Patent application number | Description | Published |
20090125274 | SENSOR CONTROL - A system/method of controlling a sensor to sense one target from a plurality of targets includes predicting states of the targets. A set of probability distributions is generated. Each probability distribution in the set represents a setting or settings of at least one control parameter of the sensor. An expected information gain value for each said control parameter in the set is calculated. The information gain value represents an expected quality of a measurement of one of the targets taken by the sensor if controlled according to the control parameter, based on the predicted state of the target. Updating the set of probability distributions takes place to identify the sensor control parameters that maximise the expected information gain value. The sensor is then controlled in accordance with the maximising control parameters. | 05-14-2009 |
20110169951 | ESTIMATING STATES OF A PLURALITY OF TARGETS TRACKED BY A PLURALITY OF SENSORS - A method of estimating states of a plurality of targets tracked by a plurality of sensors. The method includes obtaining a plurality of data sets based on measurements taken by a plurality of sensors, each data set including information on states of a plurality of targets. The method then generates a plurality of target correlation data sets describing correlation of the targets within a first data set and at least one other data set. A Generalised Covariance Union (GCU) technique is used to merge at least some of the plurality of target correlation data sets to generate an estimate of the states of the plurality of targets. | 07-14-2011 |
20120000349 | ASSIGNING WEAPONS TO THREATS - System and method of assigning at least one weapon of a plurality of weapons to at least one threat of a plurality of threats. Data relating to a plurality of weapons and threats data relating to a plurality of threats is received and processed to select at least one of a plurality of weapons assignment techniques. The selected weapons assignment technique is applied to the data to produce data describing assignment of at least one of the plurality of weapons to at least one of the plurality of threats. | 01-05-2012 |
20120030154 | ESTIMATING A STATE OF AT LEAST ONE TARGET - A method of estimating a state of at least one target. The method includes obtaining at least one target measurement from a first sensor, and applying a Gaussian Process technique to a target measurement to obtain an updated target measurement. | 02-02-2012 |
20120059829 | OBJECT CLASSIFICATION - A method and apparatus for processing an observation of an object to be classified, the method comprising using a particle filter in which an observation of an object to be classified is used to weight particles on a plurality of models for the object. The method may further comprise performing at least one further iteration of using the particle filter to weight the particles on the plurality of models for the object using a further observation of the object to be classified. The method may further comprise providing respective classification probabilities that each respective model corresponds to the object based on the weightings of the particles of the respective model. Each of the respective particles may be divided into a respective plurality of sub-particles. | 03-08-2012 |
20120089554 | ESTIMATING A STATE OF AT LEAST ONE TARGET USING A PLURALITY OF SENSORS - The method includes receiving a plurality of target observations from a respective plurality of sensors and using the target observations to compute target state estimates. Each of the target state estimates is assessed to check if it suffers from one of a set of modelled possible fault types. The target state estimates are adjusted to compensate for any modelled fault type when it is assessed to be suffering from that fault type. A reliability value is computed for each of the target state estimates and the target state estimates are fused together based on the computed reliability values to produce a fused target state estimate. | 04-12-2012 |
20130006574 | TARGET TRACKING - An apparatus and method are disclosed for tracking plural targets. The method can include: estimating a state of each target; measuring values for a state of a target, and measuring a value of an identity parameter for that target to distinguish that target from another target. A state of each target can be estimated using the estimated target states for a first time-step; and updating the estimated target states for a second time-step can include performing a Joint Probabilistic Data Association process using measured state values and measured identity parameter values, wherein estimating a state of each target can be implemented using a particle filter. | 01-03-2013 |
