
180 Park Ave - Building 103
Florham Park, NJ
System And Method Of Generating A Per Sale Watermarking On Digital Files,
Tue Mar 19 17:25:26 EDT 2013
A system, method and computer readable media provided for watermarking a digital file. The method comprises altering samples of the digital file available for distribution upon request by adding a number such as + or a -1 to each sample of the digital file according to a probability value and compressing the digital file with the altered samples. Altering the sample of the digital file may be done on a per distribution or per sale basis.
Seamless Data Networking,
Tue Jan 22 17:24:47 EST 2013
A roaming client in communication with an enterprise site through a virtual private network (VPN) gateway maintains an address for a virtual network interface upon becoming a resident client at the enterprise site. A physical interface for the resident includes two valid addresses. Seamless data networking is achieved while promoting routing efficiency by reducing the amount of local traffic addressed to and from the virtual address that is unnecessarily routed through VPN gateways.
Method And System For Managing Multiple Networks Over A Set Of Ports,
Tue Jun 05 16:10:37 EDT 2012
A system has a switch that allows virtual private networks to be created dynamically. The system includes at least one network. The system also includes a computer having an address. The system also includes a plurality of ports for coupling to the computer. The system also includes a switch that assigns one of the plurality of ports to a private network according to the address of the computer. The switch assigns the port by correlating the address with an address list.
Gateway Radio Frequency Identification Tag System,
Tue Apr 24 16:10:14 EDT 2012
A system and method are disclosed for transporting deterministic traffic in a gigabit passive optical network. A system that incorporates teachings of the present disclosure may include, for example, an Optical Line Termination (OLT) for exchanging data traffic in a Gigabit Passive Optical Network (GPON) having a controller programmed to generate a timeslot schedule for transport of a desired bandwidth of constant bit rate (CBR) data traffic by selecting one or more timeslots from periodic frame clusters operating according to a GPON Transmission Convergence (GTC) protocol. Additional embodiments are disclosed.
Tracking Variable Conditions Using Radio Frequency Identification,
Tue Jan 31 16:09:10 EST 2012
A method and system for tracking variable conditions using radio frequency identification (RFID) are disclosed. In embodiments of the present invention, an RFID sensor tag is used to measure a condition. The condition can be any measurable condition such as location, temperature, humidity, pressure, time, date, inertial measurements, etc. Variable data representing the measured condition is read from the RFID sensor tag in order to track the measured condition. The variable data can be read from RFID sensor tags in addition to reading tag identification data from RFID tags, so that the variable data can be associated with tag identification data.
Method And System For Telephony And High Speed Data Access On A Broadband Access Network,
Tue Jan 31 16:09:10 EST 2012
A system and method for providing telephony and high-speed data access over a broadband access network, comprising a network interface unit (NIU) coupled to a backup local exchange carrier (LEC) line, the broadband access network coupled to the NIU, an intermediate point-of-presence (IPOP) coupled to the broadband access network, and at least one external access network coupled to the IPOP. The system also provides for a fail-safe mode in which the NIU supports the LEC line for lifeline services.
Radiation Detection With Enhanced RFID Tags,
Tue Aug 16 16:05:59 EDT 2011
An identification tag that is vulnerable to ionizing or non-ionizing radiation and system for determining the presence of radiation based on corrupted or altered memory in the tag is disclosed. An identification tag comprises: a transceiver for receiving an RF signal and transmitting a modulated RF signal; first memory containing a first code for generating the modulated RF signal, the first code being associated with an object for identification; and second memory containing a second code corresponding to a unique identifier for the tag for further modulating the received RF signal, the second memory being specifically vulnerable to ionizing or non-ionizing radiation such that the presence of ionizing or non-ionizing radiation alters or corrupts the second code, wherein the detection of the altered or corrupted code can be employed to indicate the presence of radiation.
