会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 22. 发明申请
    • TOKENIZED COMPRESSION OF SESSION INITIATION PROTOCOL DATA
    • 会议启动协议数据的压缩
    • US20080205330A1
    • 2008-08-28
    • US11932669
    • 2007-10-31
    • Andrew D. StadlerChristopher R. Wysocki
    • Andrew D. StadlerChristopher R. Wysocki
    • H04Q7/00
    • H04L69/04H04L65/1006H04L69/22Y10S379/90
    • Systems and methods are provided for compressing and decompressing session initiation protocol (SIP) messages. A serializer and parser compress and decode SIP data structures according to a tokenized binary protocol. The compression/decompression protocol uses tokens that represent message elements of the internal data structures that define SIP messages. Tokens may be assigned to message elements based on various design requirements. Some tokens provide sufficient generality to encode any legal SIP message, while others are highly optimized to match the elements found in most common SIP messages. For those elements requiring specific strings, three dictionaries are defined. Two of the dictionaries are static and are never transmitted; the third dictionary is dynamic and contains strings found only in the specific message. Because the message dictionary is transmitted with each message, and contributes to the size of the transmitted message, the message element tokens are designed to reduce the size of the message dictionary to the greatest degree possible. The compression of SIP messages in this manner is stateless in that it does not require knowledge of the characteristics of previous messages.
    • 提供了用于压缩和解压缩会话发起协议(SIP)消息的系统和方法。 串行器和解析器根据令牌化二进制协议压缩和解码SIP数据结构。 压缩/解压缩协议使用表示定义SIP消息的内部数据结构的消息元素的令牌。 可以基于各种设计要求将令牌分配给消息元素。 一些令牌提供足够的通用性来编码任何合法的SIP消息,而其他标记被高度优化以匹配在大多数常见SIP消息中找到的元素。 对于需要特定字符串的元素,定义了三个字典。 其中两个字典是静态的,从不传播; 第三个字典是动态的,并且包含仅在特定消息中发现的字符串。 由于消息字典与每个消息一起发送并且有助于发送消息的大小,消息元素令牌被设计为尽可能地减小消息字典的大小。 以这种方式,SIP消息的压缩是无状态的,因为它不需要了解先前消息的特征。
    • 23. 发明授权
    • Secure configuration of computing device
    • 计算设备的安全配置
    • US08631241B2
    • 2014-01-14
    • US13531357
    • 2012-06-22
    • Christopher R. WysockiAlan Ward
    • Christopher R. WysockiAlan Ward
    • G06F21/00
    • H04L63/10G06Q20/3678H04L63/123
    • In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication may be verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device may be operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
    • 根据广泛的方面,提供了一种用于安全地配置计算设备的方法。 配置指示被接收到计算设备中,包括接收基于配置指示生成的数字签名。 数字签名的生成考虑了名义上与计算设备相关联的唯一标识符。 所接收的配置指示可以被验证为真实的,包括处理唯一标识符,接收到的配置指示和所接收的数字签名。 计算设备可以根据接收到的配置指示来操作或互操作。 在一个示例中,服务与计算设备互操作。 例如,计算设备可以是便携式媒体播放器,并且服务可以基于配置指示的容量指示向计算设备提供媒体。
    • 25. 发明申请
    • Secure Configuration of a Computing Device
    • 计算设备的安全配置
    • US20110007895A1
    • 2011-01-13
    • US12878201
    • 2010-09-09
    • Christopher R. WysockiAlan Ward
    • Christopher R. WysockiAlan Ward
    • H04L9/30H04L9/32H04M3/00
    • H04L63/10G06Q20/3678H04L63/123
    • In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication may be verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device may be operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. The configuration indication and digital signature may be provided from the computing device to the service, and the service may interoperate with the computing device in accordance with the configuration indication and the digital signature. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
    • 根据广泛的方面,提供了一种用于安全地配置计算设备的方法。 配置指示被接收到计算设备中,包括接收基于配置指示生成的数字签名。 数字签名的生成考虑了名义上与计算设备相关联的唯一标识符。 所接收的配置指示可以被验证为真实的,包括处理唯一标识符,接收到的配置指示和所接收的数字签名。 计算设备可以根据接收到的配置指示来操作或互操作。 在一个示例中,服务与计算设备互操作。 可以从计算设备向服务提供配置指示和数字签名,并且服务可以根据配置指示和数字签名与计算设备进行互操作。 例如,计算设备可以是便携式媒体播放器,并且服务可以基于配置指示的容量指示向计算设备提供媒体。