-
公开(公告)号:US11159834B2
公开(公告)日:2021-10-26
申请号:US16472394
申请日:2017-12-13
发明人: Michael Nilsson , Stephen Appleby , Yousif Humeida
IPC分类号: H04N21/238 , H04L12/26 , H04L12/801 , H04N21/24 , H04N21/643 , H04N21/658 , H04N21/6583 , H04N21/845
摘要: A method of delivering media content over a network, the media content including a plurality of temporal segments, wherein each temporal segment comprises a plurality of data packets, the method including: selecting an initial size of a first congestion window; delivering the plurality of data packets of a first segment using the first congestion window, the initial size of the first congestion window being used to control the size of the first congestion window for the duration of the first segment delivery; measuring the packet loss during the delivery of the first segment; determining an initial size of a second congestion window in dependence on the measured packet loss for the first segment; and delivering a second segment using the second congestion window, the initial size of the second congestion window being used to control the size of the second congestion window for the duration of the second segment delivery.
-
公开(公告)号:US11153091B2
公开(公告)日:2021-10-19
申请号:US16086074
申请日:2017-03-03
摘要: A computer implemented method for code distribution by a base station to a target device via a network, the distribution being made via one or more distribution servers arranged between the base station and the target device on the network, is disclosed.
-
公开(公告)号:US11151244B2
公开(公告)日:2021-10-19
申请号:US16300169
申请日:2017-05-10
发明人: Joshua Daniel , Fadi El-Moussa
摘要: A method in a computer system having an operating system providing isolation between software processes executable in the operating system such that a first process executing in the operating system is prevented from accessing resources of a second process executing in the operating system, the method including receiving a software component for execution as an isolated process in the operating system; receiving a baseline profile for the software component defining one or more characteristics of the software component at a runtime for identifying performance of the software component; generating a runtime profile of the software component in execution in the operating system defining characteristics of the component in execution; and flagging the software component in execution based on a comparison of the baseline profile and the runtime profile so as to identify an undesirable performance of the software component.
-
公开(公告)号:US11140205B2
公开(公告)日:2021-10-05
申请号:US16981067
申请日:2019-03-15
发明人: Michael Nilsson , Stephen Appleby , Yousif Humeida
摘要: In examples of the present invention, delivery of a segment of content is done using an initial congestion window, preferably chosen to give a delivery rate that ensures timely delivery of that segment. However, under high levels of packet loss, the delivery rate may not be sufficient. Hence, at any stage during delivery of a segment, the actual delivery rate is measured, and used, together with the previous congestion window size, the amount of content segment data still to be delivered, and the time left for delivery, to calculate an updated congestion window. The remainder of the segment is then delivered using this revised congestion window.
-
公开(公告)号:US11128647B2
公开(公告)日:2021-09-21
申请号:US16086087
申请日:2017-03-03
发明人: Karl Smith , Fadi El-Moussa
摘要: A computer implemented method to identify a computer security threat based on communication of a network connected device via a computer network including receiving a plurality of blocks of network traffic from the device, each block including a sequence of network traffic data items being identifiable by a position in the sequence of the block; identifying a subset of positions occurring in every block for which a degree of variability of values of data items in each position of the subset meets a predetermined threshold; and generating executable code for performing a plurality of processing operations based on the identified subset of positions, the executable code consuming a determinate quantity of computing resources when executed for the received network traffic.
-
公开(公告)号:US11044507B2
公开(公告)日:2021-06-22
申请号:US16337641
申请日:2017-09-29
发明人: Michael Nilsson
IPC分类号: G06F15/16 , H04N21/262 , H04N21/234 , H04N21/2343 , H04N21/2662 , H04N21/845 , H04N21/84 , H04N21/854
摘要: Described are methods of delivering media, such as a video sequence, to a client device from a server, taking into account the relative importance of different portions of the video sequence. The sequence is divided into temporal segments, with each segment encoded at a plurality of bitrates (and hence qualities). A viewer importance parameter is assigned to each segment, indicating the relative importance of that segment, with the information stored in a manifest file or similar. The client receives this segment and viewer importance data in a manifest file. The bit rate of each segment selected for download is dependent on the relative importance of that segment and future segments. The selected segment is then delivered to the client device from the server. Thus, segments having a higher viewer importance will be delivered with a higher encoded bitrate than segments having a lower viewer importance.
-
公开(公告)号:US11005768B2
公开(公告)日:2021-05-11
申请号:US16641699
申请日:2018-08-21
发明人: Nicholas Farrow
IPC分类号: H04L12/825 , H04L12/26 , H04L29/06 , H04N21/2662 , H04W24/08 , H04W28/02
摘要: The invention sets out a method where a critical loading related to jitter associated with a link between the access point and a client device is determined. This critical load is the load beyond which retransmissions are insufficient for the client device to repair the video stream. The critical load is determined by sending data at varying transmission rates during a calibration mode, and measuring the jitter and packet loss rate. A safe load is then set as a fraction of this critical load. The loading associated with a multicast stream is then monitored with reference to this safe load, and if the safe load is met or exceeded, then action is taken to avoid packet loss increasing to a critical level. One action may be to adjust the transmission rate of the multicast stream for example, such that the load is reduced to below the safe load level.
-
公开(公告)号:US10965614B2
公开(公告)日:2021-03-30
申请号:US15740607
申请日:2016-06-30
IPC分类号: H04L12/927 , H04L29/08 , H04L12/851 , H04L12/725 , H04L12/913
摘要: A method of allocating resources in a network for the transmission of a data flow is disclosed. The method involves receiving a query specifying one or more quality-of-service (QoS) requirements for the data flow and identifying, based on the specified QoS requirements, one or more QoS models from a set of stored QoS models, each QoS model defining a class of service available in the network. A query response specifying the identified QoS models is transmitted. Subsequently, a reservation request is received specifying at least one of the identified QoS models. Resources are allocated in the network for the data flow based on the at least one QoS model specified in the reservation request.
-
公开(公告)号:US20210044589A1
公开(公告)日:2021-02-11
申请号:US15733655
申请日:2019-03-11
发明人: Jonathan ROSCOE
IPC分类号: H04L29/06
摘要: A computer implemented method of access control for a restricted resource includes receiving a request from an authenticated resource consumer to access the restricted resource, the request including an identifier of the consumer; accessing a set of transactions from a blockchain database based on the identifier of the consumer, each transaction corresponding to a prior security event concerning the consumer, to generate a set of prior security events; comparing the set of prior security events with an access control profile for the restricted resource; and responsive to the comparison, precluding access to the restricted resource by the consumer.
-
公开(公告)号:US20210037458A1
公开(公告)日:2021-02-04
申请号:US16941677
申请日:2020-07-29
摘要: This disclosure provides a method, and a network node for implementing the method, of switching a base station in a cellular telecommunications network between a first and second mode, in which the base station uses more energy when operating in the first mode than the second mode, wherein the cellular telecommunications network further includes a User Equipment, UE, having a camera, the method including storing visual data including a visual representation of at least a part of the base station; receiving visual data captured by the camera of the UE; performing a computer vision operation, trained on the stored visual data, on the captured visual data to determine whether the visual representation of the base station or part thereof is present in the captured visual data; and, in response initiating a switch in the base station between the first and second modes.
-
-
-
-
-
-
-
-
-