Identifying Analog Access Line Impairments Using Digital Measurements,
Tue Jun 07 16:05:22 EDT 2011
The preferred embodiments include a method, system or computer-readable storage medium for identifying analog access line impairments in a communications network. The embodiments include determining a ping packet loss count and a ping failure count from digital packet loss data associated with at least one analog access line. The embodiments also include generating a line designation for the at least one analog access line in response to the ping packet loss count exceeding a first threshold and the ping failure count exceeding a second threshold. Also, a plurality of pings can be transmitted during a testing period, the digital packet loss data being generated in response to the plurality of pings. The first threshold can represent at least a three percent ping packet loss. The second threshold can represent the ping failure count being at least ten percent of a total number of the plurality of pings.
Gateway Radio Frequency Identification Tag System,
Tue Mar 08 16:04:36 EST 2011
The specification describes a new architecture for RFID systems that is adapted to process large numbers of RFID tags and provide information about a large number of items. The system provides for multiple tag readers. The tag readers are active and have both transmit and receive capability. The system includes a gateway tag that receives information about individual items from the multiple readers and thus contains data on the entire inventory of items. This allows each of the multiple readers to conveniently access data for the entire inventory of items.
Flexible Automated Connection To Virtual Private Networks,
Tue Nov 02 15:04:59 EDT 2010
A network interface unit is provided for use intermediate a LAN and a public or private network, or a combination of both, for establishing secure links to a VPN gateway. Login by a LAN client with the network interface unit, addressing, authentication, and other configuration operations achieved using a web page-based GUI are applied in establishing tunnels from LAN clients to desired VPN destinations. Illustrative network interface units include a DHCP server and provide encryption-decryption and encapsulation-decapsulation of data packets for communication with VPN nodes. Configuration and connection of a client are further enhanced by a built-in DNS server and other functional servers to provide a high degree of autonomy in establishing connections to a desired VPN gateway via an ISP or other public and/or private network links to. The interface unit then performs required authentication exchanges, and required encryption key exchanges.
System For Automated Connection To Virtual Private Networks Related Applications,
Tue Nov 02 15:04:58 EDT 2010
A network interface unit is provided for use intermediate a LAN and a public or private network, or a combination of both, for establishing secure links to a VPN gateway. Login by a LAN client with the network interface unit, addressing, authentication, and other configuration operations achieved using a web page-based GUI are applied in establishing tunnels from LAN clients to desired VPN destinations. Illustrative network interface units include a DHCP server and provide encryption-decryption and encapsulation-decapsulation of data packets for communication with VPN nodes. Configuration and connection of a client are further enhanced by a built-in DNS server and other functional servers to provide a high degree of autonomy in establishing connections to a desired VPN gateway via an ISP or other public and/or private network links to. The interface unit then performs required authentication exchanges, and required encryption key exchanges.
Tracking Variable Conditions Using Radio Frequency Identification,
Tue Feb 09 15:03:26 EST 2010
A method and system for tracking variable conditions using radio frequency identification (RFID) are disclosed. In embodiments of the present invention, an RFID sensor tag is used to measure a condition. The condition can be any measurable condition such as location, temperature, humidity, pressure, time, date, inertial measurements, etc. Variable data representing the measured condition is read from the RFID sensor tag in order to track the measured condition. The variable data can be read from RFID sensor tags in addition to reading tag identification data from RFID tags, so that the variable data can be associated with tag identification data.
Method And Apparatus For Protecting The Quality Of Service Of Voice And Data Services Over Variable Bandwidth Access Networks,
Tue Jun 09 16:07:29 EDT 2009
A terminal adapter for guaranteeing the quality of service of both voice and data packets is disclosed. Such quality is ensured by inserting gaps between successive data packets in a stream of multiplexed data and/or voice packets. A gap after a particular data packet is proportional to the size of that particular data packet. In this way, bandwidth is preserved for any voice packets that may have arrived during the transfer of the data packet as well as for any voice packets that arrive during the gap. The unconstrained upstream data bandwidth and the bandwidth used by voice calls may each be estimated by taking a plurality of instantaneous measurements of the available bandwidth and/or taking individual direct measurements. The size of data packets may be limited to a maximum size in order to ensure that time-sensitive voice packets experience only an acceptable delay in queue for transmission.
