H04L65/00

Communication in an artificial reality device due to predicted acquaintance interception

Methods, systems, and storage media for initiating communication between artificial reality devices are disclosed. Exemplary implementations may: enable a discovery setting by a first user wearing a first artificial reality device; detect a presence of at least a second user wearing a second artificial reality device; determine a familiarity level of the first user with the second user; and in response to the familiarity level breaching a familiarity threshold, initiate a call with the second artificial reality device by the first artificial reality device, the call including an interaction in an artificial reality environment accessed via the first artificial reality device and the second artificial reality device.

COMPLEX COMPUTING NETWORK FOR IMPROVING ESTABLISHMENT AND STREAMING OF AUDIO COMMUNICATION AMONG MOBILE COMPUTING DEVICES

Systems, methods, and computer program products are provided for improving establishment and broadcasting of communication among mobile computing devices. For example, a method comprises determining a first user accesses a mobile application on a first mobile device of the first user; determining a second user accesses the mobile application on a second mobile device of the second user; and initiating the audio communication between the first user and the second user, wherein the audio communication may or may not be streamed to a third user who accesses the mobile application on a third mobile device of the third user.

Traceless access to remote deployed devices in undisclosed locations

A bridge application receives a request from a remote device to access a support server. Subsequently, the bridge application established a secure connection between the bridge application and the support server and establishes a secure connection between the bridge application and the remote device. Once these secure connections are both established, communications are relayed between the remote device and the support server to effect a software change to network device. The secure connections are later terminated upon completion of the software change to the remote device. Related apparatus, systems, techniques and articles are also described.

Method and apparatus for accessing services affiliated with a discovered service provider

A method of accessing services affiliated with a service provider is disclosed. An issuer performs a bootstrap procedure with the at least one discovered service provider. The issuer performs a discovery procedure to determine available service capability layers (SCLs) supported by the at least one discovered service provider. The issuer transmits a domain name system-based service discovery (DNS-SD) query from the issuer to a DNS-SD M2M service discovery function (MSDF) server. The DNS-SD MSDF server is provisioned with SCL discovery records. The DNS-SD MSDF server is registered with a public DNS registrar entity. The SCL discovery records include, for each SCL, a type of M2M service capabilities supported by each SCL and a class of M2M services supported by each SCL. The issuer receives SCL discovery records from the DNS-SD MSDF server in response to the DNS-SD query.

Method and apparatus for accessing services affiliated with a discovered service provider

A method of accessing services affiliated with a service provider is disclosed. An issuer performs a bootstrap procedure with the at least one discovered service provider. The issuer performs a discovery procedure to determine available service capability layers (SCLs) supported by the at least one discovered service provider. The issuer transmits a domain name system-based service discovery (DNS-SD) query from the issuer to a DNS-SD M2M service discovery function (MSDF) server. The DNS-SD MSDF server is provisioned with SCL discovery records. The DNS-SD MSDF server is registered with a public DNS registrar entity. The SCL discovery records include, for each SCL, a type of M2M service capabilities supported by each SCL and a class of M2M services supported by each SCL. The issuer receives SCL discovery records from the DNS-SD MSDF server in response to the DNS-SD query.

JITTER BUFFER CONTROL BASED ON MONITORING OF DELAY JITTER AND CONVERSATIONAL DYNAMICS

Some implementations involve analyzing audio packets received during a time interval that corresponds with a conversation analysis segment to determine network jitter dynamics data and conversational interactivity data. The network jitter dynamics data may provide an indication of jitter in a network that relays the audio data packets. The conversational interactivity data may provide an indication of interactivity between participants of a conversation represented by the audio data. A jitter buffer size may be controlled according to the network jitter dynamics data and the conversational interactivity data. The time interval may include a plurality of talkspurts.

JITTER BUFFER CONTROL BASED ON MONITORING OF DELAY JITTER AND CONVERSATIONAL DYNAMICS

Some implementations involve analyzing audio packets received during a time interval that corresponds with a conversation analysis segment to determine network jitter dynamics data and conversational interactivity data. The network jitter dynamics data may provide an indication of jitter in a network that relays the audio data packets. The conversational interactivity data may provide an indication of interactivity between participants of a conversation represented by the audio data. A jitter buffer size may be controlled according to the network jitter dynamics data and the conversational interactivity data. The time interval may include a plurality of talkspurts.

Packet processing device and packet processing method

A packet processing apparatus includes a line adapter configured to receive packets from a communication line, a packet combining unit configured to generate a combined packet by combining a plurality of packets received from the communication line, a packet memory configured to store packets received from the communication line, and a combined packet transferring unit configured to DMA transfer the combined packet generated by the packet combining unit to the packet memory. The combined packet transferring unit determines an address of start data of each packet inside the combined packet on the packet memory, writes information on the address into the descriptor that is a predetermined data area on a memory, and DMA transfers the combined packet to the packet memory.

Mitigating network resource contention
11323540 · 2022-05-03 · ·

Media, methods, and systems are disclosed for mitigating network resource contention. Event scheduling details are received regarding one or more virtual events. In response to determining that an upcoming virtual event will begin within a predetermined time threshold, various steps are performed. First, a predicted number of event participants is determined. Next, database artifacts associated with the upcoming virtual event are prefetched. Then static event display resources are accessed prior to a start of the upcoming virtual event, and the database artifacts and the static event display resources are cached. A network protocol request to access network resources is received from a client device. The database artifacts and the static event display resources are pushed to a client-side cache associated with the client device, and a minimal network response is transmitted to the client device.

CALLING LINE/NAME IDENTIFICATION OF ENTERPRISE SUBSCRIBERS IN MOBILE CALLS

A system, server, and method of DTMF detection in a VoIP network.