摘要:
A secure domain name service for a computer network is disclosed that includes a portal connected to a computer network, such as the Internet, and a domain name database connected to the computer network through the portal. The portal authenticates a query for a secure computer network address, and the domain name database stores secure computer network addresses for the computer network. Each secure computer network address is based on a non-standard top-level domain name, such as .scom, .sorg, .snet, .snet, .sedu, .smil and .sint.
摘要:
A method and system are used to transparently create an encrypted communications channel between a client device and a target device. Audio video communications between the client device and the target device are allowed over the encrypted communications channel once the encrypted communications channel is created. The method comprises: (1) receiving from the client device a request for a network address associated with the target device; (2) determining whether the request is requesting access to a device that accepts an encrypted channel connection with the client device; and (3) depending on the determination made in step (2) providing provisioning information required to initiate the creation of the encrypted communications channel between the client device and the target device such that the encrypted communications channel supports secure audio/video communications transmitted between the two devices.
摘要:
A system and method connect a first network device and a second network device by initiating a secure communication link. The system includes one or more servers configured to: receive, from the first network device, a request to look up a network address of the second network device based on an identifier associated with the second network device; determine, in response to the request, whether the second network device is available for a secure communications service; and initiate a secure communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service; wherein the secure communications service uses the secure communication link to communicate at least one of video data and audio data between the first network device and the second network device.
摘要:
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities.
摘要:
A protective cover assembly for covering a space defined by at least one wall. The protective cover assembly includes a plurality of rails coupled to one another to form a frame for securing a material over the space. At least one support bow spans the space to support the material. Clamp mechanisms are coupled to the ends of the support bow for securing the protective cover over the space. The clamp mechanisms include a latch member for engaging the wall and a handle for biasing the latch member against the wall. The clamp further includes a shaft for interconnecting the support bow to the frame. A collar is disposed over the shaft for guiding the handle and the latch member between an operational position and a stowed position along the shaft.
摘要:
A protective cover assembly for covering a space defined by at least one wall. The protective cover assembly includes a plurality of rails coupled to one another to form a frame for securing a material over the space. At least one support bow spans the space to support the material. Clamp mechanisms are coupled to the ends of the support bow for securing the protective cover over the space. The clamp mechanisms include a latch member for engaging the wall and a handle for biasing the latch member against the wall. The clamp further includes a shaft for interconnecting the support bow to the frame. A collar is disposed over the shaft for guiding the handle and the latch member between an operational position and a stowed position along the shaft.
摘要:
The present invention provides methods and systems for particle detection and analysis using two-dimensional optical imaging to access enhanced detection sensitivity and expanded sensing functionality relative to conventional point and array detection-based optical particle counters. Methods and systems of the present invention provide a two-dimensional optical imaging-based particle sensing platform wherein system components and specifications are selected to generate reproducible and readily identifiable signals, including particle detection signatures, from optical scattering or emission from particles provided to the system. Systems and methods of the present invention are capable of accurately and sensitively detecting, identifying, and characterizing (e.g., determining the size of) particles in liquid phase or gas phase samples.
摘要:
A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the first network device, a request to look up a network address of the second network device based on an identifier associated with the second network device; (b) determine, in response to the request, whether the second network device is available for a secure communications service; and (c) initiate a virtual private network communication link between the first network device and the second network device based on a determination that the second network device is available for the secure communications service, wherein the secure communications service uses the virtual private network communication link.
摘要:
A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.
摘要:
A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities.