Patent application number | Description | Published |
20090164782 | METHOD AND APPARATUS FOR AUTHENTICATION OF SERVICE APPLICATION PROCESSES IN HIGH AVAILABILITY CLUSTERS - A method and communication node that for generate a unique service application process biometric identifier for a service application service application process requesting resources and services to another service application service application process in a High Availability (HA) cluster. The method and communication node further authenticate the requesting service application service application process using the unique service application process biometric identifier and thus allowing communication between the first service application process and the second service application process. | 06-25-2009 |
20100183316 | Methods and Systems for Dynamic Equalization Delay Passive Optical Networks - Systems and methods according to these exemplary embodiments provide for methods and systems improving the protocol efficiency in passive optical networks. Additionally, methods and systems for calculating and transmitting an equalization delay change message are described. | 07-22-2010 |
20100189440 | Methods and Systems for Transmitting Data in Scalable Passive Optical Networks - Systems and methods according to these exemplary embodiments provide for methods and systems that enable decoupling of medium access control (MAC) functions from other optical transceiver functions to, for example, promote scalability of passive optical networks (PONs). A MAC frame processing unit can communicate MAC frames to optical transceiver modules via an interconnect using an encapsulating frame according to another communications protocol, e.g., XAUI. | 07-29-2010 |
20100208747 | OUTPUT DEMULTIPLEXING FOR DYNAMIC BANDWIDTH ALLOCATION IN PASSIVE OPTICAL NETWORKS - Systems and methods according to these exemplary embodiments provide for mechanisms and methods that allow for improving the efficiency of a passive optical network (PON). Upstream data transmission can occur by allowing an optical network unit (ONU) cycle to overlap more than one GPON transmission convergence (GTC) frame. Additionally, or alternatively, multiple different bandwidth maps can be transmitted per dynamic bandwidth allocation (DBA) cycle to inform ONUs of their respective, upstream bandwidth allocations. | 08-19-2010 |
20100208752 | Methods and Systems for Frame Generation in Communication Networks - Exemplary embodiments provide for methods and systems that enable frame generation by fields taken from various queues. Protocol control can also or alternatively be distributed so that one or more header fields can be generated separately from other portions of a frame, e.g., the payload. The one or more header fields can be entered into queues from which they are taken to generate frames. | 08-19-2010 |
20100278533 | BIT MASK TO OBTAIN UNIQUE IDENTIFIER - Methods and communication nodes for assigning unique identifiers to a plurality of nodes. A plurality of data values are maintained in memory, each being associated to one of the nodes. A bit mask value is obtained that, when applied to the plurality of data values, produces a plurality of unique identifiers. The bit mask value is made available to the nodes thereby assigning a unique identifier to each of the nodes. | 11-04-2010 |
20100302079 | METHOD FOR ALIGNING A SERIAL BIT STREAM WITH A PARALLEL OUTPUT - The invention relates to a method and circuit for aligning a serial bit stream with a parallel output. The method comprises latching Q bits from the serial bit stream into a register, locating a position P of a first bit of a start of frame delimiter (SFD) in the register and discarding P-1 bits from the serial bit stream, before the position of the first bit of the SFD, thereby aligning the serial bit stream with the parallel output. The circuit comprises a latch, a fault tolerant analysis logic (FTAL) for locating a position P of a first bit of a start of frame delimiter (SFD) in the register and a shift register for discarding P-1 bits from the serial bit stream, before the position of the first bit of the SFD, thereby aligning the serial bit stream with the parallel output. | 12-02-2010 |
20110138475 | SYSTEMS AND METHOD FOR PROVIDING TRUSTED SYSTEM FUNCTIONALITIES IN A CLUSTER BASED SYSTEM - A framework for providing cluster-wide cryptographic operations, including: signing, sealing, binding, unsealing, and unbinding. The framework includes an interface module (a.k.a., HAT agent) on each of a plurality of nodes in the cluster. Each HAT agent is configured to respond to an application's request for a cluster crypto operation by communication with other HAT agents in the cluster and utilizing a trusted platform module local to the node where the HAT agent resides. | 06-09-2011 |
