Patent application number | Description | Published |
20100233960 | SERVICE DISCOVERY FUNCTIONALITY UTILIZING PERSONAL AREA NETWORK PROTOCOLS - Techniques to provide service discovery via personal area network protocols. A personal area network is generally a network that covers only a few feet or meters of physical space. Personal area networks can be wired or wireless. Wired personal area networks include, for example, Universal Serial Bus (USB) and IEEE 1394 (or FireWire) connections. Wireless personal area networks can include, for example, IrDA, Bluetooth, UWB, Z-Wave and ZigBee. Service discovery results in indication of services that are available via the personal area network and not necessarily the physical devices that provide the services. A wireless device may utilize DNS formatted data over a Bluetooth connection to determine services that are available from other Bluetooth devices within range. | 09-16-2010 |
20100235525 | EFFICIENT SERVICE DISCOVERY FOR PEER-TO-PEER NETWORKING DEVICES - Techniques for discovering and/or advertising services are described herein. A first bitmask is received from a remote device over a wireless network, the first bitmask having one or more bits that have a predetermined logical value. Each bit represents a particular service provided by the remote device. A logical operation is performed between the first bitmask and a second bitmask locally generated within a local device, where the second bitmask represents a service being searched by the local device. It is determined whether the remote device is potentially capable of providing the service being searched by the local device based on a result of the logical operation. | 09-16-2010 |
20130013779 | EFFICIENT SERVICE DISCOVERY FOR PEER-TO-PEER NETWORKING DEVICES - Techniques for discovering and/or advertising services are described herein. A first bitmask is received from a remote device over a wireless network, the first bitmask having one or more bits that have a predetermined logical value. Each bit represents a particular service provided by the remote device. A logical operation is performed between the first bitmask and a second bitmask locally generated within a local device, where the second bitmask represents a service being searched by the local device. It is determined whether the remote device is potentially capable of providing the service being searched by the local device based on a result of the logical operation. | 01-10-2013 |
Patent application number | Description | Published |
20120036192 | NAT Traversal for Media Conferencing - Methods for establishing a direct peer-to-peer (“P2P”) connection between two computers are disclosed. In particular, the methods are designed to work in cases where one or both of the computers are connected to a private network, such private networks being interconnected via a public network, such as the Internet. The connections between the private network and the public network are facilitated by network address translation (“NAT”). | 02-09-2012 |
20120036193 | NAT Traversal for Media Conferencing - Methods for establishing a direct peer-to-peer (“P2P”) connection between two computers are disclosed. In particular, the methods are designed to work in cases where one or both of the computers are connected to a private network, such private networks being interconnected via a public network, such as the Internet. The connections between the private network and the public network are facilitated by network address translation (“NAT”). | 02-09-2012 |
20120042027 | NAT Traversal for Media Conferencing - Methods for establishing a direct peer-to-peer (“P2P”) connection between two computers are disclosed. In particular, the methods are designed to work in cases where one or both of the computers are connected to a private network, such private networks being interconnected via a public network, such as the Internet. The connections between the private network and the public network are facilitated by network address translation (“NAT”). | 02-16-2012 |
20140052870 | NAT TRAVERSAL FOR MEDIA CONFERENCING - Methods for establishing a direct peer-to-peer (“P2P”) connection between two computers are disclosed. In particular, the methods are designed to work in cases where one or both of the computers are connected to a private network, such private networks being interconnected via a public network, such as the Internet. The connections between the private network and the public network are facilitated by network address translation (“NAT”). | 02-20-2014 |
Patent application number | Description | Published |
20120317153 | CACHING RESPONSES FOR SCOPED AND NON-SCOPED DOMAIN NAME SYSTEM QUERIES - In the described embodiments, while executing a DNS resolver, a processing subsystem in an electronic device with a set of network interfaces receives a scoped request from an application to determine an IP address for a domain name. Generally, a DNS query generated from a scoped request is to be transmitted only on network interfaces specified in the scoped request, whereas a DNS query generated from a non-scoped request can be transmitted on any of the network interfaces. The processing subsystem then generates a DNS query from the scoped request and transmits the DNS query on the specified network interfaces. Upon receiving a response to the DNS query, the processing subsystem stores a record of the response in a scoped portion of a DNS resolution cache that is used only for storing responses to scoped requests. The DNS resolution cache also comprises a non-scoped portion that is used only for storing responses to non-scoped requests. | 12-13-2012 |
