Patent application number | Description | Published |
20080247523 | Multiple virtual telephones sharing a single physical address - A shared multi-user IP telephone device for receiving, based on SIP, calls transmitted over VoIP network, a system using such a device and method thereof. The shared multi-user IP telephone device includes a storage device for storing user profiles, an ID extraction portion for receiving from the VoIP network a SIP packet including at least the callee's ID, and extracting the ID contained in the SIP packet, and a personalized feature presentation portion for searching in the storage device for the user profile corresponding to the ID according to the extracted ID for presenting the corresponding personalized feature according to the search result. Thus it is possible for everyone using such a phone to receive directly the call for him/herself without anyone else or other device forwarding the call. | 10-09-2008 |
20080313615 | REMOTE SERVLETS COLLABORATION - Presents remote servlets collaboration. A method includes: creating a common registry; creating an extended context in response to an external request, wherein the extended context can invoke the resources within the common registry; performing initializing configuration on a plurality of servlets, and registering a plurality of servlets in the common registry, wherein a plurality of servlets being located on different Java virtual machines, or being located in different servlet containers on the same Java virtual machine; and a plurality of servlets collaborate with each other by being invoked through the extended context. It can implement collaboration between servlets located on different virtual machines or even servlets on the same virtual machine but within different servlet containers, because in a converged application service system, not only between HTTP servlets or between SIP servlets but also between HTTP servlets and SIP servlets there is necessity to collaborate. | 12-18-2008 |
20090083733 | Installing Software onto a Client through a Network, and Corresponding Client - The present invention relates to a method and system for installing software onto a client in the NIM environment and corresponding client. Said method includes: initializing said client, wherein a virtual mapping device associated with a memory driver of the client is created, the virtual mapping device for scheduling between the client's memory driver and the remote NIM server with respect to the I/O operation for running the software so as to direct the I/O operation for running said software to the client's memory driver or the remote NIM server; running said software on the client; acquiring the resources desired for running software; and conducting data migration operation from the NIM server to the client while running said software, wherein the migrated data is the resource data obtained from NIM server and desired for installing said software; and the software installation being completed when all the data desired for installing said software are migrated to the memory driver of the client. It is unnecessary for the present invention to copy all the installation images to the local client before installing software, therefore time delay of installing OSs or application programs can be shortened or even eliminated. | 03-26-2009 |
20090092131 | Method and Device for Rejecting Redundantly Retransmitted SIP Messages - A method for rejecting received SIP messages which are redundantly retransmitted used in a Session Initiation Protocol (SIP) application architecture. In one embodiment, the method comprises: forwarding all the messages transmitted from a SIP application server to a SIP terminal, and dropping all the received SIP messages redundantly retransmitted from the SIP terminal to the SIP application server according to the transmission direction of said SIP messages; and correspondingly replying to the dropped SIP messages according to the message type thereof. The present invention also provides a corresponding retransmission rejection device and a network device comprising the same, and further provides a method and device for rapidly rejecting redundantly retransmitted SIP messages in the case where the memory space is limited. The present invention can be applied to a network device such as a SIP stateless proxy at a front end of a SIP application server cluster. | 04-09-2009 |
20090122785 | VoIP ADAPTER, IP NETWORK DEVICE AND METHOD FOR PERFORMING ADVANCED VoIP FUNCTIONS - A VoIP adapter for POTS a phone comprises: a POTS phone connector, an IP network interface, two sets of signaling senders, signaling receivers, media senders and media receivers for the POTS phone and the IP network respectively, and a controller for controlling the operations of above components. The VoIP adapter enables the user to carry out VoIP communications using a normal POTS phone and further enables use of advanced VoIP functions via the normal POTS phone, such as Call Hold, Call Transfer, Ad Hoc Conference, etc. | 05-14-2009 |
20100070633 | Method and Apparatus for Improving SIP Parse Performance - The present invention discloses a method and an apparatus for improving SIP parse performance. The method comprising the steps of: receiving a text-based SIP message to be sent to a SIP server; according to a SIP message filter table, determining whether the text-based SIP message needs to be transformed to a token-based message; and in the case that the text-based SIP message needs to be transformed to a token-based message, performing the transformation and sending the transformed token-based message to said SIP server, otherwise directly sending the text-based SIP message to said SIP server. According to the present invention, larger SIP message throughput in a SIP server and better utilization of resources of a front end device can be achieved. | 03-18-2010 |
