[ { "title": "", "publication_date": "2019/02/02", "number": "", "url": "/2019/02/02/2006-07-21-compression-of-data-transmitted-between-server-and-mobile-device/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "", "publication_date": "2019/02/02", "number": "", "url": "/2019/02/02/2006-07-21-automatic-application-definition-distribution/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "", "publication_date": "2019/02/02", "number": "", "url": "/2019/02/02/2006-07-17-automatic-mobile-device-configuration/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "", "publication_date": "2019/02/02", "number": "", "url": "/2019/02/02/2006-06-09-method-system-and-network-server-for-recording-use-of-network-service-capability-by-applications/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "Establishing network policy for session-unaware mobile-device applications", "publication_date": "2006/29/12", "number": "07975053", "url": "/2006/12/29/establishing-network-policy-for-sessionunaware-mobiledevice-applications/", "abstract": "The present invention provides the benefits of negotiated network resources to session-unaware applications. When a session-unaware application runs on a mobile device, the device, knowing that the application is session-unaware, negotiates appropriate network-policy parameters for the application. The application remains unaware, but it receives the benefits of the network-policy parameter negotiation. The network-policy parameter negotiation is carried on between the mobile device and a “network policy mediator” in the network. Together, they reserve the appropriate network resources and secure the appropriate guarantees. In some embodiments, a software “shim” runs in the network-protocol stack on the mobile device. By intercepting network-access attempts sent by the session-unaware application, the shim knows to begin the network-policy parameter negotiation. In some embodiments, the mobile device downloads information about session-unaware applications from the network. This information includes a list of which network-policy parameter guarantees would be most beneficial to each application.", "owner": "United States Cellular Corporation", "owner_city": "Chicago", "owner_country": "US" }, { "title": "Method and system for time-stamping data packets from a network", "publication_date": "2006/14/12", "number": "08102852", "url": "/2006/12/14/method-and-system-for-timestamping-data-packets-from-a-network/", "abstract": "A method for timestamping data packets from a network involves receiving a first data packet from the network, obtaining, from a clock, a timestamp indicating an arrival time of the first data packet, where a network interface controller (NIC) includes the clock, providing the timestamp and the first data packet to a client operatively connected to the NIC, computing a network property using the timestamp, selecting a network protocol based on the network property, and transmitting a second data packet via the NIC using the network protocol.", "owner": "Oracle America, Inc.", "owner_city": "Redwood City", "owner_country": "US" }, { "title": "Architecture for a system and method for work and revenue management", "publication_date": "2006/01/11", "number": "08918506", "url": "/2006/11/01/architecture-for-a-system-and-method-for-work-and-revenue-management/", "abstract": "There is disclosed a system and method for processing requests over an architecture. The architecture may utilize logical partitioning to distribute work load across multiple logical servers in an efficient manager. The system may comprise a router, a directory, at least one logical server, and a wallet server. The router may receive a request from a consumer via the consumer's device and extract a value from the request that identifies the consumer. The router may access the directory, which may contain a map that matches consumers with logical servers, to determine which logical server to forward the request to. The router may then pass the request to the determined logical server. The logical server may process the request by utilizing both generic and network or market specific plug-in processing. If the logical server determines that it does not have the necessary resources or loans to complete a request, then it may communicate with the wallet server to obtain additional loans of wallets containing usage resource. The logical server may generate a reply to the router for audit and transaction assurance, to generate an optional acknowledgement to the system generating the external request.", "owner": "Netcracker Technology Solutions Inc.", "owner_city": "Cincinnati", "owner_country": "US" }, { "title": "Extensible network services system", "publication_date": "2006/27/10", "number": "07805502", "url": "/2006/10/27/extensible-network-services-system/", "abstract": "Automatically finding and using network services. An extensible framework is defined which allows any network service, new or old, to be defined. A base schema is defined that defines existing network services, and extension schemes may also be defined which are specific to new network services. A vendor can define the schemas in XML, as well as using software plug-ins and configuration data. The information is stored on a network provider's server. Clients can browse the network providers server for available services. Any available services can be accepted. When this happens, a form is provided to the client; the client fills out the form; and returns it. The information on the form is associated with the XML schemas and used to select and automatically configure the network service.", "owner": "Intel Corporation", "owner_city": "Santa Clara", "owner_country": "US" }, { "title": "Static update controller enablement in a mesh network", "publication_date": "2006/24/10", "number": "08194569", "url": "/2006/10/24/static-update-controller-enablement-in-a-mesh-network/", "abstract": "In embodiments of the present invention improved capabilities are described for using a primary controller in