Published Inventions
CableLabs is continually innovating in various areas of technology. CableLabs periodically publishes inventions made by our employees, while other inventions are filed for patent protection. The Invention Disclosures made by CableLabs listed here are intended to serve as a “printed publication” as defined under 35 U.S.C 102.
2024
PNM CPR 9/16/24
By creating measures of the amount of risk taken by cyclic prefix (CP) settings and rolloff (R) period settings, comparing to estimates of the amount of bandwidth taken or liberated by the settings of these CP&R settings, one can set policy, optimize, and implement procedures to adjust these settings in real time, triggered by events, or periodically as needed, to optimize risk and manage capacity of available bandwidth. Note this is separate from but can be implemented in concert with other resiliency capacity mechanisms including profiles in DOCSIS.
SL-U Channel Access Mechanism Discussion 9/13/24
During RAN1 #110 [1], RAN1 #111 [3], RAN1 #112 and RAN1 #112b-e, many agreements have been reached, concerning SL-U Channel Access Mechanism. This paper follows-up on some of the remaining items left for discussion and make adequate proposals.
Adaptative Queuing Configuration in WLAN 8/21/24
WLAN have a limited number of QOS queues available in HW which is limiting efficient prioritization and scheduling. An adaptative queueing configuration is proposed to adapt to the QoS queues with respect to the clients and their traffic.
Interoperable MEC Platform 8/13/24
An infrastructure deployment blueprint focused on increasing the geographical proximity between the user and/or data and the application to reduce the latency and/or transport bandwidth requirements.
Blockchain Analysis Nodes Defending Against Intrusion And Denial of Service 8/8/24
Blockchain technologies are being used for many things, and that usage is growing exponentially. The applications are often critical, or at least significant in value. The stability of these systems are questionable, and there is significant evidence that these systems are not guaranteed stable. Further, we know they are susceptible to attack, even though they are often designed to guard against these attacks. Because they are dynamic systems, and incredibly complex with many uncontrolled factors, there can be no inherent guarantee. So, some external system of support is necessary for some
applications.
Mobile Network Exposure Function as a Serverless Function 8/8/24
Mobile network cores consist of a network exposure function that enables exposing the network capabilities to authorized third-party applications. The corresponding function for 4G mobile networks is the Service Capability Exposure Function (SCEF), while that for SG mobile networks is the Network Exposure Function (NEF).
Predictive Machine Learning for Energy Optimization In 6g Networks 8/8/24
Our idea is to reduce both energy consumption and interference in future 6G networks by keeping inactive (i.e., not serving any users) access points switched off until a user device is predicted (by machine learning models running on the active parts of the rest of the network) to arrive in the region to be served by a cluster of currently inactive access points. This gives these inactive access points enough time to boot up and be ready to serve the user when it arrives.
A Method For Optimal Edge Orchestration On Cable Networks Using Reinforcement Learning 7/25/24
Reinforcement learning {RL) framework is modeled on the problem of optimal control of Markov Decision Processes. The main elements of an RL framework include – {i) the agent or the learner, {ii) the environment the agent interacts with, {iii) the policy that the agent uses to take an action, and {iv) the reward signal observed by the agent upon taking an action. A typical RL agent interacts with its environment in discrete time steps.
Architected Integration Platform 7/25/24
The overall framework of the CableLabs Launch Ready proposal is designed to increase the availability, affordability, and accessibility of Open RAN testing and evaluation in the United States to accelerate its development, deployment, and adoption.
The CableLabs’ Launch Ready Testing Events are designed to efficiently accommodate a large number of vendors, and to help progress quickly toward deployable solutions.
A Novel Method for Passive Measurement of Network Utilization Using TCP Statistics 3/28/24
Active methods of testing network links for bandwidth and congestion are limited in their effectiveness. Traditional methods hog the connection and more modern statistical methods sacrifice accuracy and reliability. By measuring key metrics involved in TCP congestion control that are already available on the device it is possible to recognize congestion, determine if the congestion is caused by the device under test, and estimate bandwidth. This method may be used continuously and can function under conditions where active methods would fail.
2023
Real-time Media Analysis Architecture & Protocol 9/18/23
Value Proposition: The future of devices requiring real-time application interaction will be enabled by an architecture based on a consistent set of protocols, high speed, low latency connections, and edge caching. This innovation positions the cable industry to enable and realize this future for these devices and users by building a standardized set of protocols and architecture for any application to work with any device over a highspeed network. An architecture such as this will allow for off-loading processing from the devices allowing device manufacturers to create innovative devices in the market. This will increase competition and ultimately benefit the subscribers. In addition, this architecture opens a wide range of new business strategies and opportunities for revenue generation to cable operators by creating the ability to sell preferences to apps through an innovative media analysis server and app cache.
Extensions to Network Grafting 9/18/23
Detect signal level changes to indicate that a switch has occurred and worked. Likewise, monitor for a drop or raise in profile initiated. Depending on which CMs change and how, which experienced outage before the switch and which just switched, one can localize the fault.
Detecting Nonlinear Distortion In Cable Spectrum Using a CM or SDR and Method and System to Find Distance to a PIM (Passive Intermod) Diode in Wiring 9/18/23
Sources of CPD can be discovered by their characteristic 2nd order distortion products which cable amplifiers do not normally produce. Previously, a wide block of frequencies was captured in the time domain and analyzed by DSP (digital signal processing) to determine if 2nd order or 3rd order nonlinear distortion was present in a vacant frequency band. This alternate method is for a two-input software defined radios (SDR) to capture on one input the portions of the downstream signal where some distortion products are created and on the second input a resulting distorted spectrum. The two captured signals are processed together to determine if harmonics of a lower-frequency source signal are contained in a higher-frequency target signal. Distance to CPD source can be determined using a cross correlation between the distorted signal giving time difference, if any. A mathematically produced “measured” distortion signal created by squaring or cubing the distortion-producing waveform and this is processed with a captured distortion-producing signal.
MAC NE in n:N Failure Protection 9/13/23
All forms of MAC NE (RMD, RMC, RPD) could be designed and configured to allow full pass through or to act as a PHY repeater if instructed to do so. By specifying messaging to the MAC NEs from the MAC Manager or Core, and/or a peer to peer signaling method between MAC NEs, a system of n redundant spares protecting N actives can be established. Then, if there is failure of one active NE, there is a close enough backup that can serve to replace it, if the failed NE can fail with pass through. In simplest forms, they can be set in 1:1 protection; but there may be situations where 1:N or even n:N are possible.
Holographics Over 10G 9/13/23
Depth-based media is an emerging market for users and enterprise that has recently witnessed a sharp uptick in growth and investment. With the rising demand for remote communication in virtual spaces, automation in transportation, maintenance, supply chain, and visualization techniques in healthcare, defense and simulation industry, startups and large companies are competing in this nascent market with the launch of fixed and wearable display units, free and propriety immersive content, developer tools, and a host of ecosystems to integrate, co-ordinate accelerating development among software professionals and industry experts. Despite growing support, challenges to content generation and transmission include developing an interchange format to support compatibility and an evolved network infrastructure to satisfy bandwidth and latency requirements to reliably and securely deliver immersive content.
Informative CM Display 7/18/23
Expand and perhaps standardize the display (like a cheap calculator crystal display) on a CM to indicate a message from the service provider. Messages could include known outages, planned maintenance, details of cause of issues, expected repair time, suggestions to check in home wiring, when and who to call, billing reminders and details, even special offers if opted into. The messages could be indicated by a simple upstream tone during an outage or planned maintenance, through internal troubleshooting capabilities added to the CM (Murphy), messages from the CMTS via MIBS or other signaling mechanisms, or a combination.
Wi-Fi Adaptative 5/6 GHZ Band Selection 7/18/23
This idea proposes a new mechanism to dynamically select the best band between the 5 GHz and the 6 GHz bands.A process running on a Wi-Fi gateway will record what clients support the 5 GHz and/or the 6 GHz band, the behavior of each client (traffic type and traffic pattern throughout the day and the week) and the airtime utilization of the 2.4 and 5 GHz channels. Once the client behaviors are learned, the AP can dynamically select the 5 GHz or 6 GHz band for the best QoE across all users.
Method of Detecting End-user Private Data Leakage 7/18/23
End-users may be able to specify their privacy preferences (e.g., CableLabs project: User-Centric Privacy – D5102) but figuring out if an entity is violating those preferences is extremely difficult. This is challenging because traffic between and end-user’s computer or mobile device is encrypted at the application-layer (e.g., HTTP (SSL)) and tracking what private information is transmitted to which application provider.
A Federated Learning Appliance for Constrained Devices 7/18/23
We propose a novel federated learning appliance that can plug into any embedded device with a USB serial port to perform custom federated machine learning with minimal coding and configuration required.
Explainable AI for PNM 7/18/23
AI and ML solutions experience friction with adoption in part due to their lack of explainability. While there is much research and development to add explainability to these solutions, they mostly rationalize a black box algorithm, or suggest monitoring of the inner model components, neglecting the value of the input space as a form of explainability. Further, for AI and ML solutions applied to PNM, including our CableLabs anomaly detector (AD), a black box explainer would be redundant and with questionable value, while monitoring the inner model components gets complicated and does not explain well to the user, which does not provide confidence and reduce friction in acceptance of the decision provided by the AI or ML.
Intelligent Bandwidth Allocation in Access Network by Using Machine Learning for Latency Management 7/18/23
This disclosure describes a novel method for intelligent bandwidth allocation in PON by using machine learning for latency management. The specific method uses reinforcement learning scheme to proactive update the bandwidth allocation policy to control or manage the latency for specific users. The proposed method uses the traffic information as well as network parameters as the State input to the core control unit Agent. The Agent updates the bandwidth allocation policy accordingly, which will be the output Actions to the OLT in PON. These Actions may include updates of the network bandwidth allocation algorithms, adjusting ONU priorities or changing the bandwidth allocation parameters and so on. As a result, the PON will measure the network performance such as latency, throughput or efficiency and return these results to the Agent as the Reward feedbacks. The Reward can be positive or negative based on the results. The training process is based upon the input of the Rewards, and the reinforcement learning algorithms will decide to reward or punish the model based on its output Actions.
