Patent application number | Description | Published |
20100250918 | METHOD AND SYSTEM FOR IDENTIFYING AN APPLICATION TYPE OF ENCRYPTED TRAFFIC - The present relates to a method and a system for identifying an application type from encrypted traffic transported over an IP network. The method and system extract at least a portion of IP flow parameters from the encrypted traffic using at least one of specific target encryption types. Then, the method and system transmit the extracted IP flow parameters to a learning-based classification engine. The learning-based classification engine has been trained with unencrypted traffic. Then, the method and system infer at least one corresponding application type for the extracted IP flow parameters. | 09-30-2010 |
20100293567 | METHOD AND SYSTEM FOR REMOTE CONTROL INTERACTIONS ANALYTICS - The present relates to a method and a system for analyzing interactions between a remote control and associated multimedia appliances. The method and system intercept transmissions representative of the interactions between the remote control and the associated multimedia appliances, and extract there from data related to the interactions. Then, the method and system process and interpret the data related to the interactions, and allocate a timestamp to some of the interactions. The method and system also generate a subscriber's profile based on the interpretation of the data related to the interactions, store the subscriber's profile, and transmit the subscriber's profile to a centralized analytic server. | 11-18-2010 |
20110252438 | METHOD AND SYSTEM FOR COLLECTING AND ANALYZING INTERNET PROTOCOL TELEVISION TRAFFIC - A method and system for collecting and analyzing IPTV traffic in an IPTV network including end user premises, an access network, and an IP core network, wherein filtering sub-systems are deployed to collect in real time IPTV traffic using at least one access technology. The filtering sub-systems are deployed in at least one location selected from the group consisting of the end user premises, the access network, and the IP core network, and the at least one location of the filtering sub-systems is selected to collect IPTV traffic with a granularity at the level of the end users. The collected IPTV traffic is transmitted from the filtering sub-systems to a centralized analytic system, the collected IPTV traffic is aggretated in relation to the end users, and business intelligence and marketing oriented analysis is performed over the collected IPTV traffic using the centralized analytic system. | 10-13-2011 |
20120060198 | METHOD AND SYSTEM FOR GENERATING METRICS REPRESENTATIVE OF POLICY AND CHARGING CONTROL RULES - The present relates to a method and a system for generating metrics representative of Policy and Charging Control rules. The method and system analyzes, at a PCC rules analyzer, a Policy and Charging Control rule, to define at least one metric representative of the Policy and Charging Control rule. Then, the method and system transmits the at least one metric representative of the Policy and Charging Control rule, from the PCC rules analyzer to an analytic system. The method and system receives, at the analytic system, information representative of an IP data traffic occurring on an IP data network; and processes, at the analytic system, the information representative of the IP data traffic occurring on the IP data network, to calculate a value of the at least one metric representative of the Policy and Charging Control rule. | 03-08-2012 |
20120215793 | METHOD AND SYSTEM FOR MATCHING SEGMENT PROFILES TO A DEVICE IDENTIFIED BY A PRIVACY-COMPLIANT IDENTIFIER - The present relates to a method and system for matching segment profiles to a device identified by a privacy-compliant identifier. For doing so, the present method and system records at least one segment profile consisting of at least one criterion. The method and system allocates a unique segment identifier to the at least one segment profile. The method and system generates in real time a correlation between each specific segment profile and devices matching the at least one criterion of the specific segment profile. The method and system receives a query with a privacy-compliant identifier corresponding to a specific device; and sends a response with at least one matching segment identifier corresponding to at least one matching segment profile. For each of the at least one matching segment profile, the specific device identified by the privacy-compliant identifier matches the at least one criterion of the matching segment profile. | 08-23-2012 |
20120271941 | METHOD AND SYSTEM FOR EFFICIENT AND EXHAUSTIVE URL CATEGORIZATION - The present method and system relate to categorizing URLs (Uniform Resource Locators) of web pages accessed by multiple users over an IP (Internet Protocol) based data network. The method and system collect real time data from IP data traffic occurring on the IP based data network, and extract parameters from the collected real time data, the parameters including an URL of a web page. The URL is processed by a rule based categorization engine, to associate a matching category to the URL of the web page. When no matching category is inferred, the URL is transferred to a semantic based categorization engine. A matching category is associated to the transferred URL by the semantic based categorization engine, based on a semantic analysis of the textual content extracted from the web page associated to the URL. | 10-25-2012 |
