading policies established in a 3GPP Long Term Evolution/Long Term Evolution-Advanced (LTE/LTE-A) Evolved Packet Core (EPC) network architecture. | 02-06-2014 |
20140050086 | CONTROL AND DATA PLANE SOLUTIONS FOR CARRIER-AGGREGATION BASED WLAN OFFLOAD - Systems and methods for controlling data traffic offload to a WLAN (e.g., a Wi-Fi network) from a WWAN (e.g., a 4G LTE network) are generally disclosed herein. One embodiment includes data traffic offload techniques managed by a Radio Resource Control (RRC) in a networked device including offloading data at the IP, PDCP, RLC, or MAC layers; another embodiment includes data traffic offload techniques managed by a MAC Scheduler with RRC control. Configurations for multimode user equipment (UE) and multimode base stations are also described herein, including configurations for implementing a Multiple Radio Access Technology (Multi-RAT) aggregation function to offload data from a WWAN to a WLAN and transmit the data via the WLAN using a Layer 2 transport. | 02-20-2014 |
20140101726 | TRUSTED WLAN CONNECTIVITY TO 3GPP EVOLVED PACKET CORE - Systems, devices, and configurations to implement trusted connections within wireless networks and associated devices and systems are generally disclosed herein. In some examples, a wireless local area network (WLAN) may be attached to a 3GPP evolved packet core (EPC) as a trusted access network, without use of an evolved packet data gateway (ePDG) and overhead from related tunneling and encryption. Information to create the trusted attachment between a mobile device and a WLAN may be exchanged using Access Network Query Protocol (ANQP) extensions defined by IEEE standard 802.11u-2011, or using other protocols or standards such as DHCP or EAP. A trusted WLAN container with defined data structure fields may be transferred in the ANQP elements to exchange information used in the establishment and operation of the trusted attachment. | 04-10-2014 |
20140185597 | SECURE ON-LINE SIGNUP AND PROVISIONING OF WIRELESS DEVICES - Embodiments of a mobile device and method for secure online sign-up and provisioning of credentials for Wi-Fi hotspots are generally described herein. In some embodiments, provisioning occurs using a service set identifier (SSID) to associate with a hotspot and retrieve a virtual LAN (VLAN) identifier. The VLAN identifier is used to complete the signup and provisioning process. In some embodiments, a hotspot may implement a primary SSID and a dependent SSID. The mobile device associates with the hotspot using the dependent SSID to perform the secure online signup and provisioning process. Once credentials are obtained using the signup and provisioning process, the device can connect to the hotspot using the primary SSID and the already provisioned credentials. The provisioned credentials may include certificates, username/password, or SIM-type credentials. | 07-03-2014 |
20140185598 | BROADCAST BASED DISCOVERY OF WI-FI NETWORKS, DEVICES AND SERVICES - Embodiments reduce the time and energy expended to establish an initial link to a network. Some embodiments use either active or passive scans to discover available access points and then use a broadcast or multicast Generic Advertisement Service (GAS) Request message to identify access points providing requested services. Other embodiments use a broadcast or multicast GAS Request message to identify access points or mobile devices providing requested services without first scanning for access points. Only access points or mobile devices providing requested services need to respond to the GAS request message. Duplicate messages received by multiple access points coupled to the same network can be filtered so only one message is received and responded to. | 07-03-2014 |
20140187252 | DISTRIBUTED POLICY ARCHITECTURE - A mobile device may select between multiple networks in order to offload network traffic from one network to another. Policies under which network selection happens are established by network operators. A hierarchy of policy servers are established where a central policy server with policies established by a network operator can delegate authority for network switching to a local policy server with policies established by the same or a different network operator. The central policy server can establish criteria under which network switching or network selection is delegated to a local server. Policies from the local policy server can include information about local network conditions. A mobile device can use the policies from the central server and local server to select a network. | 07-03-2014 |
20150050942 | DISTRIBUTED POLICY ARCHITECTURE - A mobile device may select between multiple networks in order to offload network traffic from one network to another. Policies under which network selection happens are established by network operators. A hierarchy of policy servers are established where a central policy server with policies established by a network operator can delegate authority for network switching to a local policy server with policies established by the same or a different network operator. The central policy server can establish criteria under which network switching or network selection is delegated to a local server. Policies from the local policy server can include information about local network conditions. A mobile device can use the policies from the central server and local server to select a network. | 02-19-2015 |