20130006576 | TARGET TRACKING - An apparatus and a method are disclosed for tracking a plurality of targets (e.g. land-based vehicles) The method can include: for a first time-step, estimating a state of each target; at a second time-step, measuring values for a state of a target; for the second time-step, estimating a state of each target using the estimated target states for the first time-step; updating the estimated target states for the second time-step using the measured values; and performing an identity management process to estimate a probability that a particular state measurement corresponds to a particular target by providing a mixing matrix, wherein an element of the mixing matrix is based on an overlap between the updated estimated target states of targets in an underlying state space of the estimated target states. | 01-03-2013 |
20130006577 | TARGET TRACKING - An apparatus and a method are disclosed for tracking a plurality of targets (e.g. land-based vehicles). The method can include: for a first time-step, estimating a state of each respective target; at a second time-step, measuring values for a state of each target; for the second time-step, estimating a state of each target using the estimated target states for the first time-step; updating the estimated target states for the second time-step by performing a Joint Probabilistic Data Association process using the measured values; and performing an identity management process to estimate a probability that a particular state measurement corresponds to a particular. | 01-03-2013 |
20130013551 | PROCESS ANALYSIS - An apparatus and method are disclosed for analysing a process. An exemplary method includes: generating a process template; and determining a probabilistic model specifying the process template. The method can include use of task nodes for tasks of the process; observables nodes for observables that may be caused by performance of the tasks; and a background activities node, wherein observables may further be caused by background activities of the background node. The method can include use of task nodes for tasks of the process; observables nodes for observables that may be caused by performance of the tasks; and a background activities node, observables may further be caused by background activities of the background node. The method can include measuring values of an observable corresponding to one of the observables nodes; and updating a probabilistic estimate of the process state using the measured values. | 01-10-2013 |
Patent application number | Description | Published |
20080227341 | CONNECTOR ASSEMBLY FOR USE WITH AN ELECTRICAL SUBMERSIBLE COMPONENT IN A DEEPWATER ENVIRONMENT - A connector for a connection assembly for providing electrical power to a submersible electrical component in a deepwater environment, such as a subsea well, includes a ceramic body having a metallized inner passageway. A conductive contact extends through the passageway and has a contact end and a cable connecting end. A conductive sleeve is disposed about an outer surface of the ceramic body. The ceramic body is retained within a connector housing that has an interface chamber and a cable retaining chamber. The contact end of the connector contact is disposed within the interface chamber, and the cable connecting end of the contact is disposed within the cable retaining chamber. The sleeve is attached to the housing to provide a seal between the interface chamber and the cable retaining chamber. When the connector is engaged with a complementary connector, a Faraday cage is provided within the interface chamber to manage the electrical field about the connection interface between the connectors. | 09-18-2008 |
20080265563 | Connection Device for an Underwater Service Line and Associated Mounting and Rov Handle Assemblies - There is disclosed a connection device for an underwater service line, the connection device comprising: a male connector having slidably interengageable first and second pieces, the first piece having a rearwardly facing surface and being slidable between a retracted position and an extended position; and a female connector connectable with the male connector and having a body—comprising a bore to receive the male connector, the female connector comprising an engagement member engageable with the first piece and movable from an extended position, in which it extends into the bore, to a retracted position, in which it permits forward displacement of the first piece, a biasing means biasing the engagement member towards its extended position, a forward end of the second piece being configured to allow the engagement member to extend into the bore, giving rise to a connected condition, wherein: in the connected condition, the forward end of the second piece is engageable with the engagement member upon retraction of the second piece so as to move the engagement member into its retracted position. | 10-30-2008 |
20090044956 | TUBING HANGER AND METHOD OF COMPENSATING PRESSURE DIFFERENTIAL BETWEEN A TUBING HANGER AND AN EXTERNAL WELL VOLUME - A tubing hanger and method for reducing loads and stresses on sealing boundaries in a tubing hanger is provided. The tubing hanger has an inner cavity that is sealed with respect to an external well volume present in for example the surrounding tree architecture and wellhead. A control line extends through the inner cavity to communicate with downhole equipment. A pressure compensator is configured to adjust pressure differential between the inner cavity and the external well volume. | 02-19-2009 |
