METHOD AND DEVICE FOR DYNAMIC DEPLOYMENT OF TRUST BRIDGES IN AN AD HOC WIRELESS NETWORK
    1.
    发明申请
    METHOD AND DEVICE FOR DYNAMIC DEPLOYMENT OF TRUST BRIDGES IN AN AD HOC WIRELESS NETWORK 有权
    在无线网络中动态分配信任桥的方法和设备

    公开(公告)号:US20090276841A1

    公开(公告)日:2009-11-05

    申请号:US12112319

    申请日:2008-04-30

    IPC分类号: H04L9/32

    CPC分类号: H04L63/0823 H04W84/12

    摘要: A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).

    摘要翻译: 在自组织无线网络中部署信任网桥的方法可以为多机构认证提供互操作性。 该方法包括在来自不同组织的多个认证机构(CA)的接收认证机构(DCA)节点设备授权处理,其中授权授权DCA节点设备充当代表CA的DCA(步骤1105) 。 DCA节点设备然后处理从自组织无线网络接收的上下文信息(步骤1110)。 接下来,DCA节点设备基于上下文信息确定第二节点设备应该被启用为新的信任桥(步骤1115)。 DCA节点设备然后执行信任桥部署以使得第二节点设备能够用作新的信任桥(步骤1120)。

    Method and device for dynamic deployment of trust bridges in an ad hoc wireless network
    2.
    发明授权
    Method and device for dynamic deployment of trust bridges in an ad hoc wireless network 有权
    用于在自组织无线网络中动态部署信任网桥的方法和设备

    公开(公告)号:US08539225B2

    公开(公告)日:2013-09-17

    申请号:US12112319

    申请日:2008-04-30

    IPC分类号: H04L29/06

    CPC分类号: H04L63/0823 H04W84/12

    摘要: A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).

    摘要翻译: 在自组织无线网络中部署信任网桥的方法可以为多机构认证提供互操作性。 该方法包括在来自不同组织的多个认证机构(CA)的接收认证机构(DCA)节点设备授权处理,其中授权授权DCA节点设备充当代表CA的DCA(步骤1105) 。 DCA节点设备然后处理从自组织无线网络接收的上下文信息(步骤1110)。 接下来,DCA节点设备基于上下文信息确定第二节点设备应该被启用为新的信任桥(步骤1115)。 DCA节点设备然后执行信任桥部署以使得第二节点设备能够用作新的信任桥(步骤1120)。

    METHOD AND SYSTEM FOR PROPAGATING TRUST IN AN AD HOC WIRELESS COMMUNICATION NETWORK
    3.
    发明申请
    METHOD AND SYSTEM FOR PROPAGATING TRUST IN AN AD HOC WIRELESS COMMUNICATION NETWORK 审中-公开
    在无线通信网络中传播信任的方法和系统

    公开(公告)号:US20100250922A1

    公开(公告)日:2010-09-30

    申请号:US12415640

    申请日:2009-03-31

    IPC分类号: H04L9/00

    摘要: A method and system enable robust and scalable propagation of trust between a first organization and a second organization, both operating in an ad hoc wireless communication network. The method includes establishing at a first member node of the first organization pair-wise trust with a first member node of the second organization using a predetermined inter-organizational trust establishment device (step 505). Next, the first member node of the first organization generates a credential for the second organization using the pair-wise trust (step 510). The credential is then distributed from the first member node of the first organization to a second member node of the first organization (step 515). The second member node of the first organization then establishes pair-wise trust with a second member node of the second organization using the credential received from the first member node of the first organization (step 520).

    摘要翻译: 一种方法和系统能够实现在第一组织和第二组织之间进行稳健和可扩展的信任传播,这两者在ad hoc无线通信网络中运行。 该方法包括使用预定的组织间信任建立设备在第一组织对第一成员节点与第二组织的第一成员节点建立第一成员节点(步骤505)。 接下来,第一组织的第一成员节点使用成对的信任为第二组织生成凭证(步骤510)。 然后将证书从第一组织的第一成员节点分发到第一组织的第二成员节点(步骤515)。 然后,第一组织的第二成员节点使用从第一组织的第一成员节点接收的凭证来建立与第二组织的第二成员节点的成对的信任(步骤520)。