Orthogonal OFDM Subcarriers Between DOCSIS and LTE/5g Networks 7/18/23
DOCSIS and mobile networks share a large portion or spectrum that generate interference for each other if there is a leakage point in a cable plant. DOCSIS 3.1 uses 25 or 50 kHz subcarrier spacing while LTE uses 15 kHz subcarrier spacing. If DOCSIS subcarrier spacing could be adjusted to 15 or 30 kHz, along with synchronization between DOCSIS and mobile networks, the mutual interference could be reduced by orthogonality of OFDM.
Frequency Domain Equalization Using Overlapped Fourier Transforms 7/18/23
A linearly distorted signal can be equalized in the frequency domain using a single complex multiply for each component subcarrier frequency. This method is now used for deghosting received multicarrier signals, such as OFDM (orthogonal frequency division multiplex) and OFDMA (orthogonal frequency division multiple access) with cyclic prefixes (CP), and on single carrier signals such as SC-FDMA (single carrier frequency division multiple access), also employing a cyclic prefix. However, by using an overlapped Fourier transform, the requirement for an embedded cyclic prefix can be eliminated, and a pseudo-prefix can be created in an overlapped portion of a Fourier transform. The overlapped time portion is later discarded. This improved equalization method can be used for any type of modulated or baseband signal. The advantages of FD (frequency domain) equalization are lower transmission time overhead from the cyclic prefix removal, and improved computational efficiency in the frequency domain. The computational efficiency is improved relative to a FIR (finite impulse response) filter when the signal’s bandwidth is wide and the echo is relatively long, because FIR filter structures can become very long with many taps. If employed for a burst-type signal, quiet time can be used for the pseudo-CP.
Network Access Virtual Experience Device Acceleration (NAVEDA) 7/18/23
Access virtual device acceleration – for gamers or anyone running applications that do not perform well on their edge devices, enable an edge application to know the device, assess its capabilities toward a use case (based on past experience from this and potentially other users, or based on tests or manufacturers (hw, sw) recommendations or service level) and determine when it is lacking to enable cloud or neighbor compute capabilities to step in and improve the service.
Software Method to Prevent Connected Device Service Theft 6/6/23
Software solution to prevent connected device service theft.
Methods To Prevent Connected Device Service Theft 6/6/23
Cable modems may be stolen in a variety of ways. While DOCSIS prevents unauthorized modems from accessing the network, iterations of DOCSIS before DOCSIS 4.0 do not prevent modems from accessing networks of other operators. If a given operator chooses to do so, they do not have to pay the non-recurring costs for CMs (and neither do their customers). This puts operators with more sustainable business models at a competitive disadvantage, at least in the short term.
This invention addresses this by providing a variety of mechanisms implementable in software to prevent a modem from registering, on-boarding, or connecting to a 3rd party’s network.
Enhanced Wireless Emergency Mobile Alert System 6/6/23
The WEA is a good mechanism to broadcast emergency alerts. Enhancements to make this system more effective, reliable, integrated and flexible will significantly speed up the delivery of potentially critical and life-saving information and response.
Since the alerts are broadcast messages, the UE may receive the paging information with the ETWS indication but the user may be away from the phone or the Mobile phones can be switched off (at night), or not be heard in a noisy environment or be in silent mode or do not disturb mode or have notifications turned off. Even if the User receives the alert, there is NO indication/acknowledgement to the first responders/disaster relief agency that the user received the alert message. An acknowledgement can significantly help improve the search and rescue operations and the response of the first responder’s team.
Datalyft – System and Method for Sharing Network Data
Bandwitdth With a Service 6/6/23
Network access convergence technologies created an opportunity to provide better user experience to end customers. A data sharing service platform built on converged access will allow a customer device to share network bandwidth among the end customers. This allows a true ubiquitous network connectivity and experience to end customers.
Sensorstream 6/6/23
Create a simple protocol to allow bootstrapping of telemetry in support of installation and troubleshooting of network devices, or devices that are not normally networked, or sensors, either as a one to one (network or telemetry device to reader) or as part of an ad-hoc sensor network, etc.
Method to Support Multi-service, Multi-datalink Box 6/6/23
An aggregation method is provided for multiple disparate access network data communications systems collocated in a shared enclosure. These multiple disparate access network data communications systems have traditionally used different protocols for communications and this method proposes a common network system so these disparate technologies can be operated in a common fashion.
DH Group Based 2nd Factor Authentication for Access Networks 5/15/23
Identities and Cryptography are always evolving. To manage uncertainty, one of the possible option for Access Network is to deploy 2nd Factor Authentication. When combined with identities (e.g., in the form of certificates or otherwise verifiable format), the use of a 2FA together with a trusted source of time can lower the risk of device cloning and possible weakness in the public-key algorithms used.
OCSP and CRL Proxy Signer 5/15/23
In this invention, the CRL and OCSP Proxy uses a special certificate that allows it to provide CRLs and OCSP responses for any (or well-identified) PKIS. The produced responses can override the revocation status from the original CA for NetOps purposes (e.g., OCSP not reachable, Ignore of Revocation Status, etc.)
Frictionless Self Install 5/15/23
This document captures in summary the findings, decisions, and choices made by the Frictionless Self-Install Working Group (FSI-WG) at CableLabs, exploring solutions to the key problems that cause friction in the self-installation process.
This Working Group (WG) brainstormed the major problems, and then the potential areas to explore for technology development, trialing, and research. As of the time this report is released, the group has explored many topics in three main areas: radio frequency (RF) detection, frictionless gateway, and avoiding RF. Each area is briefly explained, then the area is broken down into subtopics and specific solutions. Some additional areas were looked at too. Some solutions are under investigation still, some are tabled until the timing is more appropriate, and others are decided to not pursue further.
Networked Defense Sensors 5/15/23
This is a call to develop small sensors that can detect the use of drones in the area. By creating small sensors that can be on the communication network and complimentary sensors that can connect to the power network, we have redundant capabilities to sense when a drone is in the area, and thus can sound alarms, track information for post attach analysis, and enable fast reaction.
Rapid Coax Cutover 5/15/23
Rapid tap connector for cutover maintenance to reduce outage time. Develop a modular, snap cover, sealed tap that allows rapid cutover to new hardline and maybe taps too. This tap can be made a part of existing taps, amplifiers, nodes, or anywhere that coax needs to connect.
Method for Determining Optimal Wi-Fi Extender Placement 5/15/23
A method for comparing relevant KPIs to determine optimal Wi-Fi extender placement. By capturing the median, non-control MCS rates on the fronthaul and backhaul, it is possible to compare the values and determine if the extender needs to move closer to or further away from the gateway. The end goal is to have equally “good” links on every hop, as the overall throughput of the system will be limited to the MCS of the “worst” link.
Software to Make a Software Defined Radio (SDR) Into a Vector Network Analyzer (VNA) 3/20/23
This idea is to use a SDR as the RF engine to power a VNA. Attached with this disclosure, you will also find reading material and slides on conventional VNAs and S-parameters.
Improving Wireless MIMO With a Dispersive Signal Gathering “Lens” or Reflector 3/20/23
With wireless MIMO spatial diversity, having more potential signal paths with spatial diversity means that a space can support more information transfer by using more signal streams, or RF paths. A signal interfering with other signals at a receive antenna element is actually a desired property. This is because the signals are mathematically separated by performing an inverse matrix comprised of complex transmission coefficient elements, assuming an inverse matrix can be computed. If the inverse solution cannot be computed, a matrix is singular. This idea is to make a radio-wave gathering parabolic lens to produce a large effective aperture and then locate a multi-element phased array at a point which is moved slightly from the focal point. This “blurring” causes spatially diverse signals to overlap. Blurring can also be enhanced by making the surface of the parabolic reflector slightly irregular.
Method for Mac Address Uniqueness Checking via Hierarchical Ranges 3/20/23
Many protocols use MAC addresses as identifiers for devices – devices with different MAC addresses are considered separate entities. In the PKI world 0, CAs may be required to check for uniqueness of values – i.e., checking if a MAC address was already used in a different certificate. These checks can take quite some time because of the large dimension of the search space (48-bits). This invention reduces the lookup procedures requirements by leveraging the concept of constrained ranges of addresses.
Predictive Wi-Fi Behavior in NR-U Environments 3/20/23
Wi-Fi operation in unlicensed spectra will require to coexist with NR-U access technology in the 5/6 GHz bands.
While NR-U adopted a number of measures to coexist with 802.11ac/ax nodes, this coexistence may not be optimal. The implementation of a single ED threshold will drive to a more aggressive NR-U behavior towards Wi-Fi.
This solution addresses an adaptive Wi-Fi behavior implemented intended to increase the WiFi air time access to 50% (or other ratios) when in the presence of coexistent NR-U traffic.
Automatic Certificate Revocation Process With Service Assurance Notification 3/20/23
When a PKI certificate is revoked, impacted subscribers are unable to connect to peers or servers. IT or service provider staff should be made aware of this circumstance so the device can be corrected and service disruption is minimized. Furthermore, to the degree possible, automation of the revocation process can be supported in most circumstances. This invention outlines a process for automatic revocation processing with alerts to support service assurance.
Data Definition and Procedures to Verify Compliance With Certificate Templates 3/20/23
In many ecosystems, because the flexibility provided by digital certificates, the contents of digital certificates need to be regulated to provide interoperability within the deployment environment. Today, no standard exist that provide the required data definitions and procedures to (a) describe a profile (or template) for a certificate, and (b) to validate the compliance of a certificate to a particular profile. This invention addresses this problem by providing a solution to both aspects of certificateprofile validation.
IoT Certificates Registration For Cloud Providers 3/20/23
This method allows the Certificate Service Provider to securely register the certificates and enable them for usage under the customer’s account without exposing the SubCA’s authentication token in the customer’s account directly.
Enable Wi-fi Device Identity With Mac Randomization Enabled
3/20/23
A solution that addresses all network types, including open networks, that in the AP request for the unique STA MAC address, the AP would generate a unique key pair and provide the public key to the STA. The STA then encrypts the unique MAC address with the public key and then returns the encrypted unique MAC address. Since over an open
network monitoring can see happen, the encrypted unique MAC address string is exposed and would not change if the public key remains the same. To overcome this the AP would randomly update the key pair thus resulting in a differing encrypted unique MAC address string being sent.
Methods Of Coupling Hollow-core Fiber With Integrated Photonics For Optical Networks 3/20/23
In the last decades, great progresses have been made to the integration of optical components on a single chip, also known as photonic integration circuit (PIC). However, optical coupling between PIC chip and optical fiber components is still relatively challenging, due to the large size and optical mode mismatch between the optical fibers and the integrated optical waveguides. Coupling light from HCF, a special designed optical fiber with large mode area, into the integrated waveguides on PICs can be more challenging. In this invention, we proposed multiple spot size converter (SSC) designs targeting low-loss optical coupling between HCFs and PIC waveguides, including both edge and vertical coupling configurations.
