CELLULAR TELECOMMUNICATIONS NETWORK

    公开(公告)号:US20210337440A1

    公开(公告)日:2021-10-28

    申请号:US17250978

    申请日:2019-09-06

    IPC分类号: H04W36/00 H04W36/38 H04W72/04

    摘要: This disclosure relates to a method in a cellular telecommunications network, the cellular telecommunications network having a plurality of base stations each having at least one transmitter, each transmitter having at least one coverage area, the method including a first transmitter operating in a first state so as to transmit within a first coverage area according to a first cellular communications protocol only; receiving a request for service according to a second cellular communications protocol in the first coverage area; and, in response, the first transmitter operating in a second state so as to transmit within the first coverage area according to both the first cellular communications protocol and a second cellular communications protocol, wherein the second cellular communications protocol is an older generation than the first cellular communications protocol.

    Managing congestion response during content delivery

    公开(公告)号:US11159834B2

    公开(公告)日:2021-10-26

    申请号:US16472394

    申请日:2017-12-13

    摘要: A method of delivering media content over a network, the media content including a plurality of temporal segments, wherein each temporal segment comprises a plurality of data packets, the method including: selecting an initial size of a first congestion window; delivering the plurality of data packets of a first segment using the first congestion window, the initial size of the first congestion window being used to control the size of the first congestion window for the duration of the first segment delivery; measuring the packet loss during the delivery of the first segment; determining an initial size of a second congestion window in dependence on the measured packet loss for the first segment; and delivering a second segment using the second congestion window, the initial size of the second congestion window being used to control the size of the second congestion window for the duration of the second segment delivery.

    Software container profiling
    84.
    发明授权

    公开(公告)号:US11151244B2

    公开(公告)日:2021-10-19

    申请号:US16300169

    申请日:2017-05-10

    摘要: A method in a computer system having an operating system providing isolation between software processes executable in the operating system such that a first process executing in the operating system is prevented from accessing resources of a second process executing in the operating system, the method including receiving a software component for execution as an isolated process in the operating system; receiving a baseline profile for the software component defining one or more characteristics of the software component at a runtime for identifying performance of the software component; generating a runtime profile of the software component in execution in the operating system defining characteristics of the component in execution; and flagging the software component in execution based on a comparison of the baseline profile and the runtime profile so as to identify an undesirable performance of the software component.

    Congestion response for timely media delivery

    公开(公告)号:US11140205B2

    公开(公告)日:2021-10-05

    申请号:US16981067

    申请日:2019-03-15

    摘要: In examples of the present invention, delivery of a segment of content is done using an initial congestion window, preferably chosen to give a delivery rate that ensures timely delivery of that segment. However, under high levels of packet loss, the delivery rate may not be sufficient. Hence, at any stage during delivery of a segment, the actual delivery rate is measured, and used, together with the previous congestion window size, the amount of content segment data still to be delivered, and the time left for delivery, to calculate an updated congestion window. The remainder of the segment is then delivered using this revised congestion window.

    Cryptocurrencies malware based detection

    公开(公告)号:US11128647B2

    公开(公告)日:2021-09-21

    申请号:US16086087

    申请日:2017-03-03

    IPC分类号: H04L29/06 G06N20/00 G16Y30/10

    摘要: A computer implemented method to identify a computer security threat based on communication of a network connected device via a computer network including receiving a plurality of blocks of network traffic from the device, each block including a sequence of network traffic data items being identifiable by a position in the sequence of the block; identifying a subset of positions occurring in every block for which a degree of variability of values of data items in each position of the subset meets a predetermined threshold; and generating executable code for performing a plurality of processing operations based on the identified subset of positions, the executable code consuming a determinate quantity of computing resources when executed for the received network traffic.

    Viewer importance adaptive bit rate delivery

    公开(公告)号:US11044507B2

    公开(公告)日:2021-06-22

    申请号:US16337641

    申请日:2017-09-29

    发明人: Michael Nilsson

    摘要: Described are methods of delivering media, such as a video sequence, to a client device from a server, taking into account the relative importance of different portions of the video sequence. The sequence is divided into temporal segments, with each segment encoded at a plurality of bitrates (and hence qualities). A viewer importance parameter is assigned to each segment, indicating the relative importance of that segment, with the information stored in a manifest file or similar. The client receives this segment and viewer importance data in a manifest file. The bit rate of each segment selected for download is dependent on the relative importance of that segment and future segments. The selected segment is then delivered to the client device from the server. Thus, segments having a higher viewer importance will be delivered with a higher encoded bitrate than segments having a lower viewer importance.

    Optimising multicast video delivery in a wireless network

    公开(公告)号:US11005768B2

    公开(公告)日:2021-05-11

    申请号:US16641699

    申请日:2018-08-21

    发明人: Nicholas Farrow

    摘要: The invention sets out a method where a critical loading related to jitter associated with a link between the access point and a client device is determined. This critical load is the load beyond which retransmissions are insufficient for the client device to repair the video stream. The critical load is determined by sending data at varying transmission rates during a calibration mode, and measuring the jitter and packet loss rate. A safe load is then set as a fraction of this critical load. The loading associated with a multicast stream is then monitored with reference to this safe load, and if the safe load is met or exceeded, then action is taken to avoid packet loss increasing to a critical level. One action may be to adjust the transmission rate of the multicast stream for example, such that the load is reduced to below the safe load level.

    Negotiating quality of service for data flows

    公开(公告)号:US10965614B2

    公开(公告)日:2021-03-30

    申请号:US15740607

    申请日:2016-06-30

    摘要: A method of allocating resources in a network for the transmission of a data flow is disclosed. The method involves receiving a query specifying one or more quality-of-service (QoS) requirements for the data flow and identifying, based on the specified QoS requirements, one or more QoS models from a set of stored QoS models, each QoS model defining a class of service available in the network. A query response specifying the identified QoS models is transmitted. Subsequently, a reservation request is received specifying at least one of the identified QoS models. Resources are allocated in the network for the data flow based on the at least one QoS model specified in the reservation request.

    ACCESS CONTROL
    90.
    发明申请

    公开(公告)号:US20210044589A1

    公开(公告)日:2021-02-11

    申请号:US15733655

    申请日:2019-03-11

    发明人: Jonathan ROSCOE

    IPC分类号: H04L29/06

    摘要: A computer implemented method of access control for a restricted resource includes receiving a request from an authenticated resource consumer to access the restricted resource, the request including an identifier of the consumer; accessing a set of transactions from a blockchain database based on the identifier of the consumer, each transaction corresponding to a prior security event concerning the consumer, to generate a set of prior security events; comparing the set of prior security events with an access control profile for the restricted resource; and responsive to the comparison, precluding access to the restricted resource by the consumer.