Ad hoc network discovery menu
    1.
    发明授权
    Ad hoc network discovery menu 有权
    Ad hoc网络发现菜单

    公开(公告)号:US07590086B2

    公开(公告)日:2009-09-15

    申请号:US10979253

    申请日:2004-11-03

    IPC分类号: H04W4/00

    摘要: When an ad hoc network is formed between short range wireless devices, at least one device assumes the role of an ad hoc network information provider for the new piconet. In this role, the device allocates a browsing hierarchy of service classes in its service registry. The service classes will provide a record to characterize the ad hoc network. When a new wireless device arrives within the communication range of any member of the ad hoc network, its inquiry signals are answered by the first member detecting the inquiry. If that first member is an ad hoc network information provider, it responds with information accessed from its service registry characterizing the ad hoc network. If, instead, an ordinary device in the ad hoc network is the first to respond to the inquiry signals of the arriving device, the device responds with the address of the ad hoc network information provider. The arriving device then pages the ad hoc network information provider to obtain information characterizing the ad hoc network.

    摘要翻译: 当在短距离无线设备之间形成自组织网络时,至少一个设备承担新的微微网的自组织网络信息提供者的角色。 在此角色中,设备会在其服务注册表中分配服务类的浏览层次结构。 服务类将提供一个记录来表征自组织网络。 当新的无线设备到达自组织网络的任何成员的通信范围内时,其查询信号由检测到查询的第一成员回答。 如果该第一个成员是一个自组织网络信息提供商,它将从其表征Ad hoc网络的服务注册表中访问的信息进行响应。 相反,如果ad hoc网络中的普通设备是首先响应到达设备的查询信号,则设备用自组织网络信息提供者的地址进行响应。 然后,到达的设备将页面ad hoc网络信息提供者获得表征自组织网络的信息。

    Ad hoc network discovery menu
    2.
    发明申请

    公开(公告)号:US20050088980A1

    公开(公告)日:2005-04-28

    申请号:US10979253

    申请日:2004-11-03

    摘要: When an ad hoc network is formed between short range wireless devices, at least one device assumes the role of an ad hoc network information provider for the new piconet. In this role, the device allocates a browsing hierarchy of service classes in its service registry. The service classes will provide a record to characterize the ad hoc network. When a new wireless device arrives within the communication range of any member of the ad hoc network, its inquiry signals are answered by the first member detecting the inquiry. If that first member is an ad hoc network information provider, it responds with information accessed from its service registry characterizing the ad hoc network. If, instead, an ordinary device in the ad hoc network is the first to respond to the inquiry signals of the arriving device, the device responds with the address of the ad hoc network information provider. The arriving device then pages the ad hoc network information provider to obtain information characterizing the ad hoc network.

    Ad hoc network discovery menu
    3.
    发明授权
    Ad hoc network discovery menu 有权
    Ad hoc网络发现菜单

    公开(公告)号:US06842460B1

    公开(公告)日:2005-01-11

    申请号:US09891382

    申请日:2001-06-27

    摘要: When an ad hoc network is formed between short range wireless devices, at least one device assumes the role of an ad hoc network information provider for the new piconet. In this role, the device allocates a browsing hierarchy of service classes in its service registry. The service classes will provide a record to characterize the ad hoc network. When a new wireless device arrives within the communication range of any member of the ad hoc network, its inquiry signals are answered by the first member detecting the inquiry. If that first member is an ad hoc network information provider, it responds with information accessed from its service registry characterizing the ad hoc network. If, instead, an ordinary device in the ad hoc network is the first to respond to the inquiry signals of the arriving device, the device responds with the address of the ad hoc network information provider. The arriving device then pages the ad hoc network information provider to obtain information characterizing the ad hoc network.

    摘要翻译: 当在短距离无线设备之间形成自组织网络时,至少一个设备承担新的微微网的自组织网络信息提供者的角色。 在此角色中,设备会在其服务注册表中分配服务类的浏览层次结构。 服务类将提供一个记录来表征自组织网络。 当新的无线设备到达自组织网络的任何成员的通信范围内时,其查询信号由检测到查询的第一成员回答。 如果该第一个成员是一个自组织网络信息提供商,它将从其表征Ad hoc网络的服务注册表中访问的信息进行响应。 相反,如果ad hoc网络中的普通设备是首先响应到达设备的查询信号,则设备用自组织网络信息提供者的地址进行响应。 然后,到达的设备将页面ad hoc网络信息提供者获得表征自组织网络的信息。

    Authentication in data communication
    4.
    发明授权
    Authentication in data communication 失效
    数据通信中的认证

    公开(公告)号:US07444513B2

    公开(公告)日:2008-10-28

    申请号:US09867049

    申请日:2001-05-29

    IPC分类号: H04L9/32 H04L9/00 H04K1/00

    摘要: A client 110 may be authenticated by transmitting or beaming a telecommunication network subscriber's authentication to the client from a device 120, over a wireless link. For example, a GSM telephone 120 may authenticate an electronic book 110 to a content providing service within the Internet. The service verifies the authentication using the subscriber's GSM network operator's Authentication Center 161 to generate an authenticator and the client correspondingly generates a local copy of the authenticator using a GSM SIM over the wireless local link. The authentication is then determined by checking that these authenticators match and thereafter the authenticator can be used as a session key to encrypt data in the service.

