Patents Issued in February 6, 2003
-
Publication number: 20030028628Abstract: A method and apparatus for storing, retrieving, and managing registry settings for a computer system having handheld platform operating software is describe. A storage device and/or a network connection to another storage device or computer system are used to “mirror” the applicable parts of the registry to the storage device or network computer system in order that the computer system-specific configuration settings can be retrieved each time the computer system is booted.Type: ApplicationFiled: August 3, 2001Publication date: February 6, 2003Applicant: NCR CORPORATIONInventors: Jason Paul Irwin, Roger Terry Farmer
-
Publication number: 20030028629Abstract: A system including a server, a computer system, and a device coupled to a port of the computer system is provided. The server includes a script associated with an identifier. The device includes the identifier. The computer system is configured to read the identifier from the device, provide the identifier to the server, and cause a script associated with the identifier to be executed to cause one or more software components to be installed onto the computer system.Type: ApplicationFiled: August 2, 2001Publication date: February 6, 2003Inventors: Hatim Y. Amro, William P. Hyden, Robert G. Nadon, Steven D. Romohr
-
Publication number: 20030028630Abstract: A method for transferring data representing a network topology from a first software environment to a second software environment is provided. The data are reformatted for this purpose, since it is assumed that the different software environments support different file formats, as is the case, for example, with customary network design programs or network simulation programs. Furthermore, the data are reorganized before or after the reformatting in such a way that a different mapping of the network topology results. Consequently, the method allows an automatic transfer of network topology data from one software environment into another, even though the two software environments use different data formats and different topology representations.Type: ApplicationFiled: July 31, 2002Publication date: February 6, 2003Inventors: Gerhard Bischof, Michael Vogl, Christian Alof
-
Publication number: 20030028631Abstract: In one embodiment, the present invention provides a system and method for analyzing a stream of network data. The method includes generating a statistical model from a set of record events. A most recent record event is received. The statistical model is updated using the most recent record event by adding the most recent record event to the statistical model.Type: ApplicationFiled: July 31, 2001Publication date: February 6, 2003Inventor: N. Lee Rhodes
-
Publication number: 20030028632Abstract: A system and method of logging multicast data messages in a communication network implement data logging methodologies mapped onto a multicast architecture exploiting the efficiencies inherent in multicasting techniques. A multicast logging system may include one or more Log Clients publishing log reports to one or more multicast addresses, one or more Log Servers subscribing to one or more multicast addresses and persisting selected log data, and a Log Viewer presenting a real-time view of log traffic directed to one or more multicast addresses. A method of logging multicast messages may incorporate such a system arrangement. Additionally, alarm messages comprising critical system data may be multicast using the foregoing system architecture and functionality.Type: ApplicationFiled: August 2, 2001Publication date: February 6, 2003Inventor: Thomas G. Davis
-
Publication number: 20030028633Abstract: Techniques are disclosed for providing system manageability for computing systems operating under OS-absent conditions. In particular, techniques are disclosed for providing fully functional system management capabilities even when the primary power source for the computing system is disabled. One aspect of the invention provides an ASF-compliant device that selectively supports partial ASF functionality. One aspect of the invention provides an ASF-compliant device that runs ASF firmware that is stored in nonvolatile memory and can be upgraded in the field. One aspect of the invention provides an ASF-compliant device that runs ASF firmware and that can load portions of the ASF firmware into its memory in stages.Type: ApplicationFiled: April 24, 2002Publication date: February 6, 2003Inventors: Steven B. Lindsay, Andrew S. Hwang, Andrew M. Naylor
-
Publication number: 20030028634Abstract: A packet monitoring system includes nodes, a monitor node, and a network management system. The nodes are connected to the same network and assigned different addresses. The nodes switch packets in which destination addresses in the network are written, in accordance with the destination addresses. The monitor node is assigned a unique address different from the addresses of the nodes. The network management system issues a request for a packet to the nodes. The request from the network management system contains the unique address of the monitor node. Each of the nodes copies the packet before switching the packet, and transmits the copied packet to the monitor node in accordance with the unique address contained in the packet request from the network management system. The monitor node monitors the copied packet from each of the nodes.Type: ApplicationFiled: July 22, 2002Publication date: February 6, 2003Applicant: NEC CORPORATIONInventor: Kazuo Oshizawa