20090047815 | CONTACT PIN ASSEMBLY FOR A HIGH VOLTAGE ELECTRICAL CONNECTION - There is disclosed a contact pin assembly for a high voltage electrical connection, the contact pin assembly comprising: an electrically-conductive outer member which is supportable from a support member, the outer member having a bore extending therethrough, the bore defining a smooth inner face of the outer member and being divergent towards opposite ends of the outer member; a contact pin, ends of which are arranged to be connected directly or indirectly to cables, the contact pin extending through the bore and having a profiled portion which defines a smooth outer face of the contact pin and which is divergent towards opposite ends of the contact pin, the contact pin being concentric with the bore; an electrically-conductive layer provided adjacent the inner face, the electrically-conductive layer being in electrical communication with the outer member and conforming with the profile of the inner face; an annular space between the profiled portion and the electrically-conductive layer; electrical insulation surrounding the pin to provide a seal around the pin and filling the annular space; and sealing between the insulation and the ends of the outer member. There is also disclosed a method of manufacturing such a contact pin assembly. | 02-19-2009 |
20090235531 | TUBE CUTTER TO PREVENT DAMAGE TO INTERNAL ELECTRICAL OR OPTICAL CABLES - A tube cutter apparatus comprises a body that is generally cylindrical in shape and has a bore through which a tube to be cut is inserted. The tube cutter apparatus may further comprise a coupling restraining the tube and a bearing tube defining at least a portion of the bore. A revolving unit may be provided comprising a retaining flange. The revolving unit may further comprise a rotary tool holder including a cutting tool configured to cut the tube. An end flange, the retaining flange and the rotary tool holder may be coupled together to revolve as a unit. The tube cutting apparatus of the present invention may further include devices for setting the depth of the cut of the cutting tool and for setting the point at which the cutting operation will stop. | 09-24-2009 |
20100115769 | CONTACT PIN ASSEMBLY FOR A HIGH VOLTAGE ELECTRICAL CONNECTION - There is disclosed a contact pin assembly for a high voltage electrical connection, the contact pin assembly comprising:
| 05-13-2010 |
Patent application number | Description | Published |
20100017632 | Managing Power-Consumption - Managing power-consumption, for use in a storage system comprising first data stored on one or more storage devices is provided. A receiver receives a policy comprising a power-management parameter, a first parameter and a rule associated with the policy. An analyser, responsive to receipt of a policy, analyzes second data associated with the rule. A determiner, responsive to the analysis, determines third data in accordance with the second data. The third data is associated with migration of the first data. | 01-21-2010 |
20120233476 | Using a Control Policy to Implement Power Saving Features - Managing power-consumption, for use in a storage system comprising first data stored on one or more storage devices is provided. A receiver receives a policy comprising a power-management parameter, a first parameter and a rule associated with the policy. An analyser, responsive to receipt of a policy, analyzes second data associated with the rule. A determiner, responsive to the analysis, determines third data in accordance with the second data. The third data is associated with migration of the first data. | 09-13-2012 |
20130070618 | MOBILE NETWORK SERVICES IN A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A first service mechanism in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services based on the broken out data. A second service mechanism in the core network performs one or more mobile network services based on the network traffic remaining after the first service mechanism performs its breakout. An optional third service mechanism coupled to the core network provides one or more mobile network services in the mobile data network. An overlay network allows the first, second and third service mechanisms to communicate with each other. The overlay network is preferably a private virtual network. | 03-21-2013 |