20130019009 | METHOD AND SYSTEM FOR SUBSCRIBER JOURNEY ANALYTICS - The present method and system relate to analyzing journeys of at least one subscriber consuming a plurality of Internet services, using at least one device over multiple access technologies. The method and system store in a database, for each subscriber, a series of unique identifiers, each unique identifier corresponding to a specific device of the subscriber. The method and system collect, by means of multiple monitoring probes, real time data from IP traffic; and extract information from the collected real time data, the information comprising one of the unique identifiers. The information is transmitted to an analytic system, where it is aggregated per subscriber, using the unique identifiers to federate the plurality of devices for the same subscriber over the multiple access technologies. For each subscriber, a journey is generated, by processing the aggregated information with the analytic system. | 01-17-2013 |
Patent application number | Description | Published |
20090254905 | FACILITATING TRANSACTIONAL EXECUTION IN A PROCESSOR THAT SUPPORTS SIMULTANEOUS SPECULATIVE THREADING - Embodiments of the present invention provide a system that executes a transaction on a simultaneous speculative threading (SST) processor. In these embodiments, the processor includes a primary strand and a subordinate strand. Upon encountering a transaction with the primary strand while executing instructions non-transactionally, the processor checkpoints the primary strand and executes the transaction with the primary strand while continuing to non-transactionally execute deferred instructions with the subordinate strand. When the subordinate strand non-transactionally accesses a cache line during the transaction, the processor updates a record for the cache line to indicate the first strand ID. When the primary strand transactionally accesses a cache line during the transaction, the processor updates a record for the cache line to indicate a second strand ID. | 10-08-2009 |
20100031084 | CHECKPOINTING IN A PROCESSOR THAT SUPPORTS SIMULTANEOUS SPECULATIVE THREADING - Embodiments of the present invention provide a system for executing program code on a processor. In these embodiments, the processor is configured to start by using a primary strand to execute program code. Upon detecting a predetermined condition, the processor is configured to instantaneously checkpoint an architectural state of the primary strand and then use the subordinate strand to copy the checkpointed state to memory while using the primary strand to continue executing the program code without interruption. | 02-04-2010 |
20100049957 | RECOVERING A SUBORDINATE STRAND FROM A BRANCH MISPREDICTION USING STATE INFORMATION FROM A PRIMARY STRAND - Embodiments of the present invention provide a system that executes program code in a processor. The system starts by executing the program code in a normal mode using a primary strand while concurrently executing the program code ahead of the primary strand using a subordinate strand in a scout mode. Upon resolving a branch using the subordinate strand, the system records a resolution for the branch in a speculative branch resolution table. Upon subsequently encountering the branch using the primary strand, the system uses the recorded resolution from the speculative branch resolution table to predict a resolution for the branch for the primary strand. Upon determining that the resolution of the branch was mispredicted for the primary strand, the system determines that the subordinate strand mispredicted the branch. The system then recovers the subordinate strand to the branch and restarts the subordinate strand executing the program code. | 02-25-2010 |
20100180103 | MECHANISM FOR INCREASING THE EFFECTIVE CAPACITY OF THE WORKING REGISTER FILE - A computer processor pipeline has both an architectural register file and a working register file. The lifetime of an entry in the working register file is determined by a predetermined number of instructions passing through a specified stage in the pipeline after the location in the working register file is allocated for an instruction. The size of the working register file is selected based upon performance characteristics. A working register file creditor indicator is coupled to the front end pipeline portion and to the back end pipeline portion. The working register file credit indicator is monitored to prevent a working register file overflow. When the a location in the architectural register file is read early, the location is monitored to determine whether the location is written to prior to issuance of the instruction associated with the early read. | 07-15-2010 |
20100191993 | LOGICAL POWER THROTTLING - A processor includes a device providing a throttling power output signal. The throttling power output signal is used to determine when to logically throttle the power consumed by the processor. At least one core in the processor includes a pipeline having a decode pipe; and a logical power throttling unit coupled to the device to receive the output signal, and coupled to the decode pipe. Following the logical power throttling unit receiving the power throttling output signal satisfying a predetermined criterion, the logical power throttling unit causes the decode pipe to reduce an average number of instructions decoded per processor cycle without physically changing the processor cycle or any processor supply voltages. | 07-29-2010 |