Using DOCSIS Downstream Codewords for a Quality of Service/Outage Indicator 1/24/23
DOCSIS 3.0 downstream carriers are 6MHz wide in the US and deliver data codewords at a constant rate. There are MIBs, listed in background, that report unerrored, uncorrectable, and correctable codewords. If those numbers are read, timestamped, and summed, a delta calculation can be made between two time intervals. If the delta total number of codewords is not as expected, an outage percentage in the delta time interval can be calculated. Note this may have occurred on a CM because of power cycling. If the uncorrectable to total codewords ratio is calculated, another predictor can be made about downstream signal quality.
Novel AI-based Framework for Balancing Traffic Demand and Service Processes in Unlicensed Bands 1/24/23
This idea proposes methods for balancing traffic demand and service processes for systems operating in unlicensed bands. Unlicensed channels are shared opportunistically by many heterogeneous systems, prohibiting them from providing guaranteed QoS service. We introduce an artificial intelligence (AI)-based framework for classifying and predicting future traffic demand and service processes as well as controlling channel access parameters to meet QoS requirements. We characterize the traffic demand process based on traffic streaming statistics and characterize the traffic service process based on buffer occupancy and queue dynamics. Predictions of future streaming statistics and buffer occupancy dynamics are leveraged to control various channel access parameters and provision various QoS applications and/or meet a harmonious cross-technology coexistence among systems sharing unlicensed bands.
Methods for Resource Reclamation in Unlicensed Mobile Wi-Fi 1/24/23
In the associated invention (described in other invention disclosures and patent filings), rather than associating with a physical piece of hardware, identified by its MAC address, the Wi-Fi client associates with a virtual AP identified by a logical MAC address or Basic Service Set Identifier (BSSID). In order to perform this operation, the WTP hardware or software needs to support multiple BSSIDs, so it can dynamically instantiate a Service Set Identifier (SSID) specific to the client device.
Cable Plant RF Level Verification 1/24/23
In thinking about RF Level verification impairments and problems, we are able to bring to the table solution ideas.
Secure Device Identification 1/24/23
This invention is the outcome of the use of randomized MAC Address starting to be used within Wi-Fi. This move to use MAC Address randomization has trigger a lot of concern of how current systems that relay on the device’s MAC Address for various functions/features.
In thinking about the issue and the solution this solution it occurred that it could be used for the DOCSIS CMs, thus the expansion from just association that is used in the Wi-Fi realm to include registration as well. Then the topic of the DHCP issue came to mind and this continued to how is could be applied to DHCP to prevent IP pool exhaustion
Passive RF Interference Scanner Using SDR (Prius) 1/24/23
Design a SDR to scan spectrum to measure user activity in a market – i.e. unintentional jammers, for 5 GHz, new 6 GHz, CBRS band to measure incumbent usage and possible interference to incumbents and competitors. Including techniques to improve NR-U and Wi- Fi 6 coexistence. Also used to detect fake base stations.
From Barter to Currency – Creating Transparency in the Market for Personal Data 1/24/23
Translate (in an automated manner) the privacy policy of an online service into a standard taxonomy that (1) captures the data elements collected and (2) their uses. Use that taxonomy to develop an estimated fair market value for the personal data and the stated uses, to give the consumer a better sense of the value that is about to be traded for the “free” service – creating “transparency” for consumers. To develop the estimated fair market value, an MSO could leverage the personal data it already has to further automate the development of that estimate.
Automatic Traffic Smoothing for Low Latency (ATSLL) 1/24/23
The invention here is to automatically identify this type of traffic flow and apply smoothing to the rate of packets before they hit the cable modem. Since the overall data rate might only be 1Mbps, far below the allowable 5Mbps default congestion rate of Low Latency DOCSIS, this video data should be able to be delivered via the low latency queue without any of the packets being redirected to the classic queue.
Revocation of Compromised SIM Secrets via OCSP Responses and CRLs 1/24/23
This invention provides a mechanism to CONVERGE credentials/identity validity checking across 3GPP and Broadband Network independently of the type of credentials used (an X.509 certificate or a SIM Card).
Easy Wi-Fi QoE Framework 1/24/23
The Framework provides a comprehensive set of tools to assess the user Quality of Experience (QoE) and assist the user and ISP to enhance the QoE. It also includes a set of to defined the number of Mesh AP needed in a home and to best position the Mesh APs.
Temporary High Priority Access Based on Geographical Location and Time of Day 1/24/23
Access Class Barring (ACB) is a congestion control mechanism designed for limiting the number of simultaneous access attempts from certain UEs. The amin purpose of ACB is to redistribute the access request of UEs over time to reduce the number of access requests per Random Access Opportunity (RAO) window. This helps avoid massive-synchronized access requests to RACH. In order to implement the above, all UEs are assigned to 16 access classes (AC) from 0 to 15, which is stored in the UE’s SIM/USIM information (EF_ACC field in the USIM).
AR Assisted AP Placement 1/24/23
Use AR to overlay a channel-specific antenna pattern on an access point (AP) in order to guide installation. The AR device will capture the channel and band in-use by the AP and apply the correct pattern. Additionally, the user can select any channel or band in order to compare performance and coverage.
Multi-use Method and System for Capturing PNM Data Interpretation ExpertiseGridmetrics/EMP – Space Weather – Magnetic Pulse Sensor 1/24/23
Anomaly detectors need training data, which means it has to be tagged by experts. But the experts in this case don’t always agree on the impairment classifications. We developed a solution that allows groups to tag impairments in data in a group, thus learning together. But also, individuals can take the tool and data to tag on their own. This allows gage capability analysis to be done on individuals, group expert agreement on several examples, and thus the ability to confidently train others, train anomaly detectors (usually machine learning methods), and form a reference database for other purposes. By extending to collect information about the likely causes too, including failure modes, effects, and criticality, we extract more useful information at the same time for more capabilities, automation, and discovery.
Method for Extender Placement in Homes Using Smartphone App 1/24/23
Placing wireless backhauled extenders in the home is difficult, as finding a good location that provides coverage desired while not creating an additional wireless bottleneck is not straightforward nor intuitive.
Augmenting RF Detectors to Find Noise in Particular Frequencies 1/24/23
Augmenting RF detectors to find noise in particular frequencies. Internal to CM or external, part of tap maybe, remotely programmable perhaps or just reconfigurable before deployment depending on use case and implementation. Tie into Gridmetrics sensors too, and-or power supplies. May be solar powered or collect RF energy to power.
Apparatus and Methods for Healthcare Interoperability and Trust Operations 1/24/23
This invention describes an apparatus (the platform) for delivery of healthcare in a multi- stakeholder ecosystem. The platform allows establishment of a healthcare delivery and orchestration market place.
A framework of APIs, processes, information models, and data models that provide a path to providing holistic patient and outcome centric care experiences. The framework provides a specification to implement a centralized or distributed architecture for a multi- stakeholder health care delivery system.
Gridmetrics/EMP – Space Weather – Magnetic Pulse Sensor 1/24/23
Following development of the Joint Strategy, both DOE and EPRI committed to developing separate, but coordinated, Action Plans that would implement the five strategic goals. EPRI’s plan focused on those actions that industry would undertake to mitigate EMP risks; DOE’s plan (this Action Plan) delineates the steps that DOE will take to address EMP risks. Although the two Action Plans were developed independently, DOE and EPRI collaborated closely to ensure the plans complement one andother and avoid duplication effort.
2016
Method for Visualizing Media Usage 6/28/2016
A method of using PCAP files to visually show the medium usage by all devices on the medium.
Garage sale (location and items) advertisement through Community Wi-Fi networks 6/28/2016
Many homes have operator-managed Wi-Fi, which, is primarily used to provide connectivity. This innovation disclosure defines a system and method for operators to use community Wi-Fi network to advertise garage sale items as people walk or drive by a house.
Security Camera Activation Method 6/28/2016
Security cameras in the homes are common place today. Many of these activate independently without any coordination with home networks or other cameras nearby after detecting motion. In addition, a subset of these cameras also have in-built motor to change the angle of view of the camera. The present idea contemplates a coordination between the security cameras and home Wi-Fi network to allow proactive (in some cases before motion detection) filming by the camera. Most people have phones on them, which in many cases include Wi-Fi and Bluetooth. In the situation where an unknown person (carrying a device with MAC address not know to the AP) approaches the home, the AP in the home detects this and inform the appropriate camera to start filming. Based on the granularity of the location information available to the AP, it can also instruct the camera to change the angle and purview of filming. Many homes have multiple APs, the APs can coordinate between each other to get an understanding of the location and direction of the subject client.
Use of Flooring Sensors to Determine Activity and Location 6/28/2016
Obtaining the specific location where individuals are within an environment (home/office/hospital/elderly care facility) as well as activity tracking within that locale could be communicated to systems designed to facilitate the operation of services within that locale or to alert based on activity or inactivity. This would be accomplished by laying a special substrate (in tiles or rolled substrate) under carpeting or hardwood floors.
2015
Personalized QoS 9/15/2015
Network policies for things such as QoS (when used) are not individualized. Today, operators provision similar policies on all residential gateways without any regard to individual preferences. Thanks to social networks such as Facebook, in the last decade or so, a lot of data on individual preference is publicly available and many companies (e.g. Netflix, amazon) are using it to make all kinds of recommendations. In this disclosure, I propose operators use of publicly available data about individual to assign customized network policies per subscriber.
PNM Grouping Algorithm Based on Tap Subtraction 9/15/2015
Summary: Process two sets of equalization coefficients by subtracting taps. Then restore the main tap in the difference. A decrease in a MTR (main tap ratio, the ratio of energy in the main tap to all other taps combined) relative to the minuend coefficients or the subtrahend coefficients indicates a good match.
Gestures for mosaic window management 9/15/2015
Summary: This invention provides a set of gestures that allow you to subdivide a main window into an arbitrary set of sub-windows that completely cover the area of the main window. The process divides the main window into a set of rows or columns and continues by subdividing these rows/columns until the user achieves the window layout they desire.