-
Publication number: 20030028635Abstract: A signaling system 7 (SS7) processing system for use in an SS7 network includes a primary interface configured to process communications according to at least one layer of the SS7 protocol stack, the primary interface being configured to provide checkpoint messages relating to the communications and the at least one layer of the SS7 protocol stack, each layer of the at least one layer of the SS7 protocol stack having a corresponding set of information associated with each communication, and a backup interface configured to process communications according to the at least one layer of the SS7 protocol stack, the backup interface being coupled to the primary interface, and configured, to receive the checkpoint messages from the primary interface, wherein the checkpoint messages contain sufficient information for the backup interface to properly process communications that are transferred from being processed by the primary interface to being processed by the backup interface and contain less than all informatioType: ApplicationFiled: June 8, 2001Publication date: February 6, 2003Inventors: Jeffrey M. DeMent, Tedd R. Pierce, Jeffrey M. Putnam, Daniel S. Rothschild, Stephen F. Witt
-
Publication number: 20030028636Abstract: A method and system for workload-aware request in cluster-based network servers. The present invention provides a web server cluster having a plurality of nodes wherein each node comprises a distributor component, a dispatcher component and a server component. In another embodiment, the present provides a method for managing request distribution to a set of files stored on a web server cluster. A request for a file is received at a first node of a plurality of nodes, each node comprising a distributor component, a dispatcher component and a server component. If the request is for a core file, the request is processed at the first node (e.g., processed locally). If the request is for a partitioned file, it is determined whether the request is assigned to be processed locally at the first node or at another node (e.g., processed remotely). If the request is for neither a core file nor a partitioned file, the request is processed at the first node.Type: ApplicationFiled: June 20, 2001Publication date: February 6, 2003Inventors: Ludmila Cherkasova, Magnus Karlsson
-
Publication number: 20030028637Abstract: An adapter for providing network access to a shared image projection device may comprise a network interface for connecting to a network and receiving network data from a network device over the network. A client, operatively associated with the network interface, receives data from the network interface and produces a data signal. A video display driver, operatively associated with the client, receives the data signal and produces video data for the shared image projection device.Type: ApplicationFiled: July 31, 2001Publication date: February 6, 2003Inventor: Curtis T. Gross
-
Publication number: 20030028638Abstract: A mechanism and system are described for either releasing held resources in the case of a deadlock or to postpone requests for resources when a potential deadlock is detected. One technique involves a three pass algorithm for selecting a candidate, where the candidate is either a possessory entity or resource is used. The three passes are as follows: (1) determining the subset of candidates, which have the CAN-BE-VICTIM flag set on; (2) If pass one results in a subset with more than one candidates in it, process that subset to determine a second subset of candidates based on resource priority associated with a resource type; (3) If the second pass results in a subset with more than one candidate in it, process that subset to select the candidate that has been running or held the shortest length of time.Type: ApplicationFiled: August 3, 2001Publication date: February 6, 2003Inventors: Alok Kumar Srivastava, Wilson Wai Shun Chan
-
Publication number: 20030028639Abstract: An access control system includes a server 11, an access management database storage device 12, first and second client devices 13 and 15, and data storage devices 14 and 16. The first and second client devices 13 and 15 forms a peer-to-peer file exchange system, and can access the server 11. The access management database storage device 12 stores an access management list. When receiving a request for data from the second client device 15, the first client device 13 inquires the server 11 about whether the requested data can be accessed. The server 11 determines whether the data can be accessed by using the access management list.Type: ApplicationFiled: August 1, 2002Publication date: February 6, 2003Inventors: Masaya Yamamoto, Ryuichi Okamoto, Masahiro Oho
-
Publication number: 20030028640Abstract: A method of dynamically allocating network resources including a plurality of computers receiving a request for networked resources is described. A determination is made whether a sub-broker can handle the request. If no sub-broker can handle the request, then the request is rejected. If a sub-broker can handle the request, a peer after qualification is prepared for handling the request. The request is then provided to the peer for execution.Type: ApplicationFiled: July 30, 2001Publication date: February 6, 2003Inventor: Vishal Malik
-