    摘要翻译: 可以通过无线链路从设备120向客户端发送或发送电信网络用户的认证来认证客户端110。 例如,GSM电话120可以将互联网内的内容提​​供服务的电子书110认证。 该服务使用用户的GSM网络运营商的认证中心161验证认证,以生成认证者,并且客户端通过无线本地链路相应地使用GSM SIM生成认证者的本地副本。 然后通过检查这些验证符匹配来确定认证,此后,认证器可以用作会话密钥来加密服务中的数据。

    Naming distribution method for ad hoc networks

    公开(公告)号:US07089298B2

    公开(公告)日:2006-08-08

    申请号:US09932464

    申请日:2001-08-20

    IPC分类号: G06F15/177

    摘要: Device name conflicts are resolved when adding devices to existing ad hoc networks or when joining two ad hoc networks together. After a connection has been established between a new device to be added and a first member device in the ad hoc network, a name distribution message is transferred by the new device to the first member device. The name distribution message will be passed from member device to member device in the ad hoc network, and at each member device a name conflict check is performed. Device name conflicts are also resolved when joining two ad hoc networks together. The contents of name manager tables of the two respective ad hoc networks must be exchanged. This is accomplished by forming a name distribution message for each name record in the name manager tables of the two devices establishing the connection on behalf of their respective ad hoc networks. Then the name distribution messages formed in each respective ad hoc network are distributed to the other ad hoc network. In the process of distributing the name distribution messages through the other network, any name conflicts are commonly resolved in all of the devices in both ad hoc networks.

    Disinfection of a File System
    6.
    发明申请
    Disinfection of a File System 有权
    文件系统的消毒

    公开(公告)号:US20130160124A1

    公开(公告)日:2013-06-20

    申请号:US13325276

    申请日:2011-12-14

    IPC分类号: G06F21/00

    摘要: A method for determining appropriate actions to remedy potential security lapses following infection of a device by malware. Following detection of infection of the device the device undergoes a cleaning operation. As part of the cleaning operation infected electronic files and any other associated files or objects are removed from the device. From timestamps associated with the infected files and associated files and objects, either directly or from another source such as an anti-virus trace program, the time of infection can be estimated. This allows the system to reference timestamps on the device to determine the source of the infection. Additionally, if the type of infection is identified timestamps on the device can be used to determine where there are particular areas of vulnerability due to user actions on the device.

    摘要翻译: 一种用于确定适当的措施以补救恶意软件感染设备后潜在的安全性失效的方法。 在检测到装置的感染之后,装置进行清洁操作。 作为清洁操作的一部分,感染的电子文件和任何其他相关的文件或对象将从设备中删除。 从与受感染文件及相关文件和对象相关联的时间戳,直接或从其他来源(如反病毒跟踪程序)可以估计感染时间。 这允许系统引用设备上的时间戳来确定感染的来源。 另外,如果识别出感染类型,则可以使用设备上的时间戳来确定由于设备上的用户动作而导致的特定的漏洞区域。

    Disinfection of a file system
    7.
    发明授权
    Disinfection of a file system 有权
    文件系统的消毒

    公开(公告)号:US08931100B2

    公开(公告)日:2015-01-06

    申请号:US13325276

    申请日:2011-12-14

    摘要: A method for determining appropriate actions to remedy potential security lapses following infection of a device by malware. Following detection of infection of the device the device undergoes a cleaning operation. As part of the cleaning operation infected electronic files and any other associated files or objects are removed from the device. From timestamps associated with the infected files and associated files and objects, either directly or from another source such as an anti-virus trace program, the time of infection can be estimated. This allows the system to reference timestamps on the device to determine the source of the infection. Additionally, if the type of infection is identified timestamps on the device can be used to determine where there are particular areas of vulnerability due to user actions on the device.