20150110096 | SECURE ON-LINE SIGNUP AND PROVISIONING OF WIRELESS DEVICES - Embodiments of a mobile device and method for secure online sign-up and provisioning of credentials for Wi-Fi hotspots are generally described herein. In some embodiments, provisioning occurs using a service set identifier (SSID) to associate with a hotspot and retrieve a virtual LAN (VLAN) identifier. The VLAN identifier is used to complete the signup and provisioning process. In some embodiments, a hotspot may implement a primary SSID and a dependent SSID. The mobile device associates with the hotspot using the dependent SSID to perform the secure online signup and provisioning process. Once credentials are obtained using the signup and provisioning process, the device can connect to the hotspot using the primary SSID and the already provisioned credentials. The provisioned credentials may include certificates, username/password, or SIM-type credentials. | 04-23-2015 |
20150180978 | ONLINE SIGNUP PROVISIONING TECHNIQUES FOR HOTSPOT CONNECTIONS - Embodiments of system and method configurations for providing provisioning information to a mobile device via a wireless network access point are generally described herein. In some examples, a communication session is established between a mobile device and a service provider to obtain provisioning information for wireless network connectivity via a designated access point (e.g., a “hotspot”). A HTTP session is established within the communication session to exchange registration information via a browser of the mobile device. Provisioning information is returned within the communication session in a Subscription Management Object (MO) in response to successful completion of the HTTP session. The subscription MO is provided outside of the browser and the HTTP session (but within the communication session) using mechanisms such as OMA-DM or SOAP-XML communications. The mobile device can then utilize the provisioning information from the subscription MO to associate with an appropriate hotspot. | 06-25-2015 |
20150208274 | CONTROL AND DATA PLANE SOLUTIONS FOR CARRIER-AGGREGATION BASED WLAN OFFLOAD - Systems and methods for controlling data traffic offload to a WLAN (e.g., a Wi-Fi network) from a WWAN (e.g., a 4G LTE network) are generally disclosed herein. One embodiment includes data traffic offload techniques managed by a Radio Resource Control (RRC) in a networked device including offloading data at the IP, PDCP, RLC, or MAC layers; another embodiment includes data traffic offload techniques managed by a MAC Scheduler with RRC control. Configurations for multimode user equipment (UE) and multimode base stations are also described herein, including configurations for implementing a Multiple Radio Access Technology (Multi-RAT) aggregation function to offload data from a WWAN to a WLAN and transmit the data via the WLAN using a Layer | 07-23-2015 |
20150223146 | IMPLEMENTATIONS OF APPLICATION SPECIFIC ACCESS CLASS BARRING SKIP FUNCTIONALITY IN A WIRELESS NETWORK - User Equipment (UE) may skip the Access Class Barring (ACB) procedure for specific services, such as MMTEL voice, MMTEL video, and SMS. In one implementation, NAS layer of a UE may: receive, from an upper layer relative to the NAS layer, a request for a particular service type that is being originated by the UE; receive an indication, from a Radio Resource Control (RRC) layer of the UE, that access to a cell, associated with the UE, is barred; and bypass the indication that access to the cell is barred, when the particular service type matches a predetermined set of service types. The bypassing may include: requesting that the RRC layer establish an RRC connection for the service request, and notifying the RRC layer that the request for the RRC connection corresponds to the particular service type. | 08-06-2015 |
20150281998 | NETWORK ACCESS SELECTION BASED ON INTERNET PROTOCOL-MEDIA SUBSYSTEM SERVICE - Embodiments of user equipment and a method for network access selection based on IMS service are generally described herein. In some embodiments, the method includes a UE receiving a message from an ANDSF server comprising an ANDSF MO that includes an inter-system routing policy (ISRP) based on an Internet Protocol (IP) Multimedia Subsystem (IMS) service identifier. The UE may then offload IMS traffic from the cellular network to a non-cellular network based on the IMS service identifier and the ISRP. | 10-01-2015 |
20150350953 | RADIO RESOURCE CONTROL (RRC) PROTOCOL FOR CELL SELECTION AND TRAFFIC STEERING FOR INTEGRATED WLAN/3GPP RADIO ACCESS TECHNOLOGIES - An integrated WLAN/WWAN Radio Access Technology (RAT) architecture is described in which signaling used to control the integration of the WLAN/WWAN architecture is performed over the Radio Resource Control (RRC) plane. The integrated architecture may allow for User Equipment (UE) assistance in cell selection and traffic steering. In particular, UE-assisted RRC signaling is described for managing inter-RAT session transfers and secondary cell (SCell) selection. | 12-03-2015 |
20150350988 | RADIO RESOURCE CONTROL (RRC) PROTOCOL FOR INTEGRATED WLAN/3GPP RADIO ACCESS TECHNOLOGIES - An integrated WLAN/WWAN Radio Access Technology (RAT) architecture is described in which signaling used to control the integration of the WLAN/WWAN architecture is performed over the Radio Resource Control (RRC) plane. The integrated architecture may provide a network-controlled framework for performing traffic steering and radio resource management. | 12-03-2015 |
20150350989 | INTERWORKING/CO-EXISTENCE OF INTEGRATED WLAN/3GPP RAT ARCHITECTURES WITH LEGACY WLAN/3GPP INTERWORKING SOLUTIONS - An integrated WLAN/WWAN architecture is described, in which signaling used to control the integration of the WLAN/WWAN architecture is performed over the Radio Resource Control (“RRC”) plane. The integrated architecture may provide a network-controlled framework for performing traffic steering and radio resource management. Additionally, according to the disclosure provided herein, the integrated architecture may interwork with legacy systems (e.g., architectures that do not support the integrated WLAN/WWAN architecture). | 12-03-2015 |