20140173123 | ADDRESS FAMILY PREFERENCE IN MULTIPLE NETWORK INTERFACE ENVIRONMENTS - Internet protocol (IP) addresses are received from one or more domain name service (DNS) servers for accessing a remote host in response to a DNS query. The IP addresses are prioritized based on a list of preferred network interfaces associated with a plurality of networks. A network connection is established with the remote host using the most prioritized one of the IP addresses and a network protocol associated with the most prioritized IP address, where the most prioritized IP address is routable to reach the remote host over a network via the most preferred network interface. | 06-19-2014 |
20140362765 | Multipath TCP Subflow Establishment and Control - Techniques for electronic devices to control a multipath transmission control protocol (MPTCP) connection. An MPTCP connection between two endpoints may be established. The MPTCP connection may include at least one MPTCP subflow. At least one of the endpoints may be configured to act as a master with respect to the MPTCP connection. The master may perform one or more control operations on the MPTCP connection, while if one of the endpoints is not a master, that endpoint may not perform control operations on the MPTCP connection. The control operations may include initiating or establishing new MPTCP subflows or modifying a priority level of one or more MPTCP subflows of the MPTCP connection. | 12-11-2014 |
Patent application number | Description | Published |
20090082951 | Intelligent Restriction of Device Operations - A navigation system includes a user interface for detecting touch input. The system uses touch input to determine if a driver or passenger is operating the navigation system. If the system determines that the driver is operating the system, then an action is initiated (e.g., the user interface is locked down, a warning is provided). The navigation system allows a passenger in the vehicle to operate the navigation system while the vehicle is in motion. In an aspect, additional or other sensors (e.g., seat sensor, seat belt sensor, infrared sensor) can be used to detect whether a driver or passenger is operating the navigation system while the vehicle is in motion. | 03-26-2009 |
20090096573 | Activation of Cryptographically Paired Device - An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated. | 04-16-2009 |
20090157289 | Navigation Systems and Services - Navigation systems and services are described. The navigation services can include obtaining a route or route segment based on a location of a vehicle and a destination. Based on the route, a current fuel supply of the vehicle, and a number of factors related to fuel consumption, a refueling location can be estimated. A number of locations of fuel stations in proximity to the refueling location can be determined and presented to a user, for example, on a map showing the route. | 06-18-2009 |
20110179153 | METHOD AND APPARATUS FOR IDLING A NETWORK CONNECTION - The described embodiments provide a system that controls the operating state of a network interface. During operation, in response to receiving a request from an application to use the network interface for a route, the system creates a route structure for the route and increments a route reference counter in an interface data structure for the network interface. Upon subsequently determining that the application is no longer using the route, the system sets a route expiration timer in the route structure to a predetermined expiration time. When the route expiration timer expires, the system deletes the route structure and decrements the route reference counter in the interface data structure. When decrementing the route reference counter in the interface data structure causes the route reference counter to be equal to zero, the system sends a signal to a configuration application to inform the application that the network interface can be idled. | 07-21-2011 |
20110179163 | METHOD AND APPARATUS FOR IDLING A NETWORK CONNECTION - The described embodiments include a system that configures a network interface. During operation, the system receives a signal from an operating system indicating that the network interface can be idled. The signal is sent from the operating system as soon as the operating system determines that a final route structure that depended on the network interface has expired and been deleted. The system then determines if an application has established a route that uses the network interface since the signal was sent from the operating system. If not, the system causes the network interface to be idled. Otherwise, the system leaves the network interface in a current operating state. | 07-21-2011 |
20140171065 | SYSTEM AND METHOD FOR INTELLIGENTLY SELECTING A NETWORK INTERFACE - An method, apparatus and machine readable medium are described for intelligently selecting a network interface. An attempt may be made to connect over a first network interface having the highest priority (e.g., WiFi). At the same time, a fallback timer is started. If the attempt to connect over the first network interface does not succeed within a designated timer threshold, then a parallel attempt is made to connect over a second network interface having a lower priority (e.g., cellular). The first network interface over which a connection is successfully made is then used. These techniques may be employed on a per-connection basis. Thus, a first process may successfully connect over the first network interface while a second process may be unsuccessful over the first network interface but may fall back to the second network interface. | 06-19-2014 |
