会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • Ad-Hoc Trust Establishment Using Visual Verification
    • 使用视觉验证的Ad-Hoc信任机构
    • US20100017602A1
    • 2010-01-21
    • US12146774
    • 2008-06-26
    • Laurent BussardUlrich MullerAlain Gefflaut
    • Laurent BussardUlrich MullerAlain Gefflaut
    • H04L9/32H04L9/30H04L9/08
    • H04L9/0844H04L9/3236H04L9/3271
    • Methods for ad-hoc trust establishment using visual verification are described. In a first embodiment, a visual representation of a shared data is generated on two or more devices and the visual representations generated can be visually compared by a user. This method can be used to verify that the correct devices are involved in a negotiation, when pre-existing trust relationships do not exist between the devices. The visual representation may, for example, comprise a picture with a number of different elements, each representing a part of the shared data. In another embodiment, a method of secure key exchange is described in which, before sharing the keys, the parties exchange information which encapsulates the key. This information can be used subsequently to check that a party has not changed the key that they are using and prevents a man in the middle attack.
    • 描述了使用视觉验证的即席信任建立方法。 在第一实施例中,在两个或多个设备上生成共享数据的视觉表示,并且可以由用户视觉地比较生成的视觉表示。 当设备之间不存在预先存在的信任关系时,此方法可用于验证正确的设备是否参与协商。 视觉表示可以例如包括具有多个不同元素的图像,每个图像表示共享数据的一部分。 在另一个实施例中,描述了一种安全密钥交换方法,其中在共享密钥之前,双方交换封装密钥的信息。 随后可以使用此信息来检查一方是否没有改变他们正在使用的密钥,并防止中间人员发生攻击。
    • 13. 发明申请
    • Ad-hoc creation of group based on contextual information
    • 基于上下文信息的组创建
    • US20070168332A1
    • 2007-07-19
    • US11326278
    • 2006-01-05
    • Laurent BussardAlain Gefflaut
    • Laurent BussardAlain Gefflaut
    • G06F17/30
    • H04L12/185H04L12/1818H04L12/189
    • Provided is ad-hoc creation of groups based on contextual information comprising. Two mechanisms are used to restrict valid members of a group. First, to make sure that devices are somehow related, devices provide contextual information that is compared to the contextual information provided by other devices willing to join the group. Only devices providing “similar” contextual information are accepted as possible candidates in the group. Second, to scope the group, a time window is used to limit the duration of the group creation. In other words, access to the group is reserved to the devices that can provide similar context information to existing member of the group in a defined time window. Security properties are ensured by enabling a visual check of the list of group participants. For instance, a member can verify that the displayed pictures indeed represent the attendees of an ongoing meeting.
    • 提供基于上下文信息的特设创建组,包括。 两个机制用于限制组的有效成员。 首先,为了确保设备有某种相关性,设备提供与愿意加入该组的其他设备提供的上下文信息进行比较的上下文信息。 只有提供“相似”上下文信息的设备才被接受为组中可能的候选者。 第二,为了对组进行分组,使用时间窗口来限制组创建的持续时间。 换句话说,对于可以在定义的时间窗口中为组中的现有成员提供类似上下文信息的设备保留对组的访问。 通过对组参与者列表的目视检查来确保安全属性。 例如,成员可以验证所显示的图片确实代表正在进行的会议的与会者。
    • 14. 发明授权
    • Framework for programming embedded system applications
    • 嵌入式系统应用编程框架
    • US08661407B2
    • 2014-02-25
    • US12146819
    • 2008-06-26
    • Frank SiegemundAlain GefflautMatthias Neugebauer
    • Frank SiegemundAlain GefflautMatthias Neugebauer
    • G06F9/44
    • G06F8/20
    • The disclosure describes a method for programming applications for embedded systems such as sensor nodes. In an embodiment, this comprises writing embedded system applications in a high-level language such as C# or Java using a software development framework which includes a set of tools and class libraries. The class libraries contain pre-written code to carry out tasks which may be required of an embedded system. The class libraries may be extended following identification of a need for a particular function in an embedded system. Developed applications may be subsequently stored on the embedded system but executed on a gateway computing device which interacts with the embedded system. This means that the application(s) can be executed without requiring the presence of a virtual execution system located on the embedded system while allowing a high-level programming model for application programmers.
