会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • ANALYTICS-DRIVEN POLICY CONTROL IN COMPUTER NETWORKS
    • 计算机网络中的分析驱动策略控制
    • US20160013991A1
    • 2016-01-14
    • US14795000
    • 2015-07-09
    • Benjamin Parker
    • Benjamin Parker
    • H04L12/24H04M15/00G06Q30/02
    • H04M15/886G06Q30/0204H04L12/1485H04L41/0893H04L41/5029H04M15/58
    • Methods and systems for allocating computer-network resources among a group of network users calculate, for each network user, a worth of that network user based at least on a usage fee paid by that network user and a cost of that network user based at least on a network bandwidth consumed by that network user. For each network user, a worth-to-cost ratio based on the worth and cost of that network user may be computed. A group of high-value network users and a group of low-value network users may be identified such that each high-value network user has a higher worth-to-cost ratio than that of each low-value network user. Preferential access to a network resource is provided to the group of high-value network users relative to an access provided to the group of low-value network users.
    • 用于在一组网络用户中分配计算机网络资源的方法和系统至少基于该网络用户支付的使用费用以及该网络用户的成本至少为每个网络用户计算该网络用户的价值 在该网络用户所占用的网络带宽上。 对于每个网络用户,可以计算基于该网络用户的价值和成本的价值成本比。 可以识别一组高价值网络用户和一组低价值网络用户,使得每个高价值网络用户比每个低价值网络用户具有更高的价值成本比。 相对于提供给低价值网络用户组的访问,向高价值网络用户组提供优先访问网络资源。
    • 4. 发明授权
    • Method and system for managing security of mobile terminal
    • 管理移动终端安全的方法和系统
    • US08671438B2
    • 2014-03-11
    • US12078741
    • 2008-04-04
    • Benjamin ParkerSteven R. Rados
    • Benjamin ParkerSteven R. Rados
    • G06F21/00G06F17/00G08B23/00
    • G06F21/554H04L63/102H04L63/1416H04L63/1466H04W12/08H04W12/12
    • A method for enabling security on a mobile terminal having a communication link with a circuit switched network against suspicious activities is provided. Activities performed at the mobile terminal are performed according to a security policy provided from the circuit switched network. Detection of a suspicious activity is alerted to the circuit switched network when the suspicious activity is detected. A policy manager server of the circuit switched network changes the security policy to cure the suspicious activity on the mobile terminal. Call traffic delivered to/sent from the mobile terminal is filtered out, which causes the suspicious activity according to the security policy. The mobile terminal enforces a security measure on a suspicious activity according to the security policy.
    • 提供了一种用于在具有与电路交换网络的通信链路的移动终端上实现可靠活动的安全性的方法。 根据从电路交换网络提供的安全策略,在移动终端执行的活动。 当检测到可疑活动时,可疑活动的检测被警告到电路交换网络。 电路交换网络的策略管理器服务器改变安全策略以治愈移动终端上的可疑活动。 从移动终端传送到/发送的呼叫流量被过滤掉,这导致根据安全策略的可疑活动。 移动终端根据安全策略对可疑活动执行安全措施。
    • 7. 发明授权
    • Optimized SIP routing architecture using an integrated network and systems approach
    • 使用集成网络和系统方法优化SIP路由架构
    • US07821923B2
    • 2010-10-26
    • US12026989
    • 2008-02-06
    • Deepak Kumar KakadiaBenjamin Parker
    • Deepak Kumar KakadiaBenjamin Parker
    • G01R31/08
    • H04L12/14H04L12/145H04L41/5009H04L41/5087H04L43/0805H04L43/0852H04L45/22H04L45/28H04L45/304H04L45/70H04L65/1006H04L69/40H04W40/34
    • Session initiation protocol (SIP) control traffic routing decisions, such as rapid failure detection and recovery mechanisms, are based on detection of events and/or conditions that may result in suboptimal performance. The disclosed approach ensures that the SIP traffic is routed or rerouted on an optimal basis. Sample inputs to the SIP routing decisions, include integration with BFD, system metrics and other criteria to determine network and systems conditions, for dynamic decisions on where to optimally route SIP traffic. Examples leverage the B2BUA model, which maintains call state and participates in call processing, however, the examples introduce an improved routing model that is able to not only reroute SIP traffic based on failures but also upon the detection of other suboptimal conditions, e.g. excessive cost. The exemplary techniques provide significant savings by ensuring SIP peering decisions are automatically performed considering costs of peering arrangements, congestion and/or other criteria.
