Abstract:
In various aspects, code-based indicia contain secured network access credentials. In some aspects, a computer processor receives user input that specifies secured network access credentials, and the computer processor creates or modifies credentials for establishing a secured network connection. In these aspects, the computer processor generates code-based indicia that contain at least part of the secured network access credentials. In other aspects, a computer processor scans the code-based indicia and extracts the network access credentials. In these aspects, the computer processor employs the network access credentials to establish the secured network connection. In additional aspects, a network router apparatus renders the code-based indicia to an active display. In further aspects, a network router apparatus conditions grant of network access to a device on receipt from the device of an answer to a security question included in the secured network access credentials.
Abstract:
A network appliance configured to optimize advertising content displayed on an internal network. The appliance includes a network appliance input connected at least indirectly to an internal network and configured to receive a plurality of data packets including a request for advertising content, a data packet analyzer configured to monitor the plurality of data packets and to detect the request for advertising content, an advertisement profile generator configured to generate a user profile and to modify the request for advertising content based on the user profile, and a network appliance output connected at least indirectly to an external network and configured to transmit the plurality of data packets including the modified request for advertising content.
Abstract:
Embodiments of the present invention relate generally to media content, such as content contained within audio works (e.g., songs, audio-books, etc.), audiovisual works (e.g., movies, films, etc.), and textual works, as examples, as well as managing playback of such content, and more specifically to assigning independent content ratings to various segments of an individual work (as opposed to or in addition to a content rating for the individual work as a whole) and managing playback of such work based at least in part on the assigned ratings of the various segments.
Abstract:
A method and apparatus for providing system clock failover using a one-shot circuit are disclosed. A process, in one embodiment, is able to detect a clock failure using a one-shot circuit, wherein the clock signals are generated by a first clock circuit. Upon generating a switching signal in response to the clock failure, a system reset signal is asserted for a predefined time period in accordance with the clock failure. After switching a second clock circuit to replace the first clock circuit, the process is capable of resuming the clock signals via the second clock circuit.
Abstract:
A storage apparatus and method configured to improve efficiency of data access utilizing dynamically adjusting storage zone boundary within a disk are disclosed. A process capable of implementing the flexible zone boundary, in one example, allocates a first zone of a first disk operable to store data. While the first zone can be referred to as a Redundant Array of Independent Disks 0 (“RAID 0”) zone, the implementation of RAID 0 can be carried out in the first zone. Upon allocating a second zone of the first disk operable to store secured data, the process allocates a third zone of the first disk wherein the storage boundary of the first zone can be dynamically expanded into the third zone in response to the availability of free storage capacity of the first zone of the first disk.
Abstract:
Tunneling is a mechanism used to aggregate payloads from a network protocol at or below the tunneling layer into a single packet. A user-space application establishes a Transmission Control Protocol (TCP) tunnel and encapsulates an end-to-end TCP payload into a TCP segment for transmission over a TCP connection. This enhanced TCP tunnel eliminates TCP meltdown and can be used over any network which supports TCP. The calling application either identifies the parameters of an existing TCP socket or establishes a new TCP socket. A modified transport layer uses the identified TCP connection in forming the enhanced TCP tunnel. The enhanced TCP tunnel manages the data transmission on the TCP stack to eliminate TCP meltdown.
Abstract:
A system and a protocol enable transmission between two TCP peers that exist behind one or more firewalls and network address translators NATs to automatically setup a true peer-to-peer TCP connection and exchange data without making changes to the firewall or NAT devices or existing TCP-based applications. In embodiments of this invention, the synchronization between the blind TCP peers is achieved using a system that consists of a registration server, an agent application, and a virtual network interface that together relay and replicate the control signals between the two TCP peers. In addition, embodiments of this invention are also used to traverse the NAT and establish a bi-directional peer-to-peer TCP connection in the firewall.
Abstract:
A dual band spectrum allocation system and method for wireless data communications uses discrete bands for upstream and downstream data communications. A preferred embodiment uses unlicensed UNII bands for license-free data transmissions from a subscriber to a hub, and uses relatively interference free licensed bands for data transmissions from a hub to subscribers, thereby allowing use of greater bandwidth, simplifying system licensing and reducing filtering requirements for subscribers.
Abstract:
A controller is connected to one or more media devices. Each media device includes an associated native remote control. The controller includes a data store comprising one or more descriptions of remote control protocols. The user presses a button on the native remote control. The controller receives a resulting signal and compares the signal against the stored remote control protocols. After at least one and preferably less than three key presses, the controller identifies a single remote control protocol associated with the received signals, and thus identifies the media device whose remote control is being used. The user may subsequently use a controller remote control to issue commands to the media device through the controller. The controller may identify a plurality of media devices, and allow the user to issue complex commands. The controller may receive updates to its data store from a server through a network connection.
Abstract:
A system includes a sensor platform, a motor capable of moving the sensor platform, a set of interfaces to receive messages from a set of mobile computing devices attached to the sensor platform, and a circuitry attached to the sensor platform in communication with the motor. A method may include obtaining a path that traverses a region that receives wireless signals from at least one access point of a plurality of access points and controlling the motor to move the sensor platform along the path. The method may include collecting a set of wireless signal values and determining whether the set of wireless signal values satisfy a set of anomaly criteria at a location of the sensor platform. The method may include stopping the motor at a location associated with the satisfaction of the set of anomaly criteria and storing the location in a set of locations.