Method for advance negotiation of computer settings
    91.
    发明申请
    Method for advance negotiation of computer settings 有权
    计算机设置提前协商的方法

    公开(公告)号:US20070136591A1

    公开(公告)日:2007-06-14

    申请号:US11699182

    申请日:2007-01-29

    IPC分类号: H04L9/00 G06F15/16

    CPC分类号: G06F9/44505

    摘要: A method to negotiate computer settings in advance is presented. A prediction is made to determine if the computer setting will be needed, and if needed, whether a value outside of a normal range of values will be needed. A value for the computer setting that is outside of the normal range of values is determined and the value is set to the outside value. A value within the normal range of values is used if it was predicted that there is no need for a value outside of the normal range of values.

    摘要翻译: 提出了一种提前协商计算机设置的方法。 进行预测以确定是否需要计算机设置,并且如果需要,是否需要在正常值范围之外的值。 确定超出正常值范围的计算机设置的值,并将该值设置为外部值。 如果预测不需要在正常值范围之外的值,则使用在正常范围内的值。

    Outgoing connection attempt limiting to slow down spreading of viruses
    92.
    发明申请
    Outgoing connection attempt limiting to slow down spreading of viruses 有权
    传出连接尝试限制了病毒传播速度的减慢

    公开(公告)号:US20060107322A1

    公开(公告)日:2006-05-18

    申请号:US10989912

    申请日:2004-11-15

    IPC分类号: G06F12/14

    CPC分类号: G06F21/56

    摘要: Disclosed is a method for slowing down the spread of viruses by limiting the number of Transmission Control Protocol (“TCP”) connection attempts to arbitrary Internet Protocol (“IP”) addresses that can be in progress at any given time—a common method employed by viruses to spread to other hosts from an infected host. This is achieved by setting a small limit on the number of connection attempt requests that can be in progress at any given time and can be implemented regardless of whether anti-virus software is installed on the system.

    摘要翻译: 公开了一种通过将传输控制协议(“TCP”)连接尝试的数量限制在任何给定时间可能正在进行的任意互联网协议(“IP”)地址的数量来减慢病毒传播的方法 - 采用一种常用方法 通过病毒从受感染的主机传播到其他主机。 这可以通过在任何给定时间对可能正在进行的连接尝试请求的数量设置一个小限制来实现,无论是否在系统上安装了防病毒软件。

    System and method for defeating SYN attacks
    93.
    发明申请
    System and method for defeating SYN attacks 有权
    破坏SYN攻击的系统和方法

    公开(公告)号:US20050259644A1

    公开(公告)日:2005-11-24

    申请号:US10847341

    申请日:2004-05-18

    IPC分类号: H04L12/56 H04L29/06

    摘要: A system and method for defeating SYN attacks are provided. When the number of packets received by a server is above the capacity of the server, the server assumes that a SYN attack is in progress. The server randomly drops SYN packets without processing them. The percentage of SYN packets dropped is increased while the load on the server exceeds capacity, and decreased while the load on the server does not exceed capacity. Under attack conditions, a percentage of TCP connections are still maintained.

    摘要翻译: 提供了一种用于击败SYN攻击的系统和方法。 当服务器接收的数据包数量高于服务器的容量时,服务器假定正在进行SYN攻击。 服务器随机丢弃SYN数据包而不进行处理。 当服务器上的负载超过容量时,丢弃的SYN数据包的百分比就会增加,服务器上的负载不会超过容量。 在攻击条件下,仍然维持一定百分比的TCP连接。

    Method of negotiating security parameters and authenticating users interconnected to a network
    94.
    发明申请
    Method of negotiating security parameters and authenticating users interconnected to a network 有权
    协商安全参数和认证与网络互连的用户的方法

    公开(公告)号:US20050108531A1

    公开(公告)日:2005-05-19

    申请号:US10713980

    申请日:2003-11-14

    IPC分类号: H04L9/00 H04L9/08 H04L29/06

    摘要: A method for authenticating and negotiating security parameters among two or more network devices is disclosed. The method has a plurality of modes including a plurality of messages exchanged between the two or more network devices. In a main mode, the two or more network devices establish a secure channel and select security parameters to be used during a quick mode and a user mode. In the quick mode, the two or more computers derive a set of keys to secure data sent according to a security protocol. The optional user mode provides a means of authenticating one or more users associated with the two or more network devices. A portion of the quick mode is conducted during the main mode thereby minimizing the plurality of messages that need to be exchanged between the initiator and the responder.

    摘要翻译: 公开了一种用于在两个或多个网络设备之间认证和协商安全参数的方法。 该方法具有多个模式,包括在两个或多个网络设备之间交换的多个消息。 在主模式中,两个或多个网络设备建立安全通道并选择在快速模式和用户模式期间使用的安全参数。 在快速模式下,两台或多台计算机派生一组密钥来保护根据安全协议发送的数据。 可选的用户模式提供了认证与两个或多个网络设备相关联的一个或多个用户的手段。 快速模式的一部分在主模式期间进行,从而最小化需要在启动器和应答器之间交换的多个消息。

    Ambulatory presence features
    95.
    发明授权
    Ambulatory presence features 有权
    动态存在功能

    公开(公告)号:US08253774B2

    公开(公告)日:2012-08-28

    申请号:US12413782

    申请日:2009-03-30

    IPC分类号: H04N7/14

    摘要: The claimed subject matter provides a system and/or a method that facilitates managing one or more devices utilized for communicating data within a telepresence session. A telepresence session can be initiated within a communication framework that includes two or more virtually represented users that communicate therein. A device can be utilized by at least one virtually represented user that enables communication within the telepresence session, the device includes at least one of an input to transmit a portion of a communication to the telepresence session or an output to receive a portion of a communication from the telepresence session. A detection component can adjust at least one of the input related to the device or the output related to the device based upon the identification of a cue, the cue is at least one of a movement detected, an event detected, or an ambient variation.