    • 本公开描述了一种用于编程诸如传感器节点之类的嵌入式系统的应用的方法。 在一个实施例中,这包括使用包括一组工具和类库的软件开发框架来编写诸如C#或Java之类的高级语言的嵌入式系统应用程序。 类库包含预先编写的代码,用于执行嵌入式系统可能需要的任务。 在对嵌入式系统中的特定功能的需求的识别之后,可以扩展类库。 开发的应用可以随后存储在嵌入式系统上,但在与嵌入式系统交互的网关计算设备上执行。 这意味着可以执行应用程序,而不需要存在位于嵌入式系统上的虚拟执行系统,同时允许应用程序员的高级编程模型。
    • 15. 发明授权
    • Cognitive channel adaptation in wireless sensor networks
    • 无线传感器网络中的认知信道适配
    • US08514789B2
    • 2013-08-20
    • US12249298
    • 2008-10-10
    • Eldar AkchurinAlain Gefflaut
    • Eldar AkchurinAlain Gefflaut
    • H04W4/00
    • H04W4/20
    • Cognitive radio adaptation is employed in WSNs to reduce effects of RF interference. Communication channel quality is assessed locally at each node. Using beacons to propagate channel quality and node related information among the nodes of the network, channel adaptation decision is made either centrally by identifying a channel that is optimum for a majority of nodes through a tree-structure dissemination (Majority Voting Scheme) or in a distributed manner by identifying a channel where maximum interference for any node is less than maximum interference on the other channels (Veto Voting Scheme). If two channels have the same level of maximal interference, the channel with a lesser number is chosen. Channel quality assessment may be optimized based on expected interference type and/or statistical methods.
    • 在无线传感器网络中采用认知无线电适配来减少射频干扰的影响。 在每个节点本地评估通信信道质量。 使用信标在网络节点中传播信道质量和节点相关信息,通过树形结构传播(多数投票方案)或在一个 通过识别任何节点的最大干扰小于其他信道上的最大干扰的通道(Veto Voting Scheme),分布式方式。 如果两个通道具有相同的最大干扰水平,则选择具有较小数量的通道。 可以基于预期的干扰类型和/或统计方法优化信道质量评估。
    • 16. 发明申请
    • STREAM PROCESSING ON HETEROGENEOUS HARDWARE DEVICES
    • 异步硬件设备的流程处理
    • US20120278811A1
    • 2012-11-01
    • US13093846
    • 2011-04-26
    • Alexandre de BaynastArsalan AhmadAndreas SteinmetzlerThomas SantenSatnam SinghAlain GefflautWilliam Dunlap
    • Alexandre de BaynastArsalan AhmadAndreas SteinmetzlerThomas SantenSatnam SinghAlain GefflautWilliam Dunlap
    • G06F9/46
    • G06F9/5027G06F2209/501Y02D10/22
    • A stream processing execution engine evaluates development-time performance characteristic estimates in combination with run-time parameters to schedule execution of stream processing software components in a stack of a stream processing application that satisfy a defined performance criterion in a heterogeneous hardware device. A stream processing application includes a stack of interdependent stream processing software components. A stream processing execution engine evaluates one or more performance characteristics of multiple computational resources in the heterogeneous hardware device. Each performance characteristic is associated with performance of a computational resource in executing a computational-resource-dependent instance of a stream processing software component. The stream processing execution engine schedules within the run-time environment a computational resource on which to execute a computational-resource-dependent instance of one of the stream processing software components. The computational-resource-dependent instance is targeted for execution on the computational resource that satisfies a performance policy attributed to the stream processing software component.