Device for determining presence of cable service on a jack 9/15/2015
Summary: Our device makes it easy for a customer to tell whether cable service is available on a jack. We attach a cable line to an amplifier (e.g., op-amp, log-amp, or similar) and a 3-5 V battery. This apparatus is then attached to an LED. If signal is present, the LED lights. In the absence of signal, the LED is dark. See the attached circuit diagram and photo.
This could also be attached to a cell phone via the USB port, and the signal could be interpreted by a phone app, rather than the LED. We expect that this invention could also use an Arduino or Raspberry Pi instead of the amp. Other signaling devices are also possible.
Sound Streaming for Meeting Rooms and Other Applications 9/15/2015
Summary: Portable/Low Cost Alternative to Push to Talk Microphones and expensive speakers
Methods for Medium Access Resolution in Online Meetings 04/06/2015
Online meetings are increasingly becoming more common and replacing the traditional F2F meetings. The proposed access resolution methods enhance the online meeting experience by improving the efficiency of medium access among the participants.
Distributed scalable Floor Control Model for Audio & Video Conferencing 04/06/2015
This invention disclosure proposes an improved, distributed and scalable algorithm for determining the loudest N speakers in an A/V conference. We propose multiple scalable approaches for granting so-called floor access to a particular speaker (being the speaker in the A/V conference whose volume control is turned up while others are muted). Our approach is particularly well suited for (but not limited to) conferencing systems that are hosted in cloud computing environments. Furthermore, the distributed approach proposed here facilitates hosting of A/V conferences by different cloud providers more easily than a strict centralized model.
Novel space- and power-efficient ONU for MDUs 04/06/2015
Broadband customers increasingly start to consume video content (video, audio) either via an IP-based offering from their provider or via many of the available options for Over The Top (OTT) services. In addition, many subscribers no longer require voice service via their incumbent carrier, broadband provider or ISP, preferring to go with a mobile solution. MSOs and telcos are likely to respond by offering data-only services. In order to facilitate more effective ways to provide data-only services, we propose a new type of ONU. This so-called “Super-ONU” offers data-only services to subscribers via an integrated home networking technology.
Wireless signal strength and characteristic mapping using drones 04/06/2015
With wireless becoming pervasive (including Cable Wi-Fi everywhere initiative), drones could be used to measure wireless (including, but not limited to Wi-Fi or LTE) signal strength and characteristics in 3-dimensions, within or outside a building.
Using PacketCable for Non-Telephony QoS-Sensitive Applications and Services 04/06/2015
MSOs typically use PacketCable to deliver Dynamic Quality of Service for VoIP telephony, guaranteeing minimum parameters for IP traffic such as jitter, latency, and bandwidth. With adaptations, a Cable Modem can utilize PacketCable DQoS technology to provide prioritized packet flow for other services such as gaming, videoconference, and OTT video. Packaging this service as “GQoS,” or Guaranteed Quality of Service, can drive additional revenue by prioritizing packet flow for premium subscribers.
Cable plant repair via drones 04/06/2015
This invention describes ways in which cable plant equipment could be repaired in the field using drones. It involves drones attached with landing / gripping gear and a robotic arm to perform mechanical tasks. The extra power required by the drone during such an operation could be supplied via an external detachable probe, which can supply power during the operation. Three of these invention combine drones with robotics.
Character input method for one-handed remote controls 04/06/2015
We propose to add a touch-sensitive pad (called touchpad from here on) to a single-handed remote control. The touchpad and the associated circuitry have the capability to recognize letters that are being drawn on it. This input method is far faster and more convenient than selecting individual characters from a large grid of characters, using the arrow and other navigation keys.
Cloud controlled proactive air conditioning for vehicles using GPS, terrain and sensor data 04/06/2015
Method and system to offer cloud controlled optimum air conditioning for moving vehicle using GPS, terrain and sensor data.
TV screenshot using remote control 04/06/2015
Often times while watching TV there arises a need to note an address, a phone number, a website address or we simply like a picture which we want to capture and store.
Remote control for a CM/GW 04/06/2015
By defining an IR interface on the CM/GW, it becomes lot easier for the end user to turn the device on/off during remote troubleshooting procedures.
Phone backup/sync using Wi-Gig 04/06/2015
This disclosure proposes to activate the Wi-Gig interface as soon as the accelerometer running on a smartphone detects that the phone is about to fall and thereby data is synched over the Wi-Gig interface to a home media server due to the high speeds offered by 60Ghz.
IoT Smart hotel lock 04/06/2015
This invention describes a ‘smart’ hotel lock/door blocker to integrate with IoT platforms.
Using Ripples in a Full-Band Capture to Accurately Discover Echo Tunnels 04/06/2015
An Inverse Fast Fourier Transform is performed on the magnitude spectral data of a signal to reveal the presence of an echo tunnel.
Using drones in operations to enable seamless network repairs 04/06/2015
The idea is to use drones to help establish alternate network paths when the operations crew has to make physical repairs to plants, such as when they need to splice cables, change cable terminations, or anything that involves disruption to network cables that are in use by customers.
N+0 Architecture with a Bidirectional Mid-Band 04/06/2015
A flexible N+0 architecture allowing a bi-directional frequency band in the middle. It is backwards compatible with legacy terminal equipment, and allows sub-split, mid-split and high-split gear to co-exist on the same plant. Accommodates switchable diplex filters. Mid-band can be FDD or TDD.
2014
Indication of remaining charge on the battery itself (Design improvement) 11/14/14
Rechargeable batteries are a good technological advancement which is slowly taking over the billion dollar battery industry. The usage of rechargeable batteries have less impact on global warming, water and air pollution.
Dynamic Orientation of Antennas on Public Wi-Fi Hotspot APs based on Traffic Patterns 11/14/14
Wi-Fi AP uses information from the GPS to determine resource allocation and physical orientation.
Dynamic allocation of wireless resources based on transportation (e.g. Train) schedule 11/14/14
A centralized server interfaces with the scheduling system and ticket scanning system at transportation terminals to dynamically allocate radio resources and enable a better Wi-Fi user experience.
A mechanism to enable A/V conferences to be hosted by multiple Service Providers 11/14/14
This invention provides a way to distribute the media server resources within a service provider (SP) network, or across multiple service providers. This will improved scalability, and for the multi-SP case, will enable each SP to tailor the service to meet the special needs of their users.
Secure home eDelivery without the public Internet 11/14/14
Businesses such as USPS, FedEx and UPS have national or global distribution networks, widely available local outlets and frequent home proximity. Customers trust the security of this delivery chain and, in the case of USPS, there is federal penalty in tampering with that chain. This invention enables these businesses to become a secure document delivery replacement for the public Internet.
Monetized ‘gray list’ for voice services 11/14/14
This invention describes a voice firewall where callers can be billed for connecting calls.
DOCSIS “Bring Your Own” Cable Modem provisioning improvement (via OpenFlow.) 11/14/14
This invention provides a model to simplify DOCSIS Cable Modem provisioning allowing Service Providers different options of how to self-provision by using the OpenFlow architecture to quarantine new devices.
Service Access Locating 11/14/14
This invention provides a way for 3rd party services to determine if the user is accessing their service from home.
Automated Internet of Things Certificate Installation Process 9/19/14
Defines an automated process for installing PKI certificates on retail purchased IoT devices allowing the MSOs to extend the privacy and security supplied by their HSD service to the emerging IoT ecosystem.
Smart City Crowd Parking 9/19/14
Defines a method of providing open anonymous crowd-based smart parking solution without incurring the expensive of new infrastructure equipment like cameras and pressure sensors
Internet of Things Electrical Wall Switch 9/19/14
Provides a method for integrating the electrical switches in the home with the Internet of Things devices that are connect to the building internal power grid.
Embedded wifi extenders in STB or TV 9/19/14
Embedded wifi extender in STB or TV for better user experience.
Driverless Car Entertainment System 9/19/14
Allows safe viewing of video content for occupants of a driverless car during computer control using the wireless networks that MSOs are deploying.
Smart Repetition Counter 9/19/14
This invention disclosure describes a wearable device that is specifically designed to help users keep track of repetitions during fitness/exercise workouts. Beyond the initial fitness use case, this device could also have potential commercial or industrial utility.
Method of adding IP video channel information to a cable system 9/19/14
This invention is designed to add the necessary Internet Protocol Multicast data, which is needed for clients to tune to a channel, to a cable system using existing standards. This is for future use in IP-based headends.
Remotely Configurable Hearing Aid 7/31/14
Create firmware image for hearing aids. Image contains a WebApp (the invention). The WebApp as access to the hearing aid configuration settings. Hearing aid is IPv6 addressable. Remote user can log on to the hearing aid and configure it.
Real time language translation for video (broadcast or on-demand) 7/31/14
Implement a translation module in a cable Set Top Box (or TV) system that performs real-time translation of the audio track associated with a video asset into a target language.
Multi Port Set-top Box for Multimode Operation 7/31/14
As the US frequency range of DOCSIS expands from 42 to 85 and beyond, there is a need to protect the input of the set top box from upstream bursts from in house or neighboring CMs, which would cause the RF input of the set-top box to saturate or for the AGC module to misbehave. A typical solution would be to use a switchable diplex filter, which is a solution that increases cost and backend support complexity.
Method to transform UML-based information models to various OSS components 7/31/14
When we create MIBs today (e.g., for DOCSIS), it is a very manual process. We first manually create a UML-based information model, then manually create a data model, then manually create MIBs, Yang Modules, TR-69/TR-181 models, etc. This is a slow, cumbersome, and error-prone process. Our invention would automate the creation of these models from the UML information model.
Method for Detection of Configuration Protocol 7/31/14
An emerging trend in access network termination devices (particularly ONUs) is an ONU may support one of multiple methods for configuration and management. This invention proposes a method for determining the supported configuration protocol.
Test and Evaluation Method for Production Systems 7/31/14
Evaluate changes to production computer systems in real time without impacting users by directing cloned inputs to a sandbox platform and comparing performance metrics with the production system.
HMD-driven Content and Channel Navigation 7/31/14
Develop a head-mounted display enabled experience that enables MSO subscribers to leverage available programming guide information of online applications to check, schedule or cancel a recording on the go.
Means to Create Passwords that May be Sent in the Clear (one time passwords) 7/31/14
A user’s password is determined by a server selecting the number and locations of symbols from a matrix previously generated by the server. This previously generated matrix is on the user’s computer and at the server. The resulting password is used just once with the server selecting the number and locations of the symbols each time.