20130070619 | MAINTENANCE OF HIGH-SPEED CHANNELS BY INSERTING CHANNEL MAINTENANCE DATA IN A MOBILE DATA NETWORK TO AVOID CHANNEL TYPE SWITCHING - A mobile data network includes a radio access network and a core network. A first service mechanism in the radio access network breaks out data coming from a basestation. When data is broken out by the first service mechanism, the data is delivered at the edge, which means the true activity of the channel is not visible to the core network. The reduction of data in the core network due to serving data at the edge risks causing a switch from a high-speed channel to a low-speed channel by the mechanism in the core network that monitors and assigns channel speeds. In order to maintain the high-speed channel, the on-going data rate for a subscriber session is monitored and channel maintenance traffic is injected towards and from the radio network controller (in both directions). The amount of channel maintenance traffic depends on thresholds that determine a desired data rate. | 03-21-2013 |
20130094394 | MAINTENANCE OF HIGH-SPEED CHANNELS BY INSERTING CHANNEL MAINTENANCE DATA IN A MOBILE DATA NETWORK TO AVOID CHANNEL TYPE SWITCHING - A mobile data network includes a radio access network and a core network. A first service mechanism in the radio access network breaks out data coming from a basestation. When data is broken out by the first service mechanism, the data is delivered at the edge, which means the true activity of the channel is not visible to the core network. The reduction of data in the core network due to serving data at the edge risks causing a switch from a high-speed channel to a low-speed channel by the mechanism in the core network that monitors and assigns channel speeds. In order to maintain the high-speed channel, the on-going data rate for a subscriber session is monitored and channel maintenance traffic is injected towards and from the radio network controller (in both directions). The amount of channel maintenance traffic depends on thresholds that determine a desired data rate. | 04-18-2013 |
20130094400 | MOBILE NETWORK SERVICES IN A MOBILE DATA NETWORK - Mobile network services are performed in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. A first service mechanism in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services based on the broken out data. A second service mechanism in the core network performs one or more mobile network services based on the network traffic remaining after the first service mechanism performs its breakout. An optional third service mechanism coupled to the core network provides one or more mobile network services in the mobile data network. An overlay network allows the first, second and third service mechanisms to communicate with each other. The overlay network is preferably a private virtual network. | 04-18-2013 |
20140071803 | Packet Loss Recovery on a Wireless Link in a Transmission Layer Protocol Session - Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet. | 03-13-2014 |
20140071833 | Packet Loss Recovery on a Wireless Link in a Transmission Layer Protocol Session - Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet. | 03-13-2014 |
20140280839 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of methods and/or algorithms. | 09-18-2014 |
Patent application number | Description | Published |
20080256145 | Apparatus for Migrating Data Between Heterogeneous Data Storage Devices - A method for migrating data between heterogeneous data storage devices within a storage area network is disclosed. A first virtualizer presents stored data as a first virtual disk, and then communicates a managed disk representation of the first virtual disk to a second virtualizer. After receiving the managed disk representation, the second virtualizer virtualizes the stored data from the managed disk representation as a second virtual disk. At such point, the stored data can be progressively migrated from the first virtualizer to the second virtualizer. | 10-16-2008 |
20090138522 | APPARATUS AND METHOD FOR MANAGING STORAGE COPY SERVICES SYSTEMS - An apparatus for controlling a storage system having a data replication function, comprises: a storage array component being operable to send notification to a replication engine that a write of data to a primary storage location by a host is subject to data replication; the replication engine being operable to receive the notification and in response to instruct the storage array to copy the data to a secondary storage location; wherein the data is copied to the secondary storage location unmediated by the replication engine. | 05-28-2009 |
20090144499 | Preemptive write-inhibition for thin provisioning storage subsystem - Write requests from host computers are processed in relation to a thin provisioning storage subsystem. A write request is received from a host computer. The write request identifies a first virtual disk that has been previously assigned to the host computer. It is determined whether the first virtual disk has to be allocated additional physical storage locations of the thin provisioning storage subsystem for storing data associated with the write request. In response to determining that the virtual disk has to be allocated additional physical storage locations, the following is performed. First, a quantity of free space remaining unallocated within physical storage locations of the thin provisioning storage subsystem is determined. Second, where the quantity of free space remaining unallocated within the physical storage locations satisfies a policy threshold associated with a second virtual disk, the second virtual disk is write-inhibited. The first and second virtual disks can be different. | 06-04-2009 |
