Contact Management in a Serverless Peer-to-Peer System
    31.
    发明申请
    Contact Management in a Serverless Peer-to-Peer System 有权
    无服务器对等系统中的联系人管理

    公开(公告)号:US20090248868A1

    公开(公告)日:2009-10-01

    申请号:US12483507

    申请日:2009-06-12

    CPC classification number: H04L67/104 H04L67/24

    Abstract: Systems and methods are described that facilitate the management of contact information, at least some of the contact information related to entities in a serverless, peer-to-peer system. A contact store may store information regarding which other entities of a plurality of other entities are authorized to monitor presence of a user entity. Presence of an entity may generally indicate the willingness and/or ability of the entity to communicate and/or collaborate with other entities, for example. The contact store may also store information regarding which other entities of the plurality of other entities the presence of which should be monitored by the system. A user entity may be able to add contacts to and/or delete contacts from the contact store, for example. The user entity may also be able to modify the contact store to modify which other entities are authorized to monitor presence of the user entity and/or which other entities the presence information of which should be monitored by the system, for example.

    Abstract translation: 描述了便于管理联系人信息的系统和方法,至少一些与无服务器,对等系统中的实体有关的联系信息。 联系人存储可以存储关于多个其他实体的哪些其他实体被授权以监视用户实体的存在的信息。 实体的存在通常可以指示实体与其他实体进行通信和/或协作的意愿和/或能力。 联系人存储还可以存储关于多个其他实体中哪个其他实体的存在的信息,其中存在哪个应该由系统监视。 例如,用户实体可能能够向联系人商店添加联系人和/或删除联系人。 用户实体还可能能够修改联系人存储,以修改哪个其他实体被授权来监视用户实体的存在和/或其中的哪些实体,其存在信息应由系统监视。

    PEER-TO-PEER NAME RESOLUTION PROTOCOL (PNRP) SECURITY INFRASTRUCTURE AND METHOD
    32.
    发明申请
    PEER-TO-PEER NAME RESOLUTION PROTOCOL (PNRP) SECURITY INFRASTRUCTURE AND METHOD 有权
    同名对等人名称解决协议(PNRP)安全基础设施和方法

    公开(公告)号:US20090006849A1

    公开(公告)日:2009-01-01

    申请号:US12138421

    申请日:2008-06-13

    Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.

    Abstract translation: 提出了一种防止恶意节点中断对等网络的正常操作的能力的安全基础设施和方法。 本发明的方法允许节点通过使其自我验证来使用安全和不安全的身份。 在必要或机会主义的情况下,通过捎带现有消息的验证来验证身份所有权。 通过随机选择连接到哪个节点来减少初始连接到恶意节点的概率。 此外,来自恶意节点的信息被识别,并且可以通过维护关于将要响应的先前通信的信息而被忽略。 通过允许节点在其资源利用超过预定限制时忽略请求,禁止拒绝服务攻击。 恶意节点删除有效节点的能力通过要求撤销证书由要删除的节点进行签名来减少。

    Peer-to-peer authentication and authorization
    34.
    发明授权
    Peer-to-peer authentication and authorization 有权
    对等认证和授权

    公开(公告)号:US07350074B2

    公开(公告)日:2008-03-25

    申请号:US11110592

    申请日:2005-04-20

    Abstract: An authentication mechanism uses a trusted people store that can be populated on an individual basis by users of computing devices, and can comprise certificates of entities that the user wishes to allow to act as certification authorities. Consequently, peer-to-peer connections can be made even if neither device presents a certificate or certificate chain signed by a third-party certificate authority, so long as each device present a certificate or certificate chain signed by a device present in the trusted people store. Once authenticated, a remote user can access trusted resources on a host device by having local processes mimic the user and create an appropriate token by changing the user's password or password type to a hash of the user's certificate and then logging the user on. The token can be referenced in a standard manner to determine whether the remote user is authorized to access the trusted resource.

    Abstract translation: 认证机制使用可被计算设备的用户单独填充的受信任的人员存储,并且可以包括用户希望允许作为认证机构的实体的证书。 因此,即使两个设备都没有呈现由第三方认证机构签名的证书或证书链,只要每个设备呈现由可信任人员中存在的设备签名的证书或证书链,就可以进行对等连接 商店。 一旦经过身份验证,远程用户可以通过使本地进程模仿用户并通过将用户的密码或密码类型更改为用户证书的哈希值,然后记录用户来创建适当的令牌来访问主机设备上的受信任资源。 可以以标准方式引用令牌,以确定远程用户是否被授权访问受信任的资源。

    Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
    35.
    发明申请
    Peer-to-peer name resolution protocol (PNRP) security infrastructure and method 有权
    对等名称解析协议(PNRP)安全基础设施和方法

    公开(公告)号:US20070168512A1

    公开(公告)日:2007-07-19

    申请号:US11376397

    申请日:2006-03-15

    Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.

