Patent application number | Description | Published |
20080231511 | Beacon-Assisted Precision Location of Untethered Client in Packet Networks - A novel beacon-based position location technique for efficient location discovery of untethered clients in packet networks is disclosed. The position location technique utilizes the time-difference-of-arrival (“TDOA”) of a first signal transmitted by a beacon of known location and a second signal transmitted by an untethered client. The TDOA of these two signals is measured locally by at least three non-collinear signal receivers. For each of the receivers, the TDOA is used to calculate a perceived distance to the client. A circle is then calculated for each receiver, centered on the receiver and having a radius equal to the perceived distance. At least two lines defined by points of intersection of the calculated circles are then calculated. The point of intersection of the lines represents the location of the client. To facilitate operation, the signal receivers may be arranged on vertices which define a convex polygon as viewed from above. The location system requires no time (time-of-day) synchronization of the signal receivers, and only the coarse frequency synchronization, on the order of, tens of parts-per-million (ppm). The technique even works for the case where the signal receivers are run asynchronously, provided the frequency accuracies of the signal receivers are on the order of about 50ppm or better. The technique introduces no communication overhead for the beacon, client and signal receivers. Further, the computation overhead at the signal receivers is relatively low because the location detection algorithm involves only simple algebraic operations over scalar values. | 09-25-2008 |
20080254797 | SEAMLESS AND VERTICAL CALL HANDOFF SOLUTION ARCHITECTURE - A system, method and apparatus for facilitating handoff of communications with a user device between a first communication network having a first domain technology, and a second communication network having a second domain technology different from the first domain technology, the system, method and apparatus includes an anchor point that establishes a first service flow with the first communication network, and a second service flow with the second communication network based upon a triggering event respectively, with the user device, and a handoff device that receives at least one handoff parameter for determining a handoff operation of the user device from the first communication network to the second communication network. | 10-16-2008 |
20090161537 | NETWORK DATA ROUTING PROTECTION CYCLES FOR AUTOMATIC PROTECTION SWITCHING - A computer network processes data packets in the event of a network link failure. The network includes a plurality of routers that deliver data packets to the network via a plurality of links. At least one router includes a protection cycle manager. The protection cycle manager has a protection cycle packet identifier and a protection cycle packet processor. The protection cycle packet identifier identifies, as protection cycle packets, data packets having a specific protection cycle format. The protection cycle packet processor processes protection cycle packets to determine whether the packet destination corresponds to the routing node, and if the packet destination corresponds to the routing node, the protection cycle packet is treated by the routing node as a data packet received from the packet source via the failed link. Otherwise, if the packet destination does not correspond to the routing node, the protection cycle packet is sent to a protection cycle node for the routing node. | 06-25-2009 |
20100008351 | METHOD AND SYSTEM FOR ROUTE SYNCHRONIZATION USING TIME SYNCHRONIZATION - A system, method and apparatus synchronize protocol events in a distributed communication network. The network includes a plurality of nodes. Each node in the network includes a time source which maintains a clock signal synchronized with each other node time source in the network. An announcement of a protocol event is sent to at least one node. The announcement includes a predetermined time for implementing the protocol event. The protocol event is acted upon at the predetermined time. | 01-14-2010 |
20110320596 | Method and Apparatus for Protecting Networks from Unauthorized Applications - A traffic controller is provided which integrates black-box tests of unauthorized applications to extract application characteristics from associated Internet traffic, exploits the networking information learned by host clients, actively scans and controls hosts on the corporate network, and dynamically configures a corporate firewall to block traffic to and from critical application network elements. As a result, the traffic controller effectively manages unauthorized applications and their associated traffic in a corporate environment. | 12-29-2011 |
20120030071 | SECURE, DIFFERENTIATED READING OF SENSORS AND RFID TAGS - Secure access to inventory data concerning a supplier's product located at a seller's premises is provided by tagging units of product with a supplier identifier and a product identifier. The identifiers may be embedded in RFID tags or EPC labels. A secure VPN tunnel is established between a supplier and a seller. The VPN tunnel is associated with a particular supplier identifier such that only inventory data associated with the supplier identifier that matches the supplier is transmitted on the VPN tunnel, and inventory data associated with supplier identifiers that do not match the supplier are filtered out. Hence, the seller can provide the supplier with access to inventory data without exposing sensitive information related to the seller and other suppliers. | 02-02-2012 |