    • 流处理执行引擎结合运行时参数评估开发时性能特性估计,以调度在异构硬件设备中满足定义的性能标准的流处理应用的堆栈中的流处理软件组件的执行。 流处理应用包括一组相互依赖的流处理软件组件。 流处理执行引擎评估异构硬件设备中的多个计算资源的一个或多个性能特征。 每个性能特征与执行流处理软件组件的依赖于计算资源的实例相关联的计算资源的性能。 流处理执行引擎在运行时环境内调度计算资源,在其上执行流处理软件组件之一的基于计算资源的依赖实例。 计算资源依赖实例被定位为在满足流处理软件组件的性能策略的计算资源上执行。
    • 17. 发明授权
    • Framework for optimizing and simplifying network communication in close proximity networks
    • 用于优化和简化近距离网络中网络通信的框架
    • US07961726B2
    • 2011-06-14
    • US12246683
    • 2008-10-07
    • Zhou WangAlain GefflautAlexandre de BaynastArsalan AhmadAndreas Steinmetzler
    • Zhou WangAlain GefflautAlexandre de BaynastArsalan AhmadAndreas Steinmetzler
    • H04L12/28
    • H04L69/08H04L69/24
    • A framework capable of providing transparent handling of network traffic in close proximity networks such as home networks is provided. A single virtual network interface is exposed to users/applications on connected devices. A virtual network interface manager determines available physical network interfaces and switches to a different physical network interface or a different configuration on the same physical network interface in a transparent manner to the communicating application(s). This enables the framework to optimize network communications for the communicating applications, devices, and users based on predefined criteria, application requirements such as different data throughput, or changing environment conditions such as interference. Network communication operations are also simplified for users since they are no longer required to have the necessary knowledge for configuring physical network interfaces manually in response to changing conditions.
    • 提供了能够提供诸如家庭网络之类的近距离网络中的网络流量的透明处理的框架。 单个虚拟网络接口暴露给连接设备上的用户/应用程序。 虚拟网络接口管理器以透明的方式确定可用的物理网络接口,并以相同的物理网络接口切换到不同的物理网络接口或不同的配置。 这使得框架能够基于预定义的标准,诸如不同数据吞吐量的应用需求或改变环境条件(例如干扰)来优化用于通信应用,设备和用户的网络通信。 网络通信操作也为用户简化,因为不再需要具备为响应不断变化的条件手动配置物理网络接口的必要知识。
    • 18. 发明申请
    • FRAMEWORK FOR OPTIMIZING AND SIMPLIFYING NETWORK COMMUNICATION IN CLOSE PROXIMITY NETWORKS
    • 优化网络通信在简单网络中简化的框架
    • US20100085975A1
    • 2010-04-08
    • US12246683
    • 2008-10-07
    • Zhou WangAlain GefflautAlexandre de BaynastArsalan AhmadAndreas Steinmetzler
    • Zhou WangAlain GefflautAlexandre de BaynastArsalan AhmadAndreas Steinmetzler
    • H04L12/28
    • H04L69/08H04L69/24
    • A framework capable of providing transparent handling of network traffic in close proximity networks such as home networks is provided. A single virtual network interface is exposed to users/applications on connected devices. A virtual network interface manager determines available physical network interfaces and switches to a different physical network interface or a different configuration on the same physical network interface in a transparent manner to the communicating application(s). This enables the framework to optimize network communications for the communicating applications, devices, and users based on predefined criteria, application requirements such as different data throughput, or changing environment conditions such as interference. Network communication operations are also simplified for users since they are no longer required to have the necessary knowledge for configuring physical network interfaces manually in response to changing conditions.
