Patent application number | Description | Published |
20090257361 | METHODS AND APPARATUS FOR DETERMINING COMMUNICATION LINK QUALITY - Methods and apparatus for determining the quality of a communication link transmitting a specified packet type are disclosed. The methodology includes configuring first packets, which share transmission characteristics with a specific packet type, such as a Voice over IP packet, such that the first packets experience similar communication link treatment as the specific packet type. The first packets are then transmitted over the communication link to a quality monitoring server located near a termination equipment of the particular communication link. Second packets, which are transmitted by the server in response to the first packets, are received and evaluated to determine the quality of the communication link based on characteristics of the second packets. Corresponding apparatus are also disclosed. | 10-15-2009 |
20100049869 | Methods and Apparatus for Event Distribution and Routing in Peer-to-Peer Overlay Networks - Methods and apparatus for event distribution and routing in peer-to-peer overlay networks. A method is provided for event distribution and routing in a peer-to-peer overlay network that comprises a plurality of nodes. The method includes identifying a plurality of buckets on the overlay network, wherein each bucket includes one or more nodes, respectively, identifying bucket groups, wherein each bucket group includes a selected number of buckets, respectively, distributing events based on the bucket groups, and updating a routing table based on the events. A node includes a transceiver and a processor coupled to the transceiver and configured to identify a plurality of buckets on the overlay network, wherein each bucket includes one or more nodes, respectively, identify bucket groups, wherein each bucket group includes a selected number of buckets, respectively, distribute events based on the bucket groups, and update a routing table based on the events. | 02-25-2010 |
20100050235 | METHODS AND APPARATUS FOR REDUCING THE EFFECTIVENESS OF CHOSEN LOCATION ATTACKS IN A PEER-TO-PEER OVERLAY NETWORK - Methods and apparatus for reducing the effectiveness of chosen location attacks in a peer-to-peer overlay network. A method includes determining that new node identifiers are to be generated for a plurality of nodes in the network, inputting parameters to a hash function to generate a selected node identifier, and adopting a location in the network associated with the selected node identifier. Another method includes receiving a node identifier associated with a selected node, inputting parameters associated with the selected node to a hash function to generate a corresponding node identifier, comparing the node identifier with the corresponding node identifier, and determining that the selected node is a potential attacker if the node identifiers do not match. Another method includes detecting responsibility for initiating an update to one or more node identifiers, generating parameters to generate the node identifiers, and transmitting the parameters on the network. | 02-25-2010 |
20100080163 | APPARATUS AND METHODS OF PROVIDING AND RECEIVING VENUE LEVEL TRANSMISSIONS AND SERVICES - A venue-cast system and method for providing and receiving venue level transmissions and services, including discovery of a venue specific transmission by receiving an overhead signal from a non-venue network, extracting information for receiving the venue specific transmission from the overhead signal, and tuning to receive the venue specific transmission based on the extracted information. The venue level transmission may be provided and received in a manner that does not prevent an access terminal from receiving a local area or wide area transmission. | 04-01-2010 |
20100125670 | SYSTEMS AND METHODS FOR DATA AUTHORIZATION IN DISTRIBUTED STORAGE NETWORKS - Storage authorization and access control of data stored on a peer-to-peer overlay network is provided. A publishing node stores data on a storage node in the overlay network. The publishing node is adapted to facilitate data storage authorization by generating a resource identifier as a function of a usage string associated with a data type to be stored. A storage request is generated that includes the resource identifier and data to be stored. The storage request may be sent to the storage node. The storage device receives the storage request sent by a publishing node, including a resource identifier and data to be stored. Independent storage authorization is performed by the storage node at an overlay level by verifying the resource identifier. The data in the storage request is stored at the storage node if the resource identifier is successfully verified. | 05-20-2010 |
20100161817 | SECURE NODE IDENTIFIER ASSIGNMENT IN A DISTRIBUTED HASH TABLE FOR PEER-TO-PEER NETWORKS - A multi-party commitment method is provided whereby a joining node uses contributions provided by contributor nodes in a peer-to-peer overlay network to generate a node identifier. The joining node generates a first contribution and sends a join request to an introducer node (or a plurality of contributor nodes), where the join request seeks to obtain one or more contributions for generating the node identifier within an identifier space of the overlay network. A hash of the first contribution may be included as part of the join request. In response, the joining node may receive a plurality of contributions, wherein the contributions are bound to each other and the first contribution by a prior external multi-node commitment operation. The joining node can then generate its node identifier as a function of the first contribution and the received contributions. Consequently, collusion between nodes and malicious manipulation during ID generation can be frustrated. | 06-24-2010 |