20100077084 | PROCESSING SIP MESSAGES BASED ON MULTIPLE CORES - A method and an apparatus of processing Session Initiation Protocol (SIP) messages based on multiple cores. The method comprises: pre-parsing a received SIP message to obtain an identifier of the SIP message; dispatching SIP messages with the same identifier to the same core; and processing, on each core, SIP messages dispatched to the core by using related dedicated resources. The present invention relieves the resource contention and thus improves the utilization efficiency of computing resources of cores. | 03-25-2010 |
20110029812 | METHOD AND SYSTEM FOR RECOVERING SIP TRANSACTION - A method and system for recovering a SIP transaction. The method including monitoring an event related to transaction change; recording information related to the event; and regenerating a transaction by use of the recorded information upon failover. A system is also provided to carry out the steps of the method. Through the present invention, a transaction may be regenerated upon occurrence of failure during the transaction period, thereby enabling transaction-level failover and noticeably reducing the information load needed to recorded compared with the prior art. The present invention not only improves reliability of a SIP-based service but also requires less overhead for transaction recovery. | 02-03-2011 |
20110088121 | Genes for improving salt tolerance and drought tolerance of plant and the uses thereof - Provide a nucleotide coding sequence and another nucleotide coding sequence artificially synthesized according to biased codons of plant. Construct recombinant vectors containing the genes as above and transform them into host cells including prokaryotic cells and eukaryotic cells. It is confirmed that the resulting transgenic plant has improved salt and drought tolerance after the said genes are expressed in the plant. | 04-14-2011 |
20110173716 | EPSP synthase with high glyphosate resistance and its encoded sequence - An EPSP synthase (5-enolpyruvylshikimate-3-phosphate synthase) with high glyphosate resistance and a nucleotide sequence encoding the synthase are disclosed. The gene encoding the EPSP synthase has low homology with the reported EPSP synthase. A transgenic plant obtained by the expression of the gene in plant has an increased resistance to glyphosate after experimental confirmation. | 07-14-2011 |
20130007276 | METHOD AND APPARATUS FOR IMPROVING SIP PARSE PERFORMANCE - A method and an apparatus are disclosed for improving SIP parse performance. The method comprises the steps of: receiving a text-based SIP message to be sent to a SIP server; according to a SIP message filter table, determining whether the text-based SIP message needs to be transformed to a token-based message; and in the case that the text-based SIP message needs to be transformed to a token-based message, performing the transformation and sending the transformed token-based message to said SIP server, otherwise directly sending the text-based SIP message to said SIP server. According to the present principles, larger SIP message throughput in a SIP server and better utilization of resources of a front end device can be achieved. | 01-03-2013 |
20130017656 | METHOD OF FABRICATING A SEMICONDUCTOR DEVICEAANM Wei; QingsongAACI BeijingAACO CNAAGP Wei; Qingsong Beijing CNAANM Lu; WeiAACI BeijingAACO CNAAGP Lu; Wei Beijing CNAANM Liu; WupingAACI BeijingAACO CNAAGP Liu; Wuping Beijing CNAANM He; YonggenAACI BeijingAACO CNAAGP He; Yonggen Beijing CN - A method of fabricating semiconductor device is provided. First, a recess having a substantially rectangular cross section is formed in a substrate. Then, oxide layers are formed on sidewalls and bottom of the recess by oxygen ion implantation process, wherein oxide layer on sidewalls of recess is thinner than oxide layer on bottom of recess. Thereafter, oxide layer on sidewalls of recess is completely removed, and only a portion of oxide layer on bottom of recess remains. Then, sidewalls of recess are shaped into Σ form by orientation selective wet etching using oxide layer remained on bottom of recess as a stop layer. Finally, oxide layer on bottom of recess is removed. By forming oxide layer on bottom of recess and using it as stop layer in subsequent orientation selective wet etching, the disclosed method can prevent a Σ-shaped recess with a cuspate bottom. | 01-17-2013 |
20130173149 | NAVIGATION SYSTEM WITH GRADE-SEPARATION DETECTION MECHANISM AND METHOD OF OPERATION THEREOF - A method of operation of a navigation system includes: identifying a device location; selecting a maneuver type with the device location; and determining a junction-type with the maneuver type for displaying on a device. | 07-04-2013 |