    Wireless relay device deployment methods and apparatus
    4.
    发明申请
    Wireless relay device deployment methods and apparatus 审中-公开
    无线中继设备部署方法和装置

    公开(公告)号:US20080101325A1

    公开(公告)日:2008-05-01

    申请号:US11590359

    申请日:2006-10-31

    申请人: Qi Bao Whay Chiou Lee

    发明人: Qi Bao Whay Chiou Lee

    IPC分类号: H04J3/00

    摘要: In an embodiment, an adaptively-augmentable wireless network (100, FIG. 1) may include at least one mobile device (110-115) and at least one relay device (104-109). During network setup, a mobile device associated with a first host user may determine (505, FIG. 5) that no relay device signal is receivable by the mobile device which has an adequate signal quality. When an undeployed relay device is not available to the first host user, he mobile device may transmit (508) a deployment request message (700, FIG. 7). Another mobile device associated with a second host user may receive (902, FIG. 9) the deployment request message, and may determine (908) whether to initiate deployment of an undeployed relay device associated with the second host user. When the other mobile device decides to initiate deployment, it may transmit (912) a responsive deployment announcement message (800, FIG. 8). Accordingly, collaborative relay device deployment is achievable.

    摘要翻译: 在一个实施例中,自适应增强的无线网络(100,图1)可以包括至少一个移动设备(110-1105)和至少一个中继设备(104-109)。 在网络建立期间,与第一主机用户相关联的移动设备可以确定(505,图5)没有中继设备信号可被具有足够信号质量的移动设备接收。 当未部署的中继设备对于第一主机用户不可用时,他的移动设备可以发送(508)部署请求消息(700,图7)。 与第二主机用户相关联的另一个移动设备可以接收(902,图9)部署请求消息,并且可以确定(908)是否启动与第二主机用户相关联的未部署的中继设备的部署。 当另一个移动设备决定启动部署时,它可以发送(912)响应部署通知消息(图8中的800)。 因此,可实现协同中继设备部署。

    APPARATUS, METHOD AND SYSTEM FOR SELECTING AND CONFIGURING INTERNET CONTENT FOR BYPASS ENCAPSULATION WITHIN A BYPASS ARCHITECTURE
    5.
    发明申请
    APPARATUS, METHOD AND SYSTEM FOR SELECTING AND CONFIGURING INTERNET CONTENT FOR BYPASS ENCAPSULATION WITHIN A BYPASS ARCHITECTURE 审中-公开
    用于在旁路建筑中选择和配置旁路包络的互联网内容的装置,方法和系统

    公开(公告)号:US20100083329A1

    公开(公告)日:2010-04-01

    申请号:US12241184

    申请日:2008-09-30

    IPC分类号: H04N7/173

    摘要: An apparatus, method and system for delivering Internet content within a system that includes an encapsulation database and a last-hop router as part of a bypass architecture, such as a bypass architecture that transmits IP content from a source to a downstream modulator, such as an EQAM modulator, in a manner that bypasses the system's Cable Modem Termination System (CMTS). The encapsulation database, which typically is controlled by the MSO, but also is in operable communication with the last-hop router and CMTS, is configured to store encapsulation identification information, which is used to identify which portions of the IP content receive bypass encapsulation. The encapsulation database also can include the QoS settings for such identified portions of IP content. The encapsulation database allows the MSO to provide QoS settings for select portions of IP content, such as videos from internet video providers with whom the MSO has made special arrangements.

    摘要翻译: 一种用于在包括作为旁路架构的一部分的旁路架构的封装数据库和最后一跳路由器的系统内递送因特网内容的装置,方法和系统,例如从源向下游调制器发送IP内容的旁路架构,例如 EQAM调制器,绕过系统的电缆调制解调器终端系统(CMTS)。 通常由MSO控制,而且与最后一跳路由器和CMTS可操作地通信的封装数据库被配置为存储用于标识IP内容的哪些部分接收旁路封装的封装标识信息。 封装数据库还可以包括用于这样识别的IP内容部分的QoS设置。 封装数据库允许MSO为IP内容的选定部分提供QoS设置,例如MSO作出特殊安排的互联网视频提供商的视频。

    Selection of erasure code parameters for no data repair
    6.
    发明授权
    Selection of erasure code parameters for no data repair 有权
    选择无数据修复的擦除代码参数

    公开(公告)号:US08788913B1

    公开(公告)日:2014-07-22

    申请号:US13402324

    申请日:2012-02-22

    IPC分类号: H03M13/00

    摘要: An improved data storage technique achieves a desired level of reliability by providing sufficient redundancy in erasure coded data to maintain the data, without repair, for a prescribed period of time. The improved technique employs a newly devised, continuous-time Markov chain model. The model can be applied in computerized systems to establish erasure coding parameters for storing and reliably maintaining data for a designated period of time, without any need to repair the data to reestablish an original or previous level of erasure coding redundancy.

