会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • Applying blocking measures progressively to malicious network traffic
    • 对恶意网络流量逐步应用阻塞措施
    • US20060075496A1
    • 2006-04-06
    • US11283380
    • 2005-11-17
    • Brian CarpenterKevin HimbergerClark JeffriesMohammad Peyravian
    • Brian CarpenterKevin HimbergerClark JeffriesMohammad Peyravian
    • G06F12/14
    • H04L63/1458G06F21/00G06F21/552H04L69/22
    • A method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized. When a truncated secure session attack is detected, the detector notifies protective equipment such as a firewall or a router to invoke a blocking measure. The blocking measure is maintained for an initial duration, after which it is suspended while another test for the anomaly is made. If the attack is no longer evident, the method returns to the state of readiness. Otherwise, a loop is executed to re-applying the blocking measure for a specified duration, then suspend the blocking measure and test again for the attack. If the attack is detected, the blocking measure is re-applied, and its duration is adapted. If the attack is no longer detected, the method returns to the state of readiness.
    • 一种逐步响应的方法,用于调用和中止阻止网络异常(如恶意网络流量)的阻塞措施,从而最大限度地减少误报和假阴性。 当检测到截断的安全会话攻击时,检测器通知防火墙或路由器等防护设备调用阻塞措施。 阻塞措施保持初始持续时间,之后暂停,并进行另一次异常测试。 如果攻击不再明显,则该方法返回到准备状态。 否则,执行一个循环以在指定的持续时间内重新应用阻塞度量,然后暂停阻止措施并再次测试攻击。 如果检测到攻击,则重新应用阻塞措施,并适应其持续时间。 如果不再检测到攻击,该方法返回到准备状态。
    • 12. 发明申请
    • Front-end protocol for server protection
    • 用于服务器保护的前端协议
    • US20060053487A1
    • 2006-03-09
    • US10937695
    • 2004-09-09
    • Clark JeffriesMohammad Peyravian
    • Clark JeffriesMohammad Peyravian
    • G06F12/14
    • H04L63/1458
    • The present invention provides for protecting against denial of service attacks. A request is sent by a client, the request comprises client indicia. The request is received at a server. A request count is incremented by the server. A sequence number is assigned as a function of the client indicia. A problem is selected by the server. The problem is sent by the server to the client. A solution to the problem is sent to the server. It is determined if the solution by client is correct. If the solution is correct, a session is performed. If the solution is not correct, the request is discarded. This can substantially decrease the amount of attacks performed by a rogue client, as the session set-up time can be substantial.
    • 本发明提供了防止拒绝服务攻击的保护。 请求由客户端发送,请求包括客户端标记。 服务器收到请求。 请求计数由服务器递增。 作为客户端标记的函数分配序列号。 服务器选择了一个问题。 该问题由服务器发送给客户端。 将问题的解决方案发送到服务器。 确定客户端的解决方案是否正确。 如果解决方案是正确的,则执行会话。 如果解决方案不正确,请求将被丢弃。 这可以显着减少流氓客户端执行的攻击的数量,因为会话建立时间可能很大。
    • 13. 发明申请
    • APPLYING BLOCKING MEASURES PROGRESSIVELY TO MALICIOUS NETWORK TRAFFIC
    • 应对阻塞措施进展到恶性网络交通
    • US20080072326A1
    • 2008-03-20
    • US11871188
    • 2007-10-12
    • Robert DanfordKenneth FarmerClark JeffriesRobert SiskMichael Walter
    • Robert DanfordKenneth FarmerClark JeffriesRobert SiskMichael Walter
    • G06F21/00
    • H04L63/1458
    • A method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized. When an anomaly is detected, the detector notifies protective equipment such as a firewall or a router to invoke a blocking measure. The blocking measure is maintained for an initial duration, after which it is suspended while another test for the anomaly is made. If the anomaly is no longer evident, the method returns to the state of readiness. Otherwise, a loop is executed to re-applying the blocking measure for a specified duration, then suspend the blocking measure and test again for the anomaly. If the anomaly is detected, the blocking measure is re-applied, and its duration is adapted. If the anomaly is no longer detected, the method returns to the state of readiness.
