USER-DEFINED QUALITY OF EXPERIENCE (QOE) PRIORITIZATIONS

    公开(公告)号:US20220360618A1

    公开(公告)日:2022-11-10

    申请号:US17871556

    申请日:2022-07-22

    Abstract: A method includes, at a media bridge configured to distribute a plurality of media streams among a plurality of client devices connected to the media bridge over a network during a real-time communication (RTC) instance, receiving a plurality of quality of experience (QoE) preferences from the plurality of client devices via the media bridge, the plurality of QoE preferences being transmitted as a real-time transport protocol (RTP) control protocol (RTCP) extension header of a transmitted data packet. The method also includes receiving a plurality of QoE metrics at the media bridge, and in response to a determination that a degradation in network conditions of the network has occurred, downgrading at least one of the plurality of media streams based on the plurality of QoE preferences.

    IaaS-aided access control for information centric networking with Internet-of-Things

    公开(公告)号:US11050724B2

    公开(公告)日:2021-06-29

    申请号:US15928265

    申请日:2018-03-22

    Abstract: A producer communicates over a network with a user application in an infrastructure-as-a-service (IaaS) and an IaaS node. The producer encrypts content with first encryption using a first key and second encryption using a second key, to produce twice encrypted content. The producer encrypts the second key with attribute-based encryption and symmetric encryption using an IaaS key, to produce a twice encrypted second key. The producer provides to the user application the twice encrypted content, the twice encrypted second key, and key information configured to remove the first encryption from the twice encrypted content. The producer provides to the IaaS node the IaaS key to enable the IaaS node to remove the symmetric encryption from the twice encrypted second key, such that the user application and the IaaS node are constrained to exchange with each other key-related information and intermediate decryption results in order to recover the content.

    Distribution of network-policy configuration, management, and control using model-driven and information-centric networking

    公开(公告)号:US10931559B2

    公开(公告)日:2021-02-23

    申请号:US16178967

    申请日:2018-11-02

    Abstract: A network of routers configure resource nodes connected to the network in accordance with a configuration model including configuration objects that imply resources. A router device among the network of router devices receives, from forwarding paths in the network relative to the router device, originated at the resource nodes and that indicate resources supported by the resource nodes. The router device creates mappings of the resources as advertised to the forwarding paths. The router device receives from the network an Intent request to create a configuration object among the configuration objects, and determines whether the configuration object matches a resource in the mappings. If the configuration object matches a resource in the mappings, the router device generates a new Intent request that identifies the resource, specifically, and forwards the new Intent request along the forwarding path mapped to the resource.

    Lightweight naming scheme for aggregating requests in information-centric networking

    公开(公告)号:US10924540B2

    公开(公告)日:2021-02-16

    申请号:US15943775

    申请日:2018-04-03

    Abstract: In one embodiment, a device in a network receives an interest request for one or more pieces of content data available in the network. The interest request specifies the one or more pieces of content data via one or more bits sets in a content request bitmap of the interest request, each bit of the content request bitmap being associated with a different piece of content data. The device compares the content request bitmap to a content availability bitmap in a forwarding information base (FIB) of the device that is associated with a particular interface of the device and each bit of the content availability bitmap indicates whether a particular piece of content data is available via the particular interface. The device forwards the interest request via the particular interface, based on the comparison between the content request bitmap and the content availability bitmap in the FIB of the device.

    MULTIPARTY REAL-TIME COMMUNICATIONS SUPPORT OVER INFORMATION-CENTRIC NETWORKING

    公开(公告)号:US20210037069A1

    公开(公告)日:2021-02-04

    申请号:US17074955

    申请日:2020-10-20

    Abstract: Embodiments include technologies for creating a manifest for a conferencing event in a network, adding a name tag identifying the conferencing event to the manifest, receiving an interest packet including one or more parameters indicating a named flow being produced at a source node, adding content metadata of the named flow to the manifest, and sending the manifest to the source node. Further embodiments include adding, to the manifest, session-level metadata associated with a user of the source node. Embodiments include receiving a second interest packet with one or more second parameters identifying a user of a client node, where the second interest packet indicates a request to authorize the user of the client node to subscribe to the conferencing event. In further embodiments, session-level metadata associated with the user is added to the manifest if the user is authorized to subscribe to the conferencing event.

    System and method to facilitate cross-layer optimization of video over WiFi in an information-centric networking environment

    公开(公告)号:US10805825B2

    公开(公告)日:2020-10-13

    申请号:US15658638

    申请日:2017-07-25

    Abstract: A method is provided in one example embodiment and may include determining each station of a plurality of stations connected to a WiFi access point that are to receive downlink video transmissions from the WiFi access point, wherein the WiFi access point is connected to an Information-Centric Networking-based (ICN-based) network; associating each station of the plurality of stations to each of a corresponding ICN face of a plurality of ICN faces maintained by the WiFi access point; and managing a downlink transmission buffer for each station of the plurality of stations based, at least in part, a modulation and coding scheme (MCS) associated with downlink video transmissions for each station of the plurality of stations, wherein each downlink transmission buffer is associated with the corresponding ICN face associated with each station.

    ACTIVE SPEAKER TRACKING USING A GLOBAL NAMING SCHEME

    公开(公告)号:US20220368729A1

    公开(公告)日:2022-11-17

    申请号:US17320606

    申请日:2021-05-14

    Abstract: A method includes, at a media bridge configured to distribute a plurality of media streams among a plurality of client devices connected to the media bridge over a network, receiving the plurality of media streams from the plurality of client devices via the media bridge. The media bridge connects the plurality of client devices. The method further includes assigning a pair of names for each of the plurality of media streams. The pair of names include a contribution name and a distribution name. The method further includes presenting a first list to the plurality of client devices. The first list including a plurality of the distribution names for the plurality of media streams received from the plurality of client devices. The method further includes providing an indication of a current active speaker within the plurality of media streams via a signaling process.

    Secure packet modification
    10.
    发明授权

    公开(公告)号:US11245677B2

    公开(公告)日:2022-02-08

    申请号:US16044672

    申请日:2018-07-25

    Abstract: In various implementations, a network device receives a packet from a content producer. The packet includes data and further includes a signature generated by the content producer, based on the data, using a private key of the content producer. The network device modifies the packet without affecting the signature and forwards the modified packet toward a user device. The network device also sends the user device a manifest specifying how the packet was modified. The user device receives the packet and manifest, restores the packet's original data based on the manifest, and verifies the original data using the signature and a public key corresponding to the private key of the content producer. In response to verification of the original data, an application on the user device is allowed to use the data.

Patent Agency Ranking