20120163178 | Multiple-Algorithm Congestion Management - Methods and devices performing management of traffic on a single network device using plural congestion avoidance algorithms are provided. A traffic management method includes (i) separating an incoming traffic in sub-streams of traffic based on at least one characteristic, (ii) managing virtual queues corresponding to the sub-streams of traffic, using congestion avoidance algorithms configured to each operate on one sub-stream of traffic to avoid congestion within a capacity allocated to the one of the at least two sub-streams of traffic, and (iii) dynamically reallocating a total capacity of traffic through the single network device to the virtual queues, a capacity reallocated to a virtual queue depending on a proportion of the incoming traffic, historical or current, in a sub-streams of traffic to which the virtual queue corresponds. | 06-28-2012 |
20120324572 | SYSTEMS AND METHODS THAT PERFORM APPLICATION REQUEST THROTTLING IN A DISTRIBUTED COMPUTING ENVIRONMENT - Methods of managing network traffic in a distributed computing environment include segmenting a plurality of virtual hosts into sub-groups. A first security agent monitors first communications of virtual hosts within a first sub-group of virtual hosts, and a second security agent monitors second communications of virtual hosts within a second sub-group of virtual hosts. Information regarding the first communications and the second communications is collected from the security agents and analyzed to detect a denial of service attack. A defense mechanism is initiated in response to detecting the denial of service attack. | 12-20-2012 |
Patent application number | Description | Published |
20100192388 | METALLIZED CUTLERY AND TABLEWARE AND METHOD THEREFOR - A plastic cutlery item molded from a plastic material, such as polystyrene, having a metallic coating that imparts to this cutlery item the appearance of metal cutlery or silverware. In one embodiment the plastic cutlery or tableware items are molded using injection molding techniques, and subjected to a vacuum metallizing process in an individualized non-contiguous manner, where a thin metallic layer is deposited on at least one of their surfaces. The resultant items simulate the appearance of metal cutlery or tableware. In one embodiment of the invention the plastic cutlery or tableware articles are molded from a clear polystyrene resin and are coated with a thin stainless steel layer through vacuum sputtering deposition on only one of the sides. The abrasion resistance of the metallic coating can be enhanced by subjecting the articles to a post-metallizing holding period or by applying a clear protective overcoat. | 08-05-2010 |
20120192435 | METALLIZED CUTLERY AND TABLEWARE AND METHOD THEREFOR - A plastic cutlery item molded from a plastic material, such as polystyrene, having a metallic coating that imparts to this cutlery item the appearance of metal cutlery or silverware. In one embodiment the plastic cutlery or tableware items are molded using injection molding techniques, and subjected to a vacuum metallizing process in an individualized non-contiguous manner, where a thin metallic layer is deposited on at least one of their surfaces. The resultant items simulate the appearance of metal cutlery or tableware. In one embodiment of the invention the plastic cutlery or tableware articles are molded from a clear polystyrene resin and are coated with a thin stainless steel layer through vacuum sputtering deposition on only one of the sides. The abrasion resistance of the metallic coating can be enhanced by subjecting the articles to a post-metallizing holding period or by applying a clear protective overcoat. | 08-02-2012 |
20140106145 | METALLIZED CUTLERY AND TABLEWARE AND METHOD THEREFOR - A tableware item molded from a plastic material, such as polystyrene has a metallic coating applied to at least one surface by a sputtering deposition process. The sputtered coating is suitable for food contact without an overcoat, and imparts the appearance of a metal tableware item. In embodiments, the tableware item is a cup, a plate, a bowl, a tray, a lid, a glass, a champagne flute, a goblet, a napkin ring, a candle holder, or a centerpiece receptacle. The metallic coating can be silver, steel, stainless steel, chromium, aluminum, copper, or gold. In some embodiments, the metallic coating is not applied to all surfaces of the tableware item. In various embodiments, the tableware article is molded from a clear polystyrene resin and coated with a thin stainless steel layer on only one side. The abrasion resistance of the metallic coating can be enhanced by applying a clear protective overcoat. | 04-17-2014 |
