会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • System and method for extensible computer assisted collaboration
    • 可扩展计算机辅助协作的系统和方法
    • US20060242236A1
    • 2006-10-26
    • US11113218
    • 2005-04-22
    • Todd ManionDaniel CrevierDavid ThalerGursharan SidhuRohit GuptaSandeep Singhal
    • Todd ManionDaniel CrevierDavid ThalerGursharan SidhuRohit GuptaSandeep Singhal
    • G06F15/16
    • G06Q10/00
    • A collaborative services platform may include a connectivity service, an activity service and a contact management service. The connectivity service may provide communicative connectivity between users of the collaborative services platform. The activity service may provide one or more collaborative activities supporting various modes of communication. The contact management service may maintain contact information for each of the users of the collaborative service platform. It may be that not every user is capable of participating in every collaborative activity. The contact information maintained by the contact management service may indicate the collaborative activities in which each user is capable of participating. A set of programmatic objects utilized to implement the collaborative services platform may include contact objects, conference objects, MeContact objects, endpoint objects, published objects and presence objects. The presence object may represent a presence of a particular user in a networked computing environment and may reference multiple collaborative endpoints.
    • 协作服务平台可以包括连接服务,活动服务和联系人管理服务。 连接服务可以提供协作服务平台的用户之间的交互连接。 活动服务可以提供支持各种通信模式的一个或多个协作活动。 联系人管理服务可以维护协作服务平台的每个用户的联系人信息。 可能不是每个用户都能够参与每个协作活动。 由联系人管理服务维护的联系信息可以指示每个用户能够参与的协作活动。 用于实现协作服务平台的一组程式化对象可以包括联系对象,会议对象,MeContact对象,端点对象,已发布对象和存在对象。 存在对象可以表示在联网计算环境中特定用户的存在,并且可以引用多个协作端点。
    • 4. 发明申请
    • PRIVATE VIRTUAL LAN SPANNING A PUBLIC NETWORK FOR CONNECTION OF ARBITRARY HOSTS
    • 私人虚拟局域网传播公共网络连接仲裁主机
    • US20080183853A1
    • 2008-07-31
    • US11769941
    • 2007-06-28
    • Todd ManionArsalan AhmadAlain GefflautSandeep Singhal
    • Todd ManionArsalan AhmadAlain GefflautSandeep Singhal
    • G06F15/173
    • H04L67/104H04L12/4641H04L29/12066H04L29/12216H04L61/1511H04L61/2007H04L63/0272H04L63/104H04L67/1046H04L67/1093
    • Architecture for exposing a virtual private network of peer devices into the public domain via an overlay network. Computing devices, peripheral devices, as well as mobile devices can be physically distributed, but appear to belong to the same virtual private (or home) network, and be accessible from anywhere. Benefits include access to user media/documents from anywhere, searching of all connected devices from one location, multicast and broadcast connectivity, management of the private network and the associated policies, and device discovery on the private network from across public networks. P2P networks and ad-hoc networks can be exposed as a virtual interface, as well as the utilization of client operating systems to create the virtual network, grouping, graphing, the integration with relay services and other NAT/firewall traversal schemes, and the creation of a P2P overlay manager on a physical NIC (network interface card) address rather than a virtual address.
    • 通过覆盖网络将对等设备的虚拟专用网络暴露于公有领域的体系结构。 计算设备,外围设备以及移动设备可以在物理上分布,但似乎属于同一虚拟专用(或家庭)网络,并且可以从任何地方访问。 优点包括从任何地方访问用户媒体/文档,从一个位置搜索所有连接的设备,组播和广播连接,专用网络的管理和相关策略以及从公共网络到专用网络上的设备发现。 P2P网络和自组织网络可以作为虚拟接口公开,以及利用客户端操作系统创建虚拟网络,分组,绘图,与中继服务和其他NAT /防火墙穿越方案的集成以及创建 的物理NIC(网络接口卡)地址而不是虚拟地址上的P2P覆盖管理器。
    • 8. 发明申请
    • LOCALITY-BASED ROUTING TABLE GENERATION
    • 基于局部性的路由表生成
    • US20090279437A1
    • 2009-11-12
    • US12119346
    • 2008-05-12
    • Kevin RansomSandeep Singhal
    • Kevin RansomSandeep Singhal
    • H04L12/24
    • H04L43/0864H04L41/12H04L43/16H04L67/1002H04L67/101H04L67/1012H04L67/1021
    • Systems and methods storage of adding a node entry to a routing table of an inquiring node of a data network are disclosed herein. An inquire message is transmitted to a publishing node. The publishing node can be configured to publish a routing entry which can be added by nodes of a network. An acknowledgment response can be received from the publishing node. The roundtrip time elapsed between transmitting the inquire message and receiving the response can be measured by the inquiring node. For all node registration entries in the routing table of the inquiring node a determination of whether the inquiring node is closest in locality to the publishing node than to a node corresponding to each node registration entry can be performed. Such determination can be made based on (a) the roundtrip time between nodes (b) node IP address prefix matching.
    • 本文公开了将节点条目添加到数据网络的询问节点的路由表的系统和方法存储。 查询消息被发送到发布节点。 可以将发布节点配置为发布可由网络节点添加的路由条目。 可以从发布节点接收确认响应。 发送查询消息和接收响应之间的往返时间可以由查询节点进行测量。 对于查询节点的路由表中的所有节点注册表,可以确定查询节点在本地是否最接近发布节点,而不是对应于每个节点注册表项的节点。 可以基于(a)节点之间的往返时间(b)节点IP地址前缀匹配来进行这种确定。
    • 9. 发明申请
    • Integration of social network information and network firewalls
    • 整合社交网络信息和网络防火墙
    • US20070250922A1
    • 2007-10-25
    • US11408837
    • 2006-04-21
    • Noah HortonSandeep Singhal
    • Noah HortonSandeep Singhal
    • G06F15/16G06F17/00G06F9/00
    • H04L63/0254H04L63/029
    • A firewall functions normally to pass data on open ports to a respective service or endpoint associated with an open port. Invitations may sent to from an internal endpoint to an external peer-to-peer network endpoint inviting a connection back to the internal endpoint. Rather than leave ports open in a firewall for such connections, an invitation manager analyzes the invitation and in real time programs an exception in the firewall based on the invitation. The exceptions may be programmed for a limited duration, based on the nature of the internal endpoint. When an authenticated connection is required, a public key or handle to a public key for the external endpoint may be passed to the firewall for use in establishing the connection.
    • 防火墙通常可以将打开端口上的数据传递到与开放端口相关联的相应服务或端点。 邀请可以从内部端点发送到外部对等网络端点,邀请连接回内部端点。 邀请管理员不是在防火墙中为这种连接打开端口,而是根据邀请分析邀请并实时地在防火墙中编程异常。 基于内部端点的性质,可以将有限的持续时间编程为例外。 当需要经过身份验证的连接时,可以将外部端点的公钥或公钥的句柄传递到防火墙,以用于建立连接。