Publication number: 20030028641Abstract: A method and apparatus for allocating bandwidth within a network domain. A centralized bandwidth broker maintains a link-level database including detailed flow data for individual links in a network domain and a path-level database including summarized flow data for individual paths in the network domain. The bandwidth broker determines bandwidth allocations at a path-level by allocating discrete amounts of bandwidth, termed quotas, based on flow requests. If a flow request cannot be satisfied by allocating quotas, then the bandwidth broker uses the link-level database to recover bandwidth from unused bandwidth by other paths on the same link in order to satisfy the flow request. In another embodiment of a bandwidth broker, the centralized bandwidth broker is replaced by a distributed bandwidth broker including a central bandwidth broker and one or more edge bandwidth brokers. An edge bandwidth broker conducts path-level allocations and requests or releases quotas from and to the central bandwidth broker.Type: ApplicationFiled: July 30, 2001Publication date: February 6, 2003Inventors: Zhi-Li Zhang, Yiwei Thomas Hou, Zhenhai Duan
-
Publication number: 20030028642Abstract: In an ASP server farm, requests to use an application are directed to a particular executing instance of the application (or an appropriate component thereof) that is identified as being the least loaded of the available such instances of the application or its component. The number of such instances is dynamically increased or decreased in response to the number of requests for the application or components thereof. Requests may be directed (in accordance with the first aspect) or the instances adjusted (in accordance with a second aspect) on a per client-basis, in which instances of the application and/or components thereof are reserved for the use of a user or a particular group of users. Operation in this manner facilitates compliance with service agreements with respective users or groups of users.Type: ApplicationFiled: August 3, 2001Publication date: February 6, 2003Applicant: International Business Machines CorporationInventors: Vikas Agarwal, Girish Chafle, Neeran Mohan Karnik, Arun Kumar, Ashish Kundu, Johara Shahabuddin, Pradeep Varma
-
Publication number: 20030028643Abstract: A system (and methods) for transferring multimedia information from a source location to a destination location through one or more networks, which may be different. The system has a source output which provides a first stream of information in a first format. The system also has a destination input which receives a second stream of information in a second format. A proxy transcoder server (“PTS”) is coupled between the source output and the destination input. The PTS has a transcoding module transcoding data. The PTS also has a capability module identifying a first capability of the source output and a second capability of the destination input, and selecting a transcoding process based upon the first capability and the second capability.Type: ApplicationFiled: June 17, 2002Publication date: February 6, 2003Applicant: Dilithium Networks, Inc.Inventor: Marwan Anwar Jabri
-
Publication number: 20030028644Abstract: A method and system for load sharing among a plurality of pooled network resources disclosed wherein each network resource includes a load reporting logic for storing load data from the plurality of pooled network resources and for distributing load data from the respective network resource to the plurality of pooled network resources.Type: ApplicationFiled: April 18, 2002Publication date: February 6, 2003Inventors: Patrick Maguire, Peter Hans Edlund
-
Publication number: 20030028645Abstract: The invention provides for a cluster management system, including:Type: ApplicationFiled: August 5, 2002Publication date: February 6, 2003Inventor: Emmanuel Romagnoli
-
Publication number: 20030028646Abstract: In a method of establishing a data connection between a client computer and a destination computer over a computer network, a first computer network comprises a local area network (LAN) to which is connected a first, second and third client computer. At the boundary of the first computer network is provided a first firewall computer which is connected to the LAN. The first firewall computer is a secure relay computer. A second computer network comprises a web-site server and a second firewall computer which acts in much the same way as the first firewall computer. The second firewall computer only permits incoming data connections if an SSL data connection is used. The second computer network is connected to the first computer network by means of a public network, in this case the Internet. Each of the first, second and third client computers is able to access a website stored on the web-site server.Type: ApplicationFiled: July 24, 2002Publication date: February 6, 2003Inventor: Michael John Wray
-
Publication number: 20030028647Abstract: A message delivery server system for delivery of electronic content to a receiving client, comprises: a data storage for storing electronic content, a connection unit for maintaining a connection with the receiving client, and a connection establishment unit for allowing a receiving client to establish a connection with the server. The connection establishment unit comprises a definition unit for placing one or more connection definitions relating to the connection in an entity that is independent of any actual connection socket used for the session. The definition unit can be use to establish additional sockets to maintain the session and the definitions within can be used to find the best way to download media to the receiving client.Type: ApplicationFiled: July 30, 2002Publication date: February 6, 2003Applicant: COMVERSE, LTD.Inventor: Yair Grosu
