摘要:
A method and system for obscuring user requests for information in a computer network. A user request for information, aimed at another network member, is routed to a first cache memory. If the first cache memory contains the requested information, the cache returns the requested information in response to the user request without releasing the user request to the network member. If the first cache memory does not contain the requested information, a first reference editing function edits user identity information contained in the request, resulting in an edited request with obscured identity information. The edited request is then released to the network member and the requested information is received by the user from the network member. A copy of the requested information is stored in the first cache memory. In this method and system, user privacy is enhanced because user requests for information that can be satisfied by information stored in the cache memory are not revealed to other network members, and user requests that cannot be satisfied by the cache memory are obscured by the reference editing function prior to release to other network members. A software program and system for implementing the method are also disclosed.
摘要:
An RST reason code is conveyed in a predetermined field of the TCP or IP header for a TCP RST packet in order to indicate the reason for the RST. In this way, an enhanced TCP device that receives the RST packet can access the RST reason code in machine-readable form and, unlike prior art implementations in which ASCII text is carried in the TCP payload to provide a RST reason, without having to process the payload of the TCP packet.
摘要:
The invention relates to imaging devices and methods, pertinent to electromagnetic energy in visual and other spectra, to capture and reproduce substantially all image information in a relevant spectrum through all-electronic sensors and electronic computation means.
摘要:
Autoband's distributed networking intelligence provides a novel architecture capable of dynamically reconfiguring communications pathways consisting of links whose transmission media are opportunistically and dynamically selectable. At least one constituent node in such automatically configurable transient pathways is mobile, for example, information (source) server, intervening router node(s), gateway server and/or client device. Additionally, Autoband's ad hoc communications pathways may seamlessly and dynamically integrate (i.e., “graft”) into standard fixed node networks such as terrestrial networks, other wireless networks or combinations thereof. These communications may consist of point-to-point or multicast links. An economic market-based approach further assures allocation of available network resources (i.e., bandwidth and processing) needed to achieve the most optimally resource efficient communications pathway configurations for the totality of communications. Consequently, optimal network resource allocation and efficiency at a system-wide level is continuously achieved.
摘要:
Integrity is rarely a valid presupposition in many systems architectures, yet it is necessary to make any security guarantees. To address this problem, the present invention discloses a secure bootstrap process, which presumes a minimal amount of integrity. The basic principle is sequencing the bootstrap process as a chain of progressively higher levels of abstraction, and requiring each layer to check a digital signature of the next layer before control is passed to it. A major design decision is the consequence of a failed integrity check. A simplistic strategy is to simply halt the bootstrap process. However, the bootstrap process of the present invention can be augmented with automated recovery procedures which preserve the security properties of the bootstrap process of the present invention under the additional assumption of the availability of a trusted repository. A variety of means by which such a repository can be implemented are disclosed with attention focused on a network-accessible repository. The recovery process is easily generalized to applications other than the bootstrap process of the present invention, such as standardized desktop management and secure automated recovery of network elements such as routers or “Active Network” elements.
摘要:
An interactive and programmable tone generator with scenarios is disclosednd described as a training device. Sounds are recorded as they are heard in their actual environment. The recording then can be combined with a coded track that triggers a graphics demonstration previously prepared from notations taken during the recordings that describe the actual environment that corresponds to the respective sound. Also, selections can be taken from the recording that present a best example of a sound to be learned, looped for repetition, and then rerecorded digitally onto micro-floppy diskettes. When played-back the diskettes provide challenging interactive training for the novice and expert alike in a variety of available modes using both computer generated graphics and sounds reconverted from digital storage.
摘要:
Autoband's distributed networking intelligence provides a novel architecture capable of dynamically reconfiguring communications pathways consisting of links whose transmission media are opportunistically and dynamically selectable. At least one constituent node in such automatically configurable transient pathways is mobile, for example, information (source) server, intervening router node(s), gateway server and/or client device. Additionally, Autoband's ad hoc communications pathways may seamlessly and dynamically integrate (i.e., “graft”) into standard fixed node networks such as terrestrial networks, other wireless networks or combinations thereof. These communications may consist of point-to-point or multicast links. An economic market-based approach further assures allocation of available network resources (i.e., bandwidth and processing) needed to achieve the most optimally resource efficient communications pathway configurations for the totality of communications. Consequently, optimal network resource allocation and efficiency at a system-wide level is continuously achieved.
摘要:
The present invention provides a new solution to reliable communication between automobiles and other communications devices. It relies on multiple available wireless bands and the addition of significant memory buffering to automobiles. The memory buffering is used to enable a new communications model for messages that is referred to as Mobile Message Memory Queues (M3Qs). A significant benefit of the communication device is the ease in which it can be incorporated into an automobile.
摘要:
The Location Enhanced Information Deliver System Architecture (LEIA) customizes the information that is displayed to an information recipient based on optimizing a match between information purveyors, such as advertisers, and the information recipients who are local to an information delivery system. The present location enhanced information delivery system presents the information most suited to the real current audience, as measured by location information systems, rather than to a static predicted audience. While the preferred embodiment discloses a beaconing-style wireless technology, the system concept is easily extensible both to other location-information systems, such as license-plate scanning with cameras, and to utilizing the location-information for private displays of information in addition to public displays of information.
摘要:
A host interface comprising a reassembler for reassembling and decrypting data that has been encrypted in accordance with a pre-defined key and segmented into a plurality of asynchronous transfer mode (ATM) cells. Each cell comprises a virtual channel identifier (VCI), a multiplexing identifier (MID) if the data is transmitted using the CCITT specified Class 4 connectionless transfer ATM adaptation layer (AAL), and a cell body. The reassembler comprises a cell manager for separating each cell body from that cell body's corresponding VCI and MID (if present), a linked list manager for managing and storing linked list data indicative of addresses at which the cell bodies are to be stored, a content addressable memory (CAM) for managing and storing the VCIs (and MIDs for connectionless data) and providing pointers into the linked list data, a lookup controller for writing the VCIs to the CAM, a reassembly buffer for storing the cell bodies, and a decryption device for decrypting the data and writing the decrypted data to the reassembly buffer. The major subsections operate concurrently to form an ATM cell-processing pipeline. The interface may also comprise a segmenter for encrypting data received from a host computer and segmenting the encrypted data into a plurality of ATM cells.