Method and apparatus for multi-channel MAC protocol using multi-tone synchronous collision resolution
    32.
    发明授权
    Method and apparatus for multi-channel MAC protocol using multi-tone synchronous collision resolution 有权
    用于多通道MAC协议的方法和装置,使用多音同步冲突解决方案

    公开(公告)号:US07466676B2

    公开(公告)日:2008-12-16

    申请号:US10999389

    申请日:2004-11-30

    IPC分类号: H04Q7/00

    摘要: A multi-tone synchronous collision resolution system permits communication nodes within a MANET to contend simultaneously for a plurality of available channels. The communication nodes contend for access using a synchronous signaling mechanism that utilizes multiple tones in a synchronous manner to resolve contentions. Contentions are arbitrated locally, and a surviving subset of communication nodes is selected. The communication nodes of the surviving subset then transmit data packets simultaneously across the available communication channels.

    摘要翻译: 多音同步冲突解决系统允许MANET内的通信节点同时争用多个可用信道。 通信节点使用同步信令机制来竞争接入,该同步信令机制以同步方式利用多个音调来解决争用。 争用在本地进行仲裁,并选择一个幸存的通信节点子集。 幸存子集的通信节点然后在可用的通信信道上同时传输数据分组。

    System and method for extensible computer assisted collaboration
    33.
    发明申请
    System and method for extensible computer assisted collaboration 审中-公开
    可扩展计算机辅助协作的系统和方法

    公开(公告)号:US20060242236A1

    公开(公告)日:2006-10-26

    申请号:US11113218

    申请日:2005-04-22

    IPC分类号: G06F15/16

    CPC分类号: G06Q10/00

    摘要: A collaborative services platform may include a connectivity service, an activity service and a contact management service. The connectivity service may provide communicative connectivity between users of the collaborative services platform. The activity service may provide one or more collaborative activities supporting various modes of communication. The contact management service may maintain contact information for each of the users of the collaborative service platform. It may be that not every user is capable of participating in every collaborative activity. The contact information maintained by the contact management service may indicate the collaborative activities in which each user is capable of participating. A set of programmatic objects utilized to implement the collaborative services platform may include contact objects, conference objects, MeContact objects, endpoint objects, published objects and presence objects. The presence object may represent a presence of a particular user in a networked computing environment and may reference multiple collaborative endpoints.

    摘要翻译: 协作服务平台可以包括连接服务,活动服务和联系人管理服务。 连接服务可以提供协作服务平台的用户之间的交互连接。 活动服务可以提供支持各种通信模式的一个或多个协作活动。 联系人管理服务可以维护协作服务平台的每个用户的联系人信息。 可能不是每个用户都能够参与每个协作活动。 由联系人管理服务维护的联系信息可以指示每个用户能够参与的协作活动。 用于实现协作服务平台的一组程式化对象可以包括联系对象,会议对象,MeContact对象,端点对象,已发布对象和存在对象。 存在对象可以表示在联网计算环境中特定用户的存在,并且可以引用多个协作端点。

    Peer-to peer name resolution protocol (PNRP) security infrastructure and method
    35.
    发明申请
    Peer-to peer name resolution protocol (PNRP) security infrastructure and method 有权
    对等名称解析协议(PNRP)安全基础设施和方法

    公开(公告)号:US20060161657A1

    公开(公告)日:2006-07-20

    申请号:US11375748

    申请日:2006-03-15

    IPC分类号: G06F15/173

    摘要: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.

    摘要翻译: 提出了一种防止恶意节点中断对等网络的正常操作的能力的安全基础设施和方法。 本发明的方法允许节点通过使其自我验证来使用安全和不安全的身份。 在必要或机会主义的情况下,通过捎带现有消息的验证来验证身份所有权。 通过随机选择连接到哪个节点来减少初始连接到恶意节点的概率。 此外,来自恶意节点的信息被识别,并且可以通过维护关于将要响应的先前通信的信息而被忽略。 通过允许节点在其资源利用超过预定限制时忽略请求,禁止拒绝服务攻击。 恶意节点删除有效节点的能力通过要求撤销证书由要删除的节点进行签名来减少。

