Patent application number | Description | Published |
20090010245 | Synchronization of media access control (MAC) superframes - A device and method for of synchronizing a MAC superframe of a wireless device is disclosed. The wireless device can be located within a chain of a plurality of other wireless devices. The method includes receiving beacons from at least one other device during a superframe of the wireless device, determining a superframe offset for each of the other wireless devices based on timing of the received beacons, determining a corrective delay based on the superframe offsets, inserting the corrective delay within a current superframe of the wireless device, and inserting a predictive delay within the current superframe, the predictive delay being determined by an estimate of a difference between a frequency a clock of the wireless device and a frequency of a slowest clock of the other wireless devices within the chain. | 01-08-2009 |
20100098047 | Setting a data rate of encoded data of a transmitter - Embodiments for setting a data rate of encoded data of a transmitter are disclosed. One method includes determining a physical layer transmission rate based on a transmission link quality of a link, estimating a transmission throughput that can be transmitted over the link ensuring a level of Quality of Service (QOS) requirement, and the transmitter adjusting the data rate of the encoded data based on the estimated transmission throughput. | 04-22-2010 |
20140283038 | Safe Intelligent Content Modification - A computer-implemented method for deflecting abnormal computer interactions includes receiving, at a computer server system and from a client computer device that is remote from the computer server system, a request for web content; identifying, by computer analysis of mark-up code content that is responsive to the request, executable code that is separate from, but programmatically related to, the mark-up code content; generating groups of elements in the mark-up code content and the related executable code by determining that the elements within particular groups are programmatically related to each other; modifying elements within particular ones of the groups consistently so as to prevent third-party code written to interoperate with the elements from modifying from interoperating with the modified elements, while maintain an ability of the modified elements within each group to interoperate with each other; and recoding the mark-up code content and the executable code to include the modified elements. | 09-18-2014 |
20140283067 | DETECTING THE INTRODUCTION OF ALIEN CONTENT - A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characterize the subsets of the particular document object models; and using the clusters to identify alien content on the particular client computers, wherein the alien content comprises content in the document object models that is not the result of content that is the basis of the document object model served. | 09-18-2014 |
20140283068 | PROTECTING AGAINST THE INTRODUCTION OF ALIEN CONTENT - In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client. | 09-18-2014 |
20140283069 | PROTECTING AGAINST THE INTRODUCTION OF ALIEN CONTENT - In one implementation, a computer-implemented method can identify abnormal computer behavior. The method can receive, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet. The method can also modify the computer code to obscure operational design of the web server system that could be determined from the computer code, and supplement the computer code with instrumentation code that is programmed to execute on the computing client. The method may serve the modified and supplemented computer code to the computing client. | 09-18-2014 |
20150207816 | INTERCEPTING AND SUPERVISING CALLS TO TRANSFORMED OPERATIONS AND OBJECTS - In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer. | 07-23-2015 |
20150350243 | Safe Intelligent Content Modification - A computer-implemented method for deflecting abnormal computer interactions includes receiving, at a computer server system and from a client computer device that is remote from the computer server system, a request for web content; identifying, by computer analysis of mark-up code content that is responsive to the request, executable code that is separate from, but programmatically related to, the mark-up code content; generating groups of elements in the mark-up code content and the related executable code by determining that the elements within particular groups are programmatically related to each other; modifying elements within particular ones of the groups consistently so as to prevent third-party code written to interoperate with the elements from modifying from interoperating with the modified elements, while maintain an ability of the modified elements within each group to interoperate with each other; and recoding the mark-up code content and the executable code to include the modified elements. | 12-03-2015 |