摘要:
Advertisements are dynamically selected for incorporation into programs utilizing information about available spots and demographics associated with a program. An individual consumer may view or hear advertisements which have been incorporated into the program. The consumer can rate the advertisements and/or programs, and the information is tracked, possibly modifying the way advertisements are selected in the future. Advertisers may be given the opportunity to bid for advertising rights for particular demographic categories of consumers watching particular programs.
摘要:
Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. An encrypted stream of packets is received, with the encryption obscuring the type of data within the stream of packets. The type of data contained within the encrypted stream of packets is inferred using at least one of i) a set of variables comprising at least one of an observable parameter, a threshold value, a range of values, a timer, and an algorithm, and ii) multiple processes. Varying the selection of the variables thwarts hacking attempts, and the multiple processes enhance effectiveness and reliability.
摘要:
Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents.
摘要:
Consumer equipment that is connected to a packet switched network is verified, and a Quality of Service for communications therewith are controlled based on the verification. Information is hashed to generate a first hash value. The information in a memory of the consumer equipment is hashed to generate a second hash value. The first hash value and the second hash value are compared to generate a verification indication for the consumer equipment. The Quality of Service for information packets that are communicated with the consumer equipment through the packet switched network is controlled based on the verification indication.
摘要:
A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially untrustworthy network element poses in the communication network. Application programming interfaces (APIs) may automate the invocation of trust-controlled services, such as a traffic mirroring service for a network element, a traffic monitoring service for a network element, a traffic examination service for traffic associated with a network element, a traffic blocking service for traffic associated with a network element, a traffic storage service for traffic associated with a network element, a traffic logging service for traffic associated with a network element, an endpoint resource selection service for traffic associated with a network element, a midpoint selection service for traffic associated with a network element, a tunneling service for traffic associated with a network element, and/or an application management service for a network element. An API for a trust-controlled service may be used to directly perform a function on one or more resources in the communication network or may be used to set up an ongoing function on one or more resources in the communication network that may continue until the API is used to terminate the function.
摘要:
Methods and apparatus provide for analysis of wireless signal session data records in order to detect a selectively defined relationship. The relationship involves one or more wireless signal performance metrics and a geographical area. The relationships can be correlated with at least one syndrome of real-world circumstances. Detection of one or more relationships can be reported and leveraged to improve wireless signal service within an area or throughout a wireless system or infrastructure. Such detection and syndrome reporting can also be used to provide valuable and time-saving information to wireless system users.
摘要:
Methods, systems, and computer-readable media provide for the reporting of an environmental condition to vehicles prior to encountering the environmental condition. According to various embodiments described herein, local environment data corresponding to the environmental condition is collected from sensors on a vehicle. The local environment data is used to determine that the environmental condition exists at the current location of the vehicle. A notification that includes the geographic location of the environmental condition is created and provided to one or more other vehicles in the vicinity of the environmental condition.
摘要:
Methods, systems, and computer-readable media provide for the reporting of an environmental condition to vehicles prior to encountering the environmental condition. According to various embodiments described herein, local environment data corresponding to the environmental condition is collected from sensors on a vehicle. The local environment data is used to determine that the environmental condition exists at the current location of the vehicle. A notification that includes the geographic location of the environmental condition is created and provided to one or more other vehicles in the vicinity of the environmental condition.
摘要:
Methods, systems and computer program products of dynamic communication data routing by a multi-network remote communication terminal across a plurality of networks are provided. The multi-network remote communication terminal is delivered to a locality to receive communication services. The terminal is communicatively connected to a first network, a second network, the second network having a communication characteristic different from the first network, and to a user endpoint device positioned in the locality. Communication data directed to a target device from the user endpoint device is received at the terminal. A characteristic of the received communication data is determined. Routing of received communication data to the target device is allocated across the first network and/or the second network based on the determined characteristic of the received communication data and the communication characteristics of the first and second network. Routing of the received communication data is dynamically re-allocated based on a detected change in the characteristic of the communication data.
摘要:
A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially untrustworthy network element poses in the communication network. Application programming interfaces (APIs) may automate the invocation of trust-controlled services, such as a traffic mirroring service for a network element, a traffic monitoring service for a network element, a traffic examination service for traffic associated with a network element, a traffic blocking service for traffic associated with a network element, a traffic storage service for traffic associated with a network element, a traffic logging service for traffic associated with a network element, an endpoint resource selection service for traffic associated with a network element, a midpoint selection service for traffic associated with a network element, a tunneling service for traffic associated with a network element, and/or an application management service for a network element. An API for a trust-controlled service may be used to directly perform a function on one or more resources in the communication network or may be used to set up an ongoing function on one or more resources in the communication network that may continue until the API is used to terminate the function.