a mesh network to instruct a static update controller to enable node information server functionality to form a static update controller information server. Capabilities are described for using the static update controller information server to enable other controllers in the mesh network to command other nodes in the mesh network on behalf of the static update controller information server, to distribute an installation process to a plurality of controllers in a mesh network, and the like. The present invention further describes improved capabilities for associating a static update controller with an inclusion controller within a mesh network, associating the inclusion controller with a node slave within the mesh network, transmitting a first data between the static update controller and the inclusion controller, wherein the first data relates at least in part to the node slave, and transmitting a second data between the inclusion controller and the node slave, wherein the second data relates at least in part to the first data transmitted.", "owner": "Sigma Designs, Inc.", "owner_city": "Milpitas", "owner_country": "US" }, { "title": "Apparatus for interfacing a wireless local network and a wired voice telecommunications system", "publication_date": "2006/11/10", "number": "07693101", "url": "/2006/10/11/apparatus-for-interfacing-a-wireless-local-network-and-a-wired-voice-telecommunications-system/", "abstract": "An apparatus for interfacing a wireless local area network with a wide area, cellular or public switched telephone network including the function of a wireless LAN base station or access point, and a gateway. The interface may contain one or more different types of gateways, including a PSTN voice gateway, an analog modem gateway, and others. The apparatus may also include a well designed to receive the handset or mobile computer device to recharge the battery as well as to automatically transfer data when the phone or device is secured in the well.", "owner": "Symbol Technologies, Inc.", "owner_city": "Holtsville", "owner_country": "US" }, { "title": "Remote vehicle control system", "publication_date": "2006/28/09", "number": "07731588", "url": "/2006/09/28/remote-vehicle-control-system/", "abstract": "An apparatus for remotely controlling the movements of a vehicle includes a user input means, such as a gamepad with a plurality of joystick-controlled and button-controlled outputs, a tracker, and optional sliding foot pedals; a processor for running a control mapping algorithm; and a remote vehicle controller. A control mapping algorithm maps the outputs to the remote-controlled vehicle's course, heading, displacement, and camera view, with the joysticks mapped to provide open loop directional control over the vehicle's course and heading, the tracker providing open loop control over the camera view, and the optional sliding foot pedals providing open loop control over the vehicle's displacement. The remote vehicle controller sends commands to on-board controls to direct the vehicle's movement. A video stream from an on-board camera is transmitted back to the operator station for viewing on a computer desktop display or a head mountable display.", "owner": "The United States of America as represented by the Secretary of the Navy", "owner_city": "Washington", "owner_country": "US" }, { "title": "Method and apparatus for universal data exchange gateway", "publication_date": "2006/29/06", "number": "1966672", "url": "/2006/06/29/method-and-apparatus-for-universal-data-exchange-gateway/", "abstract": "A universal gateway that allows data to be transferred between one or more network protocols and one or more control protocols is described. The various protocols can coexist on the same physical network medium or on separate networks. The gateway also provides tunneling of network protocols through a selected protocol, and centralized control of network nodes. By using the gateway, end-users can mesh together traditionally standalone, incompatible, networks into a universally accessible, centrally administered, “super-network.” The gateway provides a centralized node database, support for legacy protocols, a rules engine, and an object-oriented class library interface. Configuration is simplified through automatic device discovery. The centralized node database is managed by an active server node. High reliability access to the centralized node database is enhanced by the system fault tolerance provided by standby server nodes. When used in connection with a power line network, the gateway provides the ability to distribute various types of data streams over the power line. Routing handlers provided by the gateway allow virtually any of the legacy data networking services such as TCP/IP to be routed over the power-line.", "owner": "Thomson Licensing", "owner_city": "Boulogne-Billancourt", "owner_country": "FR" }, { "title": "Multi-speed mesh networks", "publication_date": "2006/22/06", "number": "08509790", "url": "/2006/06/22/multispeed-mesh-networks/", "abstract": "In embodiments of the present invention improved capabilities are described for a communications facility that is adapted to communicate with at least one other mesh network node at a communication speed selected from a plurality of communication speeds.", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "Secure delivery of flash content over networks", "publication_date": "2006/17/05", "number": "08190752", "url": "/2006/05/17/secure-delivery-of-flash-content-over-networks/", "abstract": "A method for securing delivery of flash content over a network includes rewriting flash content action code capable of making a network request for flash content to redirect network communication associated with the flash content to a network device.", "owner": "Juniper Networks, Inc.", "owner_city": "Sunnyvale", "owner_country": "US" }, { "title": "Transparent virtual machine for mobile applications", "publication_date": "2006/18/04", "number": "07734583", "url": "/2006/04/18/transparent-virtual-machine-for-mobile-applications/", "abstract": "The