摘要:
Described is a method for statically or dynamically enabling a DVMRP router in a DVMRP domain to perform a reverse path forwarding check for an external source. A route report is generated for each known external source and injected into the DVMRP domain. Each route report includes routing information for a respective one of the known external sources. In one embodiment, the route report is generated for each network listed in a unicast routing table maintained on a DVMRP multicast border router and each route report includes unicast routing information for each of the networks and an indicator designating that the routing information is derived from unicast routing information. In another embodiment, if it is determined that routing information for an external source of multicast traffic received at a DVMRP border router is not available, the route report is generated at that time and includes a predetermined metric value.
摘要:
A method for digitally tearing out an article from a digital magazine is disclosed. In one embodiment, the method is realized by splitting the whole digital magazine into separate articles based on the digital magazine's meta-data, providing a user interface for users to take action of tearing out an article, checking the tear-out request against the article's tear-out policy, and retrieving and adding the article to the user's collection if the request is granted.
摘要:
A light emitting unit driving circuit may include: an operating voltage supplying unit configured to supply a voltage input for the driving circuit; a driving unit coupled to the operating voltage supplying unit and configured to drive the light emitting unit to make the light emitting unit turn on or turn off; and a feedback control unit coupled between the driving unit and the light emitting unit, and configured to form a feedback loop together with the driving circuit and the light emitting unit to stabilize an operating current of the light emitting unit.
摘要:
A method for limiting digital content consumption inside defined real-world geographic area(s) is disclosed. In one embodiment, the method is realized by adding additional consumption policy for geographic control to digital content's metadata, requesting the digital consumption device to acquire and provide its current location, checking device's current location against the geographic control consumption policy, and displaying the content for consumption if the digital content consumption policy is satisfied.
摘要:
A method and apparatus is disclosed which enables detection of undesired packets received at a device in a network, where the device is a member of a group of devices in the network. A registration table stores transform identifiers for each member of a group and controls the forwarding of the transform identifiers to the members of the group as members are added and deleted. A transform identifier indicates a format or transformation of a packet transmitted by an associated member. The transform identifier can therefore be used at a receiving device to distinguish between transmissions by different members of the group, thereby enabling the receiving device to extract sequence information associated with the member from the packet. The sequence information can be compared against an expected sequence number for the member to determine whether the packet is an undesirable or rogue packet.
摘要:
Method and apparatus that enable secure transmission of data in a scalable private network are described. Each station that is to be part of a private network registers with a key table. A group security association associated with the private network is forwarded to each trusted ingress and egress point that communicates with each member of the private network. When a member of the private network seeks to communicate with another member, it simply forwards the communication to the trusted ingress point. The trusted ingress point uses the security association associated with the private network to transform the communication and forwards the transformed communication through other intermediate stations in the network until it reaches a trusted egress point. The trusted egress point uses the stored security association to decode the transformed communication and forwards the communication to the appropriate destination. The ingress and egress points may be any points in the network, including customer edge devices, provider edge devices, or some combination thereof.
摘要:
Method and apparatus that enable secure transmission of data in a scalable private network are described. Each station that is to be part of a private network registers with a key table. A group security association associated with the private network is forwarded to each trusted ingress and egress point that communicates with each member of the private network. When a member of the private network seeks to communicate with another member, it simply forwards the communication to the trusted ingress point. The trusted ingress point uses the security association associated with the private network to transform the communication and forwards the transformed communication through other intermediate stations in the network until it reaches a trusted egress point. The trusted egress point uses the stored security association to decode the transformed communication and forwards the communication to the appropriate destination. The ingress and egress points may be any points in the network, including customer edge devices, provider edge devices, or some combination thereof.
摘要:
A method and apparatus for authorizing forwarding states in a Layer 2 device of a multicast system includes a forwarding table for use in forwarding communications to group members over interfaces of the Layer 2 device. According to one aspect of the invention, associated with the forwarding state is an authorization flag. The authorization flag signals whether or not the forwarding state is an authorized forwarding state over which multicast communications may be transferred. The Layer 2 device snoops authorization communications between a host and a layer 3 device, and updates the forwarding table authorization flags in response to these communications.
摘要:
A method for improving downloading performance of digital magazine in OFIP (Open Format Interactive Publishing) format or Folio format based on reading intent is disclosed. In one embodiment, the method is realized by packaging the whole issue of digital magazine into per article based or per page based record based on meta-data analyzing the reading intent, e.g. which article and which page a user is currently reading, which article and which page the user intents to read next, downloading only resources related to those articles and pages, and displaying the article or the page as soon as the related resources are downloaded.
摘要翻译:披露了一种基于阅读意向改进OFIP(Open Format Interactive Publishing)格式或Folio格式的数字杂志下载性能的方法。 在一个实施例中,该方法通过基于分析阅读意图的元数据,例如,将每个数字杂志的整个问题包装到每个基于文章或基于每页的记录中来实现。 哪个文章和用户当前正在阅读的页面,哪个文章和用户要下载的页面,仅下载与这些文章和页面相关的资源,并在相关资源下载后立即显示该文章或页面。
摘要:
A method for limiting digital content distribution inside defined real-world geographic area(s) is disclosed. In one embodiment, the method is realized by adding additional distribution policy for geographical control to digital content's metadata, requesting the receiver to acquire and provide its current location, checking receiver's current location against the geographic control distribution policy, and distributing the content if the distribution policy is satisfied.