-
Publication number: 20030028648Abstract: A method and device for providing switched tunnel connections from a user to a destination or a multiple number of destinations. Tunnels are switched from a user to a destination by receiving an incoming tunnel connection from the user and initiating a switched tunnel connection to the destination. Traffic from the incoming tunnel is switched to the destination over the switched tunnel. A disclosed embodiment uses user information to determine the switching of the tunnel to implement security access to a tunnel destination, load balancing among destination resources, and bundling of tunnel sessions to implement high bandwidth transmission.Type: ApplicationFiled: October 7, 2002Publication date: February 6, 2003Applicant: 3Com CorporationInventor: Patrice R. Calhoun
-
Publication number: 20030028649Abstract: An apparatus and method for generating an identifier to facilitate delivery of enhanced data services in a wireless computing environment is presented. In accordance with one aspect of the invention, a method is presented comprising receiving a request to establish a communication session between a subscriber unit in a wireless communication system and a data network access server through a basestation, and selectively generating a communication session identifier to uniquely identify the communication session from a plurality of communication sessions supported by the network access server to enable mobility management within the point-to-point communication session between the basestation and the network access server.Type: ApplicationFiled: July 31, 2001Publication date: February 6, 2003Inventors: Christopher Uhlik, Neeraj Sinha, Zhifeng Cai
-
Publication number: 20030028650Abstract: A network interface unit is provided for use intermediate a LAN and a public or private network, or a combination of both, for establishing secure links to a VPN gateway. Login by a LAN client with the network interface unit, addressing, authentication, and other configuration operations achieved using a web page-based GUI are applied in establishing tunnels from LAN clients to desired VPN destinations. Illustrative network interface units include a DHCP server and provide encryption-decryption and encapsulation-decapsulation of data packets for communication with VPN nodes. Configuration and connection of a client are further enhanced by a built-in DNS server and other functional servers to provide a high degree of autonomy in establishing connections to a desired VPN gateway via an ISP or other public and/or private network links to. The interface unit then performs required authentication exchanges, and required encryption key exchanges.Type: ApplicationFiled: July 23, 2001Publication date: February 6, 2003Inventors: Yihsiu Chen, Mark Jeffrey Foladare, Shelley B. Goldman, Thomas Joseph Killian, Norman Loren Schryer, Kevin Stone, Roy Philip Weber
-
Publication number: 20030028651Abstract: A proprietary information utility includes an interface that provides outside entities connection to the proprietary information utility. A repository contains proprietary information. The repository is compartmentalized by user identity and entitlement. A security system limits access of each user connecting to the proprietary information utility to proprietary information to which each user is entitled. The proprietary information to which each user is entitled is through use of the application services operating within the proprietary information utility. A billing system tracks usage of users of the proprietary information utility for billing purposes.Type: ApplicationFiled: July 31, 2001Publication date: February 6, 2003Inventors: James O. Schreckengast, Anton I. Engberg
-
Publication number: 20030028652Abstract: A media storage device ensures that downloaded digital data is only accessible for a predetermined period of time. An expiration time and the requested digital data are encrypted and downloaded from a content provider and stored as encrypted data on the media storage device. The expiration time indicates a specific time at which the digital data will be made invalid. At the onset of a predetermined time interval, the media storage device obtains a current global time from a secure clock, decrypts the expiration time, and compares the current global time to the expiration time. If the expiration time is earlier than the current global time, then the digital data stored in the media storage device remains valid. While valid, the media storage device is able to retrieve and transmit the digital data for viewing. This process is repeated for each subsequent time interval. Once the expiration time elapses, the media storage device invalidates the digital data.Type: ApplicationFiled: August 1, 2001Publication date: February 6, 2003Applicant: Sony Corporation and Sony Electronics, Inc.Inventors: Richard A. Bardini, Glen Stone
-