20110246064 | AUGMENTED REALITY SHOPPER ROUTING - A method for guiding a shopper in a store, including: receiving one or more recommended products identified for the shopper based on a set of one or more sought products; calculating a route through the store to a location of each of the sought products based on the store product map; and including a waypoint in the route corresponding to a location of each of the one or more recommended products. The route is then sent to an augmented reality device for presenting the route to the shopper in conjunction with a representation of a current view of the shopper in the store. | 10-06-2011 |
20130054691 | FLEXIBLE RULE BASED MULTI-PROTOCOL PEER-TO-PEER CACHING - Flexible rule based multi-protocol peer-to-peer caching in a wireless environment. A request is received from a requestor for a file from one of a plurality of peer-to-peer networks. The peer-to-peer network the request is directed to is determined in response to receiving the request. Using a generic rule structure, the file that is requested from the peer-to-peer network is identified. The generic rule structure is compatible with all of the plurality of peer-to-peer networks. If the file is stored in a cache it is retrieved from the cache and is transmitted to the requestor. | 02-28-2013 |
20130198313 | USING ENTITY TAGS (ETAGS) IN A HIERARCHICAL HTTP PROXY CACHE TO REDUCE NETWORK TRAFFIC - Disclosed is a program for validating a web cache independent of an origin server. A computer in between a client computer and the origin server computer receives a request for a resource and an entity tag (ETag) corresponding to the request. The computer forwards the request to the origin server and subsequently receives the resource. The computer generates an ETag for the received resource and compares the generated ETag to the ETag corresponding to the request. If the ETags match, the computer sends an indication toward the client computer that the resource has not been modified. | 08-01-2013 |
20130244612 | CACHE HITS VIA A USERS SPEED, DIRECTION OF MOVEMENT, LOCATION, AND BAND WITHIN A CELLULAR NETWORK - A method, system, and computer program product for caching data in a cellular network is provided. Information from a cellular network regarding location, speed, direction of travel, and bandwidth for a user can be used to determine how much data should be cached for the user. More specifically, the time period for how long a user will be in a cell of a cellular network can be calculated using information received from the cellular network. The calculated time period can be used to calculate how much data will be used by a user for the calculated time period with only the amount of data needed for the time period being cached. | 09-19-2013 |
20130244711 | CACHE HITS VIA A USERS SPEED, DIRECTION OF MOVEMENT, LOCATION, AND BAND WITHIN A CELLULAR NETWORK - A method, system, and computer program product for caching data in a cellular network is provided. Information from a cellular network regarding location, speed, direction of travel, and bandwidth for a user can be used to determine how much data should be cached for the user. More specifically, the time period for how long a user will be in a cell of a cellular network can be calculated using information received from the cellular network. The calculated time period can be used to calculate how much data will be used by a user for the calculated time period with only the amount of data needed for the time period being cached. | 09-19-2013 |
20140032360 | AUGMENTED REALITY SHOPPER ROUTING - A store routing system for guiding a shopper in a store comprises a storage storing a store product map comprising location information for products available at the store. The system also comprises an analytics engine for identifying one or more recommended products for the shopper based on a set of one or more sought products. The system also comprises a route calculator for calculating a route through the store to a location of each of the sought products based on the store product map and for including a waypoint in the route corresponding to a location of each of the one or more recommended products. | 01-30-2014 |
20140036674 | SPLIT TRANSPORT CONTROL PROTOCOL (TCP) FLOW CONTROL MANAGEMENT IN A CELLULAR BROADBAND NETWORK - Embodiments of the present invention provide a method, system and computer program product for split transport control protocol (TCP) flow control management in a cellular broadband network. In an embodiment of the invention, a method for split TCP flow control management in a cellular broadband network is provided. The method includes first determining a context for a packet received as part of a data flow in a base station of a cellular broadband network and then selecting either an end-to-end TCP connection or a split TCP connection to support the data flow. Thereafter, the data flow is routed using the selected connection. | 02-06-2014 |
