摘要:
A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).
摘要:
A method for deploying a trust bridge in an ad hoc wireless network can provide interoperability for multi-organizational authentication. The method includes processing at a delegate certification authority (DCA) node device authorizations received from of a plurality of certification authorities (CAs) of different organizations, where the authorizations authorize the DCA node device to serve as a DCA representing the CAs (step 1105). The DCA node device then processes context information received from the ad hoc wireless network (step 1110). Next, the DCA node device determines, based on the context information, that a second node device should be enabled as a new trust bridge (step 1115). The DCA node device then performs a trust bridge deployment to enable the second node device to serve as the new trust bridge (step 1120).
摘要:
A method and system enable robust and scalable propagation of trust between a first organization and a second organization, both operating in an ad hoc wireless communication network. The method includes establishing at a first member node of the first organization pair-wise trust with a first member node of the second organization using a predetermined inter-organizational trust establishment device (step 505). Next, the first member node of the first organization generates a credential for the second organization using the pair-wise trust (step 510). The credential is then distributed from the first member node of the first organization to a second member node of the first organization (step 515). The second member node of the first organization then establishes pair-wise trust with a second member node of the second organization using the credential received from the first member node of the first organization (step 520).
摘要:
In an embodiment, an adaptively-augmentable wireless network (100, FIG. 1) may include at least one mobile device (110-115) and at least one relay device (104-109). During network setup, a mobile device associated with a first host user may determine (505, FIG. 5) that no relay device signal is receivable by the mobile device which has an adequate signal quality. When an undeployed relay device is not available to the first host user, he mobile device may transmit (508) a deployment request message (700, FIG. 7). Another mobile device associated with a second host user may receive (902, FIG. 9) the deployment request message, and may determine (908) whether to initiate deployment of an undeployed relay device associated with the second host user. When the other mobile device decides to initiate deployment, it may transmit (912) a responsive deployment announcement message (800, FIG. 8). Accordingly, collaborative relay device deployment is achievable.
摘要:
An apparatus, method and system for delivering Internet content within a system that includes an encapsulation database and a last-hop router as part of a bypass architecture, such as a bypass architecture that transmits IP content from a source to a downstream modulator, such as an EQAM modulator, in a manner that bypasses the system's Cable Modem Termination System (CMTS). The encapsulation database, which typically is controlled by the MSO, but also is in operable communication with the last-hop router and CMTS, is configured to store encapsulation identification information, which is used to identify which portions of the IP content receive bypass encapsulation. The encapsulation database also can include the QoS settings for such identified portions of IP content. The encapsulation database allows the MSO to provide QoS settings for select portions of IP content, such as videos from internet video providers with whom the MSO has made special arrangements.
摘要:
An improved data storage technique achieves a desired level of reliability by providing sufficient redundancy in erasure coded data to maintain the data, without repair, for a prescribed period of time. The improved technique employs a newly devised, continuous-time Markov chain model. The model can be applied in computerized systems to establish erasure coding parameters for storing and reliably maintaining data for a designated period of time, without any need to repair the data to reestablish an original or previous level of erasure coding redundancy.
摘要:
An apparatus, method and system for delivering Internet Protocol (IP) content within a system that includes a bypass architecture, using a Session Encapsulation Information Database (SEIDB). Within an existing PacketCable Multimedia (PCMM) framework used as a control plane for IP content bypass flow setup, the SEIDB system stores session bypass encapsulation information for IP content bypass flows within the system. Within the SEIDB, each entry of bypass encapsulation information has a flow classifier component that uniquely identifies a bypass flow in a manner that allows both a cable modem termination system (CMTS) and the IP content source to uniquely identify the bypass flow at the SEIDB. Initially, the CMTS gathers bypass encapsulation information and uploads it to the SEIDB. Before the bypass flow begins, the IP content source obtains the necessary bypass encapsulation information from the SEIDB, e.g., using a flow classifier as a search filter item.
摘要:
An apparatus, method and system for delivering Internet content within a system that includes a bypass architecture, such as a bypass architecture that transmits content from the Internet or an Internet content source to a downstream modulator, such as an Edge Quadrature Amplitude Modulation (EQAM) modulator, in a manner that bypasses the system's Cable Modem Termination System (CMTS). Content from the Internet or an Internet source is transmitted to a last-hop router, which is configured to identify content for bypass encapsulation. The last-hop router also can be configured to perform at least a portion of the necessary bypass encapsulation for proper bypass flows of the identified content. Alternatively, the EQAM is configured to perform the bypass encapsulation, and the last-hop router transmits the identified content to the EQAM, which performs at least a portion of the necessary bypass encapsulation on the identified content.
摘要:
A technique performs policy-based intelligent data placement in an electronic environment. The technique involves selecting, from a pool of candidate local area networks (LANs) of the electronic environment, a plurality of LANs within which to store the data based on a set of policy priority levels assigned to the data. The technique further involves generating a set of information elements (e.g., data fragments, erasure codes, etc.) from the data, and placing the set of information elements on storage nodes of the plurality of LANs. Such a method enables the data to be stored in a distributed manner and alleviates the need for a central storage facility. Since the data is distributed among the storage nodes of the plurality of LANs, system capacity and infrastructure is able to grow (i.e., scale) in a manner which does not create a problematic bottleneck.
摘要:
An overlay network has a hierarchical cluster tree (HCT) structure on an underlying physical network, the HCT structure having clusters of local area networks (LANs) associated with respective sub-spaces of a hash key space. A cluster proxy node (CP) maintains a routing table and channels to both a parent cluster and member LANs, with routing information associating each LAN with a physical-network address (PA) of a corresponding LAN representative node (LR). Nodes sending routing request messages each containing a key value to the CP node, which returns routing response messages each including PA information from the routing table and/or the parent cluster. The PA information in the response for a given request includes a PA of an LR of a request-specific LAN whose sub-space contains the key value in the request message. A node uses the PA information to send a message to the LR node using the physical network.