Publication number: 20030028653Abstract: A method and computer system for providing access to computer resources on a computer system and includes generating a token containing encrypted user information including credit, authorization, and authentication information. A request is initiated to open an encrypted computer resource stored on the computer system, and execution of a remote application manager component on the computer system is also initiated. The remote application manager component decrypts the token and authenticates a user using authentication information stored in the token. Whether the user is authorized and has sufficient credit are then verified. When the user is approved, the requested computer resource is decrypted and opened. Use of the computer resource is monitored to determine whether the user has sufficient credit to continue using the computer resource. A notification is provided when the monitored usage of the opened computer resource has exceeded the credit.Type: ApplicationFiled: August 6, 2001Publication date: February 6, 2003Inventors: John C. New, Mark T. Price
-
Publication number: 20030028654Abstract: A method and apparatus to perform pattern matching for content based switching is described.Type: ApplicationFiled: August 10, 2001Publication date: February 6, 2003Inventors: John B. Abjanic, Tak F. Sze
-
Publication number: 20030028655Abstract: The present invention relates to a data processing system and method for providing support and maintenance services to a computer with at least reduced and preferably minimal user interaction. Data, that ordinarily would be inaccessible to a non-trusted applet, is, prior to any use of that data by such a non-trusted applet collated with the permission of the user of the computer by a trusted applet. The trusted applet has a greater range of access to system configuration as compared to the non-trusted applet. However, invoking a trusted applet requires user interaction; namely, the user must grant permission for the trusted applet to access the system configuration information and platform identification data. The necessary system configuration information that is required for the provision of support and maintenance services is harvested by the trusted applet and stored within a cookie.Type: ApplicationFiled: June 7, 2002Publication date: February 6, 2003Inventor: Eric Owhadi
-
Publication number: 20030028656Abstract: The present invention discloses a system and method for reserving fractionally schedulable resources. The system includes a scheduling engine to receive reservation requests. The scheduling engine applies the reservation request to a resource usage table corresponding to a fractionally schedulable resource required by the reservation request. If the fractionally schedulable resource has adequate capacity to comply with the requested reservation, the scheduling engine will add the reservation request to a resource usage table.Type: ApplicationFiled: July 11, 2002Publication date: February 6, 2003Applicant: Forgent Networks, Inc.Inventor: James Joseph Babka
-
Publication number: 20030028657Abstract: A system and a method for transmitting data packets over a network to selected multiple remote destinations. The data packets include a header section and a data section. The header section includes a special internetworking protocol field indicating that a list of internetworking protocol addresses is embedded in the data packet. Network elements utilize a particular addressing protocol to access the list of addresses and transmit a copy of the data packet to each of the selected remote destinations corresponding to each of the addresses in the list.Type: ApplicationFiled: July 31, 2001Publication date: February 6, 2003Inventors: Gary L. Thunquest, Jeffrey D. Schwartz
-
Publication number: 20030028658Abstract: A system and method for accessing registers of a PHY device in a network including an extended protocol software layer between the protocol and application layers, on the one hand, and the MAC driver, on the other hand. The extended protocol layer generates the PHY device register read and write commands and embeds them within standardized Ethernet data packets. The extended PHY device is adapted to distinguish these register read and write command packets from normal data packets and intercept and parse them to retrieve the commands. Likewise, the extended PHY device embeds the read and write acknowledgments in standardized Ethernet data packets that the extended protocol layer, in turn, can distinguish from normal Ethernet data packets and intercept and parse them to retrieve the acknowledgments.Type: ApplicationFiled: August 1, 2001Publication date: February 6, 2003Inventors: William R. Bullman, Ryan S. Holmqvist, Steven E. Strauss
-
Publication number: 20030028659Abstract: A method and system thereof for reducing the energy consumed when decoding an encoded and synchronized multimedia data stream, wherein the data stream is non-preemptable and subject to precedence constraints. In a client-server environment, the server delivers to the client the stream for decoding. The client has a processor operating on a discrete variable-voltage power supply. Prior to transmitting the stream to the client, the server produces an execution schedule according to the precedence constraints. The server also assigns a voltage setting for each task in the schedule, wherein each task decodes a frame in the stream without preemption. The server transmits the execution schedule and voltage settings to the client with the encoded data stream. The schedule and voltage settings reduce energy consumption by the client while satisfying multimedia timing constraints.Type: ApplicationFiled: June 29, 2001Publication date: February 6, 2003Inventors: Malena Rosa Mesarina, Yoshio Frank Turner
-