    Abstract translation: 提出了一种防止恶意节点中断对等网络的正常操作的能力的安全基础设施和方法。 本发明的方法允许节点通过使其自我验证来使用安全和不安全的身份。 在必要或机会主义的情况下,通过捎带现有消息的验证来验证身份所有权。 通过随机选择连接到哪个节点来减少初始连接到恶意节点的概率。 此外,来自恶意节点的信息被识别,并且可以通过维护关于将要响应的先前通信的信息而被忽略。 通过允许节点在其资源利用超过预定限制时忽略请求,禁止拒绝服务攻击。 恶意节点删除有效节点的能力通过要求撤销证书由要删除的节点进行签名来减少。

    Method and apparatus for multi-channel MAC protocol using multi-tone synchronous collision resolution
    36.
    发明申请
    Method and apparatus for multi-channel MAC protocol using multi-tone synchronous collision resolution 有权
    用于多通道MAC协议的方法和装置,使用多音同步冲突解决方案

    公开(公告)号:US20060114851A1

    公开(公告)日:2006-06-01

    申请号:US10999389

    申请日:2004-11-30

    Abstract: A multi-tone synchronous collision resolution system permits communication nodes within a MANET to contend simultaneously for a plurality of available channels. The communication nodes contend for access using a synchronous signaling mechanism that utilizes multiple tones in a synchronous manner to resolve contentions. Contentions are arbitrated locally, and a surviving subset of communication nodes is selected. The communication nodes of the surviving subset then transmit data packets simultaneously across the available communication channels.

    Abstract translation: 多音同步冲突解决系统允许MANET内的通信节点同时争用多个可用信道。 通信节点使用同步信令机制来竞争接入,该同步信令机制以同步方式利用多个音调来解决争用。 争用在本地进行仲裁,并选择一个幸存的通信节点子集。 幸存子集的通信节点然后在可用的通信信道上同时传输数据分组。

    Method and system for managing identities in a peer-to-peer networking environment
    37.
    发明申请
    Method and system for managing identities in a peer-to-peer networking environment 审中-公开
    用于管理对等网络环境中的身份的方法和系统

    公开(公告)号:US20050177715A1

    公开(公告)日:2005-08-11

    申请号:US10775916

    申请日:2004-02-09

    Abstract: Disclosed is a system for organizing and storing information about multiple peer identities. New certificates are introduced that enable a user to efficiently create, modify, and delete identities and groups. New storage structures enable the user to list and search through existing identities, groups, and their related certificates. An identity certificate contains information about a peer identity. A group root certificate is created by a user when he decides to create a new group. When the group creator user wishes to invite another entity to join the group, it creates another type of certificate called a group membership certificate. The group membership certificate is logically “chained” to the group root certificate. The invitee checks the validity of these certificates by checking that the chaining has been properly done. The invitee may then be allowed to invite other entities to join the group by sending out its own group membership certificates.

    Abstract translation: 公开了一种用于组织和存储关于多个对等体身份的信息的系统。 引入了新的证书,使用户能够有效地创建,修改和删除身份和组。 新的存储结构使用户能够列出和搜索现有身份,组及其相关证书。 身份证书包含有关对等体身份的信息。 当他决定创建一个新组时,用户创建一个组根证书。 当组创建者用户希望邀请另一个实体加入组时,它创建另一种称为组成员资格证书的证书类型。 组成员证书在逻辑上“链接”到组根证书。 被邀请者通过检查链接是否正确完成,检查这些证书的有效性。 然后可以允许受邀者邀请其他实体通过发送自己的组成员证书来加入该组。

    INTEGRATED CIRCUIT WITH MULTI-VOLTAGE INPUT/OUTPUT (I/O) CELLS
    39.
    发明申请
    INTEGRATED CIRCUIT WITH MULTI-VOLTAGE INPUT/OUTPUT (I/O) CELLS 有权
    具有多电平输入/输出(I / O)电池的集成电路

    公开(公告)号:US20150362970A1

    公开(公告)日:2015-12-17

    申请号:US14568074

    申请日:2014-12-11

    CPC classification number: G06F1/28 G01R21/00 G06F1/26

    Abstract: An integrated circuit (IC) includes a first I/O cell, a logic cell, a trigger signal generation circuit, and a second I/O cell having a voltage selection pin. I/O interfaces of the first I/O cell receive first and second supply voltages, respectively, and I/O interfaces of the second I/O cell receive third and fourth supply voltages, respectively. The first I/O cell generates a first trigger signal when the first supply voltage reaches a first predetermined voltage. The logic cell receives the first trigger signal and generates a safe-state signal. The trigger signal generation circuit generates a second trigger signal when the third supply voltage reaches a second predetermined voltage. The voltage selection pin receives the safe-state signal and the second trigger signal and sets the second I/O cell in a safe-state mode, which protects the second I/O cell from over voltage damage.

    Abstract translation: 集成电路(IC)包括第一I / O单元,逻辑单元,触发信号生成电路和具有电压选择引脚的第二I / O单元。 第一I / O单元的I / O接口分别接收第一和第二电源电压,第二I / O单元的I / O接口分别接收第三和第四电源电压。 当第一电源电压达到第一预定电压时,第一I / O单元产生第一触发信号。 逻辑单元接收第一触发信号并产生安全状态信号。 当第三电源电压达到第二预定电压时,触发信号产生电路产生第二触发信号。 电压选择引脚接收安全状态信号和第二触发信号,并将第二I / O单元设置为安全状态模式,保护第二I / O单元免受过电压损坏。

Patent Agency Ranking