How to Build a Cheap Phased Array Antenna 7/31/14
A single A-D converter services multiple antennas in an array. DSP is used
to form an array and remove errors. Phased arrays can also be used to create
directional nulls.
Schedule DOCSIS 3.1 Transmissions to Avoid Switching Regulator Noise 6/10/14
CableLabs has built a research tool called the Joule Tool. It captures upstream full-band time waveforms
and integrates the energy over a selected frequency band for a period of 40us.The Joule Tool reveals that there frequently seem to be statistically two noise floors on the blue histogram, which is associated with a full-band capture.
Voice-Interactive Private Residential Context-Aware Information Engine 6/10/14
Using natural language, users will be able to manage a personal repository of information as a context-aware memory aid. The engine will utilize voice recognition and heuristics to build a database of information that will be searchable using regular natural language queries, thus creating an infinitely expandable, personal, and private repository of data for each individual user.
Location Independent Secure Internet Access 6/10/14
A mechanism for secondary degree of identity verification for secure communication. A generating code mechanism can be instrumented for added security. Such mechanism is location agnostic.
Offloading Logins 6/10/14
This invention allows for another entity to provide the credentials required for a login, without actually revealing them. Examples include a parent letting a child login use their credentials, and offloading authentication to a hardware box (like an STB), so that the user does not have to have credentials to login. Such a scheme can also be used for login by ‘applications’ which are not trustable with the user credentials.
Wireless Network Selection 6/10/14
One common problem encountered in community Wi-Fi networks is that as a broadband subscriber moves from out-of-range of private SSIDs to in-rage of private SSIDs, the subscriber device remains on a public SSID. One of the solutions provided so far is that the AP learns the MAC addresses of clients that have previously connected to its private SSID and once such clients are in its range, the AP blocks their association requests to the public SSID. In this disclosure, we propose an alternative solution.
User Friendly Coax Connectors 6/10/14
Provide visual feedback when cable is properly connected.
Virtualized Hosted PBX 4/21/14
This invention proposes a radical new way to deliver hosted PBX service. The MSO provides a Web Portal where potential business customers can order new business communications services. Once ordered, the service is automatically and immediately deployed to customer devices. The service-delivery platform (SDP) uses emerging technologies such as SDN and WebRTC to enable delivery of services to programmable customer-owned equipment, thus eliminating the cost of providing MSO-owned equipment. The SDP is virtualized in the cloud to achieve dramatic cost reductions. The SDP provides a simple high-level API that customers and 3rd-party partners can use to develop compelling new services.
Adaptive Prefix Distribution for Home Routers 4/21/14
Describes a method for home routers to determine the size of prefix they sub-delefate within a home network based on their number of ports.
Customer Edge Identification Algorithm 4/21/14
This application describes a mechanism for identifying the edge of a customer network using IPv6 Prefix Delegation.
Automatic Address Assignment Algorithm 4/21/14
An algorithm for automatically delegating multiple IPv6 and IPv4 prefixes in a home network is contemplated.
Directionless Home Router 4/21/14
This application describes a home router which does not have predefined WAN/Internet and LAN ports, but rather can be attached to the home network in any manner and then autodiscover its alignment within the network.
Methods to support multi-homing 4/21/14
This application identifies methods to support home network multi-homing (e.g. for video services).
WAN-LAN Auto-discovery on a router 4/21/14
This disclosure proposes methods to identify the WAN port vs LAN ports on a router which can dynamically configure any port to a LAN port or the WAN port.
Router Capabilities (RC) Protocol 4/21/14
A new protocol that enables the automatic configuration of a complex home network by allowing home routers to advertise their capabilities is contemplated.
DHCPv6 Router and Host Distinction 4/21/14
This application uses information from DHCPv6 requests to determine if the requester is a router or a host.
Coupons For Subscribers 4/21/14
Many membership-based companies incentivize their membership by giving members-only offers. AAA is a good example. Cable companies can also provide similar offers. Th is invention provides one such way. In this, a coupon code will be provided to the subscriber, particularly while they were watching a relevant program or commercial, using their second screen application. When the user uses the coupon on a merchant site, the merchant site checks with the MSO to see if the user is indeed a subscriber.
A seamless way for customer to collect, organize, and share the most important snippets within content and ads 4/21/14
Create a very easy to use way of collecting, organizing, and sharing snippets (section) of shows and ads to make the cable experience better.
Security Camera Provisioning and Processing on a Cable Network 4/21/14
This document defines the procedures for provisioning security cameras that are added to a cable network.
Building a Better Wave for Surfing Digital Channels 4/21/14
Solutions for QAM and IP Video that enable rapid changes between channels, enabling customers to channel surf at speeds comparable to analog TV.
Light bulb wireless access point 4/21/14
This is a system and method for providing high bandwidth wireless connectivity on a room by room basis.
An architecture for using SDN to support virtual cable modems and device configuration in DOCSIS based networks 1/27/14
This invention defined a network architecture that uses SDN mechanisms to provision DOCSIS networks and devices.
Terrestrial Wi-Fi based Auto Security and Car Safety Service 1/27/14
Deliver Auto Security and Car Safety services using the Cable industry’s Community Wi-Fi deployments and security services to consumers
Local Radio Station Listings in a Connected Car Environment 1/27/14
This invention disclosure describes a method of accessing local radio station listing services from within a connected car environment. Radio station discovery and tuning can be simplified and implemented in a less distracting manner.
2013
“Tele White Boarding”: Method for remotely interacting with distant colleagues on immersive screens 12/3/13
Can high-speed networks and ubiquitous large displays remove the “distance” barrier and provide real-time interactivity for future workers?
Concept for Linking Phone Calls to Internet Sites 11/20/13
This is a concept in which an Internet site or web page is opened when a phone call is received in a similar manner to Caller ID.
Using upstream scheduling for PAPR reduction 11/20/13
This invention proposes using the DOCSIS 3.1 CMTS’s upstream scheduler to assign modems to transmit minislots with no data to reduce Peak to Average Power Ratio (PAPR).
PAPR Reduction Using a Communal Band for Use By Multiple Cable Modems 11/20/13
Use vacant or noise corrupted bandwidth shared between more than one CM for PAPR reduction signals.
Methods for saving power based on user location with respect to screen 11/20/13
There are products (e.g. your laptop) that detect user activity and switch off the screen if the user has been inactive for certain amount of time. This is good as it saves power among other things. What these products don’t consider today is the location of the user with respect to the screen. In this disclosure we propose that products with screen shall also consider user presence, orientation, location with respect to the screen to decide brightness of the screen and also turn the screen on and off based on the presence.
EPoC Key Management Delegation with Bridge FCU 11/20/13
Some key management functions can be delegated to the Bridge FCU to improve overall key management efficiency/performance at the DPoE System
Method for Simulating Video Tuning Events using Ratings Weighted Channel Selections (probability density distribution) 11/20/13
This describes an algorithm and data model for generating video tuning events conforming to a weighted distribution (probability density function) of channel-tuning and providing a bounded random distribution for viewing session duration and channel dwell time.
Signaling method for phone handsets and base stations to report capabilities 11/20/13
A signaling method to allow phone handsets/base stations to report functions and capabilities to an MTA or like controller/switch.
Method to query Telephone devices for features/capabilities/information 11/20/13
There needs to be a universal method to query telephony equipment about their features/capabilities/information. This invention is to expand the Telecordia GR-30-CORE functionality to include such a method.
Mixing Legacy ATDMA DOCSIS with OFDMA 11/20/13
By correctly timing the transmission of legacy ATDMA it can be incorporated into an OFDMA
transmission block and orthogonality can be maintained between the two disparate transmission methods.
Methods for choosing video quality based on user location with respect to screen 11/20/13
As part of this innovation we are proposing that the device being used to watch video keeps track of the user with respect to the screen and reports it to the video server (e.g. Video GW in the house or in the cloud). Video server takes the user location into consideration when choosing the encoding rate for the video.
“Air Notes” wearable technology on the wrist to create, store, and retrieve notes in the cloud 11/20/13
Wearable technology, such as Google Glasses, is the next big thing. However, I already hate having to wear glasses, and I would prefer to put this technology in a stylish wrist accessory. This idea merges the technology demonstrated by Leap Motion with a concept such as Google Glass, to provide the capability to easily create notes by writing “in the air”, connecting via WiFi or wireless (4G, LTE) technology to store it in the cloud, and then notes could be retrieved and reviewed either on a simple screen on the wrist device, or through a projection from the device to a surface. Of course the device could also include a camera and the ability to display pictures. And of course, it could be integrated with the cable service to control a STB.
Service Tech CMTS App 11/20/13
An application from the CMTS to a smart phone, enables the user to monitor CMTS diagnostic page in real time over a smart phone app.
Learning Home Air Conditioning System with Smart Air Registers and Returns 11/20/13
Creating the most efficient heating/cooling system for a home, without heavy infrastructure re-engineering, through smart sensor air registers and returns, which operate as a neural network and determine the optimal air flow conditions through a learning process.
Make use of a Signing Avatar be used in conjunction with alert messages for deaf individuals 11/20/13
In cases of alert messages distributed via TV and portable devices – include a function that is a signing Avatar that signs the alert in the case of no streaming text and to supplement streaming text.
Network failure detection and prediction using DOCSIS 3.1 pilot measurements 11/20/13
This invention targets network health monitoring and network failure detection and prediction using opportunistic scheduling and measurement of pilot power in various bands to detect second order and third order harmonics created by equipment induced distortions. This invention also enables Identifying impairment location and predicting equipment failure.
EPoC Key Management Delegation with Bridge FCU 10/31/13
Some key management functions can be delegated to the Bridge FCU to improve overall key management efficiency/performance at the DPoE System
Allow customer to easily send and gather reference information (knowledge gained) from television programs or ads via email or another mechanism 10/31/13
Our customers need an easy way to collect information they would like to retain based on things they learned or found out about through television program. Write now they have to write it down or have a second device to retain this information. This allows clicking a button on the remote and an email is sent.
Supporting Jumbo Frames with DOCSIS 3.1 Downstream Profiles 9/17/13
This invention proposes to use the “Downstream Profiles” feature within DOCSIS 3.1 as a way of allowing some devices to support Jumbo Ethernet Frames (Ethernet frames of ~9000 bytes in size), while not requiring other devices that don’t support the feature to even be aware of the Jumbo Frames. It also allows Jumbo Frame support to be added to the specification at a later time, because early deployment devices will not need to be aware of these Frames.