Publication number: 20030028660Abstract: A relay apparatus on a network includes an analysis section that analyzes multimedia contents transmitted from a contents provider. The relay apparatus temporarily stores contents identifiers, component information of the contents, and element data pointed by pointers of the component information, and creates a transmission sequence for transmitting the element data. A transmission section transmits the contents identifier, the contents component information and the element data according to the transmission sequence to a service provider. When the relay apparatus receives a request from a terminal or from a service provider even before the service provider completes registration of the entire multimedia contents, the relay apparatus or the service provider can start rendering multimedia transmission services to the terminal.Type: ApplicationFiled: June 11, 2002Publication date: February 6, 2003Applicant: HITACHI, Ltd.Inventors: Masaru Igawa, Koichi Shibata
-
Publication number: 20030028661Abstract: Packets of real-time media streams are processed at a network node such within a desired maximum latency less than the frame interval of the streams. The media streams have respective packet rates all substantially equal to a nominal packet rate and respective packet arrival times that are generally non-deterministic. The streams are assigned to digital signal processors (DSPs), each capable of processing up to a predetermined maximum number of the streams within real-time constraints. The number of streams assigned to each DSP is less than the predetermined maximum number and no greater than the quotient of a desired maximum processing latency less than the frame interval and the DSP processing latency for a single packet. For example, if the desired maximum processing latency is 5 ms. and the processing latency for one packet is 1.6 ms., then only three streams are assigned to a DSP (5/1.6˜3), even if the DSP can process many more than 3 streams in real time.Type: ApplicationFiled: July 3, 2002Publication date: February 6, 2003Applicant: SHOWSHORE NETWORKS, INC.Inventors: Eric Burger, Joel Hughes, David Penny
-
Publication number: 20030028662Abstract: A method for reconstructing network communication sessions is disclosed. The packets comprising the communication are captured and sorted into a sorted list. The sorted packets are decoded and the information from those packets is used to reconstruct the content and context of the network communication. The reconstructed communication is then displayed on a computer monitor using a web browser or other display program. The user is provided with commands to facilitate navigation of the reconstructed network communication.Type: ApplicationFiled: July 9, 2002Publication date: February 6, 2003Inventors: Bevan S. Rowley, Stephen G. Huntington
-
Publication number: 20030028663Abstract: A system and method for converting low-jitter, interleaved frame traffic, such as that generated in an IP network, to high jitter traffic to improve the utilization of bandwidth on arbitrated loops such as Fibre Channel Arbitrated Loops. Embodiments of a high jitter scheduling algorithm may be used in devices such as network switches that interface an arbitrated loop with an IP network that carries low-jitter traffic. The high jitter algorithm may use a separate queue for each device on the arbitrated loop, or alternatively may use one queue for two or more devices. Incoming frames are distributed among the queues based upon each frame's destination device. The scheduling algorithm may then service the queues and forward queued frames to the devices from the queues. In one embodiment, the queues are serviced in a round-robin fashion. In one embodiment, each queue may be serviced for a programmed limit.Type: ApplicationFiled: May 22, 2002Publication date: February 6, 2003Inventors: Rodney N. Mullendore, Stuart F. Oberman, Anil Mehta, Keith Schakel, Kamran Malik
-
Publication number: 20030028664Abstract: A method and system for the secure distribution and utilization of data over a network. A server computer may issue a certificate and a private key to a client for identifying the client in a transaction. The certificate and the private key may be stored in a token used by the client during a transaction. The server may verify a digital signature using the certificate stored in the token before distributing data to the client. The server may also generate a message associated with the data being downloaded to the client and associated with the token used by the client during a transaction.Type: ApplicationFiled: August 2, 2001Publication date: February 6, 2003Inventors: Kaijun Tan, Michael Lloyd Cochran, Logan Badia
-
Publication number: 20030028665Abstract: The present invention is particularly contemplated for using a web-based system to send religious tracts to recipients. The method of creating the tract provides the sender to input subject matter variables regarding the desired content of the religious tract. Previously created phrases matching the subject matter variables are displayed to the sender from which they may select. The phrases that are displayed may be a word, group of words, sentence, paragraph, or complete tract. The sender may further include bible verses, hypertext links to other religious sites on the network, music, artwork, and others. The sender builds the tract using the phrases and other desired information and then sends the tract to the recipient. The tract may be in the form of letters, stories, bible versus, poems, and the like to support and inspire the recipient.Type: ApplicationFiled: July 20, 2001Publication date: February 6, 2003Inventors: Dawn T. McAllister, T. Naomie Odoom, Carolyn Wilkins Lucas, Monica A. Williams, M. Allen Wilson