20100268919 | METHOD AND STRUCTURE FOR SOLVING THE EVIL-TWIN PROBLEM - A register file, in a processor, includes a first plurality of registers of a first size, n-bits. A decoder uses a mapping that divides the register file into a second plurality M of registers having a second size. Each of the registers having the second size is assigned a different name in a continuous name space. Each register of the second size includes a plurality N of registers of the first size, n-bits. Each register in the plurality N of registers is assigned the same name as the register of the second size that includes that plurality. State information is maintained in the register file for each n-bit register. The dependence of an instruction on other instructions is detected through the continuous name space. The state information allows the processor to determine when the information in any portion, or all, of a register is valid. | 10-21-2010 |
20120331314 | LOGICAL POWER THROTTLING - A processor includes a device providing a throttling power output signal. The throttling power output signal is used to determine when to logically throttle the power consumed by the processor. At least one core in the processor includes a pipeline having a decode pipe; and a logical power throttling unit coupled to the device to receive the output signal, and coupled to the decode pipe. Following the logical power throttling unit receiving the power throttling output signal satisfying a predetermined criterion, the logical power throttling unit causes the decode pipe to reduce an average number of instructions decoded per processor cycle without physically changing the processor cycle or any processor supply voltages. | 12-27-2012 |
Patent application number | Description | Published |
20140115128 | DYNAMIC FUNCTIONALITY PARTITIONING - A sensor and processing system dynamically partitions functionality between various remote sensor nodes and a processing subsystem based on available communication capabilities. Redundant functionality is located at the processing subsystem and each of the various remote sensor nodes, and each sensor node coordinates with the processing subsystem to determine the location (e.g., at the processing subsystem or at the sensor node) at which a particular functionality is executed. | 04-24-2014 |
20140115372 | ENERGY MANAGEMENT BY DYNAMIC FUNCTIONALITY PARTITIONING - A sensor and processing system dynamically partitions or allocates functionality between various remote sensor nodes and a processing subsystem based on energy management management considerations. Redundant functionality is located at the processing subsystem and each of the various remote sensor nodes, and each sensor node coordinates with the processing subsystem to determine the location (e.g., at the processing subsystem or at the sensor node) at which a particular functionality is executed. | 04-24-2014 |
20140185457 | COST-EFFECTIVE MOBILE CONNECTIVITY PROTOCOLS - Structures and protocols are presented for signaling a status or decision concerning a wireless service or device within a region to a network participant or other communication device (smartphone or motor vehicle, e.g.). | 07-03-2014 |
20140187145 | COST-EFFECTIVE MOBILE CONNECTIVITY PROTOCOLS - Structures and protocols are presented for signaling a status or decision concerning a wireless service or device within a region to a network participant or other communication device (smartphone or motor vehicle, e.g.). | 07-03-2014 |
20140187161 | COST-EFFECTIVE MOBILE CONNECTIVITY PROTOCOLS - Structures and protocols are presented for signaling a status or decision concerning a wireless service or device within a region to a network participant or other communication device (smartphone or motor vehicle, e.g.). | 07-03-2014 |
20140187279 | COST-EFFECTIVE MOBILE CONNECTIVITY PROTOCOLS - Structures and protocols are presented for signaling a status or decision concerning a wireless service or device within a region to a network participant or other communication device (smartphone or motor vehicle, e.g.). | 07-03-2014 |
20140189846 | COST-EFFECTIVE MOBILE CONNECTIVITY PROTOCOLS - Structures and protocols are presented for signaling a status or decision concerning a wireless service or device within a region to a network participant or other communication device (smartphone or motor vehicle, e.g.). | 07-03-2014 |
20140223098 | DYNAMIC MANAGEMENT OF HETEROGENOUS MEMORY - A method of operating a computing device includes dynamically managing at least two types of memory based on workloads, or requests from different types of applications. A first type of memory may be high performance memory that may have a higher bandwidth, lower memory latency and/or lower power consumption than a second type of memory in the computing device. In an embodiment, the computing device includes a system on a chip (SoC) that includes Wide I/O DRAM positioned with one or more processor cores. A Low Power Double Data Rate 3 dynamic random access memory (LPDDR3 DRAM) memory is externally connected to the SoC or is an embedded part of the SoC. In embodiments, the computing device may be included in at least a cell phone, mobile device, embedded system, video game, media console, laptop computer, desktop computer, server and/or datacenter. | 08-07-2014 |
