Collaborative invitation system and method
    61.
    发明授权
    Collaborative invitation system and method 有权
    协同邀请系统和方法

    公开(公告)号:US07752253B2

    公开(公告)日:2010-07-06

    申请号:US11114634

    申请日:2005-04-25

    CPC classification number: G06Q10/10

    Abstract: A set of collaborative contacts may be selected with an invitation user interface. An invitation to participate in a collaborative activity may be sent to the selected contacts from the invitation user interface or from a collaborative application. The invitation may be received by a collaborative services platform. A user of the collaborative services platform may be presented with the invitation along with an ability to choose one of accept, decline and ignore in response to the invitation. The user may choose to accept, decline or explicitly ignore the invitation, and a response may be sent to the sender of the invitation indicating the user's choice. An application programming interface for a collaborative invitation service of the collaborative services platform may include an invitation element, a send invitation element, a respond to invitation element and a cancel invitation element. The cancel invitation element may be used to cancel issued invitations.

    Abstract translation: 可以使用邀请用户界面选择一组协作联系人。 参与协作活动的邀请可以从邀请用户界面或协作应用发送到所选择的联系人。 邀请可以由协作服务平台接收。 可以向协作服务平台的用户呈现邀请以及响应于邀请选择接受,拒绝和忽略之一的能力。 用户可以选择接受,拒绝或明确地忽略邀请,并且可以向邀请的发送者发送响应,指示用户的选择。 用于协作服务平台的协作邀请服务的应用编程界面可以包括邀请元素,发送邀请元素,对邀请元素的响应和取消邀请元素。 取消邀请元素可用于取消发出的邀请。

    Contact management in a serverless peer-to-peer system
    63.
    发明授权
    Contact management in a serverless peer-to-peer system 有权
    在无服务器对等系统中联系管理

    公开(公告)号:US07571228B2

    公开(公告)日:2009-08-04

    申请号:US11112135

    申请日:2005-04-22

    CPC classification number: H04L67/104 H04L67/24

    Abstract: Systems and methods are described that facilitate the management of contact information, at least some of the contact information related to entities in a serverless, peer-to-peer system. A contact store may store information regarding which other entities of a plurality of other entities are authorized to monitor presence of a user entity. Presence of an entity may generally indicate the willingness and/or ability of the entity to communicate and/or collaborate with other entities, for example. The contact store may also store information regarding which other entities of the plurality of other entities the presence of which should be monitored by the system. A user entity may be able to add contacts to and/or delete contacts from the contact store, for example. The user entity may also be able to modify the contact store to modify which other entities are authorized to monitor presence of the user entity and/or which other entities the presence information of which should be monitored by the system, for example.

    Abstract translation: 描述了便于管理联系人信息的系统和方法,至少一些与无服务器,对等系统中的实体有关的联系信息。 联系人存储可以存储关于多个其他实体的哪些其他实体被授权以监视用户实体的存在的信息。 实体的存在通常可以指示实体与其他实体进行通信和/或协作的意愿和/或能力。 联系人存储还可以存储关于多个其他实体中哪个其他实体的存在的信息,其中存在哪个应该由系统监视。 例如,用户实体可能能够向联系人商店添加联系人和/或删除联系人。 用户实体还可能能够修改联系人存储,以修改哪个其他实体被授权来监视用户实体的存在和/或其中的哪些实体,其存在信息应由系统监视。

    PEER-TO-PEER NAME RESOLUTION PROTOCOL (PNRP) SECURITY INFRASTRUCTURE AND METHOD
    64.
    发明申请
    PEER-TO-PEER NAME RESOLUTION PROTOCOL (PNRP) SECURITY INFRASTRUCTURE AND METHOD 有权
    同名对等人名称解决协议(PNRP)安全基础设施和方法

    公开(公告)号:US20080295170A1

    公开(公告)日:2008-11-27

    申请号:US12138419

    申请日:2008-06-13

    Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.

    Abstract translation: 提出了一种防止恶意节点中断对等网络的正常操作的能力的安全基础设施和方法。 本发明的方法允许节点通过使其自我验证来使用安全和不安全的身份。 在必要或机会主义的情况下,通过捎带现有消息的验证来验证身份所有权。 通过随机选择连接到哪个节点来减少初始连接到恶意节点的概率。 此外,来自恶意节点的信息被识别,并且可以通过维护关于将要响应的先前通信的信息而被忽略。 通过允许节点在其资源利用超过预定限制时忽略请求,禁止拒绝服务攻击。 恶意节点删除有效节点的能力通过要求撤销证书由要删除的节点进行签名来减少。

    Peer-to-peer authentication and authorization
    65.
    发明申请
    Peer-to-peer authentication and authorization 有权
    对等认证和授权

    公开(公告)号:US20060242405A1

    公开(公告)日:2006-10-26

    申请号:US11110592

    申请日:2005-04-20

    Abstract: An authentication mechanism uses a trusted people store that can be populated on an individual basis by users of computing devices, and can comprise certificates of entities that the user wishes to allow to act as certification authorities. Consequently, peer-to-peer connections can be made even if neither device presents a certificate or certificate chain signed by a third-party certificate authority, so long as each device present a certificate or certificate chain signed by a device present in the trusted people store. Once authenticated, a remote user can access trusted resources on a host device by having local processes mimic the user and create an appropriate token by changing the user's password or password type to a hash of the user's certificate and then logging the user on. The token can be referenced in a standard manner to determine whether the remote user is authorized to access the trusted resource.