-
Publication number: 20030028666Abstract: A system and method for receiving data packets at a computer system are presented. The method and system comprise receiving at a buffer, at least two data packets. Once received, an ending portion of the first data packet is stored in a buffer, wherein the ending portion comprises at least the last data bit in the first data packet. Next the method and system concatenates the ending portion of the first data packet with a beginning portion of the second data packet so a string search engine can determine if the concatenated data contains a known string of malicious data bits.Type: ApplicationFiled: July 15, 2002Publication date: February 6, 2003Inventor: Brian D. Hanner
-
Publication number: 20030028667Abstract: Information is distributed within a group or organisation by taking a message in electronic form distributing it to the intended recipient or generating a list of suitable recipients (based on the contents of the database containing details of all individuals and their areas of expertise and/or information related to particularly highly connected individuals) of the message and sends the message to those recipients accordingly. A random distribution model is provided which comprises copying the message a number of times, and generating a list of potential further recipients, and for subsequently selecting a random set of those potential recipients.Type: ApplicationFiled: July 17, 2002Publication date: February 6, 2003Inventors: Richard Taylor, Christopher Tofts
-
Publication number: 20030028668Abstract: Routing table update messages that include both network-level and link-level addresses of nodes of a computer network are exchanged among the nodes of the computer network. Further, a routing table maintained by a first one of the nodes of the computer network may be updated in response to receiving one or more of the update messages. The routing table is preferably updated by selecting a next node to a destination node of the computer network only if every intermediate node in a path from the next node to the destination node satisfies a set of nodal conditions required by the first node for its path to the destination node and the next node offers the shortest distance to the destination node and to every intermediate node along the path from the next node to the destination node. The shortest distance to the destination node may be determined according to one or more link-state and/or node-state metrics regarding communication links and nodes along the path to the destination node.Type: ApplicationFiled: September 25, 2002Publication date: February 6, 2003Applicant: Nokia Wireless Routers Inc.Inventors: J. Joaquin Garcia-Luna-Aceves, David A. Beyer, Thane J. Frivold
-
Publication number: 20030028669Abstract: The invention relates to a method for routing a request to an application and a computer system containing a mapper 1. An incoming request is analyzed by the request object analyzer 3 and a corresponding descriptor of the request is created. The descriptor of the request is compared to descriptors of applications and to a descriptor of a logging module by the matcher 4. In case of a match to one of the descriptors of the applications the request is routed to the corresponding application and in case of a match with the descriptor of the logging module a copy of the request is forwarded to the logging module 7 in addition.Type: ApplicationFiled: July 3, 2002Publication date: February 6, 2003Applicant: ALCATELInventors: Claudine Batsleer, Dominiqe Chantrain, Koen Handekyn, Steven Vermeulen
-
Publication number: 20030028670Abstract: Methods and components are provided which ensure both the improved use of network resources and adequate performance of best effort (BE) traffic by intelligently distributing the BE traffic demands at connection level with corresponding scaling weights, and without reserving bandwidth. A weighted sum of the best effort (BE) class connections (or LSPs in MPLS context) in a link is used as a path selection criterion, where each BE connection is weighted by its service volume. Path selection for a requested BE service volume is performed by creating a virtual topology in which all links in a network have weighted BE metrics updated to include the effects of the requested BE service volume, and identifying a best path through the virtual topology taking into account the weighted BE metrics.Type: ApplicationFiled: July 31, 2001Publication date: February 6, 2003Inventors: Byoung-Joon Lee, Hans Frederick Johnsen, Richard Charles Vieregge
-
Publication number: 20030028671Abstract: Methods and systems for providing two-way initiated, bi-directional communication with wireless devices using connection-based or connection-less protocols, such as, for example, TCP/IP and UDP/IP, are provided. Example embodiments provide an Address Management Proxy System (“AMPS”), which enables devices and systems connected to a public internet, such as the Internet, to initiate communication with and to send data to wireless devices connected to a private wireless network, without exposing the non-routable private addresses of these wireless devices. The AMPS allocates a public (routable) network address for temporarily use by a requesting device on a public network to communicate with a wireless device on a wireless network. In one embodiment, a pool of public addresses, for example, public IP addresses, is maintained by the AMPS and allocated dynamically to wireless network devices as required.Type: ApplicationFiled: June 10, 2002Publication date: February 6, 2003Applicant: 4th pass Inc.Inventors: Samir Narendra Mehta, Mazin Ramadan, Geoffrey S. Heller, Vineet R. Sharma, Markus L. Jansen, Edward L. Gow, Ngochan T. Nguyen
