会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 52. 发明申请
    • PHYSICAL SECURITY TRIGGERED DYNAMIC NETWORK AUTHENTICATION AND AUTHORIZATION
    • 物理安全触发动态网络认证和授权
    • US20080271109A1
    • 2008-10-30
    • US11739892
    • 2007-04-25
    • Amit SinghPrabandham Madan GopalManjunath S. BangaloreRaman Shankara Krishnan
    • Amit SinghPrabandham Madan GopalManjunath S. BangaloreRaman Shankara Krishnan
    • G06F17/00H04L9/32
    • H04L63/08H04L63/102
    • A unified access control component (UACC) can maintain information relating to network access information and physical location information associated with respective users who may access a network that can include network resources (e.g., applications, information). The UACC can cross reference the network access information (e.g., user network access events, credentials, and policy) and physical location information (e.g., user physical access events, credentials, and policy) and can generate and enforce a unified network access policy based on network access information and physical location information associated with a particular user. After network access privileges have been granted to a user, the UACC can continue to monitor the user. The UACC can include a dynamic authentication component that can request a user re-authenticate if a change in the physical location and/or network access associated with the user is detected, such that a re-computation of network access privileges is desired.
    • 统一的访问控制组件(UACC)可以维护与可能访问可以包括网络资源(例如,应用,信息)的网络的相应用户相关联的网络访问信息和物理位置信息的信息。 UACC可以交叉参考网络访问信息(例如,用户网络访问事件,凭据和策略)和物理位置信息(例如,用户物理访问事件,凭据和策略),并且可以生成并实施基于统一的网络访问策略 关于与特定用户相关联的网络访问信息和物理位置信息。 在向用户授予网络访问权限之后,UACC可以继续监视用户。 如果检测到与用户相关联的物理位置和/或网络访问的改变,则UACC可以包括动态认证组件,其可以请求用户重新认证,使得期望重新计算网络访问特权。
    • 53. 发明申请
    • Efficient discovery and verification of paths through a meshed overlay network
    • 通过网格覆盖网络高效发现和验证路径
    • US20070263553A1
    • 2007-11-15
    • US11805488
    • 2007-05-23
    • Anupam BharaliBalraj SinghManish SampatAmit SinghRajiv Batra
    • Anupam BharaliBalraj SinghManish SampatAmit SinghRajiv Batra
    • H04L12/28H04L12/56
    • H04L45/125H04L45/02H04L45/124H04L45/26H04L45/64
    • The present invention provides an efficient system and method for routing information through a dynamic network. The system includes at least one ingress point and one egress point. The ingress and egress point cooperate to form a virtual circuit for routing packets to destination subnets directly reachable by the egress point. The egress point automatically discovers which subnets are directly accessible via its local ports and summarizes this information for the ingress point. The ingress point receives this information, compiles it into a routing table, and verifies that those subnets are best accessed by the egress point. Verification is accomplished by sending probe packets to select addresses on the subnet. Additionally, the egress point may continue to monitor the local topology and incrementally update the information to the ingress to allow the ingress to adjust its compiled routing table.
    • 本发明提供了一种通过动态网络路由信息的有效系统和方法。 该系统包括至少一个入口点和一个出口点。 入口点和出口点协作形成一个虚拟电路,用于将数据包路由到出口点直接访问的目的地子网。 出口点自动发现哪些子网可以通过其本地端口直接访问,并总结入口点的此信息。 入口点接收该信息,将其编译成路由表,并验证这些子网是否最好被出口点访问。 验证是通过发送探测数据包来选择子网上的地址来实现的。 此外,出口点可以继续监视本地拓扑,并将信息递增地更新到入口,以允许入口调整其编译的路由表。
    • 54. 发明申请
    • Creating an assured execution environment for at least one computer program executable on a computer system
    • 为计算机系统上可执行的至少一个计算机程序创建一个有保证的执行环境
    • US20070150874A1
    • 2007-06-28
    • US11318192
    • 2005-12-24
    • Anurag SharmaAmit Singh
    • Anurag SharmaAmit Singh
    • G06F9/45
    • G06F21/53
    • The present invention provides a method and system of creating an assured execution environment (AxE) for at least one computer program executable on a computer system. In an exemplary embodiment, the method and system include (1) converting the executable into a computer program targeted for the computer system and (2) providing the environment in which the program can be accessed on the computer system. In an exemplary embodiment, the converting includes scrambling the executable. In an exemplary embodiment, the converting includes attaching filesystem metadata to the executable. In an exemplary embodiment, the providing includes executing the program on the computer system only if the program complies with a policy. In an exemplary embodiment, the providing includes preventing malicious code from executing on the computer system before the environment is loaded on the computer system.