20130185714 | INSTALLING SOFTWARE ONTO A CLIENT THROUGH A NETWORK, AND CORRESPONDING CLIENT - The present invention relates to a method and system for installing software onto a client in the NIM environment and corresponding client. Said method includes: initializing said client, wherein a virtual mapping device associated with a memory driver of the client is created, the virtual mapping device for scheduling between the client's memory driver and the remote NIM server with respect to the I/O operation for running the software so as to direct the I/O operation for running said software to the client's memory driver or the remote NIM server; running said software on the client; acquiring the resources desired for running software; and conducting data migration operation from the NIM server to the client while running said software, wherein the migrated data is the resource data obtained from NIM server and desired for installing said software; and the software installation being completed when all the data desired for installing said software are migrated to the memory driver of the client. It is unnecessary for the present invention to copy all the installation images to the local client before installing software, therefore time delay of installing OSs or application programs can be shortened or even eliminated. | 07-18-2013 |
20130290305 | DATA FILTERING IN THE INTERNET OF THINGS - This invention relates to the Internet of Things (IOT), and discloses a method and apparatus of data filtering in the IOT, where the IOT includes a plurality of sensor devices. The method includes: inputting an application deployed rule; converting the rule into at least one sub-predicate expression having static predicates and dynamic predicates; inputting data collected by the sensor devices; matching the collected data with the static predicates and the dynamic predicates of the sub-predicate expression in sequence; and distributing matched data to the application. In this invention, a rule is divided into static and dynamic predicates, and a match is performed on static predicates before dynamic predicates, so that the speed of predicate match can be improved and fast and efficient data filtering in the IOT can be achieved. | 10-31-2013 |
20140105011 | METHODS, APPARATUS, A SYSTEM, AND A RELATED COMPUTER PROGRAM PRODUCT FOR ACTIVATION AND DEACTIVATION OF BEARERS - Methods, apparatuses, system and computer program product for activation and/or deactivation of bearers for a group of devices are disclosed. The method comprises receiving an attach request for a device belonging to a group of devices, obtaining an identity of the group of devices, allocating a first bearer identity for the group of devices, and sending the identity of the group and the first bearer identity to a first network element, wherein the first network element is involved in transmission of user data of the group of devices. | 04-17-2014 |
20140334336 | Multi-Tenant Virtual Access Point- Network Resources Virtualization - A method and system for virtualization of access points are disclosed. A venue owner or manager can deploy a plurality of wireless access point hardware units at a physical venue location. Various sets of virtual wireless access points that correspond to the plurality of wireless access point hardware units can be leased to various WLAN network operators, according to certain embodiments. | 11-13-2014 |
20140334467 | Multi-Tenant Virtual Access Point - Access Point Resources Virtualization - A method and system for virtualization of access points are disclosed. Portions of memory resources associated with a respective wireless access point can be subleased to various business entities, according to certain embodiments. | 11-13-2014 |
20150058463 | PROXY METHODS FOR SUPPRESSING BROADCAST TRAFFIC IN A NETWORK - Some embodiments use proxies on host devices to suppress broadcast traffic in a network. Each host in some embodiments executes one or more virtual machines (VMs). In some embodiments, a proxy operates on each host between each VM and the underlying network. For instance, in some of these embodiments, a VM's proxy operates between the VM and a physical forwarding element executing on the VM's host. The proxy monitors the VM's traffic, and intercepts broadcast packets when it knows how to deal with them. The proxy connects to a set of one or more controllers that provides a directory service that collects and maintains global information of the network. By connecting to the controller cluster, the proxy can obtain information that it can use to resolve broadcast requests. In some embodiments, the connection between the proxy and the controller cluster is encrypted and authenticated, to enhance the security. Also, in some embodiments, the connection is an indirect connection through an agent that executes on the host device and connects the proxies of the host device with the controller cluster. | 02-26-2015 |
20150058968 | PROXY METHODS FOR SUPPRESSING BROADCAST TRAFFIC IN A NETWORK - Some embodiments use proxies on host devices to suppress broadcast traffic in a network. Each host in some embodiments executes one or more virtual machines (VMs). In some embodiments, a proxy operates on each host between each VM and the underlying network. For instance, in some of these embodiments, a VM's proxy operates between the VM and a physical forwarding element executing on the VM's host. The proxy monitors the VM's traffic, and intercepts broadcast packets when it knows how to deal with them. The proxy connects to a set of one or more controllers that provides a directory service that collects and maintains global information of the network. By connecting to the controller cluster, the proxy can obtain information that it can use to resolve broadcast requests. In some embodiments, the connection between the proxy and the controller cluster is encrypted and authenticated, to enhance the security. Also, in some embodiments, the connection is an indirect connection through an agent that executes on the host device and connects the proxies of the host device with the controller cluster. | 02-26-2015 |