-
Publication number: 20030028672Abstract: The present invention discloses a system and method to provide memory management for electronic devices having limited and/or finite memory resources. The preferred inventive device packetizes the original digital data stored on the device. A communication controller opportunistically establishes communications between the electronic device and at least one remote transport device. A transceiver singly transmits copies of the packets to the remote device. The transceiver also operates to receive the communication signals from the remote devices. As the copies of the packets are transmitted, a memory controller deletes the digital data corresponding to the transmitted packets, thus freeing space on the electronic device memory.Type: ApplicationFiled: August 3, 2001Publication date: February 6, 2003Inventor: Timothy L. Goldstein
-
Publication number: 20030028673Abstract: Improved browser caching performance in portable, handheld and wireless communication devices has been achieved by ASIC compression and decompression engines that compress cache content resulting in a more efficient use of the limited memory of such devices. Based on a data type, the compression engine selects an appropriate compression accelerator which invokes a corresponding compression algorithm, to compress the cache data. The process is reversed when the cache is requested by the browser.Type: ApplicationFiled: August 1, 2001Publication date: February 6, 2003Applicant: Intel CorporationInventors: Rui Lin, Gary Wang, Harvey Zien
-
Publication number: 20030028674Abstract: Control and management of communication traffic. IP packet filtering occurs in an operating system kernel implementation of, for example, the TCP/IP protocol suite. Access rules are expressed as filters referencing system kernel data; for outbound processing, source application indicia is determined; for inbound packet processing, a look-ahead function is executed to determine target application indicia; and responsive to the source or target application indicia, filter processing is executed.Type: ApplicationFiled: July 30, 2001Publication date: February 6, 2003Applicant: International Business Machines CorporationInventor: Edward B. Boden
-
Publication number: 20030028675Abstract: A centralized network storage system comprises a plurality of diskless clients and a server. A transforming device in the client, such as an interface card installed in the IDE or PCI expansion slot of the client, receives a hard disk access command from the client and packs the identity number and the command into a package and delivers the package to a server. A centralized storage device in the server is divided into a plurality of storage areas, each of which respectively corresponds to one of the clients.Type: ApplicationFiled: November 28, 2001Publication date: February 6, 2003Applicant: ICP Electronics Inc.Inventors: Ming-Chih Chang, Tse-Ming Lin
-
Publication number: 20030028676Abstract: A technician trainer including interactive software executed on a computer that gives broadband telecommunication field technicians a comprehensive way to practice and improve troubleshooting skills to accelerate the training process. The trainer provides an interactive virtual broadband communication network environment that incorporates a virtual working cable plant which simulates real-world situations. The tech trainer incorporates proper diagnostic and trouble-shooting procedures that enables the user/technician to recognize and practice proper procedures through virtual experience and repetition to improve field performance. The trainer presents the user with a work order indicative of a network problem and various selectable options and actions. The interactive environment includes network components that are programmed with measurable values that reflect the network problem, and further includes interactive selectable tools and test equipment for taking measurements.Type: ApplicationFiled: June 27, 2002Publication date: February 6, 2003Inventors: David M. Pangrac, Donald T. Gall
-
Publication number: 20030028677Abstract: A network control system includes a managing device, separate devices that communicate with the managing device, and a repeater that interconnects the managing device and separate devices. In the network control system, when the managing device performs maintenance, the separate devices each include a separate device side power source control circuit. The power source control circuit controls the on-state and off-state levels of a power source which is to be delivered to a circuit including at least an activating signal monitor unit such as a separate device side wake-up packet monitor unit that monitors whether or not an activating signal such as a wake-up packet sent from tho managing device via the repeater has been received. When the power source control circuit detects that the power source switch of the separate device is in off-state, the power source control circuit suppresses the transmission of a predetermined signal to the repeater.Type: ApplicationFiled: August 2, 2002Publication date: February 6, 2003Applicant: FUJITSU LIMITEDInventor: Yoshiyuki Fukuhara