    摘要翻译: 改进的数据存储技术通过在擦除编码数据中提供足够的冗余来维持数据,而不需要修复一段规定的时间,来实现所需的可靠性水平。 改进的技术采用新设计的连续时间马尔可夫链模型。 该模型可以应用在计算机系统中以建立擦除编码参数,用于在指定的时间段内存储和可靠地维护数据,而无需修复数据以重新建立原始或先前的擦除编码冗余级别。

    Apparatus, method and system for managing session encapsulation information within an internet protocol content bypass architecture
    7.
    发明授权
    Apparatus, method and system for managing session encapsulation information within an internet protocol content bypass architecture 有权
    用于在因特网协议内容旁路架构中管理会话封装信息的装置,方法和系统

    公开(公告)号:US08179883B2

    公开(公告)日:2012-05-15

    申请号:US12140830

    申请日:2008-06-17

    IPC分类号: H04L12/66

    摘要: An apparatus, method and system for delivering Internet Protocol (IP) content within a system that includes a bypass architecture, using a Session Encapsulation Information Database (SEIDB). Within an existing PacketCable Multimedia (PCMM) framework used as a control plane for IP content bypass flow setup, the SEIDB system stores session bypass encapsulation information for IP content bypass flows within the system. Within the SEIDB, each entry of bypass encapsulation information has a flow classifier component that uniquely identifies a bypass flow in a manner that allows both a cable modem termination system (CMTS) and the IP content source to uniquely identify the bypass flow at the SEIDB. Initially, the CMTS gathers bypass encapsulation information and uploads it to the SEIDB. Before the bypass flow begins, the IP content source obtains the necessary bypass encapsulation information from the SEIDB, e.g., using a flow classifier as a search filter item.

    摘要翻译: 一种使用会话封装信息数据库(SEIDB)在包括旁路架构的系统内传送因特网协议(IP)内容的装置,方法和系统。 在用作IP内容旁路流设置的控制平面的现有PacketCable多媒体(PCMM)框架内,SEIDB系统存储用于系统内的IP内容旁路流的会话旁路封装信息。 在SEIDB中,旁路封装信息的每个条目都具有一个流分类器组件,其以允许电缆调制解调器终端系统(CMTS)和IP内容源唯一地标识旁路流的方式来唯一地标识SEIDB的旁路流。 最初,CMTS收集旁路封装信息,并将其上传到SEIDB。 在旁路流开始之前,IP内容源从SEIDB获得必要的旁路封装信息,例如使用流分类器作为搜索过滤项。

    APPARATUS, METHOD AND SYSTEM FOR MANAGING BYPASS ENCAPSULATION OF INTERNET CONTENT WITHIN A BYPASS ARCHITECTURE
    8.
    发明申请
    APPARATUS, METHOD AND SYSTEM FOR MANAGING BYPASS ENCAPSULATION OF INTERNET CONTENT WITHIN A BYPASS ARCHITECTURE 审中-公开
    用于管理旁路建筑中互联网内容的旁路封装的装置,方法和系统

    公开(公告)号:US20090310596A1

    公开(公告)日:2009-12-17

    申请号:US12140843

    申请日:2008-06-17

    IPC分类号: H04L12/66

    CPC分类号: H04L12/2801 H04L12/4633

    摘要: An apparatus, method and system for delivering Internet content within a system that includes a bypass architecture, such as a bypass architecture that transmits content from the Internet or an Internet content source to a downstream modulator, such as an Edge Quadrature Amplitude Modulation (EQAM) modulator, in a manner that bypasses the system's Cable Modem Termination System (CMTS). Content from the Internet or an Internet source is transmitted to a last-hop router, which is configured to identify content for bypass encapsulation. The last-hop router also can be configured to perform at least a portion of the necessary bypass encapsulation for proper bypass flows of the identified content. Alternatively, the EQAM is configured to perform the bypass encapsulation, and the last-hop router transmits the identified content to the EQAM, which performs at least a portion of the necessary bypass encapsulation on the identified content.