Heat producing stylus for touch devices 9/17/13
A heat producing stylus that can be used with touch devices that use temperature senses. The stylus would be made with a lower voltage heating element or light that can be turned on and off by the user through a switch that is activated when grasping the stylus. The heat from the stylus would act as a replacement for body heat when used on touch devices.
Method for detecting bandwidth demand for a modem in low power mode 9/17/13
This invention describes a method by which the CMTS can determine that a CM should be moved out of a low power state.
Method to detect F-connector disconnection 9/17/13
In this invention, the cable device employs an energy detection circuit connected to its F-connector, a circuit having a long (perhaps programmable) time-constant and a programmable threshold that can be utilized to enable a micro-power standby function and to trigger a wake from standby operation.
Enhanced Emergency Alert Service 9/17/13
Automatically turn on all of the televisions in the home and tuning to the EAS can warn people of dangerous weather and reduce the loss of life.
HTML5 Remote Window Manager 9/17/13
Consumer devices, such as televisions, are providing functionality through Remote User Interfaces (RUI) displayed within an HTML5 web browser. This approach can be extended to provide the device with a Remote Window Manager (RWM), allowing the user to simultaneously interact with multiple RUIs.
The Remote Window Manager would be loaded into the browser first, and would load the other Remote User Interfaces into iframe elements that it controls. The Remote Window Manager would access the underlying device capabilities through a local server, or through platform extensions directly implemented by the browser.
Load balancing in MDU scenarios – Wi-Fi sharing 9/17/13
In the current MSO deployments in an MDU, it becomes really difficult to sustain the throughputs when there is a sudden influx of people in a MDU. This disclosure provides ways to tap the potential of neighboring APs in the MDUs (assuming these neighboring APs are not loaded and are nearby to the serving AP).
DHCP Fingerprinting for Mobile Client Identity Tracking 9/17/13
Use DHCP fingerprinting to track identity of mobile clients.
The 911 channel 9/17/13
This invention explains how the Cable Operator can dedicate a channel to extend in a very economical way the EAS information.
“Dropbox” like functionality or folder (e.g. accessible through the internet outside of the home) in a cable deployed home device 9/17/13
Allow LAN access to a device in the home deployed by service provider externally through quick and easy setup.
Expanded security systems to include two-way video services 9/17/13
Coupled existing security systems that when trigger preassigned cameras become active and start transmitting to the security company and/or E-911 services. In response all video devices connected to the cable system (directly or indirectly) are enabled allowing the security company and/or E-911 to transmit an image back into the home or business. This allows a two-way video path that responders can get a quick view into the situation and a virtual present to act as a deterrent or provide help provide emergency services.
Scalable CPE Connection Request Proxy Mechanism 9/17/13
Proxy function in a TR-069 capable gateway to perform Connection Request on behalf of the ACS to reduce connectivity and state of TR-069 CPEs behind the gateway
Embeddable web forms application engine 9/17/13
A reusable, multiuser web-forms application engine (standalone or embedded) and reporting system designed to collect and update user supplied data for scheduled and unscheduled events including RFPs, provisioning, and event registrations.
Cloud Connected Scale 9/17/13
This invention describes a scale connected by a relatively short range mechanism such as Blu-Tooth. If the users phone or tablet sees the scale and a configurable time since the last weighting as passed, it will alert the user to weigh. The weight would be available on mobile devices and the cloud for analysis and could be forwarded to physicians, weight trainers, etc.
Emergency Service Alert to CPE using a remote controller 9/17/13
This invention proposes an emergency response system by linking home data service subscribers to first responders through the simple click of a button, or a combination of buttons on customer premise equipment remote control or other connected devices on a home network.
Sink-Source Power Negotiation over Data Connector 9/17/13
Data connectors, such as HDMI (example only), could also be used to power devices. Devices can be either a power sink, or a power source. The invention establishes a protocol for devices to negotiate what power features the devices have, and set up a power sink- source relationship. Elaborations might also include:
-Swapping the sink-source relationship
-Negotiation of specific voltage/current
-AC/DC negotiation
-Handling of stand-by modes
Multi-Domain Scheduling for Subordinate P2MP Networks with Pass-Through Reporting 4/3/13
A concept for a single scheduler supporting multiple separate scheduling domains to support cascaded point-to-multipoint networks (subordinate P2MP networks) resulting in a unified and cohesive shared transmission environment.
Determination of Bandwidth Requirements for Aggregation Device Using Bandwidth Reports from End Units 4/3/13
In EPON networks, ONUs send REPORT messages to the OLT to report the “fullness” of their queues. The OLT, in turn, uses the REPORT messages to allocate upstream bandwidth to the ONU.
In the present invention, the OLT dynamically determines the upstream bandwidth requirements of an intermediate Aggregation Device by algorithmically combining the individual REPORT messages from the individual ONUs which are downstream from the Aggregation Device.
System for determining characteristics and power usage profiles of electricity consuming devices 3/13/13
One non-limiting aspect of the present invention relates to a system for determining characteristics and power usage profiles of electricity consuming devices (e.g. consumer home appliances or industrial machinery).
Multiple Connections for Real-Time media 3/10/13
One non-limiting aspect of the present invention relates to a method for increasing the available bandwidth and improving the reliability for real-time media sessions between two media endpoints by utilizing multiple connections between the endpoints.
Heuristic/Adaptive Learning Energy Reduction 3/1/13
Mechanism to allow Customer Premise Equipment to achieve the lowest possible power modes while still providing an acceptable user experience.
Prescription QR Code or RF ID Tag labeling 3/1/13
Prescription QR Code or RF ID Tag labeling to assist with EMT initial patient evaluation.
Method for delivering local advertisements for connected car and mobile applications 3/1/13
In the near future, wireless networks will be even more ubiquitous, particularly along major roads and highways, and travelers will have increased connectivity through mobile devices and network enabled vehicles with dashboard displays. Using location and heading information obtained through any number of ways, local advertisements or “digital interactive billboards” can be displayed to travelers on their vehicle’s display or personal mobile device.
STB Energy Conservation using Presence Detection Techniques 3/1/13
This approach utilizes a number of methods to determine if a viewer is present in a room to control the power state of a set-top box (STB).
Methodology for delivering Medical Data for Emergency Medical Services 3/1/13
Based upon a unique Emergency Service ID, patient information is delivered to authorized tablet or PDA utilizing onsite using an authenticated application to certified first responders.
Method for supporting multi-ISP 1/25/13
This invention provides a mechanism for supporting home networks with more than one ISP (e.g. for a home office).
Energy Efficient Handover Preparation in Cellular Networks 1/25/13
This invention describes a method to optimize the cellular handover process that requires the handset to only switch on GPS circuitry rather than full RF receiver most of the time, which results in an energy saving of 15x for the handset, compared to the approach in the current 3GPP specifications.
Providing Out-of-Band Signals for Legacy STBs in Mid-split or High-Split Plant 1/25/13
A mid-split or high-split amplifier provides a legacy QPSK carrier to STBs by down- converting a UHF carrier to the 70-130MHz band where it can be received by legacy STBs. The QPSK will essentially be traveling the “wrong way” (downstream) in the high-split cable system’s upstream band. Terminal equipment in homes will avoid transmitting on the QPSK carrier frequency to prevent interference.
Method of Interference Avoidance on Cable 1/25/13
A wideband tuner detects interference on an occupied or un-occupied RF channel. MAC messages are used to instruct the controller to avoid this RF channel or to use more robust modulation or more powerful forward error correction.
Improved Method of CW Carrier Testing for Channel Impairments 1/25/13
Previous CableLabs work included a device called a CWTesterTM. This invention is an improvement on that system because it does not require a phase-locked-loop to demodulate the test carrier. The CW Carrier is dropped into a narrow notch filter. Interference will cause the carrier’s sidebands to fall outside the notch filter’s range. This creates a trigger signal that causes a trace capture, followed by a recording.
Architecture for Delivering Greater DRM Rights Expression over QAM Networks 1/16/13
A method of extending the rights expression of the CA system’s CCI bits is proposed resulting in a hybrid CA/DRM system.
Automatic Address Assignment Algorithm 1/9/13
This invention describes an algorithm for automatically delegating multiple IPv6 and IPv4 prefixes in a home network.
System for obtaining and sharing records (e.g. medical) 1/8/13
This invention describes a system for obtaining and sharing records (e.g. medical).
Time Shifted Personal Recorder 1/8/13
This invention describes a method of recording things that have already happened.
TDM for OFDM with DOCSIS Secondary Downstream Channels 1/8/13
This invention proposing doing Time Division Multiplexing to allow OFDM signals to share the same downstream spectrum being used by DOCSIS 3.0 secondary sing-carrier QAM downstream channels.
Cable Modem Spectrum Analyzer Reveals Ingress Points in Home Wiring 1/8/13
A technician with a transmitter and an antenna walks around a house looking for his test signal to peak on a spectrum analyzer to indicate bad coaxial shielding. The spectrum analyzer is built into the CM, STB or Gateway. A downstream bandpass filter allows the DOCSIS CM (with SA function) to communicate with hub site.
Hybrid IP CableCARD 1/8/13
The present invention describes a IP enabled CableCARDTM that allows legacy CableCARD devices to operate without modification on a cable system that has been converted or is in the process of being converted from QAM to IP delivery. The invention considers both unidirectional and bidirectional CableCARD devices. Furthermore, the invention considers operation through a home gateway as well as through direct “cloud to ground” delivery.
A way to anonymize transaction data in B2B2C scenarios 1/8/13
Mechanisms to ensure anonymity of transaction data, while retaining the ability to authenticate/authorize/troubleshoot the transactions themselves – for use in partnership- based B2B2C offerings (e.g., heath care).
Method to Reduce Power Consumption with Partial OFDM Demodulation 1/8/13
To wake up a sleeping cable modem use a low data rate signal using just a fraction of the OFDM subcarriers available. Demodulate them with a discrete Fourier transform instead of the conventional fast Fourier transform. This reduces power draw while in sleep mode.
2012
Architecture For Accessing Health Care Services Seamlessly Across Devices 11/16/12
An architecture for monitoring healthcare sensor readings and providing notifications to designated caregiver(s) via multiple device endpoints (set-top box, tablet, and mobile phone) and allowing the caregiver to take action upon the notification(s) is contemplated.
Self-Optimizing User Interface 10/24/12
This invention automatically revises and customizes a user interface to maximize or
minimize performance against an objective.
