会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • Method for managing requests for obtaining peer identifiers to access stored contents in P2P mode, and associated management device and network equipment
    • 用于管理用于获得对等标识符以以P2P模式访问存储内容的请求的方法,以及相关联的管理设备和网络设备
    • US20090234918A1
    • 2009-09-17
    • US12380822
    • 2009-03-04
    • Christoph NeumannXavier Lebegue
    • Christoph NeumannXavier Lebegue
    • G06F15/16G06F17/30
    • H04L67/104H04L67/1063H04L67/1089H04L67/18H04W4/02H04W4/20
    • A management device (D) that is part of a communication network (R1) to which can be connected items of communication equipment (T1-T4) constituting peers storing content data and operating in P2P mode. This device (D) comprises analysing means (MA) adapted to, in the case of reception of a request for obtaining peer identifiers, said request designating content, from a peer (T1), i) to access a tree structure comprising leaves (associated with peer identifiers storing content associated with content identifiers) and location nodes (associated with location information, representative of location of peers associated with leaves that are attached to them, and with content information, representative at least of content identifiers that store these peers), in order to determine the location of the leaf associated with the content identifier designated in the received request, then the peer identifiers associated with leaves that are attached to this determined location node and said content identifier, and ii) order the transmission to the requesting peer (T1) of the determined peer identifiers.
    • 作为通信网络(R1)的一部分的管理装置(D),可以连接构成存储内容数据并以P2P模式操作的对等体的通信设备(T1-T4)的项目。 该设备(D)包括分析装置(MA),适于在从对等体(T1)接收到获取对等体标识符的请求指定内容的情况下,i)访问包括叶(相关联的)的树结构 存储与内容标识符相关联的内容的对等体标识符)和位置节点(与位置信息相关联,代表与附加到它们的叶相关联的对等体的位置,并且具有至少代表存储这些对等体的内容标识符的内容信息) 为了确定与接收到的请求中指定的内容标识符相关联的叶片的位置,则与附加到该确定的位置节点的叶子和所述内容标识符相关联的对等标识符,以及ii)将发送命令到请求对等体 (T1)所确定的对等标识符。
    • 5. 发明申请
    • Method for assigning multimedia data to distributed storage devices
    • 将多媒体数据分配给分布式存储设备的方法
    • US20080065975A1
    • 2008-03-13
    • US11895753
    • 2007-08-27
    • Laurent MassoulieChristoph NeumannMary-Luc Champel
    • Laurent MassoulieChristoph NeumannMary-Luc Champel
    • G06F17/00
    • H04L67/2847G11B27/002
    • The invention concerns a method for assigning parts of multimedia files to distributed storage devices, the number of said devices being an integer n, characterized in that it comprises the following steps: a step consisting in dividing each multimedia file in windows, which represent data for contiguous playback of a given duration; a step consisting, for each multimedia file, in determining a number k so that any original window of file can be recovered from any k distinct symbols; a step consisting, for each window of each said multimedia files, in assigning n corresponding symbols to said devices, one to each device, the n distinct symbols being created using erasure coding; and a step consisting in partially or totally filling the storage memory left on each device after said first steps with prefix windows of said multimedia files.
    • 本发明涉及一种用于将多媒体文件的部分分配给分布式存储设备的方法,所述设备的数量为整数n,其特征在于包括以下步骤:步骤包括:将窗口中的每个多媒体文件划分为 给定持续时间的连续播放; 对于每个多媒体文件,包括确定数字k的步骤,使得可以从任何k个不同符号恢复任何原始文件窗口; 对于每个所述多媒体文件的每个窗口,包括向所述设备分配n个相应符号,每个设备一个,使用擦除编码创建的n个不同符号; 以及在所述第一步骤之后部分或完全填充每个设备上剩余的存储存储器的步骤,其中包含所述多媒体文件的前缀窗口。
    • 6. 发明申请
    • Secure error-correction code
    • 安全纠错码
    • US20070174754A1
    • 2007-07-26
    • US11641613
    • 2006-12-19
    • Aurelien FrancillonVincent RocaChristoph NeumannPascal Moniot
    • Aurelien FrancillonVincent RocaChristoph NeumannPascal Moniot
    • H03M13/00
    • H04L9/06H04L9/08H04L2209/125
    • A method and a system for coding digital data represented by source symbols (Si) with an error-correction code. The error-correction code generates parity symbols (Pj) based on, for each parity symbol, several source symbols and at least one parity symbol of preceding rank. At least a part of the source symbols is submitted to at least a first ciphering. The obtained ciphered symbols and the rest of the unciphered source symbols are submitted to the error-correction code. Accordingly, the present disclosure improves the security of the transmitted data. The present disclosure is also compatible with the management of different groups of users. The present disclosure is well adapted to large-scale broadcasting systems and provides a solution compatible with any ciphering algorithm. In addition, the present disclosure is particularly well adapted for use with LDPC-type error-correction codes.
    • 一种用于使用纠错码对由源符号(S i i i i i)表示的数字数据进行编码的方法和系统。 基于对于每个奇偶校验符号,几个源符号和至少一个前一等级的奇偶校验符号,纠错码产生奇偶校验符号(P SUB)。 至少一部分源符号被提交至少一个第一加密。 获得的加密符号和其余的未密码的源符号被提交给纠错码。 因此,本公开提高了所发送数据的安全性。 本公开还与不同用户组的管理兼容。 本公开适用于大规模广播系统,并提供与任何加密算法兼容的解决方案。 此外,本公开特别适用于与LDPC型纠错码一起使用。
    • 7. 发明授权
    • Method and device for fingerprinting of wireless communication devices
    • 无线通信设备指纹识别方法及装置
    • US09462449B2
    • 2016-10-04
    • US13988529
    • 2011-11-23
    • Olivier HeenChristoph NeumannStephane Onno
    • Olivier HeenChristoph NeumannStephane Onno
    • H04W24/00H04W80/04H04W84/12H04W8/00H04L29/06H04W12/12
    • H04W8/005H04L63/1425H04W12/12
    • A method for fingerprinting wireless devices and a method for using a device fingerprint for identifying wireless devices. A monitoring station listens to a channel. For each received frame, the station measures the inter-arrival time from the end of the previously received frame to the end of the present frame, If possible, the station obtains the identity of the sender of the frame. If the sender is known, then the station stores the inter-arrival time in a histogram for the sender; the histogram becomes the fingerprint for the sender. Identification of a device begins by obtaining a number of inter-arrival times for an unknown sender and then matching these to stored fingerprints using a suitable similarity measure. The invention is particularly suitable for IEEE 802.11 and may for example be used to detect so-called MAC spoofing and as an additional layer of an identification protocol.
    • 一种无线设备的指纹识别方法以及使用设备指纹识别无线设备的方法。 一个监听站监听一个频道。 对于每个接收的帧,站测量从先前接收的帧的结束到当前帧的结束的到达之间的时间。如果可能,站获得帧的发送者的身份。 如果发送者是已知的,则该站将发往者的到达时间存储在直方图中; 直方图成为发送者的指纹。 设备的识别开始于通过获得未知发送者的到达之间的时间数目,然后使用合适的相似度度量将它们与存储的指纹进行匹配。 本发明特别适合于IEEE 802.11,并且可以例如用于检测所谓的MAC欺骗和作为识别协议的附加层。