    摘要翻译: 一种用于确定适当的措施以补救恶意软件感染设备后潜在的安全性失效的方法。 在检测到装置的感染之后,装置进行清洁操作。 作为清洁操作的一部分,感染的电子文件和任何其他相关的文件或对象将从设备中删除。 从与受感染文件及相关文件和对象相关联的时间戳,直接或从其他来源(如反病毒跟踪程序)可以估计感染时间。 这允许系统引用设备上的时间戳来确定感染的来源。 另外,如果识别出感染类型,则可以使用设备上的时间戳来确定由于设备上的用户动作而导致的特定的漏洞区域。

    Internet/intranet access mechanism
    8.
    发明授权
    Internet/intranet access mechanism 失效
    互联网/内部网访问机制

    公开(公告)号:US08631135B2

    公开(公告)日:2014-01-14

    申请号:US12474129

    申请日:2009-05-28

    IPC分类号: G06F15/16 G06F9/00 G06F17/00

    摘要: A method connects one of several customer premises equipment (CPE) via an ATM network to one of several service providers (SP). Each CPE is connected to the ATM network via a corresponding network termination point (NT). There is an access server function (ASF), having a permanent virtual connection (PVC) to each NT and a connection to each SP. A tunneling protocol is established on the permanent virtual connection between each NT and the ASF. The tunneling protocol is able to support an integrated signaling protocol. The CPE or its user select selects an appropriate SP by using the integrated signaling protocol. Routing from the CPE to the selected SP is performed by the ASF. The ASF connects the CPE to the selected SP using the integrated signaling protocol.

    摘要翻译: 一种方法将几个客户端设备(CPE)之一经由ATM网络连接到多个服务提供商(SP)之一。 每个CPE通过相应的网络终端点(NT)连接到ATM网络。 有一个访问服务器功能(ASF),具有到每个NT的永久虚拟连接(PVC)和到每个SP的连接。 在每个NT和ASF之间的永久虚拟连接上建立隧道协议。 隧道协议能够支持集成的信令协议。 CPE或其用户选择通过使用集成信令协议选择适当的SP。 从CPE到所选的SP的路由由ASF执行。 ASF使用集成的信令协议将CPE连接到所选的SP。

    INTERNET/INTRANET ACCESS MECHANISM
    9.
    发明申请
    INTERNET/INTRANET ACCESS MECHANISM 失效
    互联网/内部访问机制

    公开(公告)号:US20090232145A1

    公开(公告)日:2009-09-17

    申请号:US12474129

    申请日:2009-05-28

    IPC分类号: H04L12/56

    摘要: A method connects one of several customer premises equipment (CPE) via an ATM network to one of several service providers (SP). Each CPE is connected to the ATM network via a corresponding network termination point (NT). There is an access server function (ASF), having a permanent virtual connection (PVC) to each NT and a connection to each SP. A tunneling protocol is established on the permanent virtual connection between each NT and the ASF. The tunneling protocol is able to support an integrated signaling protocol. The CPE or its user select selects an appropriate SP by using the integrated signaling protocol. Routing from the CPE to the selected SP is performed by the ASF. The ASF connects the CPE to the selected SP using the integrated signaling protocol.

    摘要翻译: 一种方法将几个客户端设备(CPE)之一经由ATM网络连接到多个服务提供商(SP)之一。 每个CPE通过相应的网络终端点(NT)连接到ATM网络。 有一个访问服务器功能(ASF),具有到每个NT的永久虚拟连接(PVC)和到每个SP的连接。 在每个NT和ASF之间的永久虚拟连接上建立隧道协议。 隧道协议能够支持集成的信令协议。 CPE或其用户选择通过使用集成信令协议选择适当的SP。 从CPE到所选的SP的路由由ASF执行。 ASF使用集成的信令协议将CPE连接到所选的SP。

    Malware detection
    10.
    发明授权
    Malware detection 有权
    恶意软件检测

    公开(公告)号:US09111094B2

    公开(公告)日:2015-08-18

    申请号:US12931000

    申请日:2011-01-21

    IPC分类号: G06F21/00 G06F21/56

    CPC分类号: G06F21/56

    摘要: First data relating to a selected file is obtained. Based upon the first data it is determined if malware detection processing can be selected. Malware detection processing of the file is selected based upon said first data if it is determined that malware detection processing can be selected based upon the first data. If it is determined that, based upon the first data, malware detection processing cannot be selected based upon the first data, second data relating to the selected file is obtained and malware detection processing of the file is selected based upon said first and second obtained data. The selected malware detection processing is applied to said selected file. In an exemplary embodiment the first data is metadata and represents a faster scan of the file, and the second data is content of the file's header and represents a more in-depth scan of the file.

    摘要翻译: 获得与所选文件有关的第一数据。 基于第一个数据,确定是否可以选择恶意软件检测处理。 如果确定可以基于第一数据选择恶意软件检测处理,则基于所述第一数据来选择文件的恶意软件检测处理。 如果基于第一数据确定不能基于第一数据选择恶意软件检测处理,则获得与所选择的文件相关的第二数据,并且基于所述第一和第二获得数据选择文件的恶意软件检测处理 。 所选择的恶意软件检测处理被应用于所选择的文件。 在示例性实施例中,第一数据是元数据并且表示文件的更快扫描,并且第二数据是文件头部的内容,并且表示文件的更深入的扫描。