20120109340 | System and Method for Providing Power Management in a Sensor Network - Providing power management to sensing nodes in a sensor network may include a plurality of sensing nodes, each sensing node connected through a power management device to an external power source, such as a powered node of another network, for managing power from the external power source to the sensing node. Multiple power management devices allow for a sensor network of fixed or mobile wireless sensing nodes or sensor gateways to make use of power from an external source such as an another network. An intelligent power management device connected to at least one of the sensing nodes may provide for power policy management. | 05-03-2012 |
20120182863 | PROTOCOL FOR CLOCK DISTRIBUTION AND LOOP RESOLUTION - In response to a network topology change, a clock root node calculates a new clock path for each affected node by building a clock source topology tree, and identifying from that tree a path to the network node from a clock source of higher or equal stratum relative to that network node. The root node then sends a network message to each node indicating the new path that the node should use. Each node receives the message and compares the new path with the existing path. If the paths are different then the node acquires the new path just received in the message. If the paths are the same then the node does nothing and discards the message. | 07-19-2012 |
20120265653 | Secure, Differentiated Reading of Sensors and RFID Tags - Secure access to inventory data concerning a supplier's product located at a seller's premises is provided by tagging units of product with a supplier identifier and a product identifier. The identifiers may be embedded in RFID tags or EPC labels. A secure VPN tunnel is established between a supplier and a seller. The VPN tunnel is associated with a particular supplier identifier such that only inventory data associated with the supplier identifier that matches the supplier is transmitted on the VPN tunnel, and inventory data associated with supplier identifiers that do not match the supplier are filtered out. Hence, the seller can provide the supplier with access to inventory data without exposing sensitive information related to the seller and other suppliers. | 10-18-2012 |
20130054643 | Method and Apparatus for Document Matching - Documents written using a markup language such as XML may be decomposed into Path and Parent Associated Node (PPAN) elements, each of which is a linear data structure that includes the content of a node, the parent-child relationship of the node, and the path level of the node. A number of PPAN elements may be grouped together to form A PPAN chain. A PPAN matching process uses the PPAN elements/PPAN chain to search for structured documents that match the PPAN chain. The PPAN matching process is able to perform query and match at the same time to accelerate the PPAN matching process, and also enables complex services to be represented by generic structured documents. Optionally, the PPAN matching process may support wildcard requests so that services may be discovered without prior knowledge of the services. | 02-28-2013 |
20140019640 | SYSTEM AND METHOD FOR DYNAMICALLY RE-CONFIGURING COMMUNICATIONS SESSION ROUTING BASED ON LOCATION INFORMATION - System and method for dynamically re-directing communications sessions destined for a particular entity in a communications system, each communications session being associated with at least one predefined route. Location information indicative of a current location of the particular entity is obtained and applied to a predefined set of conditional routing rules associated with the particular entity. This rules-based processing generates a routing result, on the basis of which the at least one predefined route associated with each communications session destined for the particular entity is dynamically updated. | 01-16-2014 |
20140172913 | Method and Apparatus for Document Matching - Documents written using a markup language such as XML may be decomposed into Path and Parent Associated Node (PPAN) elements, each of which is a linear data structure that includes the content of a node, the parent-child relationship of the node, and the path level of the node. A number of PPAN elements may be grouped together to form A PPAN chain. A PPAN matching process uses the PPAN elements/PPAN chain to search for structured documents that match the PPAN chain. The PPAN matching process is able to perform query and match at the same time to accelerate the PPAN matching process, and also enables complex services to be represented by generic structured documents. Optionally, the PPAN matching process may support wildcard requests so that services may be discovered without prior knowledge of the services. | 06-19-2014 |
20140269434 | PROTOCOL FOR CLOCK DISTRIBUTION AND LOOP RESOLUTION - In response to a network topology change, a clock root node calculates a new clock path for each affected node by building a clock source topology tree, and identifying from that tree a path to the network node from a clock source of higher or equal stratum relative to that network node. The root node then sends a network message to each node indicating the new path that the node should use. Each node receives the message and compares the new path with the existing path. If the paths are different then the node acquires the new path just received in the message. If the paths are the same then the node does nothing and discards the message. | 09-18-2014 |