Method and system for managing multiple networks over a set of ports,
Tue Nov 11 18:13:09 EST 2008
A system has a switch that allows virtual private networks to be created dynamically. The system includes at least one network. The system also includes a computer having an address. The system also includes a plurality of ports for coupling to the computer. The system also includes a switch that assigns one of the plurality of ports to a private network according to the address of the computer. The switch assigns the port by correlating the address with an address list.
Adaptive Modem Connection Lifetimes,
Tue Jul 22 18:08:47 EDT 2003
In an arrangement where users are connected to an ISP through a bank of modems, a time-out threshold is then selected for the user based on the user's connection pattern. The threshold is varied dynamically in response to access patterns, in an attempt to trade the benefit accrued by using the ISP's modem and phone line for a shorter period of time, against the inconvenience to the user from having to reestablish a connection to the ISP. Specifically, the time interval between the last disconnection by the user and the time of reconnection is evaluated, and when this time interval is shorter than a preselected threshold, then the time-out threshold is increased. When this time interval is longer than the preselected threshold, then the time-out threshold is decreased. Typically, when the time-out threshold is decreased, it is decreased by a significantly smaller amount that the amount by which it is increased, when it is increased.
Adaptive modem connection lifetimes,
Tue Nov 26 18:08:33 EST 2002
In an arrangement where users are connected to an ISP through a bank of modems, a time-out threshold is then selected for the user based on the user's connection pattern. The threshold is varied dynamically in response to access patterns, in an attempt to trade the benefit accrued by using the ISP's modem and phone line for a shorter period of time, against the inconvenience to the user from having to reestablish a connection to the ISP. Specifically, the time interval between the last disconnection by the user and the time of reconnection is evaluated, and when this time interval is shorter than a preselected threshold, then the time-out threshold is increased. When this time interval is longer than the preselected threshold, then the time-out threshold is decreased. Typically, when the time-out threshold is decreased, it is decreased by a significantly smaller amount that the amount by which it is increased, when it is increased.
Transferring messages in networks made up of subnetworks with different namespaces,
Tue Oct 29 18:08:31 EST 2002
Techniques employed in packet networks for transferring a packet across subnetworks with different namespaces. When a packet enters a given subnetwork and has a destination in a subnetwork with a different namespace, the given subnetwork encapsulates the packet by adding a header which specifies a decapsulator in the namespace. When the packet arrives at the decapsulator, the decapsulator strips the header and provides the packet to a subnetwork with a different namespace. A particular use of the technique is in a network used for broad-band interactive service. The network has two sub-networks. The first subnetwork is a TV channel which functions as a high-bandwidth forward channel and the second subnetwork is a packet network accessible via a public modem pool which functions as a lower-bandwidth return channel. The encapsulator establishes a connection with the public modem pool and receives an address in the second subnetwork which is temporarily associated with the connection. When the encapsulator receives a packet which is produced in response to a packet received from the TV channel and has a destination address in the sub-network of the TV channel, the encapsulator places a header on it which contains the temporary address and the address of the decapsulator. When the packet arrives at the decapsulator, the decapsulator removes the header and provides the packet to the second sub-network.
Transferring messages in networks made up of subnetworks with different namespaces,
Tue Aug 17 18:05:14 EDT 1999
Techniques employed in packet networks for transferring a packet across subnetworks with different namespaces. When a packet enters a given subnetwork and has a destination in a subnetwork with a different namespace, the given subnetwork encapsulates the packet by adding a header which specifies a decapsulator in the namespace. When the packet arrives at the decapsulator, the decapsulator strips the header and provides the packet to a subnetwork with a different namespace. A particular use of the technique is in a network used for broad-band interactive service. The network has two sub-networks. The first subnetwork is a TV channel which functions as a high-bandwidth forward channel and the second subnetwork is a packet network accessible via a public modem pool which functions as a lower-bandwidth return channel. The encapsulator establishes a connection with the public modem pool and receives an address in the second subnetwork which is temporarily associated with the connection. When the encapsulator receives a packet which is produced in response to a packet received from the TV channel and has a destination address in the sub-network of the TV channel, the encapsulator places a header on it which contains the temporary address and the address of the decapsulator. When the packet arrives at the decapsulator, the decapsulator removes the header and provides the packet to the second sub-network.