20140064058 | BYTE CACHING IN WIRELESS COMMUNICATION NETWORKS - Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism. | 03-06-2014 |
20140064141 | MOBILITY DETECTION FOR EDGE APPLICATIONS IN WIRELESS COMMUNICATION NETWORKS - Various embodiments detect wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity. | 03-06-2014 |
20140064182 | MOBILITY DETECTION FOR EDGE APPLICATIONS IN WIRELESS COMMUNICATION NETWORKS - Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity. | 03-06-2014 |
20140067987 | BYTE CACHING IN WIRELESS COMMUNICATION NETWORKS - Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism. | 03-06-2014 |
20140196108 | SECURITY POLICY ENFORCEMENT - A method of operating a network message interceptor for enforcing a security policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, and the security policy identifying at least one valid security standards for communication over the network, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting from the handshake message an identification of a security standard selected for the communication between the first and second endpoints; determining a validity status of the identified security standard based on the security policy; and preventing communication between the first and second endpoints based on a negatively determined validity status of the identified security standard. | 07-10-2014 |
20140280825 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of systems and/or algorithms. | 09-18-2014 |
20140331287 | AUTHENTICATION POLICY ENFORCEMENT - A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate. | 11-06-2014 |
20150032974 | OBJECT CACHING FOR MOBILE DATA COMMUNICATION WITH MOBILITY MANAGEMENT - Method and system are provided for object caching with mobility management for mobile data communication. The method may include: intercepting and snooping data communications at a base station between a user equipment and a content server without terminating communications; implementing object caching at the base station using snooped data communications; implementing object caching at an object cache server in the network, wherein the object cache server proxies communications to the content server from the user equipment; and maintaining synchrony between an object cache at the base station and an object cache at the object cache server. | 01-29-2015 |
20150033072 | MONITORING HIERARCHICAL CONTAINER-BASED SOFTWARE SYSTEMS - A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to indicate whether or not a first program is functioning correctly. The computer determines if the heartbeat message includes the indication that the first program is functioning correctly. If the computer determines that the heartbeat message indicates that the first program is functioning correctly, then the computer sends a data stream to the first program. | 01-29-2015 |
20150156607 | MOBILE DEVICE LOCATION - A mobile device is associated with a mobile communications network. The mobile device comprises: a transmitter for sending a request, to the mobile communications network, for a secure location verification (LV) message; a receiver for receiving the requested LV message, wherein the LV message is digitally secured so as to enable a selected third party application program to verify an authenticity of the LV message, wherein the LV message comprises location data determined by the mobile communications network as representing a location of the mobile device and identification data for identifying the mobile device; and the transmitter for sending the received LV message to the third party application program so as to enable the third party application program to verify the location of the mobile device. | 06-04-2015 |
20150350872 | MOBILITY DETECTION FOR EDGE APPLICATIONS IN WIRELESS COMMUNICATION NETWORKS - Various embodiments detect wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity. | 12-03-2015 |
20150382176 | MOBILITY DETECTION FOR EDGE APPLICATIONS IN WIRELESS COMMUNICATION NETWORKS - Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity. | 12-31-2015 |
20160028816 | APPARATUS AND METHOD FOR MANAGING STORAGE COPY SERVICES SYSTEMS - An apparatus for controlling a storage system having a data replication function, comprises: a storage array component being operable to send notification to a replication engine that a write of data to a primary storage location by a host is subject to data replication; the replication engine being operable to receive the notification and in response to instruct the storage array to copy the data to a secondary storage location; wherein the data is copied to the secondary storage location unmediated by the replication engine. | 01-28-2016 |
20160044023 | AUTHENTICATION POLICY ENFORCEMENT - A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate. | 02-11-2016 |