    Abstract translation: 认证机制使用可被计算设备的用户单独填充的受信任的人员存储,并且可以包括用户希望允许作为认证机构的实体的证书。 因此,即使两个设备都没有呈现由第三方认证机构签名的证书或证书链,只要每个设备呈现由可信任人员中存在的设备签名的证书或证书链,就可以进行对等连接 商店。 一旦经过身份验证,远程用户可以通过使本地进程模仿用户并通过将用户的密码或密码类型更改为用户证书的哈希值,然后记录用户来创建适当的令牌来访问主机设备上的信任资源。 可以以标准方式引用令牌,以确定远程用户是否被授权访问受信任的资源。

    System and method for unifying the implementation and processing of mobile communications and a unified mobility manager for providing such communications
    68.
    发明授权
    System and method for unifying the implementation and processing of mobile communications and a unified mobility manager for providing such communications 有权
    用于统一移动通信的实现和处理的系统和方法以及用于提供此类通信的统一移动管理器

    公开(公告)号:US06563919B1

    公开(公告)日:2003-05-13

    申请号:US09465177

    申请日:1999-12-17

    Abstract: A gateway cluster has a number of gateways for different types of communication protocols. The respective gateways convert network messages to normalized messages by querying the categories, data, and network types of the normalized data for the mobile systems from which the network messages were generated. A database system stores normalized data in categories. The normalized data include data relating to the mobile systems and network types for the data. A unified mobility manager is coupled to and in communications with the gateway cluster and the database system. The unified mobility manager receives and processes the normalized messages, performs operations based on the normalized messages and on the categories, the data, and the network types of the normalized data, and formulates normalized responses responsive to the normalized messages. The normalized responses are converted to network responses at the gateways, and the network responses are sent to the respective mobile systems.

    Abstract translation: 网关集群具有用于不同类型的通信协议的多个网关。 相应的网关通过查询生成网络消息的移动系统的归一化数据的类别,数据和网络类型,将网络消息转换为归一化消息。 数据库系统按类别存储规范化数据。 归一化数据包括与移动系统有关的数据和数据的网络类型。 统一的移动性管理器与网关集群和数据库系统相连接并与之通信。 统一移动管理器接收和处理归一化消息,基于归一化消息和归一化数据的类别,数据和网络类型执行操作,并响应于归一化消息制定归一化响应。 归一化的响应被转换为网关处的网络响应,网络响应被发送到相应的移动系统。

    Method and system in an intelligent communications network for a
programmable call control utilizing removable configurable control
mechanisms
    69.
    发明授权
    Method and system in an intelligent communications network for a programmable call control utilizing removable configurable control mechanisms 失效
    智能通信网络中的方法和系统,用于使用可移动可配置控制机制的可编程呼叫控制

    公开(公告)号:US6167064A

    公开(公告)日:2000-12-26

    申请号:US37371

    申请日:1998-03-10

    CPC classification number: H04W24/00 H04Q3/0029 H04W24/02

    Abstract: A method and system for implementing a communications network having configurable control mechanisms for the identification and transference of particular types of communications data. Detection points are established within the communications network, wherein particular types of communications data transferred through the detection points may be identified. Removable configurable control mechanisms are associated with the detection points mechanisms that manage the transference of communications data through the detection points, such that the removable configurable control mechanisms may be easily replaced and updated without deconstructing the communications network or extensively delaying communication services within the communications network. The communications network can include a wireless or wireline communications or a combination thereof. The configurable control mechanisms include triggers within calls or communication transactions which can be armed to transfer control and call-related information to external nodes that may be composed of off-board service platforms.

    Abstract translation: 一种用于实现具有用于识别和转移特定类型的通信数据的可配置控制机制的通信网络的方法和系统。 在通信网络内建立检测点,其中可以识别通过检测点传送的特定类型的通信数据。 可移动可配置控制机制与通过检测点管理通信数据传输的检测点机制相关联,使得可拆卸可配置控制机制可以容易地替换和更新,而不解构通信网络或广泛延迟通信网络内的通信服务 。 通信网络可以包括无线或有线通信或其组合。 可配置的控制机制包括呼叫或通信事务中的触发器,其可以被布防以将控制和呼叫相关信息传送到可由外板服务平台组成的外部节点。

Patent Agency Ranking