    • 本发明提供了一种为在计算机系统上可执行的至少一个计算机程序创建可靠的执行环境(ax)的方法和系统。 在示例性实施例中,该方法和系统包括(1)将可执行文件转换成针对计算机系统的计算机程序,以及(2)提供可以在计算机系统上访问该程序的环境。 在示例性实施例中,转换包括对可执行文件进行加扰。 在示例性实施例中,转换包括将文件系统元数据附加到可执行文件。 在示例性实施例中,提供包括仅在程序符合策略时才在计算机系统上执行该程序。 在示例性实施例中,提供包括在将环境加载到计算机系统之前防止恶意代码在计算机系统上执行。
    • 56. 发明授权
    • Determining frequency errors in a multi-carrier receiver
    • 确定多载波接收机中的频率误差
    • US09413579B2
    • 2016-08-09
    • US14110875
    • 2012-03-14
    • Thomas NilssonJianjun ChenAmit Singh
    • Thomas NilssonJianjun ChenAmit Singh
    • H04B1/10H04L27/26H04L25/02H04L27/00
    • H04L27/2657H04B1/1081H04L25/0222H04L27/0014H04L27/2672H04L27/2675H04L27/2695
    • Individual multipath components of digital data symbols sent from a transmitter on at least two carrier frequencies generated from a common clock signal, are received (401) with individual delays and processed by a receiver unit having at least two fingers. Successive channel estimates are determined (402) from received symbols for each finger and each carrier, and an estimated frequency error is determined (404) for each finger and each carrier. A linear equation system is constructed (405), in which each determined frequency error is expressed as a function of a first variable indicative of frequency drift and a second variable indicative of frequency error caused by Doppler effect. The equation system is solved (406) to provide a solution with estimates of the first and second variables for each finger, and an estimated frequency drift is determined (407) from the solution and utilized (408) as feedback signal for adjusting receiver clock frequency.
    • 在从公共时钟信号产生的至少两个载波频率上从发射机发送的数字数据符号的单个多径分量被接收(401)并具有单独的延迟,并由具有至少两个手指的接收机单元进行处理。 从每个手指和每个载体的接收符号确定连续信道估计(402),并且为每个手指和每个载波确定估计的频率误差(404)。 构造线性方程组(405),其中每个确定的频率误差被表示为指示频率漂移的第一变量的函数,以及指示由多普勒效应引起的频率误差的第二变量。 求解方程系统(406)以提供每个手指的第一和第二变量的估计的解,并且从解中确定估计的频率漂移(407),并将其用作用于调整接收机时钟频率的反馈信号(408) 。
    • 57. 发明申请
    • Managing Crossbar Oversubscription
    • 管理交叉栏超额订阅
    • US20140029627A1
    • 2014-01-30
    • US13561921
    • 2012-07-30
    • Lalit KumarDeepak MayyaAmit SinghRajesh L. G.
    • Lalit KumarDeepak MayyaAmit SinghRajesh L. G.
    • H04L29/02
    • H04L47/22H04L47/25H04L49/30
    • A number of ports are configured in a linecard in a network device as dedicated ports and a remaining number of ports as shared ports. A total bandwidth allocated to the dedicated ports is computed. It is determined that available bandwidth at a central crossbar is greater than the total bandwidth allocated to the dedicated ports. The total data sent the central crossbar is rate limited to less than the available bandwidth at the central crossbar. First data associated with the dedicated ports is scheduled to the central crossbar using a first priority. Second data associated with the shared ports is scheduled using a second priority. A shared port data is scheduled based on a ration of a bandwidth requirement for the shared port as a fraction of overall bandwidth requirement for the shared ports.
    • 多个端口在网络设备的线路卡中配置为专用端口,剩余端口数量作为共享端口配置。 计算分配给专用端口的总带宽。 确定中央交叉开关处的可用带宽大于分配给专用端口的总带宽。 发送中央交叉开关的总数据速率被限制为小于中央横梁上的可用带宽。 使用第一优先级将与专用端口相关联的第一数据调度到中央交叉开关。 使用第二优先级调度与共享端口相关联的第二数据。 共享端口数据根据共享端口的带宽要求的比例作为共享端口的总带宽需求的一小部分进行调度。
    • 58. 发明授权
    • Method and apparatus for enhancing the accuracy of the estimated covariance matrix in wideband-CDMA systems
    • 用于提高宽带CDMA系统中估计的协方差矩阵的精度的方法和装置
    • US08582624B2
    • 2013-11-12
    • US12976519
    • 2010-12-22
    • Elias JonssonYoshitaka MurataJaroslaw NiewczasAmit SinghKazuyoshi Uesaka
    • Elias JonssonYoshitaka MurataJaroslaw NiewczasAmit SinghKazuyoshi Uesaka
    • H04B1/10
    • H04B1/712
    • A set of channelization codes to be monitored is divided into two groups. The first group includes those codes for which an associated symbol modulation and transmit-diversity scheme is known. In the second group are those codes that are characterized by an unknown symbol modulation or unknown transmit-diversity scheme. The quality of the transmission of each code is then evaluated, using a metric. The metric in turn is used to determine whether the code should be used in estimating the covariance matrix by correlating the RAKE data corresponding to the code (i.e., by computing a correlation matrix for the code) or by first subtracting the channel estimates from the channel samples before correlation (i.e., by computing a covariance matrix for the code). An impairment covariance matrix is computed from the covariance matrices and correlation matrices so computed.
    • 要监视的一组信道化代码被分为两组。 第一组包括已知相关联的码元调制和发射分集方案的那些码。 在第二组中是以未知符号调制或未知传输分集方案为特征的代码。 然后使用度量来评估每个代码的传输质量。 该度量依次用于确定代码是否应该用于通过将与代码相对应的RAKE数据相关联来估计协方差矩阵(即,通过计算代码的相关矩阵),或者首先从信道中减去信道估计 相关前的样本(即通过计算代码的协方差矩阵)。 根据所计算的协方差矩阵和相关矩阵计算损伤协方差矩阵。