会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Implementation method and system of virtual private network
    • 虚拟专网实施方法与系统
    • US08661525B2
    • 2014-02-25
    • US13496284
    • 2010-09-10
    • Xiangbiao YanYizhou Sun
    • Xiangbiao YanYizhou Sun
    • H04L29/06
    • H04L29/12028H04L12/4633H04L12/4641H04L29/12981H04L61/103H04L61/609
    • An implementation method and system of a virtual private network (VPN) are provided in the invention, wherein, the VPN dedicated mapping table of the VPN is stored in the mapping plane in the identity and location separation network, and it is determined whether to achieve the communication between the VPN end host users in the VPN or not according to the VPN dedicated mapping table, thereby the VPN is efficiently achieved in the identity and location separation network, meeting the user requirements for the VPN, eliminating the influence of the identity and location separation technical solution on the traditional VPN service, and reducing the changes on the existing devices and software tools due to the implementation of VPN.
    • 本发明提供了一种虚拟专用网(VPN)的实现方法和系统,其中VPN的VPN专用映射表存储在身份和位置分离网络的映射平面中,并确定是否实现 根据VPN专用映射表,VPN端主机用户之间的通信不符合VPN专用映射表,从而在身份和位置分离网络中有效实现VPN,满足VPN的用户需求,消除身份的影响, 传统VPN业务的位置分离技术解决方案,减少由于VPN实现而导致的现有设备和软件工具的变化。
    • 3. 发明申请
    • Method for Realizing End-to-End Call, End-to-End Call Terminal and System
    • 实现端到端呼叫,端对端呼叫终端和系统的方法
    • US20120180117A1
    • 2012-07-12
    • US13395920
    • 2010-09-15
    • Yizhou Sun
    • Yizhou Sun
    • G06F15/16G06F21/00H04L9/32
    • H04L63/00H04L61/106H04L63/083H04L65/1069
    • A method for implementing an end-to-end call, an end-to-end call terminal and a system are provided in the present invention, wherein, the end-to-end call service server is not involved, and the end-to-end communication is employed between users, therefore the reliability risk of single-point failure in the registration server in the existing system is avoided. An end-to-end service is initiated without servers so that trade secrets will not be leaked by the operator, and thus the present invention effectively avoids number stealing in end-to-end calls, and has high reliability and security. In addition, after a terminal logs in the new network and initiates the end-to-end call function, the terminal can directly use the end-to-end call service with no need of entering a username and a password to log in the end-to-end call system, and thus it is more convenient to use.
    • 在本发明中提供了一种用于实现端对端呼叫,端对端呼叫终端和系统的方法,其中,不涉及端到端呼叫服务服务器,并且终端到终端呼叫终端 在用户之间采用通信,避免了现有系统中注册服务器中单点故障的可靠性风险。 终端到终端服务启动时没有服务器,使得商业秘密不会被操作者泄露,因此本发明有效地避免了端到端呼叫中的窃取数量,并且具有高可靠性和安全性。 另外,在终端登录新网络并启动端对端呼叫功能后,终端可以直接使用端到端呼叫服务,无需输入用户名和密码登录到终端 端到端呼叫系统,因此使用起来更方便。
    • 4. 发明申请
    • VIRTUAL PRIVATE NETWORK IMPLEMENTATION METHOD AND SYSTEM
    • 虚拟私有网络实现方法与系统
    • US20120173694A1
    • 2012-07-05
    • US13395966
    • 2010-09-09
    • Xiangbiao YanYizhou Sun
    • Xiangbiao YanYizhou Sun
    • G06F15/173
    • H04L12/4641H04L61/103H04L61/609H04L63/0272
    • The present invention discloses a virtual private network (VPN) implementation method and system. The implementation of the VPN is based on the Location/ID separation network, and the corresponding VPN attribute is added to the mapping relation between the ID identifier and the location identifier. When performing the mapping processing, if the VPN attribute of the source host is judged to be the same as that of the destination host, the location identifier of the destination host is inquired, thereby the forwarding of the data packets is implemented according to the location identifier of the destination host; if the VPN attributes are not same, an unavailable message is replied. Thus, the virtual private network is implemented efficiently, the convenience and safety of the host communication of the VPN side are ensured, and the user requirement to the virtual private network is satisfied.
    • 本发明公开了一种虚拟专用网(VPN)实现方法和系统。 VPN的实现基于位置/ ID分离网络,相应的VPN属性被添加到ID标识符和位置标识符之间的映射关系中。 当执行映射处理时,如果判断源主机的VPN属性与目的主机的VPN属性相同,则查询目的主机的位置标识符,从而根据位置来实现数据包的转发 目的地主机的标识符; 如果VPN属性不相同,则回复不可用的消息。 因此,虚拟专网有效实现,保证了VPN侧主机通信的便利性和安全性,满足了虚拟专网的用户需求。
    • 6. 发明申请
    • METHOD AND SYSTEM FOR MONITORING LOCATOR/IDENTIFIER SEPARATION NETWORK
    • 用于监控定位器/识别器分离网络的方法和系统
    • US20130262672A1
    • 2013-10-03
    • US13991302
    • 2011-04-25
    • Yizhou Sun
    • Yizhou Sun
    • H04L12/26
    • H04L43/04H04L41/12H04L45/42H04L63/08H04L63/306
    • A method and system for monitoring a locator/identifier separation network. The method includes: a supervision center sending identity information of a monitored to an authentication center, querying and obtaining an identity identifier of the monitored; the supervision center obtaining a location identifier of the monitored according to the identity identifier of the monitored; the supervision center sending a command of monitoring the identity identifier of the monitored to an edge router corresponding to the location identifier of the monitored; and the edge router mirroring a data packet containing the identity identifier of the monitored in address information to the supervision center. With the method and system for monitoring the locator/identifier separation network, a monitoring function under a locator/identifier separation network architecture can be implemented.
    • 一种用于监视定位器/标识符分离网络的方法和系统。 该方法包括:监督中心向被认证中心发送被监控的身份信息,查询和获取被监控的身份标识; 监督中心根据所监视的身份识别符获取所监视的位置标识; 监控中心发送监控所监视的身份标识符的命令到对应于所监视的位置标识符的边缘路由器; 并且边缘路由器将包含被监视的地址信息的身份标识符的数据分组镜像到监督中心。 利用定位/标识分离网络的监控方法和系统,可以实现定位/标识分离网络架构下的监控功能。