Abstract:
Examples of achieving quality of service in a wireless local area network via meeting communication channel performance criteria to include a minimum signal-to-noise plus interference ratio and a proportional fairness limit are disclosed.
Abstract:
A set of collaborative contacts may be selected with an invitation user interface. An invitation to participate in a collaborative activity may be sent to the selected contacts from the invitation user interface or from a collaborative application. The invitation may be received by a collaborative services platform. A user of the collaborative services platform may be presented with the invitation along with an ability to choose one of accept, decline and ignore in response to the invitation. The user may choose to accept, decline or explicitly ignore the invitation, and a response may be sent to the sender of the invitation indicating the user's choice. An application programming interface for a collaborative invitation service of the collaborative services platform may include an invitation element, a send invitation element, a respond to invitation element and a cancel invitation element. The cancel invitation element may be used to cancel issued invitations.
Abstract:
A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.
Abstract:
Systems and methods are described that facilitate the management of contact information, at least some of the contact information related to entities in a serverless, peer-to-peer system. A contact store may store information regarding which other entities of a plurality of other entities are authorized to monitor presence of a user entity. Presence of an entity may generally indicate the willingness and/or ability of the entity to communicate and/or collaborate with other entities, for example. The contact store may also store information regarding which other entities of the plurality of other entities the presence of which should be monitored by the system. A user entity may be able to add contacts to and/or delete contacts from the contact store, for example. The user entity may also be able to modify the contact store to modify which other entities are authorized to monitor presence of the user entity and/or which other entities the presence information of which should be monitored by the system, for example.
Abstract:
A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.
Abstract:
A gateway cluster has a number of gateways for different types of communication protocols. The respective gateways convert network messages to normalized messages by querying the categories, data, and network types of the normalized data for the mobile systems from which the network messages were generated. A database system stores normalized data in categories. The normalized data include data relating to the mobile systems and network types for the data. A unified mobility manager is coupled to and in communications with the gateway cluster and the database system. The unified mobility manager receives and processes the normalized messages, performs operations based on the normalized messages and on the categories, the data, and the network types of the normalized data, and formulates normalized responses responsive to the normalized messages. The normalized responses are converted to network responses at the gateways, and the network responses are sent to the respective mobile systems.
Abstract:
A method and system for implementing a communications network having configurable control mechanisms for the identification and transference of particular types of communications data. Detection points are established within the communications network, wherein particular types of communications data transferred through the detection points may be identified. Removable configurable control mechanisms are associated with the detection points mechanisms that manage the transference of communications data through the detection points, such that the removable configurable control mechanisms may be easily replaced and updated without deconstructing the communications network or extensively delaying communication services within the communications network. The communications network can include a wireless or wireline communications or a combination thereof. The configurable control mechanisms include triggers within calls or communication transactions which can be armed to transfer control and call-related information to external nodes that may be composed of off-board service platforms.