20110075673 | Methods and Apparatus for Distribution of IP Layer Routing Information in Peer-to-Peer Overlay Networks - Methods and apparatus for distribution of IP layer routing information in peer-to-peer overlay networks. A method includes transmitting an advertisement to a first subnet advertising the accessibility of subnets and including unique subnet identifiers to disambiguate overlapping addresses, receiving a request from a network that includes the first subnet to communicate with a network that includes the second subnet, establishing a first tunnel with the second subnet and a second tunnel with the first subnet, and directing transmissions between the tunnels based on policy. An apparatus includes means for transmitting the advertisement, means for receiving a request, means for establishing the first tunnel with the second subnet and the second tunnel with the first subnet, and means for directing transmissions between the first and second tunnels based on policy information. | 03-31-2011 |
20140223479 | APPARATUS AND METHODS OF PROVIDING AND RECEIVING VENUE LEVEL TRANSMISSIONS AND SERVICES - A venue-cast system and method for providing and receiving venue level transmissions and services, including discovery of a venue specific transmission by receiving an overhead signal from a non-venue network, extracting information for receiving the venue specific transmission from the overhead signal, and tuning to receive the venue specific transmission based on the extracted information. The venue level transmission may be provided and received in a manner that does not prevent an access terminal from receiving a local area or wide area transmission. | 08-07-2014 |
Patent application number | Description | Published |
20090310517 | METHODS AND APPARATUS FOR DISCOVERY OF PEER TO PEER OVERLAYING NETWORKS - Methods and apparatus for discovery of peer-to-peer overlay networks. In an aspect, a method includes receiving a request to discover information about overlay networks of interest, generating a search query that comprises at least one parameter associated with the overlay networks of interest, and transmitting the search query to nodes on a local area network. In another aspect, an apparatus includes a memory comprising an overlay database of meta-data associated with one or more known overlay networks and a processor coupled to the memory and configured to obtain a search query that comprises at least one parameter associated with overlay networks of interest, determine one or more selected overlay networks from the overlay database based on the at least one parameter, and transmit meta-data associated with the one or more selected overlay networks in response to the search query. | 12-17-2009 |
20090310518 | METHODS AND APPARATUS FOR OPTIMAL PARTICIPATION OF DEVICES IN A PEER TO PEER OVERLAY NETWORK - Methods and apparatus for optimal participation of devices in a peer-to-peer overlay network. A method for dynamically configuring a node includes operating on an overlay network using a first participation mode, obtaining at least one configuration parameter, selecting a second participation mode for operation on the overlay network based on local policy and the at least one configuration parameter, and configuring the node to participate on the overlay network based on the second participation mode. An apparatus for dynamic node configuration includes a memory coupled to a processor and configured to operate on an overlay network using a first participation mode, obtain at least one configuration parameter, select a second participation mode for operation on the overlay network based on local policy and the at least one configuration parameter, and configure the node to participate on the overlay network based on the second participation mode. | 12-17-2009 |
20100124228 | REMOTE ACCESS TO LOCAL NETWORK - Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel. | 05-20-2010 |
20100125899 | REMOTE ACCESS TO LOCAL NETWORK VIA SECURITY GATEWAY - Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first protocol tunnel is established between a security gateway and the femto access point. A second protocol tunnel is then established in either of two ways. In some implementations the second protocol tunnel is established between the access terminal and the security gateway. In other implementations the second protocol tunnel is established between the access terminal and the femto access point, whereby a portion of the tunnel is routed through the first tunnel. | 05-20-2010 |
20100332683 | Methods and Apparatus for Merging Peer-to-Peer Overlay Networks - Methods and apparatus for merging peer-to-peer overlay networks. A method includes receiving an advertisement from a second overlay network, determining a size of the second overlay network, performing a self search on the second overlay network based on a persistent node identifier, if the size of the second overlay network is greater than the size of a first overlay network, and joining the second overlay network if the persistent node identifier is not part of the second overlay network. An apparatus includes a transceiver to receive an advertisement from a second overlay network, and a processor coupled to the transceiver to determine a size of the second overlay network, perform a self search on the second overlay network based on a persistent node identifier, and join the second overlay network if the persistent node identifier is not part of the second overlay network. | 12-30-2010 |
20110004681 | Methods and Apparatus for Enhanced Overlay State Maintenance - Methods and apparatus for enhanced overlay state maintenance in a peer-to-peer overlay network. A first method includes inferring that a first node is leaving the overlay network, and transmitting a decrement message to decrement a size counter value. A second method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a segment length associated with each node of the set of nodes, and determining a size of the overlay network by dividing the total number of nodes in the set of nodes by the sum of the segment lengths. A third method includes identifying a set of nodes associated with a first node of an overlay network, obtaining a size estimate associated with the first node and with each node of the set of nodes, and determining a size of the overlay network by averaging the size estimates. | 01-06-2011 |