    • 会话发起协议(SIP)控制流量路由决策,例如快速故障检测和恢复机制,是基于可能导致次优性能的事件和/或条件的检测。 所公开的方法确保SIP流量在最优的基础上路由或重新路由。 SIP路由决策的示例输入包括与BFD的集成,系统度量和其他标准,以确定网络和系统状况,以便在哪里最佳路由SIP流量的动态决策。 示例利用了B2BUA模型,它保持呼叫状态并参与呼叫处理,然而,这些示例引入了一种改进的路由模型,该路由模型不仅可以基于故障重新路由SIP流量,而且还可以检测到其他次优条件,例如, 成本过高 考虑到对等装置的成本,拥塞和/或其他标准,确保SIP对等决定是自动执行的,示例性技术提供了显着的节省。
    • 8. 发明申请
    • OPTIMIZED SIP ROUTING ARCHITECTURE USING AN INTEGRATED NETWORK AND SYSTEMS APPROACH
    • 使用集成网络和系统方法的优化SIP路由架构
    • US20090196183A1
    • 2009-08-06
    • US12026989
    • 2008-02-06
    • Deepak Kumar KAKADIABenjamin Parker
    • Deepak Kumar KAKADIABenjamin Parker
    • H04L12/26H04L12/58H04Q7/00
    • H04L12/14H04L12/145H04L41/5009H04L41/5087H04L43/0805H04L43/0852H04L45/22H04L45/28H04L45/304H04L45/70H04L65/1006H04L69/40H04W40/34
    • Session initiation protocol (SIP) control traffic routing decisions, such as rapid failure detection and recovery mechanisms, are based on detection of events and/or conditions that may result in suboptimal performance. The disclosed approach ensures that the SIP traffic is routed or rerouted on an optimal basis. Sample inputs to the SIP routing decisions, include integration with BFD, system metrics and other criteria to determine network and systems conditions, for dynamic decisions on where to optimally route SIP traffic. Examples leverage the B2BUA model, which maintains call state and participates in call processing, however, the examples introduce an improved routing model that is able to not only reroute SIP traffic based on failures but also upon the detection of other suboptimal conditions, e.g. excessive cost. The exemplary techniques provide significant savings by ensuring SIP peering decisions are automatically performed considering costs of peering arrangements, congestion and/or other criteria.
    • 会话发起协议(SIP)控制流量路由决策,如快速故障检测和恢复机制,是基于可能导致次优性能的事件和/或条件的检测。 所公开的方法确保SIP流量在最优的基础上路由或重新路由。 SIP路由决策的示例输入包括与BFD的集成,系统度量和其他标准,以确定网络和系统状况,以便在哪里最佳路由SIP流量的动态决策。 示例利用了B2BUA模型,它保持呼叫状态并参与呼叫处理,然而,这些示例引入了一种改进的路由模型,该路由模型不仅可以基于故障重新路由SIP流量,而且还可以检测到其他次优条件,例如。 成本过高 考虑到对等装置的成本,拥塞和/或其他标准,确保SIP对等决定是自动执行的,示例性技术提供了显着的节省。
    • 9. 发明申请
    • Method and system for managing security of mobile terminal
    • 管理移动终端安全的方法和系统
    • US20090254969A1
    • 2009-10-08
    • US12078741
    • 2008-04-04
    • Benjamin ParkerSteven R. Rados
    • Benjamin ParkerSteven R. Rados
    • G06F21/00G06F17/00G08B23/00
    • G06F21/554H04L63/102H04L63/1416H04L63/1466H04W12/08H04W12/12
    • A method for enabling security on a mobile terminal having a communication link with a circuit switched network against suspicious activities is provided. Activities performed at the mobile terminal are performed according to a security policy provided from the circuit switched network. Detection of a suspicious activity is alerted to the circuit switched network when the suspicious activity is detected. A policy manager server of the circuit switched network changes the security policy to cure the suspicious activity on the mobile terminal. Call traffic delivered to/sent from the mobile terminal is filtered out, which causes the suspicious activity according to the security policy. The mobile terminal enforces a security measure on a suspicious activity according to the security policy.
    • 提供了一种用于在具有与电路交换网络的通信链路的移动终端上实现可靠活动的安全性的方法。 根据从电路交换网络提供的安全策略,在移动终端执行的活动。 当检测到可疑活动时,可疑活动的检测被警告到电路交换网络。 电路交换网络的策略管理器服务器改变安全策略以治愈移动终端上的可疑活动。 从移动终端传送到/发送的呼叫流量被过滤掉,这导致根据安全策略的可疑活动。 移动终端根据安全策略对可疑活动执行安全措施。
    • 10. 发明申请
    • Methods and apparatus for clock synchronization and data recovery in a receiver
    • 接收机中时钟同步和数据恢复的方法和装置
    • US20070025483A1
    • 2007-02-01
    • US11193868
    • 2005-07-29
    • Azita Emami-NeyestanakMounir MeghelliBenjamin ParkerSergey RylovAlexander RylyakovJose Tierno
    • Azita Emami-NeyestanakMounir MeghelliBenjamin ParkerSergey RylovAlexander RylyakovJose Tierno
    • H04L7/00
    • H04L7/0337
    • Clock synchronization and data recovery techniques are disclosed. For example, a technique for synchronizing a clock for use in recovering received data comprises the following steps/operations. A first clock (e.g., a data clock) is set for a first sampling cycle to a first phase position within a given unit interval in the received data. A second clock (e.g., a sweep clock) is swept through other phase positions with respect to the first phase position such that a transition from the given unit interval to another unit interval in the received data is determined. A sampling point is determined based on measurements at the phase positions associated with the second clock. The second clock is set to the phase position corresponding to the sampling point such that data may be recovered at that sampling point. Further, for a next sampling cycle, the first clock may be used to sweep through phase positions with respect to the set phase position of the second clock corresponding to the sampling point in the first sampling cycle such that a next sampling point may be determined.
    • 公开了时钟同步和数据恢复技术。 例如,用于同步用于恢复接收到的数据的时钟的技术包括以下步骤/操作。 将第一时钟(例如,数据时钟)设置为在接收到的数据中的给定单位间隔内的第一相位位置的第一采样周期。 第二时钟(例如,扫频时钟)相对于第一相位位置被扫过其它相位位置,从而确定在接收数据中从给定单位间隔到另一个单位间隔的转变。 基于与第二时钟相关联的相位位置处的测量来确定采样点。 将第二时钟设置为对应于采样点的相位位置,使得可以在该采样点恢复数据。 此外,对于下一采样周期,可以使用第一时钟相对于与第一采样周期中的采样点对应的第二时钟的设置相位位置扫描相位位置,使得可以确定下一采样​​点。