Patent application number | Description | Published |
20110026704 | Identity Management and Service Access for Local User Group Based on Network-Resident User Profiles - A profile-based system is employed to manage user identities and preferences, devices, content and/or other aspects of service delivery. The user profiles may be maintained in one or more servers or other elements located in an external network access via a customer premises equipment (CPE) gateway of a local network. The profiles can be used to map users to identities, devices, services, and other features that affect the manner in which a particular user communicates with (or through) the external network. | 02-03-2011 |
20110044446 | Prioritized Call Sessions - A local network call handling device is configured to establish multiple concurrent call sessions between local network end devices and an external network. When a prioritized end device attempts to establish a call session, the call handling device may initially determine if a first call session identifier is available. If so, the call session can be established using that first identifier. If the first identifier is in use for a call session of another end device, the call handling device may either use a different call session identifier for the prioritized end device session or may drop a pre-existing call session to free an identifier for use in connection with the prioritized end device. | 02-24-2011 |
20130336470 | PRIORITIZED CALL SESSIONS - A local network call handling device is configured to establish multiple concurrent call sessions between local network end devices and an external network. When a prioritized end device attempts to establish a call session, the call handling device may initially determine if a first call session identifier is available. If so, the call session can be established using that first identifier. If the first identifier is in use for a call session of another end device, the call handling device may either use a different call session identifier for the prioritized end device session or may drop a pre-existing call session to free an identifier for use in connection with the prioritized end device. | 12-19-2013 |
20140192963 | Prioritized Call Sessions - A local network call handling device is configured to establish multiple concurrent call sessions between local network end devices and an external network. When a prioritized end device attempts to establish a call session, the call handling device may initially determine if a first call session identifier is available. If so, the call session can be established using that first identifier. If the first identifier is in use for a call session of another end device, the call handling device may either use a different call session identifier for the prioritized end device session or may drop a pre-existing call session to free an identifier for use in connection with the prioritized end device. | 07-10-2014 |
Patent application number | Description | Published |
20110044304 | Wireless Gateway Supporting A Plurality of Networks - In accordance with various aspects of the disclosure, systems and methods are illustrated for an apparatus comprising a modem component, a wireless communications component, at least one processor, and at least one tangible electronic memory storing data and numerous computer-executable modules to enable wireless hotspots with multiple network identifiers. Examples of at least some of the computer-executable modules includes, but is not limited to an input module, network identifier module, session management module, network management module, automatic location management module, authentication module, bandwidth negotiation module, billing interface module, and activity-based location module. | 02-24-2011 |
20120275450 | Obtaining Services Through a Local Network - A local network gateway may exchange signaling data for a voice communication session with an external network. The gateway may also exchange internal signaling information relating to that voice communication session across logical ports within the local network gateway using a local signaling protocol. A voice communication session can be established between the local gateway and an external network and bridged to local communication sessions between the local gateway and end points. | 11-01-2012 |
20130086202 | Multiple Virtual Machines in a Mobile Virtualization Platform - Systems and methods are described for embodiments of a mobile virtualization platform (MVP) where in some aspects a wireless mobile device including multiple virtual machines (VMs) may receive data from a remote content provider and process/execute the data using an appropriate virtual machine. In some examples, the MVP may facilitate communication between and coordination among different virtual machines in the MVP, such as to facilitate optimization of data processing/execution. | 04-04-2013 |
20150074249 | IDENTITY MANAGEMENT AND SERVICE ACCESS FOR LOCAL USER GROUP BASED ON NETWORK-RESIDENT USER PROFILES - A profile-based system is employed to manage user identities and preferences, devices, content and/or other aspects of service delivery. The user profiles may be maintained in one or more servers or other elements located in an external network access via a customer premises equipment (CPE) gateway of a local network. The profiles can be used to map users to identities, devices, services, and other features that affect the manner in which a particular user communicates with (or through) the external network. | 03-12-2015 |