Patent application number | Description | Published |
20120082313 | PRIVACY CONTROL FOR WIRELESS DEVICES - According to various embodiments, a computer-implemented method is disclosed that includes receiving, at a wireless adaptor of a device, a wireless data packet from an access point (AP), wherein the wireless data packet includes a Basic Service Set Identifier (BSSID) of the AP; changing the BSSID of the received data packet by a processor or hardware to produce a modified wireless data packet; and transmitting the modified wireless data packet to an application on the device. | 04-05-2012 |
20120159172 | SECURE AND PRIVATE LOCATION - Systems and methods of restricting access to mobile platform location information may involve receiving, via a link, location information for a mobile platform at a processor of the mobile platform, and preventing unauthorized access to the location information by an operating system associated with the mobile platform. | 06-21-2012 |
20130094489 | PRIVACY CONTROL FOR WIRELESS DEVICES - According to various embodiments, a computer-implemented method is disclosed that includes receiving, at a wireless adaptor of a device, a wireless data packet from an access point (AP), wherein the wireless data packet includes a Basic Service Set Identifier (BSSID) of the AP; changing the BSSID of the received data packet by a processor or hardware to produce a modified wireless data packet; and transmitting the modified wireless data packet to an application on the device. | 04-18-2013 |
Patent application number | Description | Published |
20160093479 | Compact Mass Spectrometer - A miniature mass spectrometer is disclosed comprising an atmospheric pressure ionisation source and a first vacuum chamber having an atmospheric pressure sampling orifice or capillary, a second vacuum chamber located downstream of the first vacuum chamber and a third vacuum chamber located downstream of the second vacuum chamber. An ion detector is located in the third vacuum chamber. A first RF ion guide is located within the first vacuum chamber and a second RF ion guide is located within the second vacuum chamber. The ion path length from the atmospheric pressure sampling orifice or capillary to an ion detecting surface of the ion detector is ≦400 mm. The mass spectrometer further comprises a tandem quadrupole mass analyser, a 3D ion trap mass analyser, a 2D or linear ion trap mass analyser, a Time of Flight mass analyser, a quadrupole-Time of Flight mass analyser or an electrostatic mass analyser arranged in the third vacuum chamber. The product of the pressure P | 03-31-2016 |
20160093480 | Compact Mass Spectrometer - A miniature mass spectrometer is disclosed comprising an atmospheric pressure ionisation source, a first vacuum chamber having an atmospheric pressure sampling orifice or capillary, a second vacuum chamber located downstream of the first vacuum chamber and a third vacuum chamber located downstream of the second vacuum chamber. A first vacuum pump is arranged and adapted to pump the first vacuum chamber, wherein the first vacuum pump is arranged and adapted to maintain the first vacuum chamber at a pressure <10 mbar. A first RF ion guide is located within the first vacuum chamber. An ion detector is located in the third vacuum chamber. The ion path length from the atmospheric pressure sampling orifice or capillary to an ion detecting surface of the ion detector is ≦400 mm. The mass spectrometer further comprises a split flow turbomolecular vacuum pump comprising an intermediate or interstage port connected to the second vacuum chamber and a high vacuum (“HV”) port connected to the third vacuum chamber. The first vacuum pump is also arranged and adapted to act as a backing vacuum pump to the split flow turbomolecular vacuum pump. The first vacuum pump has a maximum pumping speed ≦10 m | 03-31-2016 |
20160111266 | Compact Mass Spectrometer - A miniature mass spectrometer is disclosed comprising an atmospheric pressure ionisation source, a first vacuum chamber having an atmospheric pressure sampling orifice or capillary, a second vacuum chamber located downstream of the first vacuum chamber and a third vacuum chamber located downstream of the second vacuum chamber. An ion detector is located in the third vacuum chamber. A first RF ion guide is located within the first vacuum chamber and a second RF ion guide is located within the second vacuum chamber. The ion path length from the atmospheric pressure sampling orifice or capillary to an ion detecting surface of the ion detector is ≦400 mm. The product of the pressure P | 04-21-2016 |