20110078439 | APPARATUS AND METHOD FOR USER IDENTITY AUTHENTICATION IN PEER-TO-PEER OVERLAY NETWORKS - Disclosed is a method for user identity authentication for a peer device joining a peer-to-peer overlay network. In the method, a credential server of the overlay network receives a registered user identity from a joining peer device. The credential server verifies the registered user identity with an identity provider. Upon receiving, at the credential server, successful verification of the registered user identity from the identity provider, the credential server issues to the joining peer device a signed certificate for use by an authenticated peer device in the overlay network to authenticate the registered user identity of the joining peer device, wherein the signed certificate is signed by a private key of the credential server. | 03-31-2011 |
Patent application number | Description | Published |
20120303459 | METHODS AND APPARATUS FOR COMMUNICATING ADVERTISING CONTROL INFORMATION - Various embodiments are directed to the transmission, e.g., broadcast, of identification information and corresponding control information in discovery signals by a wireless communications device as part of a discovery process. In some embodiments, the identifier identifies one of: an advertisement, a user, or a module. In one embodiment the identifier identifies an advertisement, and the corresponding control information communicates a bid factor used in determining the value of a bid for an ad display opportunity. In another embodiment, the identifier identifies a dynamically modifiable advertisement, and the corresponding control information communicates information that is used to set and/or modify the dynamically modifiable portion of the advertisement. In still another embodiment, the identifier identifiers a user and the control information communicates status information. In yet another embodiment, the identifier identifies a module, e.g., a software application, and the control information communicates a command for the module to perform a particular operation. | 11-29-2012 |
20120303463 | ADCACHE SPACE AUCTIONS BASED ON DIFFERENTIAL CONTEXT - In some embodiments, in an exemplary advertising system multiple bidders compete for ad cache space on devices which display ads. The bidders are, e.g., advertisers, ad networks, and/or loyalty program providers. The devices which store and display the ads are, e.g., mobile and/or stationary wireless communications devices. An individual bidder is provided with contextual information that is of relevance to the individual bidder. The contextual information is about the device onto which ads may be loaded. Different bidders may be, and sometimes are, supplied with different restricted information. Various embodiments are directed to a methods and apparatus for operating an ad broker system. | 11-29-2012 |
20130272193 | METHODS AND APPARATUS FOR MULTIPLEXING APPLICATION IDENTIFIERS FOR PEER-TO-PEER DISCOVERY SYSTEMS - A method, a computer program product, and an apparatus are provided. The apparatus may be equipped to obtain one or more application identifiers from one or more applications on a wireless device, generate a super identifier (SID) having elements corresponding to the one or more applications and a base that identifies one or more common properties of the one or more applications, and broadcast the SID during one or more peer discovery slots allocated for the wireless device. In another example, a UE may be equipped to receive the SID broadcast by another UE, determine a match between at least one of the one or more common properties in the base, and determine whether an element associated with one or more applications is present in the SID. | 10-17-2013 |
Patent application number | Description | Published |
20130060631 | AD CACHE MAINTENANCE METHODS AND APPARATUS - Methods and apparatus relating to ad cache maintenance, e.g., determining when ad cache replenishment should occur, replenishing ad cache content and/or updating the content of an ad cache, on a device which supports the presentation of advertisements (ads) are described. Signals are received by a first device including an ad cache. The signals are received from other devices, e.g., devices in the direct wireless communications range of the first device. Received signals are processed and provide context information, e.g., information about the surrounding, services available, stores in the region, etc., in which the first device receiving the signals is at a given point in time. Context information is stored. As new context information is generated from received signals the newly generated set of context information is compared to a previously generated set of context information. Changes in context information are detected and used in performing ad cache maintenance operations. | 03-07-2013 |
20130060634 | METHODS AND APPARATUS FOR SELECTING ADVERTISEMENTS - Methods and apparatus related to selecting advertisements for presentation based on, e.g., received signals from devices in the proximity to a user's communications device, are described. In various embodiments a mobile device monitors for signals, e.g., peer discovery or other signals, from other devices which transmit, e.g., broadcast, advertisement related information. In various embodiments a device receives advertising information from an advertising device, e.g., AdPoint. In the case of peer to peer signaling, the AdPoint may be in close proximity to the user device receiving the advertising information. Advertising information received from devices in proximity to the user device are used in selecting an advertisement for presentation. Distance from the user device to the AdPoint transmitting an advertisement or advertisement identifier, distance to a store to which an advertisement relates, and/or distance to a location to which an advertisement relates, are taken into consideration when selecting an advertisement for presentation. | 03-07-2013 |
20130060702 | METHODS AND APPARATUS FOR DEMOGRAPHICS INFORMATION COLLECTION - Various embodiments are directed to methods and apparatus which can be used to implement a system for collecting demographic information of users and/or devices in real-time or near real-time. Methods and apparatus directed to communicating and collecting demographic information via wireless signals, e.g., discovery signals, transmitted by one or more wireless devices, e.g., wireless communications devices supporting a peer to peer signaling protocol, are described. In various embodiments, at least some of the demographic information is transmitted in a secure manner. | 03-07-2013 |