20150139042 | Home Gateway with Dual SSID as a Wireless Hotspot/US - In accordance with various aspects of the disclosure, systems and methods are illustrated for an apparatus comprising a modem component, a wireless communications component, at least one processor, and at least one tangible electronic memory storing data and numerous computer-executable modules to enable wireless hotspots with multiple network identifiers. Examples of at least some of the computer-executable modules includes, but is not limited to an input module, network identifier module, session management module, network management module, automatic location management module, authentication module, bandwidth negotiation module, billing interface module, and activity-based location module. | 05-21-2015 |
20160004522 | Multiple Virtual Machines in a Mobile Virtualization Platform - Systems and methods are described for embodiments of a mobile virtualization platform (MVP) where in some aspects a wireless mobile device including multiple virtual machines (VMs) may receive data from a remote content provider and process/execute the data using an appropriate virtual machine. In some examples, the MVP may facilitate communication between and coordination among different virtual machines in the MVP, such as to facilitate optimization of data processing/execution. | 01-07-2016 |
Patent application number | Description | Published |
20120102491 | VIRTUAL FUNCTION BOOT IN SINGLE-ROOT AND MULTI-ROOT I/O VIRTUALIZATION ENVIRONMENTS - A method for virtual function boot in a system including a single-root I/O virtualization (SR-IOV) enabled server includes loading a PF driver of the PF of a storage adapter onto the server utilizing the virtual machine manager of the server; creating a plurality of virtual functions utilizing the PF driver, detecting each of the virtual functions on an interconnection bus, maintaining a boot list associated with the plurality of virtual functions, querying the storage adapter for the boot list utilizing a VMBIOS associated with the plurality of VMs, presenting the detected boot list to a VM boot manager of the VMM, and booting each of the plurality of virtual machines utilizing each of the virtual functions, wherein each VF of the plurality of VFs is assigned to a VM of the plurality of VMs via an interconnect passthrough between the VMM and the plurality of VMs. | 04-26-2012 |
20140025890 | METHODS AND STRUCTURE FOR IMPROVED FLEXIBILITY IN SHARED STORAGE CACHING BY MULTIPLE SYSTEMS OPERATING AS MULTIPLE VIRTUAL MACHINES - Methods and structure for improved flexibility in managing cache memory in a storage controller of a computing device on which multiple virtual machines (VMs) are operating in a VM computing environment. Embodiments hereof provide for the storage controller to receive configuration information from a VM management system coupled with the storage controller where the configuration information comprises information regarding each VM presently operating on the computing device. Based on the configuration information, the storage controller allocates and de-allocates segments of the cache memory of the storage controller for use by the various virtual machines presently operating on the computing device. The configuration information may comprise indicia of the number of VMs presently operating as well as performance metric threshold configuration information to allocate/de-allocate segments based on present performance of each virtual machine. | 01-23-2014 |
20140201462 | Subtractive Validation of Cache Lines for Virtual Machines - A method and system for managing a cache for a host machine is disclosed. The method includes: indicating each cache line in the cache as being in a transitional meta-state when any virtual machine hosted on the host machine moves out of the host machine; each time a particular cache line is accessed, indicating that particular cache line as no longer in the transitional meta-state; and marking the cache lines still in the transitional meta-state as invalid when a virtual machine moves back to the host machine. | 07-17-2014 |
20140237163 | REDUCING WRITES TO SOLID STATE DRIVE CACHE MEMORIES OF STORAGE CONTROLLERS - Methods and structure are provided for reducing the number of writes to a cache of a storage controller. One exemplary embodiment includes a storage controller that has a non-volatile flash cache memory, a primary memory that is distinct from the cache memory, and a memory manager. The memory manager is able to receive data for storage in the cache memory, to generate a hash key from the received data, and to compare the hash key to hash values for entries in the cache memory. The memory manager can write the received data to the cache memory if the hash key does not match one of the hash values. Also, the memory manager can modify the primary memory instead of writing to the cache if the hash key matches a hash value, in order to reduce the amount of data written to the cache memory. | 08-21-2014 |
20140244936 | MAINTAINING CACHE COHERENCY BETWEEN STORAGE CONTROLLERS - Systems and methods maintain cache coherency between storage controllers utilizing bitmap data. In one embodiment, a storage controller processes an I/O request for a logical volume from a host, and generates one or more cache entries in a cache memory that is based on the request. The storage controller identifies a backup storage controller for managing the logical volume, and generates bitmap data that identifies cache entries in the cache memory that have changed since synchronizing with the backup storage controller. The storage controller provides the bitmap data to the backup storage controller to allow the backup storage controller to synchronize its cache memory with the cache memory of the storage controller based on the bitmap data. | 08-28-2014 |