    METHOD FOR REDUCING GLARE FROM LIGHT SOURCES THROUGH WINDSCREENS
    37.
    发明申请
    METHOD FOR REDUCING GLARE FROM LIGHT SOURCES THROUGH WINDSCREENS 审中-公开
    通过风速减轻光源的方法

    公开(公告)号:US20120126099A1

    公开(公告)日:2012-05-24

    申请号:US12951275

    申请日:2010-11-22

    IPC分类号: G01J1/44 B60J3/04

    摘要: A method of reducing glare may include sensing a first light source with a second vehicle, and sensing a second light source with a first vehicle and oscillating a first light source ICF between a substantially opaque state and a substantially clear state on a first schedule. A second windscreen ICF may be oscillating between the substantially opaque state and the substantially clear state on a second schedule different from the first schedule. A position of the light source may be sensed and an eye position of the occupant estimated. An intersecting region of the selectively-darkenable ICF, which is located substantially along a line from the position of the light source to the eye position, is calculated. The intersecting region of the ICF is darkened, such that a reduced amount of light from the light source passes through the intersecting region.

    摘要翻译: 减少眩光的方法可以包括用第二车辆感测第一光源,以及用第一车辆感测第二光源,并且在第一时间表上使基本上不透明状态和基本上清晰的状态之间振荡第一光源ICF。 第二挡风玻璃ICF可以在基本上不透明状态和基本上清楚的状态之间以与第一调度不同的第二调度摆动。 可以感测光源的位置并估计乘员的眼睛位置。 计算基本上沿着从光源的位置到眼睛位置的线的选择性可暗化ICF的相交区域。 ICF的相交区域变暗,使得来自光源的光量减少通过交叉区域。

    PEER-TO-PEER NAME RESOLUTION PROTOCOL (PNRP) SECURITY INFRASTRUCTURE AND METHOD
    38.
    发明申请
    PEER-TO-PEER NAME RESOLUTION PROTOCOL (PNRP) SECURITY INFRASTRUCTURE AND METHOD 有权
    同名对等人名称解决协议(PNRP)安全基础设施和方法

    公开(公告)号:US20090006849A1

    公开(公告)日:2009-01-01

    申请号:US12138421

    申请日:2008-06-13

    IPC分类号: H04L9/00 G06F15/173

    摘要: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.

    摘要翻译: 提出了一种防止恶意节点中断对等网络的正常操作的能力的安全基础设施和方法。 本发明的方法允许节点通过使其自我验证来使用安全和不安全的身份。 在必要或机会主义的情况下,通过捎带现有消息的验证来验证身份所有权。 通过随机选择连接到哪个节点来减少初始连接到恶意节点的概率。 此外,来自恶意节点的信息被识别,并且可以通过维护关于将要响应的先前通信的信息而被忽略。 通过允许节点在其资源利用超过预定限制时忽略请求,禁止拒绝服务攻击。 恶意节点删除有效节点的能力通过要求撤销证书由要删除的节点进行签名来减少。

    Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
    40.
    发明申请
    Peer-to-peer name resolution protocol (PNRP) security infrastructure and method 有权
    对等名称解析协议(PNRP)安全基础设施和方法

    公开(公告)号:US20070168512A1

    公开(公告)日:2007-07-19

    申请号:US11376397

    申请日:2006-03-15

    IPC分类号: G06F15/173

    摘要: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.

    摘要翻译: 提出了一种防止恶意节点中断对等网络的正常操作的能力的安全基础设施和方法。 本发明的方法允许节点通过使其自我验证来使用安全和不安全的身份。 在必要或机会主义的情况下,通过捎带现有消息的验证来验证身份所有权。 通过随机选择连接到哪个节点来减少初始连接到恶意节点的概率。 此外,来自恶意节点的信息被识别,并且可以通过维护关于将要响应的先前通信的信息而被忽略。 通过允许节点在其资源利用超过预定限制时忽略请求,禁止拒绝服务攻击。 恶意节点删除有效节点的能力通过要求撤销证书由要删除的节点进行签名来减少。