DOCSIS Service Flow provisioning via OpenFlow 9/9/12
This invention provides a model to simplify DOCSIS QOS provisioning by leveraging the OpenFlow infrastructure.
Light Transport and Data Serialization for TR-069 Protocol 9/9/12
This invention defines a light protocol stack for TR-069. Even though TR-069 is widely deployed, its protocol infrastructure is heavy compared to web standards used today. Alternative protocols and data representation will be beneficial for easier adoption in new breed of devices that fill the network.
Directionless Home Router 9/5/12
This invention describes a home router which does not have pre-defined WAN/Internet and LAN ports, but rather can be attached to the home network in any manner and then autodiscover its alignment within the network.
Methods to support multi-homing 9/5/12
This invention disclosure identifies methods to support home network multi homing (e.g. for video services).
DHCPv6 Router and Host Distinction 9/5/12
This invention uses information from DHCPv6 requests to determine if the requestor is a router or a host.
WAN-LAN Auto-discovery on a Router 9/5/12
This disclosure proposes methods to identify the WAN port vs. LAN ports on a router which can dynamically configure any port to be a LAN Port or the WAN port.
CM or STB Power Efficiency Improvements Using Energy Storage Components While In Sleep Mode 9/5/12
A CM (or STB) charges up a supercapacitor from the main switching regulated power supply. The CM runs on the supercapacitor’s charge while in standby or sleep mode. This solves a problem of CM power supplies running with poor efficiency if they are not operated at their design load (e.g. 30 watts). After the supercapacitor runs down, the CM’s power supply recharges it and then powers down, always operating the power supply in an efficient load range.
Non-Service Interrupting Time Domain Reflectometer (TDR) Using Bidirectional Injection 8/29/12
A TDR is modified to allow it to work on cable plant that is in-service. This allows the diagnostic tests to be done without service interruption.
Phased Array Scanner for Fire and Police Applications 8/21/12
Use a phased array scanner at millimeter wavelengths for public safety application.
Multitouch Router 8/21/12
Our idea is for a consumer-grade router where the relationship between ports is not fixed, but is controlled using multi-touch gestures.
Methods for secure resource (physical, virtual) reservation 8/21/12
Methods for resource (physical, virtual) reservation to limit access to the resources by authorized users.
Triggering Augmented Reality from Companion Applications 8/21/12
Companion applications can be used to provide context information to augmented reality capable devices. An example of this concept might be a set top box running an EBIF User Agent, where an EBIF application can be used to provide a smartphone with contextual information about what the viewer is currently watching on television. The smartphone can then display augmented reality content that is relevant to the current programming.
Method and process to detect & report DAVIC channel congestion 8/21/12
Cable operators currently do not have visibility to the level of data channel congestion on their legacy out of band (DAVIC) communication channels. The method described here uses an algorithm based on the DAVIC communication protocol along with message latency measurements to detect the level of congestion for the data channel.
Determining In-Channel Frequency Response by Capturing Signals at a Tap 8/21/12
A non-disruptive test is disclosed using a 2-channel time capture of a downstream signal with one channel seeing signals going downstream and the other channel seeing signals going in both directions. With directional and non-directional times series captures, the traces can be processed together to find impedance mismatches in a cable line.
N+0 Cable Architecture with Home Run Legacy Return 8/21/12
A Cable architecture that provides node + 0 amplifiers in cascade for downstream signals, but cascaded upstream amplifiers for legacy upstream. This configuration allows AC powering, allows backwards compatibility, provides low cost optics and electronics, and enables pay-as-you-grow.
Utilizing QR Codes Within ETV Applications 8/21/12
By combining QR codes with ETV applications, a number of obstacles can be overcome. Placing QR codes in the graphics plane may have certain advantages over including them in the broadcast video. In addition, custom QR codes can be created on a per-device basis to enable correlation of request fulfillment to the individual subscriber. This technique can also be used to enable fulfillment of a campaign that is distributed over a one-way device.
Video Screen Illumination Based on Where the Fovea Are Directed 8/21/12
The area of a video or computer screen being looked at by the viewer is given more backlighting than the rest of the screen. That is, the area of the screen being focused onto the fovea part of the retina is given increased backlighting. This saves energy, improves readability, and increases battery life. The camera in the device processes where the viewer is gazing to increase illumination only in that area. Training can be done for the camera’s software.
Amplifier Upstream Automatic Gain and Slope Control Based on Downstream Settings 8/21/12
A solution is disclosed to allow mid-split and top-split upstream cable loss compensation with temperature variation. The upstream gain and slope settings are determined based on the downstream settings, which are applied to the same span of cable, but in a different frequency band.
Context awareness for seamless Wi-Fi Roaming 8/21/12
An apparatus that extends the client roaming decisions in Wi-Fi networks by the context of any information that could be considered relevant.
Service Provider Awareness Universal Apparatus 8/21/12
An apparatus for universal Service Provider awareness by host computers.
Dynamic E-Tree 8/21/12
We are proposing that BGP be extended to carry an additional attribute which would allow a much more VPLSesque configuration of E-Tree services.
IP Transport Layer based Channel Bonding for High Speed Data Access Data Networks 8/21/12
A mechanism to provide channel bonding from different network access technology resources and potentially unrelated service providers using 2-way and 1-way data channels.
eFridge: The smart kitchen’s hub 4/10/12
This invention describes a “smart” refrigerator (or “eFridge”) that acts as the hub of a smart kitchen eco-system, a method for providing information to the eFridge via “smart” products and other means, and a user interface.
Signaling telephony CPE devices of standard and high definition call types 4/10/12
Expand the Telecordia GR-30 FSK message types to include signaling indicate standard and high definitions call types for new and active calls.
Improved Splitters with Filters for Home Wiring 4/10/12
By incorporating filters into splitters/combiners inside homes, required CM transmit power drops by 3dB, eliminating in many cases the need for home rewiring. The filters also prevent noise from bad coaxial STB connections from interfering with upstream CM transmissions. Embodiment are shown for one-way STBs and two-way STBs.
Detection of High Definition Voice on analog twisted pair phone lines 4/10/12
Compare the upper half of the HDV audio spectrum (4-7kHz) with the lower half (300- 3kHz) to determine if the delivered audio on twisted pair phone line is HDV.
Methods for link selection and load balancing in SIP based architectures 4/10/12
This invention disclosure provides a number of methods a SIP GW can use for link selection and load balancing in a SIP based architecture.
Methods for Detecting Loops in Ethernet Networks 4/10/12
This invention describes a couple of methods for detecting loops in Ethernet networks.
Method to Measure Distortion and Noise At Terminal Equipment 4/10/12
A method to discover non-linear distortion in downstream cable plant by capturing a first downstream signal at a hub site, a second downstream signal at a terminal device and processing them together to determine non-linear distortion. A trigger is provided by a downstream sync signal to insure that the downstream signal capture occurs at a same relative time.
Expandable Extended-Reach EPON over HFC Network System 4/10/12
Methodology that extends reach of EPON over HFC network to greater than 50 Km using 20 Km optical components. Methodology provides guidelines to distribute signal to multiple physical-layer-converter units providing flexibility for upgrading network based on penetration, without impacting performance and reducing number of OLTs needed.
Remote Access (VPN) to Home Network Using DOCSIS CM/eRouter 4/10/12
Add a VPN server capability to a DOCSIS CM or eRouter device to enable new services such as the ability to access the home network and devices from anywhere in the Internet.
Media CM that Supports Streaming Video Over IP 4/10/12
This invention incorporates streaming video server inside a CM. Streaming video server gets video from broadcast, multicast, and single cast carriers on the downstream Cable system. Streaming video may be sent to a single subscriber or to several subscribers.
Method for exposing a multi-track media track description 4/10/12
Media resources often consist of multiple tracks of information, e.g. main video track, main audio track and multiple subtitle tracks. This invention is a method for a media player to expose the metadata that describes these tracks in a way that is independent of the track composition of the media resource and the media resource format.
Method and system for providing mobile broadband services utilizing DOCSIS® or EPON 4/10/12
This invention disclosure proposes a method for implementing a system that provides mobile broadband services by utilizing the Data-Over-Cable Service Interface Specifications (DOCSIS) or Ethernet Passive Optical Network (EPON) protocols over the top of any radio frequency communication links, without the need to modify the existing DOCSIS protocol.
2011
Set-top energy reduction through DSG one-way mode 12/8/11
Set-tops systems are designed with an underlying assumption that the set-top is always actively listening to the network. A consideration in reducing set-top energy consumption is devising a means by which the set-top can maintain this one-way, receive-only, level of network connectivity at the lowest level of energy consumption. The DOCSIS Set-top Gateway (DSG) defines a one-way mode of operation in which the up-stream transmitter is disabled and the set-top remains tuned to and listens to the DOCSIS downstream channel.
DOCSIS Light Sleep Mode 12/8/11
A new operational mode for DOCSIS equipment, which is aimed at reducing power consumption of cable modems during periods of very low data throughput.
DOCSIS Deep Sleep Mode 12/8/11
A new operational mode for DOCSIS which is aimed at significantly reducing power consumption of cable modems during periods where continuous network connectivity is not expected.
Automatic creation of Encapsulation tags for L2VPN tunnels 12/1/11
Today VLAN tags are manually configured by the MSO in a L2VPN config file. This disclosure proposes the idea and methods in which the VLAN (Encapsulation) Tags can be automatically generated in the DOCSIS network for use as needed.
Use of PCMM to configure Non DOCSIS network devices 10/27/11
The new idea is to reuse the PCMM infrastructure (signaling interfaces & devices) for communication with other network elements like Edge routers on a MSO network (instead of just to the DOCSIS CMTS).
System and Method for Automatically Detecting User Presence for Personalized Service 10/27/11
This invention automatically detects the presence and identity of the user(s) of a network- based service, and uses the knowledge of the user’s presence to customize and personalize the service according to the user’s preferences, usage history, and/or additional externally gathered information regarding the user(s).
Out-of-Band Forward Data Channel Implementation Methods for Expanded Upstream Networks 10/28/11
Methods to carry Out-of-Band Forward Data Channel (OOB FDC) transmission to Set-Top Boxes in CATV networks where the upstream spectrum has been extended covering the frequency range used by standard OOB FDC.
Optimized Bandwidth Request Using Small Request Frames 10/28/11
A bandwidth request frame designed to incur minimum upstream overhead while enabling support of upstream QoS at gigabit per second data rates.
