Patent application number | Description | Published |
20080198234 | Video Signal Loss Detection - Faults resulting in reception of a still, but unknown, frame are recognised by comparing each received frame of the video signal with its predecessor, incrementing a counter in the event that the difference between the frames falls below a threshold; and generating an alarm signal in the event that the count of the counter exceeds a predetermined count. Other types of fault such as loss of signal (i.e. reception of just noise) are recognised by incrementing the counter whenever the difference exceeds a threshold. Similar results may be obtained by instead the monitoring quantisation step size and/or number of transmitted bits of a digitally coded signal, and noting that it falls below, or exceeds, a threshold. A preferred option is to compute a complexity measure, being a monotonically increasing function (e.g the product) of the quantisation step size and of the number of coded bits and compare this with the threshold value. Faults occasioned by receipt of a particular fixed image instead of the wanted picture are recognised by comparing each frame of the video signal with the fixed image, and generating an alarm signal in the event that the difference between the frames consistently falls below a threshold. | 08-21-2008 |
20080320573 | Automated User Registration - For users to access network services such as video streaming from a device, users usually have to register themselves with the service first. Most registration mechanisms require a user to input a username, password, date of birth and other details. When implemented through a web interface, this mechanism is relatively easy for the service provider to provision. However, the problem is that users are required to manually enter significant amounts of information which can be both time consuming, especially on a mobile device where there usually no QWERTY input device, and susceptible to unintentional errors. The present invention proposes an automated registration process that does not require a user to enter any details manually except for the initial request to subscribe to a service. The process gathers information automatically about the user and the device used, which is then stored and used for user authentication during subsequent service requests following the initial subscription request. The subsequent requests for service also do not require the user to manually input any user data. | 12-25-2008 |
20090029703 | Handover Between Mobile Networks - When a mobile station MS | 01-29-2009 |
20090059811 | COMMUNICATIONS NETWORKS - In order to keep a pathway for time critical data packets (for example for VoIP calls) a dummy flow of data packets is established between a home hub router ( | 03-05-2009 |
20090116443 | RE-ESTABLISHING WIRELESS COMMUNICATION SESSIONS - This invention relates to maintaining or re-establishing a communications session in a wireless communications system. The present invention provides a method of re-routing a call between a user device and a third party device, the method comprising: setting up a call with the third party device using a first wireless connection between the user device and an access point; monitoring a quality parameter of the first wireless connection at the access point; automatically re-routing the call from the third party device to the user via a second wireless connection between the user device and a base station in response to determining that the quality parameter of the first wireless connection has fallen below a predetermined threshold. | 05-07-2009 |
20090254975 | Location Based Authentication - The present invention relates to authenticating a mobile device using logical location information associated with the device which provides an indication of the proximity of the device to other devices. The present invention provides a mechanism for authenticating a mobile device based on location related information or a “logical location”, but without requiring an actual location. The mobile user device identifies or discovers other devices, using direct wireless communication, within its vicinity and forwards this information to the authenticating authority. If this information matches previous or otherwise predetermined information, then the device is authenticated. | 10-08-2009 |
20090260075 | SUBJECT IDENTIFICATION - A system for authenticating the identity of a subject comprises: means for receiving information on subject behaviour comprising one or more events, means for allocating confidence levels to the event or events comprised in the received behaviour information and for extracting an overall confidence level on the basis of the allocated confidence level or levels and processing means for deciding on the identity of the subject on the basis of the overall confidence level. The system may include a device for collecting information relating to one or more events forming part of the behaviour of a subject and for providing the information to a separate unit to determine the identity of the subject. | 10-15-2009 |
20090265775 | Proximity Based Authentication Using Tokens - The present invention relates to authenticating a mobile device using location information associated with the device. The present invention provides a mechanism for authenticating a mobile device based on location related information or a “logical location”, but without requiring an actual location. The mobile user device gathers tokens such as SIM data from other wireless devices using wireless communication between the user device and the other devices. A server determines whether these tokens match predetermined reference information, and if so authenticates the user device. | 10-22-2009 |
20100085943 | HANDOVER OF WIRELESS CONNECTIONS - A connection between a communications terminal and a communications network is arranged such that on detection of imminent degradation or loss of such connection, the utilization of the connection is maximized in advance of such degradation. The network temporarily reallocates the maximum bandwidth that the terminal is capable of using to that terminal, which may result in a small temporary degradation of the bandwidth available to other terminals, and the terminal downloads the data most likely to be required next to a cache (in the case of specific web pages, identified by recent accession, bookmarks, or hyperlinks from the page currently being viewed), or a buffer (if the data is being streamed) using this extra bandwidth made available. | 04-08-2010 |
20110004600 | DATA MANAGEMENT - There is proposed a method of side-loading content onto a mobile device, preferably using a WiFi connection, from a network content store and storing it on the device for viewing later. The method automatically determines when to delete stored content, and more importantly, what content should be transferred over the network in the first instance. The system comprises a content manager which takes into account various parameters to determine what should be transferred and, if required, what should be deleted from the device. The parameters used include user profiles, size of a potential download, as well as available storage space on the device and the predicted duration the device will be in range of a wireless hotspot or broadcast network. | 01-06-2011 |
20120284367 | DATA MANAGEMENT - A method relates to side-loading content onto a mobile device, preferably using a WiFi connection, from a network content store and storing it on the device for viewing later. The method automatically determines when to delete stored content, and more importantly, what content should be transferred over the network in the first instance. The system comprises a content manager which takes into account various parameters to determine what should be transferred and, if required, what should be deleted from the device. The parameters used include user profiles, size of a potential download, as well as available storage space on the device and the predicted duration the device will be in range of a wireless hotspot or broadcast network. | 11-08-2012 |