摘要:
A method and apparatus for enhancing content security including a content corruptor module having an input for encoded content, a content parameter modifier coupled to the input and having outputs for modified content and fixer data, a content encoder coupled to the output for modified content and having an output for encoded modified content and a fixer data encoder coupled to the output for fixer data and having an output for encoded fixer data. The modified encoded content discourages copying as it is not usable with the corrector data.
摘要:
Data for inclusion in a probable cause field of a telecommunications network alarm indication message is structured to comprise first and second delimited data elements respectively indicating first and second predetermined (ie standardized) probable cause codes, the first and second predetermined probable cause codes relating to one or more characteristics of an event occurring or having occurred in a telecommunications network. Methods, apparatus and computer programs for generating and for processing such data is provided as well as signals representing such data.
摘要:
System and method for transparent single sign-on authentication on computers in a networked environment. A preferred embodiment comprises receiving an authentication request from an operating system of a first computer, requesting credentials of an application making the authentication request, authenticating the credentials, storing the credentials if the authentication is successful, and transmitting the credentials to a second computer. On subsequent access requests made by the user on the second computer, the credentials can be retrieved from the secure store, eliminating the need to prompt the user to re-enter authentication information.
摘要:
Performance of applications such as service capabilities in a container for providing a multimedia service is monitored. Performance monitoring indicates how well the applications are functioning in terms of predefined metrics and also whether the applications are functioning at all. Responses are prompted if performance monitoring indicates that an application is performing below a predefined level or failing to perform entirely. For example, a hung application may be restarted and other applications may alter their manner of function. This allows complex recovery logic through combinations of simple rules.
摘要:
A technique for monitoring source addresses through statistical clustering of packets is disclosed. In one particular exemplary embodiment, the technique may be realized by a method for monitoring source addresses through statistical clustering of packets. The method may comprise identifying at least part of a source address of a packet. The method may also comprise searching at least one recorded source address based on the at least part of the source address, the at least one recorded source address being organized into at least one cluster. The method may further comprise routing the packet if the at least part of the source address falls within one of the at least one cluster and the one of the at least one cluster contains at least a predetermined number of source addresses.
摘要:
For a software application that uses a first interface, a method is provided to allow the migration of the software application to a second interface instead of the first interface. The software application may, in some situations, be migrated without having to modify the software application. The method involves the creation of a computer-readable mapping between the first interface and the second interface. The computer-readable mapping is then run through auto-generation software which automatically generates an interface wrapper. The interface wrapper can be used in a system to allow a legacy application to continue to use a legacy interface while a new application uses a new interface. The interface wrapper allows the software application to transparently communicate with the second interface. The details of the auto-generation software are also specified.
摘要:
A technique for tracing source addresses of packets is provided. In one particular exemplary embodiment, the technique may be realized by/as a method for tracing source addresses of packets. The method comprises identifying at least part of a source address of a packet and determining whether the at least part of the source address matches at least one source address recorded within a predetermined time period prior to arrival of the packet.
摘要:
Data for inclusion in a probable cause field of a telecommunications network alarm indication message is structured to comprise first and second delimited data elements respectively indicating first and second predetermined (ie standardised) probable cause codes, the first and second predetermined probable cause codes relating to one or more characteristics of an event occurring or having occurred in a telecommunications network. Methods, apparatus and computer programs for generating and for processing such data is provided as well as signals representing such data.
摘要:
A technique for enabling a plurality of software components to communicate in a software component matrix environment is disclosed. In one particular exemplary embodiment, the technique may be realized by a method for enabling a plurality of software components to communicate in a software component matrix environment comprising the steps of encoding a request at a client side; communicating the request to a server at a server side via a communication interface; comparing the request to a plurality of operations supported at the server side; determining whether a function match exists at the server side; and returning a response comprising the function match to the client side in response to the request via the communication interface wherein the response is mapped to a data model of a client.
摘要:
A technique for monitoring source addresses through statistical clustering of packets is disclosed. In one particular exemplary embodiment, the technique may be realized by a method for monitoring source addresses through statistical clustering of packets. The method may comprise identifying at least part of a source address of a packet. The method may also comprise searching at least one recorded source address based on the at least part of the source address, the at least one recorded source address being organized into at least one cluster. The method may further comprise routing the packet if the at least part of the source address falls within one of the at least one cluster and the one of the at least one cluster contains at least a predetermined number of source addresses.