Dedicated Bandwidth Request Mechanisms for Low Latency Services 10/28/11
Two bandwidth request mechanisms are designed to achieve low latency using a dedicated subcarrier approach and a dedicated slot approach.
System and Methodology to Provide Multi-Gigabit Broadband Network Services 10/27/11
This medium access control and physical layer system and methodology provides multi-gigabit service capabilities over HFC and other networks through a novel scheme that results in low complexity processes.
Remote Detection and of LTE interference on CableTV Networks 10/27/11
By analyzing the CM Downstream Equalization information, determine a pattern that provides indication of burst type service interferences residing in the same band. For example, LTE same channel interference in the 800 MHz band.
Method to Accurately Measure S-Parameters Using Time and Frequency Transforms 10/27/11
A method to accurately measure return loss comprising attaching long representative cable(s) to a device, launching a test signal through the cables, capturing the complex frequency response, converting the complex frequency response into the time domain, filtering in the time domain, converting the filtered time response back into the frequency domain, wherein the effects of the launch connectors is removed from the frequency response.
Preventing Interference In Simultaneous RF Over Glass Transmissions 10/27/11
If two optical transmitters with the same wavelength transmit at the same time and if their
wavelengths are close, optical beat interference occurs. This can be avoided by the CMTS performing testing for interference between optical transmitters, and the CMTS scheduler thereafter avoids simultaneous transmissions between units that are capable of interference.
Method To Determine Complex Frequency Response of Downstream Cable Plant 10/27/11
Two signal generators are locked up to a precise time standard, one at a hub site and the other at a test site that might be a home or a tap location. The generator at the hub site is offset from the generator by a frequency, such as 30 MHz that can propagate upstream. With common command and control, both generators step their way through a frequency band that needs to be tested for complex frequency response. A mixer in the hub site mixes the received test signal with the local offset signal. This generates a signal (e.g. 30 MHz) that is sent back upstream where it is demodulated in the hub site for amplitude and differential phase response. A number of methods are disclosed to provide a frequency reference for the two generators. In an alternative embodiment the demodulation can take place in the field, which saves returning the signal over the upstream band. The field demodulation can be done by synchronous conversion down to baseband I and Q, or by conversion to an intermediate frequency (IF)
Method For Distributing Device Metadata Across the Internet 10/27/11
Using this invention equipment metadata such as the physical dimensions, power consumed and compatible accessories can be made available in a defined format for use in OSS tools such as Inventory and Discovery.
Methodology for Localizing Additive Upstream Impairments on CATV Networks 10/19/11
This invention disclosure, defines a methodology to localize additive upstream impairments on CATV networks using granular time and frequency domain analysis of impairments in conjunction with pre-equalization data.
Back-office application taxonomy system using semantic web technology 10/19/11
A system for applying a Web Ontology Language to the application inventory for classifying, managing and analyzing the completeness and utility of the back-office of a service provider.
System for graphical VOD playlist on cable set-top box 9/12/11
This invention describes an architecture and method for allowing subscribers to browse, search, and otherwise navigate content on a consumer IP device, such as a PC, laptop, smart phone, or tablet, using a web browser or native application in order to construct a playlist which can be accessed and displayed graphically on the television through the cable set-top box using the cable set-top box remote control. The subscriber can use the cable remote control to access the playlist, select an item, and initiate a VOD session that corresponds with the selected item.
Method to create and use tags based on voice or video sessions 9/12/11
This document describes a way to dynamically associate a video or voice stream with a tag which could be an object name or person. This method then serves in many usages, for example in a multi-party video conference for the application to select the video sessions to represent more effectively.
Coding and transport of 3D depth data for closed captions 9/12/11
The invention provides an efficient way to encode depth data (Z-axis) information to enable closed caption authoring for stereoscopic 3D content based on the CEA-608 caption standard.
A DRM Implementation for Linear Content Delivery 9/12/11
A license acquisition mechanism is defined to allow use of standard DRM technologies for the secure delivery of linear video content. Supplemental materials.
Holistic Method for Evaluating Customer’s Quality of Experience 2/7/11
These days, with telecommunication service providers having to respond to customer’s different tastes and priorities, and having to support a multitude of applications and services with very different service requirements, it is difficult to follow or come up with a simple formula that provides an answer for service providers to optimize customer service experience. Instead due to its many interdependencies, it is important to develop a framework that identifies and correlates all the elements that play a role in the Quality of Experience of a customer. These elements or factors may impact Quality of Experience differently. This paper describes the elements impact on Quality of Experience and the relationships between these different elements.
2009
Method and apparatus for providing Integrated Interactive Group Services over Cable Networks 6/24/09
This invention discloses a way for people in a user selected community to interact over a cable network. Numerous applications can be built on top of this framework.
Method and apparatus for changing advertisements dynamically 6/24/09
This invention describes a method of dynamically changing the current playing advertisement on a program, based on user input and having the backend systems respond by inserting a new advertisement in its place.
Method for dynamic control of per-flow bandwidth preemption 6/24/09
This invention gives ISPs and customers a technical framework for negotiating bandwidth tiers of service based on pre-emption.
Feedback Control Measurements for Digital Program Insertion Timing 6/24/09
MPEG streams containing advertisements to be inserted at the client (STB) during commercial breaks must be carefully aligned in time with the breaks. This invention provides a mechanism to measure alignment errors so corrections can be made.
Pre-Equalization Based Pro-active Network Maintenance Process Model for CMs Transmitting on Multiple Upstream Channels 6/24/09
This disclosure extends the process for analyzing the pre-equalization information to determine the gravity of the network problem and geographically isolating the source of the problem when the CM is transmitting on multiple upstream channels. Using multiple channels for upstream transmission is a feature in DOCSIS 3.0 to increase the transmission speeds. Though the pre- equalization parameters on multiple channels provide more comprehensive information on the spectral distortion, additional complexity is introduced in the analysis of these parameters. This disclosure and the attached paper explains the methodology used to address the frequency dependency of the micro-reflection and correlating this information across multiple channels.
2008
A Method for Seamless Channel Change (DCC) in a Plant With Strong Linear Distortion 9/11/08
This invention proposes a mechanism to effect a fast and optimized change to a new channel using DCC (DOCSIS 2.0 Dynamic Channel Change) in a strong micro-reflection environment. In this environment, the CM will be forced to perform initialization technique 2 that requires the CMTS to recalculate the pre-equalization coefficients after receiving the ranging request on the new channel and provide it in the ranging response. By deriving the pre-equalization coefficients for the new channel from the values used by the current channel, this proposal will eliminate the step where CM sends ranging request and CMTS communicates the pre-equalization coefficient using an unsolicited ranging response. The seamless approach defined in this disclosure will be useful in supporting business services where stringent SLA requirements are placed. In addition, it will improve reliability and service assurance of voice services by decreasing the number of dropped calls.
A Method for a CM to Optimize Initial Ranging of Multiple Channels for DOCSIS 3.0 in a Plant With Strong Linear Distortion 9/11/08
Similar to storing the power level, this invention proposes storing the pre-equalization coefficients along with upstream channel ID in non-volatile memory at the CM This invention proposes a mechanism for DOCSIS 3.0 CMs to optimize the performance of initial ranging in a strong micro-reflection environment when multiple channels are supported by applying the pre-equalization values extrapolated from the first channel in the ranging request for the subsequent channels as long as there are no stored pre- equalization coefficients. In the case of re-initialization of the modem, if the upstream channel has not changed, using the stored pre-equalization should be given precedence over the values used for the first channel. A benefit of this proposed mechanism is to reduce the burden on the CMTS in massive outage situation as the modems are brought back on-line. An added benefit of this mechanism is in reducing the time for the cable modem to achieve high fidelity transmission in both scenarios: massive outage or normal CM initialization process. The same approach is also valid in the case when the frequency of a channel in a MD-US-SG is changed or a new channel is added to the MD- US-SG.
Method for IP Content Delivery Using Existing Cable Networks 9/10/08
System to support IP-only delivery of media content within the home, allowing IP- only set-top boxes, TVs and other presentation devices, while simultaneously supporting delivery to homes supporting legacy devices.
MPEG Voice Mail 9/10/08
Cable subscribers can use an STB to retrieve voice mail messages left for their digital voice account without requiring the use of a telephony device or client.
Cascading DOCSIS Service Flows via Dynamic Service Flow/Tunnel Creation 9/10/08
This invention provides a mechanism for faster upstream DOCSIS data rates via the dynamic creation of data tunnels and matching service flows within a single CM.
Pre-Equalization Based Pro-active Network Maintenance Process Model 6/28/08
This disclosure describes process for analyzing the pre-equalization information to determine the gravity of the network problem and geographically isolating the source of the problem. Even though this embodiment details the pro-active maintenance process using pre-equalization parameters and DOCSIS defined parameters, the methodology can be applied to other impairments along with their related network health metrics.
A Simple Algorithm for Fault Localization Using Naming Convention and Micro-reflection Signature 6/23/08
This invention proposes a simple algorithm to determine the location of the fault after calculating the micro-reflection signature and applying the naming convention described in the previous disclosures (Proactive CATV Network Maintenance Method by Alberto Campos and Pre-equalization based Pro-active maintenance model by A. Campos, E. Cardona and L. Raman). A manifestation to implement this algorithm is described by defining an XML schema and XPath queries. This algorithm enables efficient processing of large numbers of CMs thus facilitating scalability and automation.
High Availability Mechanism for Modular CMTS Systems 1/28/08
This invention provides a way to offer high availability with M-CMTS systems. It provides 1+1 redundancy for M-CMTS Cores and n+1 redundancy for EQAMs by exchanging status messages and performing health checks on various components.
DOCSIS Timing Interface (DTI) Test Dongle 1/28/08
This device allows a user to connect an oscilloscope to an M-CMTS core device without using scope probes.
2007
DT Box: DOCSIS TEST BOX 12/19/07
A diagnostic device with multiple applications in CATV environments; can be used to simulate a standard DOCSIS Cable Plant and provides a means for capturing and analyzing specific types of Radio Frequency signals. The tool is particularly adapted to sensing bursty traffic on coaxial networks and providing triggering signals to RF measurement equipment.
A Method/Architecture for Enabling 2-way Cable Services to Home Networked IP-STBs with OCAP, but w/o Cable Modem and Tuner 12/19/07
This invention describes a method/architecture for extending traditional 2-way cable services to OCAP-enabled IP-STBs (w/o cable modem and tuner) via a 2-way gateway device.