会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Systems and methods for scaling performance of Ethernet ring protection protocol
    • 以太网环保护协议扩展性能的系统和方法
    • US08509061B2
    • 2013-08-13
    • US13070098
    • 2011-03-23
    • Marc HolnessJie Hu
    • Marc HolnessJie Hu
    • H04L12/56H04L12/24
    • H04L12/437
    • The present disclosure provides systems and methods for scaling performance of Ethernet Ring Protection Protocol. Specifically, the systems and methods may apply to G.8032 and may provide protection switching control plane performance scaling benefits. In an exemplary embodiment, the present invention summarizes the per “virtual” ring control plane protocol into a single logical ring control plane protocol. Advantageously, the present invention transforms the G.8032 protocol from a per-virtual ring protocol to a per-logical ring control protocol. The mechanism/methodology that is used is to include minimal per-virtual ring instance information in to the Ring Automated Protection Switching (R-APS) (control) frames. Additionally, the present invention cleanly decouples the placement of the R-APS (control) channel block location on the ring from that of the virtual channel data blocks. Current G.8032 specifications tightly couple the location of each R-APS (control) channel block and the virtual channel block that it is managing.
    • 本公开提供了用于缩放以太网环保护协议的性能的系统和方法。 具体来说,系统和方法可能适用于G.8032,并可提供保护切换控制平面性能扩展的好处。 在示例性实施例中,本发明将每个“虚拟”环控制平面协议总结为单个逻辑环控制平面协议。 有利地,本发明将G.8032协议从每虚拟环协议转换为每逻辑环控制协议。 使用的机制/方法是将最小的每个虚拟环形实例信息包括在环自动保护倒换(R-APS)(控制)帧中。 此外,本发明将环上的R-APS(控制)信道块位置的布置与虚拟信道数据块的位置干净地去耦。 目前的G.8032规范紧密耦合每个R-APS(控制)信道块的位置和它所管理的虚拟通道块。
    • 9. 发明授权
    • Transforming a flow graph model to a structured flow language model
    • 将流图模型转换为结构化流程语言模型
    • US08127269B2
    • 2012-02-28
    • US11161463
    • 2005-08-04
    • Jie HuRaymond L. KongCurtis Miles
    • Jie HuRaymond L. KongCurtis Miles
    • G06F9/44G06F9/45
    • G06F8/10
    • The invention provides a solution for transforming a flow graph model to a structured flow language model. In particular, the nodes in the flow graph model are traversed, and each node is mapped to an activity in the structured flow language model. When a node comprises a branch point, the corresponding branch region is identified and mapped. This process is repeated until all nodes in the flow graph model have been mapped to corresponding activities in the structured flow language model. In this manner, the desired nesting and containment relationships can be identified and generated in the structured flow language model.
    • 本发明提供了一种用于将流程图模型转换为结构化流程语言模型的解决方案。 特别地,遍历流图模型中的节点,并且将每个节点映射到结构化流程语言模型中的活动。 当节点包括分支点时,识别并映射相应的分支区域。 重复此过程,直到流图模型中的所有节点都已映射到结构化流程语言模型中的相应活动。 以这种方式,可以在结构化流程语言模型中识别和生成期望的嵌套和容纳关系。
    • 10. 发明申请
    • Method for Validating User Equipment, a Device Identity Register and an Access Control System
    • 用于验证用户设备的方法,设备身份寄存器和访问控制系统
    • US20110067116A1
    • 2011-03-17
    • US12991579
    • 2008-09-24
    • Jie LuZhaoji LinJie Hu
    • Jie LuZhaoji LinJie Hu
    • G06F21/00
    • H04W12/06H04W8/22H04W12/08
    • The present invention discloses a method for validating user equipment, a device identity register and an access control system. Wherein the method for validating user equipment comprises: setting a central device identity register shared by different networks, wherein illegal user equipment identities are stored in the central device identity register; the central device identity register receiving an ID validation request from a mobility management entity, wherein the ID validation request carries ID parameters of a user equipment; the central device identity register validating the validity of the user equipment according to the ID parameters, and returning a validation result to the mobility management entity. In virtue of the present invention, the accessing of the illegal non-3GPP network user equipment which is capable of accessing 3GPP network to the 3GPP network is able to be controlled.
    • 本发明公开了一种用于验证用户设备,设备身份寄存器和访问控制系统的方法。 其中用于验证用户设备的方法包括:设置由不同网络共享的中央设备身份寄存器,其中非法用户设备标识存储在中央设备身份寄存器中; 所述中央设备身份寄存器从移动性管理实体接收ID验证请求,其中所述ID验证请求携带用户设备的ID参数; 中央设备身份寄存器根据ID参数验证用户设备的有效性,并将确认结果返回给移动性管理实体。 凭借本发明,能够控制能够访问3GPP网络到3GPP网络的非法非3GPP网络用户设备的访问。