会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • Analyzing security compliance within a network
    • 分析网络中的安全合规性
    • US20070157286A1
    • 2007-07-05
    • US11505171
    • 2006-08-16
    • Pradeep SinghAnkit AgarwalAlain CohenVenuprakash BarathanVinod Jeyachandran
    • Pradeep SinghAnkit AgarwalAlain CohenVenuprakash BarathanVinod Jeyachandran
    • H04L9/00
    • H04L41/28H04L12/2697H04L41/0866H04L41/0893H04L41/145H04L41/22H04L43/50H04L63/1433H04L63/20
    • A security policy database identifies the intended security policies within a network, a traffic generator provides test traffic that is configured to test each defined security policy, and a simulator simulates the propagation of this traffic on a model of the network. The model of the network includes the configuration data associated with each device, and thus, if devices are properly configured to enforce the intended security policies, the success/failure of the simulated test traffic will conform to the intended permit/deny policy of each connection. Differences between the simulated message propagation and the intended security policies are reported to the user, and diagnostic tools are provided to facilitate identification of the device configuration data that accounts for the observed difference. Additionally, if a network's current security policy is unknown, test traffic is generated to reveal the actual policy in effect, to construct a baseline intended security policy.
    • 安全策略数据库标识网络中的预期安全策略,流量生成器提供被配置为测试每个定义的安全策略的测试流量,并且模拟器模拟该流量在网络模型上的传播。 网络模型包括与每个设备相关联的配置数据,因此,如果设备被正确配置以实施预期的安全策略,则模拟测试流量的成功/失败将符合每个连接的预期允许/拒绝策略 。 向用户报告模拟消息传播与预期安全策略之间的差异,并提供诊断工具以便于识别出所观察到的差异的设备配置数据。 此外,如果网络当前的安全策略未知,则生成测试流量以显示实际的实际策略,以构建基准预期的安全策略。
    • 12. 发明申请
    • Routing validation
    • 路由验证
    • US20070025355A1
    • 2007-02-01
    • US11494441
    • 2006-07-27
    • Alain CohenPradeep SinghVinod JeyachandranNitin Gupta
    • Alain CohenPradeep SinghVinod JeyachandranNitin Gupta
    • H04L12/56
    • H04L45/28H04L41/0631H04L41/08H04L41/0866H04L41/14H04L41/145H04L45/02H04L45/124
    • A simulator simulates routing system protocols to build routing tables corresponding to a modeled network, and a comparator compares the routing tables in the actual network to these simulator-created routing tables. Because the modeled system represents a fault-free version of the actual system, and assuming that the modeled routing system protocols are representative of the algorithms used in the actual routers, these simulator-produced routing tables will represent the ‘ideal’ routing tables that should be present in the routers of the actual network. By querying each router in the actual network for its routing table and comparing each routing table to the corresponding simulator-produced routing table, any differences from the ‘ideal’ can be identified.
    • 模拟器模拟路由系统协议以构建与建模网络相对应的路由表,并且比较器将实际网络中的路由表与这些模拟器创建的路由表进行比较。 因为建模的系统代表了实际系统的无故障版本,并且假设建模的路由系统协议代表实际路由器中使用的算法,则这些模拟器生成的路由表将表示应该应用的“理想”路由表 存在于实际网络的路由器中。 通过查询实际网络中的每个路由器的路由表,并将每个路由表与相应的模拟器生成的路由表进行比较,可以识别与“ideal”的任何差异。
    • 13. 发明申请
    • ASSESSING NETWORK AND DEVICE COMPLIANCE WITH SECURITY POLICIES
    • 评估网络和设备遵守安全政策
    • US20080022357A1
    • 2008-01-24
    • US11776721
    • 2007-07-12
    • Ankit AgarwalNick BastinPradeep SinghSeth Martin
    • Ankit AgarwalNick BastinPradeep SinghSeth Martin
    • H04L9/00
    • H04L63/20
