Patent application number | Description | Published |
20090081946 | Placement of Gateways Away from Service Beams - A method is presented for transmitting data in a satellite system having multiple spot beams comprising ( | 03-26-2009 |
20090298416 | Satellite Architecture - A method is presented for transmitting data in a satellite system having multiple spot beams comprising (1) sending a broadband signal in a forward direction from a gateway terminal to a communications satellite for relay to at least one subscriber terminal, (2) receiving the broadband signal at the communications satellite, wherein the communications satellite comprises a bent pipe repeater having a plurality of satellite-based transmission amplifiers, (3) using one of the plurality of satellite-based transmission amplifiers to amplify the broadband signal and no other broadband signal from the gateway terminal, to produce an amplified broadband signal, (4) sending the amplified broadband signal as one of a plurality of service spot beams to the at least one subscriber terminal, and (5) receiving and retrieving data from the amplified broadband signal at the at least one subscriber terminal. | 12-03-2009 |
20090300353 | TRUSTED NETWORK INTERFACE - Systems and methods for combating and thwarting attacks by cybercriminals are provided. Network security appliances interposed between computer systems and public networks, such as the Internet, are configured to perform defensive and/or offensive actions against botnets and/or other cyber threats. According to some embodiments, network security appliances may be configured to perform coordinated defensive and/or offensive actions with other network security appliances. | 12-03-2009 |
20100008225 | SYSTEM FOR CHANNEL CONGESTION MANAGEMENT - A system for managing data traffic in a multi-user multiple-simultaneous-access (MUMSA) environment, for example in a code reuse multiple access (CRMA) environment or other physical environment having true random access with more than one transmission present at the same time, the system including a channel load estimator for multiple users, a congestion threshold calculator using the estimate of channel load to calculate threshold on an ongoing basis, a tester at each terminal performing an experiment using that congestion threshold value and a random number generator to determine if a packet is eligible to be transmitted, a traffic controller for transferring downstream virtual channel traffic and a redistributing mechanism for redistributing user terminals to affiliate with the proper downstream virtual channel. | 01-14-2010 |
20100037308 | MULTI-SERVICE PROVIDER AUTHENTICATION - Network access providers implement interactive procedures and subscriber terminals employ embedded secure authentication structures and procedures to ensure that a satellite modem at the subscriber terminal accurately verifies the identity of a satellite modem terminal system at the location of the network access provider gateway facility during the satellite modem initialization process so that the satellite modem will only attempt to acquire satellite resource from the appropriate (authenticated and authorized) satellite modem termination system. In a virtual downstream channel environment, diverse downstream channel feeds are distinguished by authentication procedures. The present invention differs from standard theft of service prevention because theft of subscriber prevention is in a virtual channel environment, where subscriber terminals have access to a plurality of virtual channels by the nature of the signal. | 02-11-2010 |
20120276840 | Satellite Architecture - A method is presented for transmitting data in a satellite system having multiple spot beams comprising (1) sending a broadband signal in a forward direction from a gateway terminal to a communications satellite for relay to at least one subscriber terminal, (2) receiving the broadband signal at the communications satellite, wherein the communications satellite comprises a bent pipe repeater having a plurality of satellite-based transmission amplifiers, (3) using one of the plurality of satellite-based transmission amplifiers to amplify the broadband signal and no other broadband signal from the gateway terminal, to produce an amplified broadband signal, (4) sending the amplified broadband signal as one of a plurality of service spot beams to the at least one subscriber terminal, and (5) receiving and retrieving data from the amplified broadband signal at the at least one subscriber terminal. | 11-01-2012 |
20120317617 | CROSS DOMAIN NOTIFICATION - A method for a mobile communication device to indicate activity associated with an operating domain includes establishing a plurality of operating domains for the mobile communication device each operating as an independent virtual machine. The method also includes providing a trusted indicator at the mobile communication device for indicating activity associated with a high-side domain. The method also includes providing an input on the mobile communication device for switching from a low-side domain to the high-side domain. The method also includes providing a trusted element for the mobile communication device that is independent of either the high-side domain or the low-side domain. The trusted element may be configured to receive a signal from the input for switching from the low-side domain to the high-side domain and to perform user authentication for switching from the low-side domain to the high-side domain. | 12-13-2012 |
20130157645 | CROSS DOMAIN NOTIFICATION - A method for a mobile communication device to indicate activity associated with an operating domain includes establishing a plurality of operating domains for the mobile communication device each operating as an independent virtual machine. The method also includes providing a trusted indicator at the mobile communication device for indicating activity associated with a high-side domain. The method also includes providing an input on the mobile communication device for switching from a low-side domain to the high-side domain. The method also includes providing a trusted element for the mobile communication device that is independent of either the high-side domain or the low-side domain. The trusted element may be configured to receive a signal from the input for switching from the low-side domain to the high-side domain and to perform user authentication for switching from the low-side domain to the high-side domain. | 06-20-2013 |
20130303146 | Multiple Domain Smartphone - A smartphone is adapted, through software modifications, to provide multiple operating domains or domains that provide differing levels of security and reliability. Each operating domain is isolated from the others. Detection of unauthorized modification is provided in some embodiments. Cross domain activity notification is provided in some embodiments. | 11-14-2013 |
20130336203 | SATELLITE ARCHITECTURE - A method is presented for transmitting data in a satellite system having multiple spot beams comprising (1) sending a broadband signal in a forward direction from a gateway terminal to a communications satellite for relay to at least one subscriber terminal, (2) receiving the broadband signal at the communications satellite, wherein the communications satellite comprises a bent pipe repeater having a plurality of satellite-based transmission amplifiers, (3) using one of the plurality of satellite-based transmission amplifiers to amplify the broadband signal and no other broadband signal from the gateway terminal, to produce an amplified broadband signal, (4) sending the amplified broadband signal as one of a plurality of service spot beams to the at least one subscriber terminal, and (5) receiving and retrieving data from the amplified broadband signal at the at least one subscriber terminal. | 12-19-2013 |
20140090060 | TRUSTED NETWORK INTERFACE - Systems and methods for combating and thwarting attacks by cybercriminals are provided. Network security appliances interposed between computer systems and public networks, such as the Internet, are configured to perform defensive and/or offensive actions against botnets and/or other cyber threats. According to some embodiments, network security appliances may be configured to perform coordinated defensive and/or offensive actions with other network security appliances. | 03-27-2014 |
20140269484 | DELAYCAST QUEUE PRIORITIZATION - Systems and methods are described for optimizing resource utilization in a communications network while also optimizing subscriber engagement with media content over the communications network. Requested content objects can be identified as delayable objects that can be queued for opportunistically delayed communication to both requesting and non-requesting subscribers. Queued delayed content objects are scored with an eye toward optimizing both subscriber engagement and utilization of opportunistically available communications link resources. For example, a storage manager calculates a likelihood that each subscriber will engage with the content if it is opportunistically delivered, and a scheduler calculates a priority order in which to queue each requested delayable content object. Content objects can then be multicast to the subscribers in priority order and with associated information that can be used by the subscribers to determine whether to locally store the content objects as they are opportunistically received. | 09-18-2014 |