20140365642 | Smart Management of Background Network Connections Based on Historical Data - In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators. | 12-11-2014 |
20140365673 | Smart Management of Background Network Connections - In some implementations, a network daemon can manage access to a mobile device's network interface. The network daemon (e.g., network connection managing process) can monitor the condition of the mobile device's network connection on one or more interfaces. The network daemon can monitor many conditions on the mobile device. The network daemon can receive background networking requests from network clients (e.g., processes, applications) that specify criteria for initiating a network connection. The network daemon can then smartly manage network connections taking into account network conditions, mobile device conditions and/or client criteria received in the client request. This can help reduce battery life impact, memory usage, likelihood of call drops, data usage cost, and load on network operators. | 12-11-2014 |
20140366042 | Initiating Background Updates Based on User Activity - In some implementations, a mobile device can be configured to monitor environmental, system and user events. The occurrence of one or more events can trigger adjustments to system settings. In some implementations, the mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or accessing a network interface, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device to preserve a high quality user experience. | 12-11-2014 |
Patent application number | Description | Published |
20080304486 | MULTIPLEXED DATA STREAM PROTOCOL - Multiplexed data stream protocols are described. In one embodiment, a method to provide a multiplexed data stream protocol includes packetizing a data stream to provide packets with headers and transmitting the packets through an interface which is not designed to use Internet Protocol (IP) addresses. The headers contain data for flow control and sequencing and are associated with a port for an application, and the headers allow multiple applications to maintain an arbitrary and changeable number of multiple concurrent sessions through the interface. The headers may be Transmission Control Protocol (TCP) like headers and may not include IP like headers. Systems, computer readable media, software architectures and other methods are also described. | 12-11-2008 |
20080307109 | FILE PROTOCOL FOR TRANSACTION BASED COMMUNICATION - File protocols for transaction based communication are described. In one embodiment, a method to provide a file transfer protocol includes receiving packets containing headers, the packets being received at a first network stack software through an interface, and extracting data from he packets and reconstructing a file from data in the packets. The extracting may be performed by a first network stack software, and the interface is not designed to use Internet Protocol (IP) addresses, and the headers contain data for flow control and sequencing and are associated with a port for a file transfer application, and the headers allow multiple applications to maintain multiple concurrent sessions through the interface, which may be a USB compliant or BLUETOOTH compliant interface. Systems, computer readable media, software architectures and other methods are also described. | 12-11-2008 |
20120185582 | System and Method For Collecting and Evaluating statistics To Establish Network Connections - An apparatus and method are described for collecting and evaluating statistics for different network addresses and/or subnets when establishing network connections. For example, a method according to one embodiment comprises: receiving a set of potential network addresses for establishing a connection to a remote host; evaluating routing statistics associated with each of the potential network addresses; prioritizing the set of potential network addresses based on the evaluation; and initially attempting to connect to the remote host using the highest priority one or more network addresses. | 07-19-2012 |
20130203422 | SYSTEM AND METHOD FOR SCHEDULING PACKET TRANSMISSION ON A CLIENT DEVICE USING TRAFFIC CLASSES AND OPPORTUNISTIC BEHAVIOR - A client device having a networking layer and a network driver layer for transmitting network packets comprising: a plurality of transmit queues configured at the network layer, each of the transmit queues having different packet service classifications associated therewith; a classifier module for classifying packets according to the different packet service classifications, wherein a packet to be transmitted is stored in one of the transmit queues based on the packet service classifications, wherein one or more of the traffic service classifications comprise opportunistic traffic classes and other traffic service classifications comprise non-opportunistic traffic classes; and a socket layer comprising socket transmitting data from an application associated with each traffic service classification, wherein a socket associated with an opportunistic traffic class is automatically suspended in response to detecting a network interface of the client device being throttled. | 08-08-2013 |