会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Communication method and apparatus using virtual sink node in wireless sensor network
    • 在无线传感器网络中使用虚拟汇聚节点的通信方法和装置
    • US08856227B2
    • 2014-10-07
    • US12370709
    • 2009-02-13
    • Hyo Hyun ChoiSun Gi KimLynn ChoiJae Kyun Jung
    • Hyo Hyun ChoiSun Gi KimLynn ChoiJae Kyun Jung
    • G06F15/16H04W40/02H04W40/20
    • H04W40/20H04W40/026Y02D70/164Y02D70/22Y02D70/30Y02D70/38
    • A communication method and apparatus using a virtual sink node in a wireless sensor network, in which location information about a destination node is acquired by a source node. If the location of the destination node is out of a transmission range of the source node, data including the location information about the destination node are transmitted from the source node to one of nodes adjacent to the source node, where the one node is typically closest to the destination node. The data are transmitted from the one node to another one of nodes adjacent to the one node, where another node is closest to the destination node, until the destination node is located within a transmission range of the one node. If the destination node is located within the transmission range of the one node, the data are transmitted from the one node to the destination node.
    • 一种在无线传感器网络中使用虚拟汇聚节点的通信方法和装置,其中由源节点获取关于目的地节点的位置信息。 如果目的地节点的位置在源节点的传输范围之外,则包括关于目的地节点的位置信息的数据从源节点发送到与源节点相邻的节点之一,其中一个节点通常最接近 到目标节点。 数据从一个节点发送到与该一个节点相邻的另一个节点,另一个节点最靠近目的地节点,直到目的地节点位于该节点的传输范围内。 如果目的地节点位于一个节点的传输范围内,则从一个节点向目的地节点发送数据。
    • 3. 发明申请
    • Method for sensing and recovery against buffer overflow attacks and apparatus thereof
    • 用于针对缓冲器溢出攻击的感测和恢复的方法及其装置
    • US20070180524A1
    • 2007-08-02
    • US10598970
    • 2005-03-18
    • Lynn ChoiYong Shin
    • Lynn ChoiYong Shin
    • G06F12/14
    • G06F12/1441G06F21/52
    • Methods and apparatuses for detecting and recovering from a buffer overflow attack are provided. A method of recovering an operation state of a processor from a buffer overflow attach includes: detecting whether a buffer overflow attack is made on any write operation while storing write operations that are potential targets of buffer overflow attacks in a predetermined location instead of an original destination to store write operations; storing the contents stored in the predetermined location at a predetermined interval in the original destination for storing write operations if no buffer overflow attack is detected and discarding unsafe write operations subsequent to a buffer overflow attack if a buffer overflow attack is detected; and ignoring the unsafe write operations subsequent to the buffer overflow attack if a buffer overflow attack is detected. Therefore, a buffer overflow attack occurring in a computer can be effectively detected, and damage of a system which is attacked can be minimized and the system can be recovered or return to the original state before the attack. A system can be effectively protected while minimizing reduction in performance of the computer system according to a method used to implement the present invention, thereby greatly improving the environments under which the computer and the Internet are used.
    • 提供了从缓冲区溢出攻击检测和恢复的方法和装置。 从缓冲器溢出附件恢复处理器的操作状态的方法包括:在存储作为缓冲器溢出攻击的潜在目标的写操作而不是原始目的地的情况下,检测是否对任何写入操作进行缓冲器溢出攻击 存储写操作; 如果没有检测到缓冲区溢出攻击并且在检测到缓冲器溢出攻击之后丢弃缓冲器溢出攻击之后的不安全写入操作,则将存储在预定位置的预定位置的内容以原始目的地存储在存储写入操作中; 并且如果检测到缓冲区溢出攻击,则忽略缓冲区溢出攻击之后的不安全写入操作。 因此,可以有效地检测计算机中发生的缓冲区溢出攻击,并且可以最小化被攻击的系统的损坏,并且可以在攻击之前恢复系统或恢复到原始状态。 可以有效地保护系统,同时根据用于实现本发明的方法使计算机系统的性能降至最低,从而大大改善使用计算机和因特网的环境。
    • 4. 发明申请
    • Packet classification method through hierarchical rulebase partitioning
    • 数据包分类方法通过分层规则库分区
    • US20050254502A1
    • 2005-11-17
    • US11118326
    • 2005-05-02
    • Lynn Choi
    • Lynn Choi
    • H04L12/28H04L12/56H04L29/06
    • H04L12/56H04L45/745H04L47/2441H04L63/0227
    • A packet classification method through hierarchical rulebase partitioning. The packet classification method for searching for a rule having a highest priority and matching among a plurality of rules included in a specified rulebase with respect to a packet input from an external network and processing the packet according to the searched rule. The method includes: a preprocessing step of partitioning the rulebase into a plurality of independent sub-rulebases based on a specified condition and producing a hash table on the basis of the sub-rulebases; and a classification step of classifying the packet by searching the hash table using a hash key extracted from a packet header of the inputted packet and mapping the packet on the sub-rulebase corresponding to the packet.
