Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

300 results about "Bandwidth limitation" patented technology

Intrusion and misuse deterrence system employing a virtual network

A method and apparatus is disclosed for increasing the security of computer networks through the use of an Intrusion and Misuse Deterrence System (IMDS) operating on the network. The IMDS is a system that creates a synthetic network complete with synthetic hosts and routers. It is comprised of a network server with associated application software that appears to be a legitimate portion of a real network to a network intruder. The IMDS consequently invites inquiry and entices the intruder away from the real network. Simulated services are configured to appear to be running on virtual clients with globally unique, class “C” IP addresses. Since there are no legitimate users of the virtual network simulated by the IMDS, all such activity must be inappropriate and can be treated as such. Consequently, the entire set of transactions by an intruder can be collected and identified rather than just those transactions that meet a predefined attack profile. Also, new exploits and attacks are handled just as effectively as known attacks, resulting in better identification of attack methodologies as well as the identification and analysis of new attack types. Since the IMDS only has to be concerned with the traffic going to its simulated hosts it additionally eliminates the bandwidth limitation that plagues a traditional intrusion detection system (IDS).
Owner:VERIZON SERVICES GROUP +2

Virtual video call method and terminals

The invention provides a virtual video call method and terminals. The method comprises the steps of collecting a video image of a first terminal user; performing facial recognition on the video image so as to obtain facial expression information; sending the facial expression information to a second terminal which establishes call connection with a first terminal, and enabling the facial expression information to be used for enabling the second terminal to synthesize and display video images according to the facial expression information and a facial image model pre-arranged on the second terminal. According to the method, a facial recognition technology is utilized to extract the facial expression information at a sending end such as the first terminal, and synthesis and restoration of the facial image are achieved at a receiving end such as the second terminal according to the sent facial expression information and a pre-arranged facial image module; due to the fact that the volume of transmitted facial expression data is extremely small, the volume of the data transmitted in the video call process is greatly reduced, video call is smoother, and the influence on the video call caused by network bandwidth limitation or flow limitation is reduced.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Intrusion and misuse deterrence system employing a virtual network

A method and apparatus is disclosed for increasing the security of computer networks through the use of an Intrusion and Misuse Deterrence System (IMDS) operating on the network. The IMDS is a system that creates a synthetic network complete with synthetic hosts and routers. It is comprised of a network server with associated application software that appears to be a legitimate portion of a real network to a network intruder. The IMDS consequently invites inquiry and entices the intruder away from the real network. Simulated services are configured to appear to be running on virtual clients with globally unique, class “C” IP addresses. Since there are no legitimate users of the virtual network simulated by the IMDS, all such activity must be inappropriate and can be treated as such. Consequently, the entire set of transactions by an intruder can be collected and identified rather than just those transactions that meet a predefined attack profile. Also, new exploits and attacks are handled just as effectively as known attacks, resulting in better identification of attack methodologies as well as the identification and analysis of new attack types. Since the IMDS only has to be concerned with the traffic going to its simulated hosts it additionally eliminates the bandwidth limitation that plagues a traditional intrusion detection system (IDS).
Owner:LEVEL 3 COMM LLC +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products