inclusion of metadata within an application description file allows a virtual machine to create an application descriptor file that may be registered with the mobile device operating system so that an icon associated with the application description file may be displayed in the main ribbon. Execution of an application defined by the application definition file may then be initiated by the selection, by the user, of the icon that is associated with the application definition file. This improves over the situation wherein execution of the application defined by the application definition file would require a selection of the runtime environment for the application and then the selection of the application.", "owner": "Research in Motion Limited", "owner_city": "Waterloo, Ontario", "owner_country": "CA" }, { "title": "Selective tunneling based on a client configuration and request", "publication_date": "2006/22/03", "number": "08572219", "url": "/2006/03/22/selective-tunneling-based-on-a-client-configuration-and-request/", "abstract": "A system, apparatus, and method are directed to network communication over a tunnel by downloading selective tunneling (STM) components into memory of a client device. The STM components selectively employ tunneling to route network traffic to a requested resource. The STM components may include a network API, application, and a tunnel manager that have been modified based in part on a client configuration. As a network request is made it is evaluated against the client configuration. If the connection is to be tunneled, a network tunnel is selectively established. If the client configuration and/or the request indicate that the request is to be un-tunneled, an un-tunneled network connection may instead be established. The client configuration may also indicate that the client device is to be redirected to enable remediation. When the application component is closed, or otherwise terminated, the client's memory may be purged of the loaded STM components.", "owner": "F5 Networks, Inc.", "owner_city": "Seattle", "owner_country": "US" }, { "title": "Barricading a computer system when installing or migrating software", "publication_date": "2006/14/03", "number": "08424088", "url": "/2006/03/14/barricading-a-computer-system-when-installing-or-migrating-software/", "abstract": "During a migration or installation of a software application (e.g., a security software application), a computer can be left vulnerable to attack by malicious code. However, a computer can be protected during an installation process by disabling routes through which a malicious attack might occur. More specifically, a determination module determines that the installation process for the security software application will be performed. When the installation process begins, a communication disabling module disables substantially all communication through external network connection ports for the computer that are unneeded for the installation process. In some embodiments, a process restriction module also restricts execution of processes which are not associated with the installation of the security software application. An installation module allows the installation process for the security software application to be performed on the computer. A communication reopening module then reopens the communication through the external network connection ports upon completion of the installation process.", "owner": "Symantec Corporation", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Automatic connection and query management", "publication_date": "2006/14/03", "number": "07797709", "url": "/2006/03/14/automatic-connection-and-query-management/", "abstract": "A method for accessing data from a network storage medium is disclosed. An application supplies a query interface to a software object. The software object then establishes a connection between the application and the network storage medium using database information supplied by the query interface. Next, an annotated method supplied by the query interface is executed using logic provided by the software object. After the transactions have ended, the annotated method closes the connection between the application and the network storage medium.", "owner": "Oracle America, Inc.", "owner_city": "Redwood City", "owner_country": "US" }, { "title": "Selectively enabling packet concatenation based on a transaction boundary", "publication_date": "2006/02/03", "number": "08565088", "url": "/2006/03/02/selectively-enabling-packet-concatenation-based-on-a-transaction-boundary/", "abstract": "A system, apparatus, and method are directed towards selectively combining data into a packet to modify a number of packets transmitted over a network based on a detection of a transaction boundary. If it is determined to concatenate the data, such concatenation may continue until an acknowledgement (ACK) is received, or a predetermined amount of data is concatenated in the packet, or a transaction boundary is detected. If at least one of these conditions is satisfied, concatenation may be inhibited, and the packet may be sent. Concatenation is then re-enabled. In one embodiment, Nagle's algorithm is used for concatenating data into a packet. In one embodiment, an ACK may be sent based on a write completion indicator included within a packet. Receipt of the ACK may disable concatenation.", "owner": "F5 Networks, Inc.", "owner_city": "Seattle", "owner_country": "US" }, { "title": "Identifying a computer device", "publication_date": "2006/15/02", "number": "07958226", "url": "/2006/02/15/identifying-a-computer-device/", "abstract": "A computer architecture for enterprise device applications that provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. The unique identity is independent of a network-address. Security information and a network address may be associated with the unique identity.", "owner": "Oracle International Corporation", "owner_city": "Redwood Shores", "owner_country": "US" } ]