    摘要翻译: 一种用于在系统内传送因特网内容的装置,方法和系统,其包括诸如边缘正交幅度调制(EQAM)之类的旁路架构,诸如将来自因特网或因特网内容源的内容从互联网内容源发送到下游调制器的旁路架构, 调制器,以绕过系统的有线调制解调器终端系统(CMTS)的方式。 来自因特网或因特网源的内容被发送到最后一跳路由器,其被配置为识别用于旁路封装的内容。 最后一跳路由器还可被配置为执行必要的旁路封装的至少一部分,以便正确地旁路所识别的内容。 或者,EQAM被配置为执行旁路封装,并且最后一跳路由器将识别的内容发送到EQAM,EQAM对所识别的内容执行必要的旁路封装的至少一部分。

    Policy based intelligent data placement
    9.
    发明授权
    Policy based intelligent data placement 有权
    基于策略的智能数据放置

    公开(公告)号:US09032061B1

    公开(公告)日:2015-05-12

    申请号:US13398163

    申请日:2012-02-16

    IPC分类号: G06F15/173 H04L12/28

    摘要: A technique performs policy-based intelligent data placement in an electronic environment. The technique involves selecting, from a pool of candidate local area networks (LANs) of the electronic environment, a plurality of LANs within which to store the data based on a set of policy priority levels assigned to the data. The technique further involves generating a set of information elements (e.g., data fragments, erasure codes, etc.) from the data, and placing the set of information elements on storage nodes of the plurality of LANs. Such a method enables the data to be stored in a distributed manner and alleviates the need for a central storage facility. Since the data is distributed among the storage nodes of the plurality of LANs, system capacity and infrastructure is able to grow (i.e., scale) in a manner which does not create a problematic bottleneck.

    摘要翻译: 一种技术在电子环境中执行基于策略的智能数据放置。 该技术涉及从电子环境的候选局域网(LAN)池中选择多个LAN,其中基于分配给数据的一组策略优先级来存储数据。 该技术还包括从数据生成一组信息元素(例如,数据片段,擦除代码等),以及将该组信息元素放置在多个LAN的存储节点上。 这种方法能够以分散的方式存储数据,并且减轻对中央存储设施的需要。 由于数据分布在多个LAN的存储节点之间,所以系统能力和基础设施能够以不产生有问题的瓶颈的方式增长(即缩放)。

    Network-assisted routing for topology-aware overlay networks
    10.
    发明授权
    Network-assisted routing for topology-aware overlay networks 有权
    用于拓扑感知覆盖网络的网络辅助路由

    公开(公告)号:US08861527B1

    公开(公告)日:2014-10-14

    申请号:US13407980

    申请日:2012-02-29

    摘要: An overlay network has a hierarchical cluster tree (HCT) structure on an underlying physical network, the HCT structure having clusters of local area networks (LANs) associated with respective sub-spaces of a hash key space. A cluster proxy node (CP) maintains a routing table and channels to both a parent cluster and member LANs, with routing information associating each LAN with a physical-network address (PA) of a corresponding LAN representative node (LR). Nodes sending routing request messages each containing a key value to the CP node, which returns routing response messages each including PA information from the routing table and/or the parent cluster. The PA information in the response for a given request includes a PA of an LR of a request-specific LAN whose sub-space contains the key value in the request message. A node uses the PA information to send a message to the LR node using the physical network.

    摘要翻译: 覆盖网络在底层物理网络上具有层次聚类树(HCT)结构,HCT结构具有与散列密钥空间的相应子空间相关联的局域网(LAN)簇。 集群代理节点(CP)将路由表和通道维护到父集群和成员LAN,路由信息将每个LAN与对应的LAN代表节点(LR)的物理网络地址(PA)相关联。 节点向CP节点发送每个包含密钥值的路由请求消息,其返回路由响应消息,每个路由响应消息包括来自路由表和/或父集群的PA信息。 针对给定请求的响应中的PA信息包括其请求消息中的子空间包含密钥值的请求特定LAN的LR的PA。 节点使用PA信息使用物理网络向LR节点发送消息。