    • 一种逐步响应的方法,用于调用和中止阻止网络异常(如恶意网络流量)的阻塞措施,从而最大限度地减少误报和假阴性。 当检测到异常时,检测器通知防火墙或路由器等防护设备调用阻塞措施。 阻塞措施保持初始持续时间,之后暂停,并进行另一次异常测试。 如果异常不再明显,则返回到准备状态。 否则,执行一个循环以在特定持续时间内重新应用阻塞度量,然后暂停阻塞度量并再次测试异常。 如果检测到异常,则重新应用阻塞措施,并适应其持续时间。 如果不再检测到异常,则该方法返回到准备状态。
    • 18. 发明申请
    • LOOKUPS BY COLLISIONLESS DIRECT TABLES AND CAMS
    • 无连续直接表和CAMS的查询
    • US20060265372A1
    • 2006-11-23
    • US11462071
    • 2006-08-03
    • Gordon DavisAndreas HerkersdorfClark JeffriesMark Rinaldi
    • Gordon DavisAndreas HerkersdorfClark JeffriesMark Rinaldi
    • G06F7/00
    • H04L49/3009H04L45/745H04L45/7453H04L49/351
    • A structure and technique for preventing collisions using a hash table in conjunction with a CAM to identify and prevent a collisions of binary keys. A portion of the hash value of a binary key, which does not collide with a portion of the hash value of any other reference binary key, is used as an entry in the hash table. If two or more binary keys have identical values of the portions of the hash values, each of these binary keys are stored in their entirety, in the CAM. The key in the CAM provides a pointer to a data structure where the action associated with that binary key is stored. If the binary key is not found in the CAM, the binary key is hashed, and a specific entry in the hash table is selected using a portion of this hash value.
    • 一种用于使用散列表与CAM结合来防止冲突的结构和技术,以识别和防止二进制键的冲突。 不与任何其他参考二进制密钥的散列值的一部分相冲突的二进制密钥的散列值的一部分被用作散列表中的条目。 如果两个或更多个二进制密钥具有相同的哈希值部分的值,则这些二进制密钥中的每一个都将全部存储在CAM中。 CAM中的关键字提供了指向数据结构的指针,其中存储与该二进制密钥相关联的动作。 如果在CAM中没有找到二进制密钥,则二进制密钥被散列,并且使用该哈希值的一部分来选择散列表中的特定条目。
    • 19. 发明申请
    • Automatic cache activation and deactivation for power reduction
    • 自动缓存激活和停用以降低功耗
    • US20060156048A1
    • 2006-07-13
    • US11034617
    • 2005-01-13
    • Jeffery HinesClark JeffriesMinh Tong
    • Jeffery HinesClark JeffriesMinh Tong
    • G06F1/32
    • G06F1/3203Y02D10/126
    • The amount of chip power that is consumed for cache storage size maintenance is optimized by the close monitoring and control of frequency of missed requests, and the proportion of frequently recurring items to all traffic items. The total number of hit slots is measured per interval of time and is compared to the theoretical value based on random distribution. If the missed rate is high, then the observed effect and value of increasing cache size are deduced by observing how this increase affects the distribution of hits on all cache slots. As the number of frequently hit items in proportion to the total traffic items increases, the benefits of increasing the cache size decreases.
    • 高速缓存存储大小维护所消耗的芯片功率的数量通过密切监视和控制错误请求的频率以及频繁重复的项目与所有流量项目的比例来优化。 每个时间间隔测量命中时隙的总数,并根据随机分布与理论值进行比较。 如果错过率高,则通过观察这种增加如何影响所有高速缓存槽上的命中分布,推导出观察到的增加高速缓存大小的效果和值。 随着与总交通项目成比例的频繁点击项目的数量增加,增加高速缓存大小的好处减少。