摘要:
The emergency alert service responds to receipt of emergency alert messages by filtering, formatting and routing emergency alert information to a variety of different networked appliances and also to remote devices. In this way, a consistent warning message is disseminated simultaneously over many different warning systems, thus increasing warning effectiveness while simplifying the warning task. The system thus provides a common alerting protocol that is simple but quite robust and capable of exchanging all-hazard emergency alerts and public warnings over all kinds of networks.
摘要:
The emergency alert service responds to receipt of emergency alert messages by filtering, formatting and routing emergency alert information to a variety of different networked appliances and also to remote devices. In this way, a consistent warning message is disseminated simultaneously over many different warning systems, thus increasing warning effectiveness while simplifying the warning task. The system thus provides a common alerting protocol that is simple but quite robust and capable of exchanging all-hazard emergency alerts and public warnings over all kinds of networks.
摘要:
A method for use in a mobile device to expedite hand-off of mobile devices between access points first detects movement of the mobile device among the coverage ranges of the access points. A mobile device that moves from one access point to another periodically transmits information on the data link level connection of its new access point on the channel used to access its prior access point. A first mobile device that is coupled to access points in a particular area maintains network level access information for access points with which it has communicated. When a new mobile device enters the area, the first device detects the new device and transmits the list to the new mobile device, enabling the new device to connect to an access point without transmitting a router solicitation message or receiving a router advertisement message.
摘要:
A protocol for extending session endpoints in an ad-hoc network environment first performs device discovery to determine local devices within its coverage area and the capability of those devices. These local devices then exchange session descriptions with the endpoint device. If the current session may be supported by one of the local devices, the endpoint device, responsive to a command from an user, transfers the session endpoint to the local device and the endpoint device acts as a proxy for the local device in the session. Optionally, if the local device has a path to the correspondent node that is independent of the path through the endpoint device, it establishes the session along this path and then signal the endpoint node to terminate its session.
摘要:
An intelligent agent has a local component associated with a user device and a network component capable of mobility that will traverse different locations on a network to discover available media content that meets the user's stored preferences. Using published presence information or user schedule information, the intelligent agent will locate a user device accessible to the user and provide notification when media content of interest is discovered. The intelligent agent mediates the media acquisition and delivery process. Content can be delivered to any one or more diverse user devices, based on user instructions or preferences. The intelligent agent interacts with authentication and purchasing mechanisms to effect secure transactions on the user's behalf.
摘要:
A computer-implemented method is presented that allows a user to receive a work such as a movie at any time and at any location. A first client connects to a server through a network. A work is selected through the first client. Transaction data related to a user's right to receive a work is created and stored. A request is sent to the server to transmit the work. The work is transmitted to either the first or the second clients at any time based upon the user's right to receive the work.
摘要:
Disclosed is a method for monitoring and control of local or remote premises using a peer-to-peer communication infrastructure. The method uses messages transmitted over the peer-to-peer communication infrastructure to relate various data and control signals.
摘要:
A method is provided for retrieving metadata for content residing in a peer-to-peer network. The method includes: determining a content reference identifier for the content; generating a hash value for the content reference identifier; determining location of a metadata service based on the hash value; and retrieving metadata for the content by accessing the metadata service using the content reference identifier
摘要:
A method for monitoring and control of local or remote premises using a popular Skype™ peer-to-peer communication service is defined. The invented methodology provides for mobile surveillance and control using information infrastructure provided by Skype™ communicator. A combination of hardware and software methodologies utilizes voice, video and text message Skype™ communication channels to relate various sensory data and controls signals. This application is derived from the patent application 60/808,050 filed on May 25, 2006.
摘要:
The file system framework extends availability of current object carousel data, delivered via broadcast stream, to devices and services associated with a networked computer system. The networked computer system, which can be a home network that includes diverse networked home appliances, is made capable of hosting object carousel data in a seamless fashion. Devices and appliances mount and unmount the networked broadcast file system, just as they would any other data store on the network. Mechanisms are provided to refresh copies of the object carousel data. The data can include data files, streams and events. These data can be communicated to devices and appliances, upon request or as unicast, multicast or broadcast data streams. Events can be communicated across the network to cause selected actions to be initiated automatically.