Abstract: The present invention provides a method and apparatus for determining the trust worthiness of executable packets, e.g., internet applets, being transmitted within a computer network. The computer network includes both secured computers and unsecured computers, which are associated with secured nodes and unsecured nodes, respectively. Each executable packet has a source address and a destination address. In one embodiment, an intelligent firewall determines within a first degree of certainty whether the source address of an executable packet arriving at one of the secured computers is associated with anyone of the secured nodes, and also determines within a second degree of certainty whether the destination address of the executable packet is associated with anyone of the secured nodes.
Abstract: Watermark data is encoded in a digitized signal by forming a noise threshold spectrum which represents a maximum amount of imperceptible noise, spread-spectrum chipping the noise threshold spectrum with a relatively endless stream of pseudo-random bits to form a basis signal, dividing the basis signal into segments, and filtering the segments to smooth segment boundaries. The data encoded in the watermark signal is precoded to make the watermark data inversion robust and is convolutional encoded to further increase the likelihood that the watermark data will subsequently be retrievable notwithstanding lossy processing of the watermarked signal. The basis signal fits noise thresholds determined by constant-quality quantization approximation. Noise introduced by quantization is estimated by determining a continuously differentiable function which approximates noise introduced by such quantization and using the function to solve for a relatively optimal gain to be applied during such quantization.
Abstract: A base node of a computer network sends concurrent TTL query messages using multicast to other receiving nodes of the computer network. Each of the TTL query messages has a different time-to-live (TTL) parameter value and records the TTL parameter of the TTL query message into a message body. The receiving nodes receive one or more of the TTL query messages, namely, those TTL query messages whose TTL parameter values are sufficient to allow the TTL query message to reach the receiving node. Each receiving node can determine the TTL distance to the receiving node from the base node by determining the lowest TTL parameter value of all TTL query messages which reached the receiving node. Each receiving node communicates the TTL distance by sending to the base node a TTL query response message which indicates, in the message body, the least TTL parameter value of all TTL query messages received by the receiving node.
May 14, 1998
Date of Patent:
February 20, 2001
Sun Microsystems, Inc.
Stephen A. Hurst, Dah Ming Chiu, Stephen R. Hanna, Radia J. Pearlman
Abstract: Digital products are delivered to a client computer through a wide area network such as the Internet only upon determination that the client computer is located in a geopolitical territory, such as a country or state, for which delivery of the digital product is authorized. A server computer estimates the geopolitical location of the client computer from the client computer's network address through contact information in a network address allocation database. Alternatively, the server computer estimates the geopolitical location of the client computer from the client computer's custom name, e.g., domain name. The domain name itself can specify a country within which the client computer is located. Such can be conventional or can be parse according to ad hoc patterns developed by large, international organizations identified by a root domain name. In addition, contact information for the domain name can be retrieved and geopolitical territory information parsed from the contact information.
Abstract: An interactive multimedia application executes in a debug mode in which previously recorded user events are retrieved from memory and emulated in sequence. Each user event is represented by a record which specifies a particular classification of user event. Accordingly, a user event satisfying the particular classification is emulated. The debug manager emulates a user event of the particular category by retrieving the classification criteria from the interactive module, forming an event message representing an event satisfying the criteria for the particular classification, and sending the event message to the interactive module. Accordingly, the interactive module receives an event message which could have come from either the debug manager or the user interface module. As such, the particular computer instructions executed by the interactive module in response to the event are the same regardless of whether the event is emulated.