    摘要翻译: 所要求保护的主题提供了一种有助于管理用于在远程呈现会话内传送数据的一个或多个设备的系统和/或方法。 可以在通信框架内启动远程呈现会话,该通信框架包括在其中通信的两个或更多虚拟表示的用户。 至少一个虚拟表示的用户可以利用设备来实现远程呈现会话内的通信,该设备包括将通信的一部分传送到远程呈现会话的输入或输出以接收通信的一部分中的至少一个 从远程呈现会话。 检测部件可以基于提示的识别来调整与设备相关的输入或输出中的至少一个,所述提示是检测到的运动,检测到的事件或环境变化中的至少一个。

    System and method for Implementing PNRP Locality
    96.
    发明申请
    System and method for Implementing PNRP Locality 有权
    实施PNRP地点的系统和方法

    公开(公告)号:US20110004677A1

    公开(公告)日:2011-01-06

    申请号:US12883346

    申请日:2010-09-16

    IPC分类号: G06F15/177

    摘要: A method is provided for a host node in a computer network to determine its coordinates in a d-dimensional network space, comprising discovering an address of a peer node in the network, measuring network latency between the host node and the peer node, determining whether network latency has been measured for at least d+1 peer nodes, where, if network latency has not been measured for at least d+1 peer nodes, estimating the network coordinates of the host node, and where, if network latency has been measured for at least d+1 peer nodes, calculating the network coordinates of the host node using d+1 measured latencies.

    摘要翻译: 提供了一种用于计算机网络中的主机节点来确定其在d维网络空间中的坐标的方法,包括发现网络中的对等节点的地址,测量主机节点和对等节点之间的网络等待时间,确定是否 已经对至少d + 1个对等节点测量了网络延迟,其中,如果尚未对至少d + 1个对等节点进行网络延迟测量,则估计主机节点的网络坐标,以及如果已经测量了网络延迟 对于至少d + 1个对等节点,使用d + 1测量的延迟来计算主机节点的网络坐标。

    AUDIO TRANSFORMS IN CONNECTION WITH MULTIPARTY COMMUNICATION
    98.
    发明申请
    AUDIO TRANSFORMS IN CONNECTION WITH MULTIPARTY COMMUNICATION 有权
    与多媒体通信相关的音频转换

    公开(公告)号:US20100195812A1

    公开(公告)日:2010-08-05

    申请号:US12365949

    申请日:2009-02-05

    IPC分类号: H04M3/42 G10L11/00

    摘要: The claimed subject matter relates to an architecture that can preprocess audio portions of communications in order to enrich multiparty communication sessions or environments. In particular, the architecture can provide both a public channel for public communications that are received by substantially all connected parties and can further provide a private channel for private communications that are received by a selected subset of all connected parties. Most particularly, the architecture can apply an audio transform to communications that occur during the multiparty communication session based upon a target audience of the communication. By way of illustration, the architecture can apply a whisper transform to private communications, an emotion transform based upon relationships, an ambience or spatial transform based upon physical locations, or a pace transform based upon lack of presence.

    摘要翻译: 所要求保护的主题涉及可以预处理通信的音频部分以便丰富多方通信会话或环境的架构。 特别地,该架构可以提供公共通信的公共信道,其由基本上所有连接的各方接收,并且可以进一步提供由所有连接方的所选子集接收的专用通信的专用信道。 特别地,架构可以基于通信的目标受众对音频转换应用于在多方通信会话期间发生的通信。 作为说明,架构可以对私人通信应用耳语转换,基于关系,基于物理位置的氛围或空间变换或基于缺乏存在的步调变换的情感变换。

    System and method for mitigation of malicious network node activity
    100.
    发明授权
    System and method for mitigation of malicious network node activity 失效
    减轻恶意网络节点活动的系统和方法

    公开(公告)号:US07640338B2

    公开(公告)日:2009-12-29

    申请号:US11039758

    申请日:2005-01-18

    IPC分类号: G06F15/173

    摘要: Malicious network node activity and, in particular, denial of service attacks, may be mitigated by one or more practical mitigation mechanisms and mitigation mechanism combinations. Suitable protocol messages may be challenged with a challenge probe. A response to the challenge probe may be utilized to determine if received protocol messages are illegitimate, that is, originated by a malicious network node. Received protocol messages may be classified as questionable protocol messages. For efficiency, protocol message challenges may be limited to protocol message classified as questionable. A sequence number limit may be calculated as a function of receive window size. Transmission control protocol messages may be determined to be illegitimate by comparing the acknowledgement number field with the calculated sequence number limit. Randomized selection of source port numbers for transmission control protocol connections may also mitigate malicious network node activity by resulting in legitimate protocol message field values that are less predictable.

    摘要翻译: 恶意网络节点活动,特别是拒绝服务攻击可以通过一个或多个实际的缓解机制和缓解机制组合来缓解。 挑战探针可能会挑战合适的协议消息。 可以利用对挑战探测器的响应来确定接收到的协议消息是否是非法的,即由恶意网络节点发起。 接收到的协议消息可以被分类为可疑协议消息。 为了效率,协议消息挑战可能被限制为被分类为有问题的协议消息。 序列号限制可以作为接收窗口大小的函数来计算。 可以通过将确认号码字段与所计算的序列号限制进行比较来确定发送控制协议消息是不合法的。 用于传输控制协议连接的源端口号的随机选择还可以通过导致较不可预测的合法协议消息字段值来减轻恶意网络节点活动。