20140262127 | MANAGEMENT OF EXTERIOR TEMPERATURES ENCOUNTERED BY USER OF A PORTABLE ELECTRONIC DEVICE - Described embodiments include a portable electronic device. The device includes a shell housing components of the portable electronic device having a heat-generating component. The device includes a heat-rejection element located at an exterior surface of the shell. The heat-rejection element is configured to reject heat received from the heat-generating component into an environment in thermal contact with the heat-rejection element. The device includes a controllable thermal coupler configured to regulate heat transfer to the heat-rejection element. The device includes a proximity sensor configured to determine a location of a user touch to the shell relative to the location of the heat-rejection element. The device includes a thermal manager configured to regulate heat transfer by the controllable thermal coupler to the heat-rejection element in response to the determined location of the user touch relative to the location of the heat-rejection element. | 09-18-2014 |
20140262128 | MANAGEMENT OF EXTERIOR TEMPERATURES ENCOUNTERED BY USER OF A PORTABLE ELECTRONIC DEVICE USING MULTIPLE HEAT-REJECTION ELEMENTS - Described embodiments include a portable electronic device. The device includes a shell and a heat-generating component. The device includes a first and a second exterior heat-rejection element. Each heat-rejection element is configured to reject heat received from the heat-generating component into an environment. The device includes a controllable thermal coupler configured to regulate heat transfer to the first and second heat-rejection elements. The device includes a first proximity sensor configured to determine if a user touch to the shell is within a first zone of possible heat discomfort. The device includes a thermal manager configured to regulate heat transfer by the controllable thermal coupler to the first and second heat-rejection elements. The regulated heat transfer includes adjusting heat rejection away from the first heat-rejection element and toward the second heat-rejection element if the user touch is within the first zone. | 09-18-2014 |
20140266405 | MANAGEMENT OF EXTERIOR TEMPERATURES ENCOUNTERED BY USER OF A PORTABLE ELECTRONIC DEVICE BY REDUCING HEAT GENERATION BY A COMPONENT - Described embodiments include a portable electronic device. The device includes a shell housing components of the portable electronic device and a heat-generating component. The device includes a contact sensor configured to determine a user touch to the shell. The device includes a temperature sensor configured to determine an exterior temperature of the shell. The device includes a thermal manager configured to reduce the exterior shell temperature by regulating heat generation by the heat-generating component. The regulating heat generation is responsive to the determined user touch and the measured determined temperature of the shell. | 09-18-2014 |
20140268573 | MANAGEMENT OF EXTERIOR TEMPERATURES ENCOUNTERED BY USER OF A PORTABLE ELECTRONIC DEVICE IN RESPONSE TO AN INFERRED USER CONTACT WITH THE PORTABLE ELECTRONIC DEVICE - Described embodiments include a portable electronic device. The device includes a shell housing components of the portable electronic device having a heat-generating component. The device includes a heat-rejection element located at an exterior surface of the shell. The heat-rejection element is configured to reject heat received from the heat-generating component into an environment in thermal contact with the heat-rejection element. The device includes a controllable thermal coupler configured to regulate heat transfer to the heat-rejection element. The device includes an activity monitor configured to infer a user touch to the shell in response to a detected activity of the portable electronic device. The device includes a thermal manager configured to regulate heat transfer by the controllable thermal coupler to the heat-rejection element in response to the inferred user touch. | 09-18-2014 |
20140331019 | INSTRUCTION SET SPECIFIC EXECUTION ISOLATION - A system on a chip (SoC) or other integrated system can include a first processor and at least one additional processor sharing a page table. The shared page table can include permission bits including a first permission indicator supporting the processor and a second permission indicator supporting at least one of the at least one additional processor. In one implementation, that page table can include at least one additional bit to accommodate encodings that support the at least one additional processor. When one of the processors accesses memory, a method is performed in which a shared page table is accessed and a value of the permission indicator(s) is read from the page table to determine permissions for performing certain actions including executing a page; read/write of the page; or kernel mode with respect to the page. | 11-06-2014 |
20150124408 | MANAGEMENT OF EXTERIOR TEMPERATURES ENCOUNTERED BY USER OF A PORTABLE ELECTRONIC DEVICE IN RESPONSE TO AN INFERRED USER CONTACT WITH THE PORTABLE ELECTRONIC DEVICE - Described embodiments include a portable electronic device. The device includes a shell housing components of the portable electronic device having a heat-generating component. The device includes a heat-rejection element located at an exterior surface of the shell. The heat-rejection element is configured to reject heat received from the heat-generating component into an environment in thermal contact with the heat-rejection element. The device includes a controllable thermal coupler configured to regulate heat transfer to the heat-rejection element. The device includes an activity monitor configured to infer a user touch to the shell in response to a detected activity of the portable electronic device. The device includes a thermal manager configured to regulate heat transfer by the controllable thermal coupler to the heat-rejection element in response to the inferred user touch. | 05-07-2015 |