20140258595 | SYSTEM, METHOD AND COMPUTER-READABLE MEDIUM FOR DYNAMIC CACHE SHARING IN A FLASH-BASED CACHING SOLUTION SUPPORTING VIRTUAL MACHINES - A cache controller implemented in O/S kernel, driver and application levels within a guest virtual machine dynamically allocates a cache store to virtual machines for improved responsiveness to changing demands of virtual machines. A single cache device or a group of cache devices are provisioned as multiple logical devices and exposed to a resource allocator. A core caching algorithm executes in the guest virtual machine. As new virtual machines are added under the management of the virtual machine monitor, existing virtual machines are prompted to relinquish a portion of the cache store allocated for use by the respective existing machines. The relinquished cache is allocated to the new machine. Similarly, if a virtual machine is shutdown or migrated to a new host system, the cache capacity allocated to the virtual machine is redistributed among the remaining virtual machines being managed by the virtual machine monitor. | 09-11-2014 |
20150178201 | SYSTEM FOR EFFICIENT CACHING OF SWAP I/O AND/OR SIMILAR I/O PATTERN(S) - An apparatus comprising a memory and a controller. The memory may be configured to (i) implement a cache and (ii) store meta-data. The cache may comprise one or more cache windows. Each of the one or more cache windows comprises a plurality of cache-lines configured to store information. The controller is connected to the memory and configured to (A) process normal read/write operations in a first mode and (B) process special read/write operations in a second mode by (i) tracking a write followed by read condition on each of said cache windows and (ii) discarding data on the cache-lines associated with the cache windows after completion of the write followed by a read condition on the cache-lines. | 06-25-2015 |
20150378947 | CACHE LOAD BALANCING IN STORAGE CONTROLLERS - Methods and structure are provided for cache load balancing in storage controllers that utilize Solid State Drive (SSD) caches. One embodiment is a storage controller of a storage system. The storage controller includes a host interface operable to receive Input and Output (I/O) operations from a host computer. The storage controller also includes a cache memory that includes an SSD. Further, the storage controller includes a cache manager that is distinct from the cache memory. The cache manager is able to determine physical locations in the multiple SSDs that are unused, to identify an unused location that was written to a longer period of time ago than other unused locations, and to store a received I/O operation in the identified physical location. Further, the cache manager is able to trigger transmission of the stored I/O operations to storage devices of the storage system for processing. | 12-31-2015 |
Patent application number | Description | Published |
20110292807 | METHOD AND SYSTEM FOR SIDEBAND COMMUNICATION ARCHITECTURE FOR SUPPORTING MANAGEABILITY OVER WIRELESS LAN (WLAN) - A management controller in a network device may support performing management operations based on management traffic communicated wirelessly via a wireless network controller of the network devices. The management controller may perform the management operations and/or to support wireless communication of the management traffic independent of operations of the network device. The management controller may be integrated into a network controller in the network device. The management traffic may comprise out-of-band (OOB) management related traffic. A direct interface may be established between the management controller and the wireless network controller, to support direct sideband communication between the management controller and the wireless network controller. The sideband interface may incorporate Network Controller Sideband Interface (NC-SI) and/or Secure Digital Input Output (SDIO) interface. The management controller may control operations of the wireless network controller, by utilizing an embedded wireless controller driver. | 12-01-2011 |
20130196643 | DYNAMIC SPACE, FREQUENCY AND TIME DOMAIN COEXISTENCE - Various methods and systems are provided for space, frequency and time domain coexistence of RF signals. In one example, among others, a communication device includes a coexistence manager capable of monitoring operating conditions of a cellular modem and a coexistence assistant capable of monitoring operating conditions of a wireless connectivity unit. The coexistence manager is capable of modifying operation of the modem and/or unit based on an operating condition change. In another example, a method includes detecting a change in antenna isolation and/or operating temperature of a FE filter, determining filtering characteristics of the FE filter based at least in part upon the change, and modifying communications of coexisting communication protocols based at least in part upon the filtering characteristics. In another example, a TX/RX configuration for coexisting communication protocols is determined and communications in a protocol is modified based at least in part upon the TX/RX configuration. | 08-01-2013 |
20150312802 | METHOD AND SYSTEM FOR SIDEBAND COMMUNICATION ARCHITECTURE FOR SUPPORTING MANAGEABILITY OVER WIRELESS LAN (WLAN) - A management controller in a network device may support performing management operations based on management traffic communicated wirelessly via a wireless network controller of the network devices. The management controller may perform the management operations and/or to support wireless communication of the management traffic independent of operations of the network device. The management controller may be integrated into a network controller in the network device. The management traffic may comprise out-of-band (OOB) management related traffic. A direct interface may be established between the management controller and the wireless network controller, to support direct sideband communication between the management controller and the wireless network controller. The sideband interface may incorporate Network Controller Sideband Interface (NC-SI) and/or Secure Digital Input Output (SDIO) interface. The management controller may control operations of the wireless network controller, by utilizing an embedded wireless controller driver. | 10-29-2015 |