Smart scan for bluetoothpan device
    1.
    发明专利
    Smart scan for bluetoothpan device 有权
    智能扫描蓝牙设备

    公开(公告)号:JP2005176347A

    公开(公告)日:2005-06-30

    申请号:JP2004339467

    申请日:2004-11-24

    Abstract: PROBLEM TO BE SOLVED: To provide a system and method for discovering a favorable remote Bluetooth device by a local Bluetooth device and connecting to it.
    SOLUTION: An inquiry scan cache is updated through a regular inquiry. A page scan cache is refreshed through a trial to connect to the favorable remote device. Regularly, more frequently than a regular inquiry scan, a list of available remote devices is formed by entries in an inquiry scan cache connected to each entry in the page scan cache which have succeeded in page scan. In one implementation configuration, a page scan cache holds a limited number of entries, and a policy of the term of validity is applied to respective added entries. In another configuration, an inquiry scan cache is also updated when a remote device tries to connect to a local device.
    COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:提供一种由本地蓝牙设备发现有利的远程蓝牙设备并与之连接的系统和方法。

    解决方案:通过定期查询更新查询扫描缓存。 通过试用版来刷新页面扫描缓存以连接到有利的远程设备。 定期比常规查询扫描频繁,通过连接到页面扫描成功的页面扫描缓存中的每个条目的查询扫描缓存中的条目形成可用远程设备的列表。 在一个实现配置中,页面扫描缓存保存有限数量的条目,并且将有效期限的策略应用于相应的添加的条目。 在另一配置中,当远程设备尝试连接到本地设备时,也会更新查询扫描高速缓存。 版权所有(C)2005,JPO&NCIPI

    Network fingerprinting
    3.
    发明专利
    Network fingerprinting 有权
    网络指纹

    公开(公告)号:JP2005122715A

    公开(公告)日:2005-05-12

    申请号:JP2004272461

    申请日:2004-09-17

    CPC classification number: H04L63/08 H04L63/105 H04L63/1433

    Abstract: PROBLEM TO BE SOLVED: To effectively perform network identification. SOLUTION: A network fingerprinting component for a computerized system issues network identifiers (NID) to computer networks. Identity confidences may be determined for each issued network identifier with respect to current computer networks. Computer network attributes may include passive network attributes and active network attributes. Retrieving values for active network attributes involves generating network traffic. Therefore, passive network attributes may be available with the network fingerprinting component before active network attributes. Learnt identity confidence modifiers may be applied to identity confidences determined independently of active network attributes to achieve more accurate identity confidences sooner. COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:有效执行网络识别。

    解决方案:计算机化系统的网络指纹识别组件向计算机网络发出网络标识符(NID)。 可以针对当前的计算机网络为每个已发布的网络标识符确定身份信息。 计算机网络属性可能包括被动网络属性和活动网络属性。 检索活动网络属性的值涉及生成网络流量。 因此,被动网络属性可能在网络指纹组件在活动网络属性之前可用。 学习的身份信任修饰符可以应用于独立于活动网络属性确定的身份信息,以更快地获得更准确的身份信息。 版权所有(C)2005,JPO&NCIPI

    APPLYING POLICIES TO SCHEDULE NETWORK BANDWIDTH AMONG VIRTUAL MACHINES
    4.
    发明申请
    APPLYING POLICIES TO SCHEDULE NETWORK BANDWIDTH AMONG VIRTUAL MACHINES 审中-公开
    将虚拟机应用于计划网络带宽

    公开(公告)号:WO2011152972A3

    公开(公告)日:2012-03-08

    申请号:PCT/US2011036127

    申请日:2011-05-11

    Applicant: MICROSOFT CORP

    Abstract: Computerized methods, systems, and computer-storage media for allowing virtual machines (VMs) residing on a common physical node to fairly share network bandwidth are provided. Restrictions on resource consumption are implemented to ameliorate stressing the network bandwidth or adversely affecting the quality of service (QoS) guaranteed to tenants of the physical node. The restrictions involves providing a scheduler that dynamically controls networking bandwidth allocated to each of the VMs as a function of QoS policies. These QoS policies are enforced by controlling a volume of traffic being sent from the VMs. Controlling traffic includes depositing tokens into token-bucket queues assigned to the VMs, respectively. The tokens are consumed as packets pass through the token-bucket queues. Upon consumption, packets are held until sufficient tokens are reloaded to the token-bucket queues.

    Abstract translation: 提供了用于允许驻留在公共物理节点上的虚拟机(VM)公平共享网络带宽的计算机化方法,系统和计算机存储介质。 实施对资源消耗的限制,以改善强调网络带宽或不利地影响保证物理节点租户的服务质量(QoS)。 这些限制涉及提供一种调度器,其作为QoS策略的功能动态地控制分配给每个VM的网络带宽。 通过控制从VM发送的流量来实现这些QoS策略。 控制流量包括分别将令牌存储到分配给虚拟机的令牌桶队列中。 令牌被消耗,因为数据包通过令牌桶队列。 消耗后,保持数据包,直到足够的令牌重新加载到令牌桶队列。

    5.
    发明专利
    未知

    公开(公告)号:AT408296T

    公开(公告)日:2008-09-15

    申请号:AT04019631

    申请日:2004-08-18

    Applicant: MICROSOFT CORP

    Abstract: A network fingerprinting component for a computerized system issues network identifiers (NID) for computer networks. Identity confidences may be determined for each issued network identifier with respect to current computer networks. Computer network attributes may include passive network attributes and active network attributes. Retrieving values for active network attributes involves generating network traffic. As a result passive network attributes may be available to the network fingerprinting component before active network attributes. Learned identity confidence modifiers may be applied to identity confidences determined independent of active network attributes to achieve more accurate identity confidence sooner. Better learned identity confidence modifiers may be obtained by comparing identity confidences for a particular computer network determined independently of active network attributes with identity confidences for the computer network determined once active network attributes become available and then adjusting the learned identity confidence modifiers so as to minimize any differences.

    6.
    发明专利
    未知

    公开(公告)号:DE602004016437D1

    公开(公告)日:2008-10-23

    申请号:DE602004016437

    申请日:2004-08-18

    Applicant: MICROSOFT CORP

    Abstract: A network fingerprinting component for a computerized system issues network identifiers (NID) for computer networks. Identity confidences may be determined for each issued network identifier with respect to current computer networks. Computer network attributes may include passive network attributes and active network attributes. Retrieving values for active network attributes involves generating network traffic. As a result passive network attributes may be available to the network fingerprinting component before active network attributes. Learned identity confidence modifiers may be applied to identity confidences determined independent of active network attributes to achieve more accurate identity confidence sooner. Better learned identity confidence modifiers may be obtained by comparing identity confidences for a particular computer network determined independently of active network attributes with identity confidences for the computer network determined once active network attributes become available and then adjusting the learned identity confidence modifiers so as to minimize any differences.

Patent Agency Ranking