    • All of the transit services that each device is expected to provide are determined and contrasted with the transit configuration of each device. Because the transit configuration of each device may be state-dependent, the service items within each application service are processed in sequential order. Sequences of service items are associated with connection groups, and each of the routes associated with each connection group is determined based on the sequential order of the service items. The configuration of each device along each route is processed to determine the services that will be permitted or denied, based on its current configuration. Each desired transit service item is compared to the transit configuration provided by each device to identify any inconsistencies and/or violations
    • 每个设备预期提供的所有过境服务都被确定,并与每个设备的传输配置进行对比。 由于每个设备的传输配置可能与状态有关,因此每个应用服务中的服务项目按顺序进行处理。 服务项目的顺序与连接组相关联,并且基于服务项目的顺序来确定与每个连接组相关联的每个路线。 根据其当前配置,处理每个路由上每个设备的配置,以确定将被允许或拒绝的服务。 将每个期望的中转服务项目与由每个设备提供的传输配置进行比较,以识别任何不一致和/或违规
    • 19. 发明申请
    • Wireless MAC and link-layer simulation modeling
    • 无线MAC和链路层仿真建模
    • US20070036088A1
    • 2007-02-15
    • US11501388
    • 2006-08-09
    • Pradeep SinghAlain CohenAlejandro Talavera-MartinezArun PasupathyPoonam SinghIbrahim Moral
    • Pradeep SinghAlain CohenAlejandro Talavera-MartinezArun PasupathyPoonam SinghIbrahim Moral
    • H04J1/16H04L12/413
    • H04W16/225H04W74/00
    • Simulation models of media access control and physical layer characteristics facilitate the simulation/emulation of a variety of phenomena that affect transmissions via a wireless media. Such phenomena include media access contention delays, packet drops, and retransmissions that are generally dependent upon changes in transmitter/receiver locations. Each wireless environment is characterized by a model of the communication channel that characterizes transmission effects based on the number of competing transmitters in the environment, which is dynamically determined based on the location of each node in the environment. Additionally, the location of nodes is used to simulate the effects of ‘hidden nodes’, nodes that are unknown to a transmitting node but can interfere with the reception of transmissions at a receiving node. Each device/node model in the wireless environment preferably accesses the same model of the communication channel, thereby minimizing the amount of detail required at each device model.
    • 介质访问控制和物理层特性的仿真模型有助于模拟/仿真影响通过无线介质传输的各种现象。 这种现象包括通常取决于发射机/接收机位置的改变的媒体接入争用延迟,分组丢弃和重传。 每个无线环境的特征在于基于环境中的竞争发射机的数量来表征传输效应的通信信道的模型,其基于环境中的每个节点的位置动态地确定。 另外,节点的位置用于模拟“隐藏节点”,发送节点未知的节点的影响,但可能会干扰接收节点的传输接收。 无线环境中的每个设备/节点模型优选地访问通信信道的相同模型,从而最小化每个设备模型所需的细节量。
    • 20. 发明授权
    • Minimizing single points of failure in paths with mixed protection schemes
    • 最小化混合保护方案路径中的单点故障
    • US07616584B2
    • 2009-11-10
    • US10986675
    • 2004-11-12
    • Suresh KatukamPradeep Singh
    • Suresh KatukamPradeep Singh
    • H04L12/26
    • H04L12/43H04J2203/0053H04J2203/006H04L45/00H04L45/22H04L45/28
    • Methods and apparatus for substantially minimizing single points of failure for circuit paths in networks with mixed protection schemes are disclosed. According to one aspect of the present invention, a method for routing circuit paths between a source and a destination of a network includes identifying a first available circuit path between the source and the destination. The first available circuit path includes a first plurality of links which each have an associated protection type. The method also includes determining a number protection changes associated with the first plurality of links, and assigning a first metric to the first available path that is based on the number of protection changes. Finally, the method includes identifying a selected available path to be used to pass information between the source and the destination based at least in part on the first metric.
    • 公开了用于基本上最小化具有混合保护方案的网络中的电路路径的单点故障的方法和装置。 根据本发明的一个方面,一种用于在网络的源和目的地之间路由电路路径的方法包括识别源与目的地之间的第一可用电路路径。 第一可用电路路径包括第一多个链路,每个链路各具有相关联的保护类型。 该方法还包括确定与第一多个链路相关联的数字保护改变,以及基于保护改变的数量为第一可用路径分配第一度量。 最后,该方法包括至少部分地基于第一度量来识别用于在源和目的地之间传递信息的所选择的可用路径。