93.
    发明专利
    未知

    公开(公告)号:BRPI0808629A2

    公开(公告)日:2014-08-05

    申请号:BRPI0808629

    申请日:2008-02-28

    Applicant: MICROSOFT CORP

    Abstract: An error correction system determines a level of error correction protection to apply to a frame of video data to be transmitted by a sending endpoint to a receiving endpoint based on the predicted impact of packet loss as well as the importance of the frame based on inter-frame dependencies, frame size, packet loss probability, historical packet loss pattern, central processing unit (CPU) load, and available network bandwidth. At the receiving endpoint, when packet loss is detected for a particular frame, the receiving endpoint will attempt to recover the frame using protection packets received along with the video data.

    SECURITY LINK MANAGEMENT IN DYNAMIC NETWORKS

    公开(公告)号:CA2407482C

    公开(公告)日:2010-10-26

    申请号:CA2407482

    申请日:2001-02-23

    Applicant: MICROSOFT CORP

    Abstract: A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication. Furthermore, the presentation of a default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.

    96.
    发明专利
    未知

    公开(公告)号:DE60134534D1

    公开(公告)日:2008-08-07

    申请号:DE60134534

    申请日:2001-02-22

    Applicant: MICROSOFT CORP

    Abstract: The invention provides Quality of Service assurances in a manner expected in other media to communications over paths that include one or more wireless links. The invention combines a subnet bandwidth manager ("SBM") at an access point ("AP") to track allocations of wireless bandwidth. The invention further incorporates multiple priority levels for packet transmission in a two-prong stochastic scheme. The first prong reserves bandwidth at each of the intermediate nodes in a transmission path subject to a veto by any intermediate node. The second prong modulates the transmission probability of a packet based on the previous failed attempts at transmission and the priority level of the packet. The overall result of this hybrid scheme is to not shut out users with the lowest priority, e.g., "best effort" priority, while assuring adequate bandwidth to higher priority applications.

    97.
    发明专利
    未知

    公开(公告)号:AT400015T

    公开(公告)日:2008-07-15

    申请号:AT04025103

    申请日:2001-02-23

    Applicant: MICROSOFT CORP

    Abstract: A method for setting up and managing secure data/audio/video links with secure key exchanges, authentication and authorization is described. An embodiment of the invention enables establishment of a secure link with limited privileges using the machine identifier of a trusted machine. This is particularly useful if the user of the machine does not have a user identifying information suitable for authentication. Furthermore, the presentation of a default user identifying information by a user advantageously initiates intervention by a system administrator instead of a blanket denial. This decentralized procedure allows new users access to the network without having to physically access a centralized facility to present their credentials. Another embodiment of the invention enables a remote user to connect to a secure network with limited privileges.

    98.
    发明专利
    未知

    公开(公告)号:DE60319791D1

    公开(公告)日:2008-04-30

    申请号:DE60319791

    申请日:2003-11-27

    Applicant: MICROSOFT CORP

    Abstract: A computer system attempts to authenticate with a server to gain authorization to access a first network. It is determined by the server that the computer system is not authorized to access the first network. The computer system is given authorization to access a second network for at least the purpose of downloading files (e.g., signup and configuration files) needed to access the first network. A user-interface for receiving user-entered signup information is automatically presented at the computer system. A first schema-based document including user-entered information is transferred to the server. If the server determines that the user-entered information is appropriate, a second-schema document, which includes an indication of authorization to access the first network (e.g., a user-identifier and password), is received. A third schema-based document is executed at the computer system to compatible configure the computer system for accessing the first network.

    99.
    发明专利
    未知

    公开(公告)号:DE602004009637T2

    公开(公告)日:2008-02-07

    申请号:DE602004009637

    申请日:2004-05-12

    Applicant: MICROSOFT CORP

    Abstract: A wireless device that adaptively makes the determination of whether or not to pre-authenticate. If the wireless device (220) is running an application that is sensitive to latency (also referred to herein as a low latency application), then pre-authentication is performed and latency is reduced during the switch between wireless access points (204,205). Such low latency applications may include voice over IP, video, interactive whiteboard, or video teleconferencing. On the other hand, if the wireless device is not running a low latency application, the wireless device is less susceptible to latency when making the wireless access point switch. In that case, pre-authentication is not performed and processing and battery resources are preserved.

    100.
    发明专利
    未知

    公开(公告)号:DE602004009637D1

    公开(公告)日:2007-12-06

    申请号:DE602004009637

    申请日:2004-05-12

    Applicant: MICROSOFT CORP

    Abstract: A wireless device that adaptively makes the determination of whether or not to pre-authenticate. If the wireless device (220) is running an application that is sensitive to latency (also referred to herein as a low latency application), then pre-authentication is performed and latency is reduced during the switch between wireless access points (204,205). Such low latency applications may include voice over IP, video, interactive whiteboard, or video teleconferencing. On the other hand, if the wireless device is not running a low latency application, the wireless device is less susceptible to latency when making the wireless access point switch. In that case, pre-authentication is not performed and processing and battery resources are preserved.

Patent Agency Ranking