会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明申请
    • Method for handling the simultaneous mobility of mobile hosts in infrastructure-based networks
    • 处理基于网络的网络中移动主机的同时移动性的方法
    • US20070242628A1
    • 2007-10-18
    • US11248743
    • 2005-10-12
    • Ashutosh DuttaKuok-Shoong WongKenneth YoungHenning Schulzrinne
    • Ashutosh DuttaKuok-Shoong WongKenneth YoungHenning Schulzrinne
    • H04B7/00
    • H04W36/0011H04W80/04H04W80/10H04W88/182
    • In infrastructure-based networks devices often move from one attachment point in the network or a sub-network thereof to another attachment point. Communications sessions may be established between Mobile Hosts attached to such nodes. Communications sessions between nodes established using Session Initiation Protocol (SIP), Mobile Internet Protocol with Location Registers (MIP-LR) or Mobile Internet Protocol version 6 (MIPv6) may fail if there is simultaneous mobility of two Mobile Hosts in an ongoing communications session. Stationary binding update proxies and stationary location proxies are introduced into such communications networks in order to provide a solution to the problem of simultaneous mobility of Mobile Hosts. Specific implementations for SIP, MIP-LR and MIPv6 are provided. In SIP networks, the SIP server for the mobile hosts acts as the stationary binding update proxy and the stationary location proxy. In MIP-LR networks,
    • 在基于基础设施的网络中,设备通常从网络中的一个连接点或其子网络移动到另一附接点。 可以在附接到这样的节点的移动主机之间建立通信会话。 如果在正在进行的通信会话中存在两个移动主机的同时移动性,则使用会话发起协议(SIP),具有位置寄存器的移动因特网协议(MIP-LR)或移动因特网协议版本6(MIPv6)建立的节点之间的通信会话可能失败。 固定式绑定更新代理和固定位置代理被引入到这样的通信网络中,以便为移动主机的同时移动性的问题提供解决方案。 提供SIP,MIP-LR和MIPv6的具体实现。 在SIP网络中,移动主机的SIP服务器作为固定绑定更新代理和固定位置代理。 在MIP-LR网络中,
    • 9. 发明授权
    • Set-top box peer-assisted video-on-demand
    • 机顶盒同时辅助视频点播
    • US09118814B2
    • 2015-08-25
    • US12648105
    • 2009-12-28
    • Vaishnav JanardhanHenning Schulzrinne
    • Vaishnav JanardhanHenning Schulzrinne
    • H04N7/173H04N21/433H04N21/436H04N21/472H04N21/4788
    • H04N7/17318H04N21/4331H04N21/43615H04N21/47202H04N21/4788
    • A peer-to-peer (P2P) video-on-demand (VoD) system or method use a plurality of LP-enabled VoD set-top box (STB) peers in a pool for providing video content data to a requesting client peer in the pool. One other peer in the pool can be designated as a parent peer for downloading high priority playback content that is substantially immediately needed for playback display. Low priority pre-fetch content can be downloaded to the requesting client peer from another peer in the pool other than the parent peer. Bandwidth at the requesting client peer that is not used by the playback module for downloading the high priority playback video content data can be allocated for downloading the pre-fetch content. Using the requesting client peer, video content data can be served, for the playback display on a video monitor, wherein such served video data content can comprise the playback content and the prefetch content.
    • 点对点(P2P)视频点播(VoD)系统或方法使用池中的多个LP使能的VoD机顶盒(STB)对等体,用于向请求客户端对等体提供视频内容数据 游泳池。 池中的另一个对等体可以被指定为父对等体,用于下载基本上立即需要播放显示的高优先级播放内容。 低优先级预取内容可以从除了父对等体之外的池中的另一个对等体下载到请求客户端对等体。 可以分配用于下载高优先级重放视频内容数据的播放模块未使用的请求客户端对等体的带宽,用于下载预取内容。 使用请求客户端对等体,可以为视频监视器上的回放显示提供视频内容数据,其中这种被服务的视频数据内容可以包括播放内容和预取内容。
    • 10. 发明授权
    • Methods and systems for controlling traffic on a communication network
    • 控制通信网络流量的方法和系统
    • US08995274B2
    • 2015-03-31
    • US13002417
    • 2009-07-02
    • Se Gi HongHenning Schulzrinne
    • Se Gi HongHenning Schulzrinne
    • H04L9/32H04L12/701H04L29/06H04L12/707H04L12/725G06F21/00
    • H04L45/00H04L45/22H04L45/304H04L63/1416H04L63/1441H04L63/1458H04L2463/143
    • Mechanisms for controlling traffic on a communication network are described. The mechanisms can be implemented, for example, using signaling messages. For example, a receiver can send a permission message to allow the sender to send a given amount of data along a particular path. As another example, a sender can send a query message indicating a volume of data that has been sent since the sender received a permission message. Upon receiving the query message, a receiver (or another device such as a router, etc.) can detect an attack by comparing the volume of data in the query message with the volume of data that has been received by the receiver. Upon detecting an attack, the receiver can drop unauthorized packets or request the sender to use a security protocol (e.g., IPsec AH) when transmitting data packets and/or change the path of the data flow (e.g., using multi-homing).
    • 描述用于控制通信网络上的业务的机制。 这些机制可以例如使用信令消息来实现。 例如,接收者可以发送许可消息以允许发送者沿特定路径发送给定量的数据。 作为另一示例,发送者可以发送指示从发送者接收到许可消息以来已经发送的数据量的查询消息。 在接收到查询消息时,接收机(或诸如路由器等的另一设备)可以通过将查询消息中的数据量与接收器接收到的数据量进行比较来检测攻击。 在检测到攻击时,接收机可以丢弃未经授权的数据包,或者在发送数据包时请求发送者使用安全协议(例如,IPsec AH)和/或改变数据流的路径(例如,使用多归属)。