Patent application number | Description | Published |
20090214018 | Distributed identifier management - An overlay network of volatile nodes, without centralized servers, using DHT-like search algorithms, is programmed to perform One-Number or One-ID services. A user's public number is either the PSTN or PLMN line that is connected to an overlay node, or a voice (or video) over IP number, which is serviced through the overlay. An overlay node is connected to the Internet, and may connect to a PSTN or PLMN phone line as well. The phone numbers allowed in the One-Number service is generally defined. The One-ID service architecture is based on user-proxy, and does not require social networking other one-ID protocols such as OpenID and protocols suites drafted by OASIS. The user-ID of such a One-ID service is not required to be globally unique while a mapping is used to transform a user-defined non-globally unique ID into a site-specific and site-unique ID. | 08-27-2009 |
20090276298 | Community virtual network operator - A virtual network operator without leasing bandwidths is built with subscribers paying their bandwidths, using installed customer premise equipments as the main part of its infrastructure. These CPEs work together in a P2P manner so that self-sustaining services can be offered without an operator, with only collaborating subscribers forming a community. While the subscriber pays an amount approximating (either above or below) the cost of the installed CPE associated with the operator, the operator provides a plurality and a range of free and fee-based services either directly or through a third party vendor. A preferred CPE is a personal infotainment center device that enables personalized multimedia services such as video conferencing and a plurality of multimedia functions and services. The operator receives revenues from targeted and non-targeted advertisement, e-commerce of all sorts, and the provision of content. | 11-05-2009 |
20090276440 | Embodiments of practical distributed computing - A practical distributed computing system with almost perfect scalability is realized by distributed has table like search and lookup algorithm implemented in a hardware P2P (peer-to-peer) overlay with multiple P2P software overlays. Each software overlay is implemented as an active database. Each hardware overlay node is any IP device, fixed or mobile; while the system can be implemented with or without a server infrastructure. This system is adapted to multiple applications: multi-player gaming, file sharing within a closed user group, media session handover, event trigger, and behavior-based marketing. | 11-05-2009 |
20100100579 | Decentralized signaling for distributed systems - Registration and deregistration of entities in a distributed directory, hosted in a distributed overlay network are carried out in a peer-to-peer manner. The overlay nodes are volatile as every node can attach to or detach from the overlay in an unpredictable manner. Therefore, the distributed directory is volatile as its entries are created and destroyed unpredictably, in accordance with the distributed registration process. The registration and deregistration process can use SIP or other protocols. Application-level connection setup is also carried out on an overlay of volatile nodes, in a peer-to-peer manner using IP as the communications protocol. The application-level setup is aided by a distributed search algorithm, which can be based on DHT (distributed hash table). | 04-22-2010 |
20100195641 | Seamless multi-mode voice - A multi-mode mobile phone device is equipped to store both PSTN and VoIP phone numbers in a unified, multi-formatted manner. Automatic registration of VoIP new user accounts is conducted using an existing cellular phone number, an existing MAC address, or an existing VoIP identifier, without active participation from the user. Registrations of an existing VoIP account's IP addresses are also conducted without the knowledge of the user of a VoIP device. Unified electronic phonebooks and graphical user interfaces present all phone (PSTN and VoIP) numbers with the same format, with an option to display the mode (PSTN or VoIP) associated with each number. Four-way switching between entire inbound and outbound circuit and VoIP calls is accomplished by intercepting CALL and ANSWER commands issued by the user of a mobile dual-mode phone device. Seamless end-to-send call setup is enabled by using a social network of phone devices using a DHT-based search algorithm on a distributed database. | 08-05-2010 |
20100228589 | Behavior-based feedback and routing in social-networking business - A system and method to incentivize members in social networking businesses model is based on historic and time-dependent behavior of members. Bilateral feedback mechanisms are used to influence behaviors of individual members and partners by rewarding benefiting behaviors and penalizing anti-benefiting behaviors explicitly. Rules for selecting matching supplying and demanding sites are also influenced by the historic behaviors of the supplying and demanding members or partners. Paths to route goods and services in a social-networking community are also chosen to increase competitive pricings and the selection of product offerings, based on current and historic behaviors of members and partners. | 09-09-2010 |
20100229220 | System and method for theft and data recovery from lost portable devices - A system and method for theft recovery, data recovery, and privacy protection for portable devices with IP connectivity is implemented either according to a peer-to-peer or client-server model, with a serverless or a server-based infrastructure. In the P2P model, a distributed hash table (DHT) algorithm is used for storing and retrieving the device IP addresses and the device location coordinates when available. An authorized user can set a protected device into a locked mode or the device automatically enters into a locked mode after the device has been operated without proper authorization. In a locked mode, private data is deleted, transferred to a pre-selected storage system, alerts and location coordinates, when available, are to be sent to preselected accounts. Data on a lost portable device can be synchronized with a pre-selected storage system and be restored when the lost device is recovered. | 09-09-2010 |
20100246566 | Serverless gateway infrastructure for voice or video - A system and method to provide voice or video over IP without a centralized control infrastructure is enabled by an overlay network of software devices. Such a device is comprised of VoIP server, PBX, PBX database, and a control module. The control module is used to store and retrieve items stored in the distributed databases hosted on the overlay networks. Two main functions provide by the serverless infrastructure are: VoIP call setup and tear-down, and accounting for a service provider. | 09-30-2010 |
20100250589 | Tree structured P2P overlay database system - A system and methods to construct and maintain a balanced-tree overlay network are used to host distributed databases. As overlay nodes can detach from and re-attach to an overlay unpredictably, overlay protocols must maintain the overlay tree properly to minimize communication overheads associated with store and retrieval operations of the hosted databases. Unlike a DHT (distributed hash table) approach, the balanced-tree approach has the advantages of stabilizibility and provable correctness of the overlay protocols. Fast inquiry can be achieved by using a caching algorithm that allows each overlay node to keep track of data ranges stored in a neighboring set of nodes. Self-healing and load balancing protocols are also incorporated to enhance the performance and stability of the tree-structured overlay. | 09-30-2010 |
20110044204 | Scalable solutions for IP rigidity - An overlay network of connection ID (called CID) processing nodes, called C-nodes, is deployed to solve joint IP mobility, NAT traversal, and path identity problems, in a unified framework. The CIDs can either be globally unique or unique at local C-nodes. CIDs can be modified along a path, and each connection is enabled to send packets in multiple paths via multiple IP networks. It is also possible to direct a path to traverse through a particular node. Double-sided/single-sided mobility, with double-sided/single-sided NAT traversal problems are solved using C-nodes deployed as terminal software, gateways, or relays. | 02-24-2011 |
20110299554 | Solutions for dynamic NAT and firewall traversal - Solution methods for ensuring control and data packets to traverse network address translators (NATs) and firewalls, when a mobile terminal acquires a new (Internet Protocol) address and may move behind a new NAT/firewall are provided. These solutions form an integral part of seamless mobility and multipath packet delivery in IP networks. The solution approach decomposes the problem into downstream control-plane, downstream data-plane, and upstream data-plane sub-problems. The solution is scalable as it does not require a new routing infrastructure, except in the case of traversing a symmetric NAT, a middle box is used as a relay | 12-08-2011 |