摘要:
A mesh is joined by a node, wherein the mesh includes a Distributed Routing Table (DRT) for determining addresses of nodes in the mesh. A DRT message is processed in accordance with a security mode of the DRT.
摘要:
A method of discovering a community relay node within a network community wherein the community relay node is operatively coupled to an access-protected client and adapted to facilitate communication between the access-protected client and a requesting client, includes receiving a request message from a requesting client relating to a request for a community relay node, associating the request message with a serverless name resolution protocol name, selecting a community relay node from among a list of community relay nodes based on the serverless name resolution protocol name, wherein the list of community relay nodes comprises at least one internet protocol address associated with a community relay node, and returning an internet protocol address of the selected community relay node to the requesting client.
摘要:
A Web server indicates which device, user, software, and network properties it can use to generate personalized content for a requesting user. The Web server also indicates which properties are actually required for it to generate any meaningful content at all. Using this mechanism, the client can optionally query the user for permission before including requested information in the request. Furthermore, the client device can save network bandwidth by only transmitting information that the server will use.
摘要:
An authentication mechanism uses a trusted people store that can be populated on an individual basis by users of computing devices, and can comprise certificates of entities that the user wishes to allow to act as certification authorities. Consequently, peer-to-peer connections can be made even if neither device presents a certificate or certificate chain signed by a third-party certificate authority, so long as each device present a certificate or certificate chain signed by a device present in the trusted people store. Once authenticated, a remote user can access trusted resources on a host device by having local processes mimic the user and create an appropriate token by changing the user's password or password type to a hash of the user's certificate and then logging the user on. The token can be referenced in a standard manner to determine whether the remote user is authorized to access the trusted resource.
摘要:
A system, apparatus, method, and computer-readable medium are provided for resolving a name to a network endpoint. According to one method, naming providers are registered with a computer system that are operative to resolve names to network endpoints for one or more domains. A provider can claim to be a primary provider or a secondary provider for a domain. A provider can also register as a wildcard provider. Once the providers have been registered, requests may be received to resolve an e-mail address into a network address of the corresponding computer system. In response to such a request, one or more of the registered providers are identified as being able to resolve names in the domain to network addresses. Requests are transmitted to the identified providers requesting that they resolve the e-mail address to a corresponding network address. The manner in which the requests are made depends upon whether authoritative results are required. Once the results of the name resolution have been returned, the results are utilized to establish a network connection to and communicate with the computer system identified by the returned network address.
摘要:
A method, computer program product, and system for answering a wireless telephone is provided. In one embodiment, the wireless telephone receives an incoming call and then determines whether the user has placed the phone in automatic call answering mode. If it is determined that automatic call answering has been selected by a user, then the phone answers the incoming call by providing the calling party with an indication that the user will take the call momentarily, such as by sending a voice message indicating that the user is busy but will take the call momentarily and instructing the calling party to not hang up. The phone also places itself into mute mode until the user has taken the incoming call to prevent the calling party from overhearing conversations that may be taking place around the user until the user has determined that it is convenient to take the phone call. In other embodiments, the wireless telephone allows the user to carry on conversations without speaking through selection of appropriate prerecorded or generated phrases.
摘要:
A method, system, and computer program product for exchanging supplemental information fields between a client and server. This supplemental information can then be used by the server to complete a client's request for content stored at a particular location. For example, the supplemental information may be used to provide a customized response, or for access control to sensitive data. Preferably, the REDIRECT message of the Hypertext Transfer Protocol (HTTP) or the Wireless Session Protocol (WSP) is used to request the supplemental information, encoding a comma-separated list of attribute names in a request header for the desired supplemental information. This solution is designed to be backward-compatible.
摘要:
A method, system, and computer-readable code for a technique by which multiple Web pages can be dynamically bundled (i.e. packaged) and downloaded for accessing on a user's workstation, enabling the user to perform a meaningful interaction even in the absence of an ongoing network connection. The proposed technique uses an on-demand bundling approach, ensuring that a requesting user will receive the most recent versions of any bundled files. The proposed technique often serves to reduce the number and duration of network connections required, enabling a user to work productively while offline. Further, the bundle may optionally contain executable code such as one or more servlets, which will execute on the user's workstation to enable dynamic content generation. Messages may be created and queued during processing of the downloaded bundle, for sending to a server when the user subsequently establishes a network connection. Optionally, data mining software may be used advantageously with this technique, to increase the likelihood of constructing a bundle that will meet the user's needs throughout the offline interaction. Additionally, transcoding may optionally be performed on a bundle destined for a particular user, that will tailor the bundled software to the user's current working environment.
摘要:
The described method and system enables a client at a branch office to retrieve data from a local hosted cache instead of an application server over a WAN to improve latency and reduce overall WAN traffic. A server at the data center may be adapted to provide either a list of hashes or the requested data based on whether a hosted cache system is enabled. A hosted cache at the client side may provide the data to the client based on the hashes. The hashes may be generated to provide a fingerprint of the data which may be used to index the data in an efficient manner.
摘要:
A firewall functions normally to pass data on open ports to a respective service or endpoint associated with an open port. Invitations may sent to from an internal endpoint to an external peer-to-peer network endpoint inviting a connection back to the internal endpoint. Rather than leave ports open in a firewall for such connections, an invitation manager analyzes the invitation and in real time programs an exception in the firewall based on the invitation. The exceptions may be programmed for a limited duration, based on the nature of the internal endpoint. When an authenticated connection is required, a public key or handle to a public key for the external endpoint may be passed to the firewall for use in establishing the connection.