    • 提供了能够提供诸如家庭网络之类的近距离网络中的网络流量的透明处理的框架。 单个虚拟网络接口暴露给连接设备上的用户/应用程序。 虚拟网络接口管理器以透明的方式确定可用的物理网络接口,并以相同的物理网络接口切换到不同的物理网络接口或不同的配置。 这使得框架能够基于预定义的标准,诸如不同数据吞吐量的应用需求或改变环境条件(例如干扰)来优化用于通信应用,设备和用户的网络通信。 网络通信操作也为用户简化,因为不再需要具备为响应不断变化的条件手动配置物理网络接口的必要知识。
    • 19. 发明申请
    • PRIVATE VIRTUAL LAN SPANNING A PUBLIC NETWORK FOR CONNECTION OF ARBITRARY HOSTS
    • 私人虚拟局域网传播公共网络连接仲裁主机
    • US20080183853A1
    • 2008-07-31
    • US11769941
    • 2007-06-28
    • Todd ManionArsalan AhmadAlain GefflautSandeep Singhal
    • Todd ManionArsalan AhmadAlain GefflautSandeep Singhal
    • G06F15/173
    • H04L67/104H04L12/4641H04L29/12066H04L29/12216H04L61/1511H04L61/2007H04L63/0272H04L63/104H04L67/1046H04L67/1093
    • Architecture for exposing a virtual private network of peer devices into the public domain via an overlay network. Computing devices, peripheral devices, as well as mobile devices can be physically distributed, but appear to belong to the same virtual private (or home) network, and be accessible from anywhere. Benefits include access to user media/documents from anywhere, searching of all connected devices from one location, multicast and broadcast connectivity, management of the private network and the associated policies, and device discovery on the private network from across public networks. P2P networks and ad-hoc networks can be exposed as a virtual interface, as well as the utilization of client operating systems to create the virtual network, grouping, graphing, the integration with relay services and other NAT/firewall traversal schemes, and the creation of a P2P overlay manager on a physical NIC (network interface card) address rather than a virtual address.
    • 通过覆盖网络将对等设备的虚拟专用网络暴露于公有领域的体系结构。 计算设备,外围设备以及移动设备可以在物理上分布,但似乎属于同一虚拟专用(或家庭)网络,并且可以从任何地方访问。 优点包括从任何地方访问用户媒体/文档,从一个位置搜索所有连接的设备,组播和广播连接,专用网络的管理和相关策略以及从公共网络到专用网络上的设备发现。 P2P网络和自组织网络可以作为虚拟接口公开,以及利用客户端操作系统创建虚拟网络,分组,绘图,与中继服务和其他NAT /防火墙穿越方案的集成以及创建 的物理NIC(网络接口卡)地址而不是虚拟地址上的P2P覆盖管理器。
    • 20. 发明授权
    • Background task resource control
    • 后台任务资源控制
    • US09164803B2
    • 2015-10-20
    • US13355115
    • 2012-01-20
    • Arun KishanHari PulapakaAlain GefflautAlex BendetovPedro Miguel Sequeira de Justo Teixeira
    • Arun KishanHari PulapakaAlain GefflautAlex BendetovPedro Miguel Sequeira de Justo Teixeira
    • G06F15/16G06F15/173G06F9/50
    • G06F9/5011G06F15/173G06F2209/5011G06F2209/504Y02D10/22
    • Among other things, one or more techniques and/or systems are provided for controlling resource access for background tasks. For example, a background task created by an application may utilize a resource (e.g., CPU cycles, bandwidth usage, etc.) by consuming resource allotment units from an application resource pool. Once the application resource pool is exhausted, the background task is generally restricted from utilizing the resource. However, the background task may also utilize global resource allotment units from a global resource pool shared by a plurality of applications to access the resource. Once the global resource pool is exhausted, unless the background task is a guaranteed background task which can consume resources regardless of resource allotment states of resource pools, the background task may be restricted from utilizing the resource until global resource allotment units within the global resource pool and/or resource allotment units within the application resource pool are replenished.
    • 除其他之外,提供一个或多个技术和/或系统用于控制后台任务的资源访问。 例如,由应用程序创建的后台任务可以通过从应用资源池消耗资源分配单元来利用资源(例如,CPU周期,带宽使用等)。 一旦应用资源池耗尽,后台任务一般不受资源的利用。 然而,后台任务还可以利用来自多个应用程序共享的全局资源池的全局资源分配单元来访问资源。 一旦全局资源池耗尽,除非后台任务是可以消耗资源的有保证的后台任务,而不管资源池的资源分配状态如何,则可能会限制后台任务的使用,直到全局资源池中的全局资源分配单元 和/或应用程序资源池中的资源分配单元被补充。