    • 通过分层规则库分区的分组分类方法。 用于搜索具有最高优先级并且包括在指定规则库中的多个规则之间的规则相对于从外部网络输入的分组并根据搜索规则处理该分组的规则的分组分类方法。 该方法包括:基于指定条件将规则库划分为多个独立子规则库并基于子规则库生成散列表的预处理步骤; 以及分类步骤,通过使用从所输入的分组的分组报头中提取的散列密钥搜索哈希表,并在与分组对应的子规则库上映射分组,对分组进行分类。
    • 6. 发明授权
    • Method for sensing and recovery against buffer overflow attacks and apparatus thereof
    • 用于针对缓冲器溢出攻击的感测和恢复的方法及其装置
    • US07814333B2
    • 2010-10-12
    • US10598970
    • 2005-03-18
    • Lynn ChoiYong Shin
    • Lynn ChoiYong Shin
    • G06F12/14
    • G06F12/1441G06F21/52
    • Methods and apparatuses for detecting and recovering from a buffer overflow attack are provided. A method of recovering an operation state of a processor from a buffer overflow attach includes: detecting whether a buffer overflow attack is made on any write operation while storing write operations that are potential targets of buffer overflow attacks in a predetermined location instead of an original destination to store write operations; storing the contents stored in the predetermined location at a predetermined interval in the original destination for storing write operations if no buffer overflow attack is detected and discarding unsafe write operations subsequent to a buffer overflow attack if a buffer overflow attack is detected; and ignoring the unsafe write operations subsequent to the buffer overflow attack if a buffer overflow attack is detected. Therefore, a buffer overflow attack occurring in a computer can be effectively detected, and damage of a system which is attacked can be minimized and the system can be recovered or return to the original state before the attack. A system can be effectively protected while minimizing reduction in performance of the computer system according to a method used to implement the present invention, thereby greatly improving the environments under which the computer and the Internet are used.
    • 提供了从缓冲区溢出攻击检测和恢复的方法和装置。 从缓冲器溢出附件恢复处理器的操作状态的方法包括:在存储作为缓冲器溢出攻击的潜在目标的写操作而不是原始目的地的情况下,检测是否对任何写入操作进行缓冲器溢出攻击 存储写操作; 如果没有检测到缓冲区溢出攻击并且在检测到缓冲器溢出攻击之后丢弃缓冲器溢出攻击之后的不安全写入操作,则将存储在预定位置的预定位置的内容以原始目的地存储在存储写入操作中; 并且如果检测到缓冲区溢出攻击,则忽略缓冲区溢出攻击之后的不安全写入操作。 因此,可以有效地检测计算机中发生的缓冲区溢出攻击,并且可以最小化被攻击的系统的损坏,并且可以在攻击之前恢复系统或恢复到原始状态。 可以有效地保护系统,同时根据用于实现本发明的方法使计算机系统的性能降至最低,从而大大改善使用计算机和因特网的环境。
    • 7. 发明申请
    • SENSOR NETWORK SYSTEM AND COMMUNICATION METHOD THEREOF
    • 传感器网络系统及其通信方法
    • US20110051645A1
    • 2011-03-03
    • US12874856
    • 2010-09-02
    • Seung Ki HONGJong Arm JUNCheol Sig PYOSang Hun LEELynn CHOI
    • Seung Ki HONGJong Arm JUNCheol Sig PYOSang Hun LEELynn CHOI
    • G08C17/00
    • H04W40/005H04L45/48H04W76/28H04W84/18Y02D70/00
    • Provided are a communication method and system for sensor network. In reporting event occurrence in a real-time sensor network application, a cycle time is divided into an event announcement period and a data transmission period to provide real-time transmission performance and energy efficiency. Each of the periods is again divided into the number of slots equal to the maximum depth of a network. Respective nodes sequentially operate according to their depths in a routing tree during the event announcement period to receive the signal transmitted from the lower node. To remove sleep delay, a slot next to the signal reception slot becomes a signal transmission slot. A node sensed an event transmits a signal informing event occurrence during its signal transmission slot, and this signal includes only the address of the transmission node. When a signal does not exist in the event announcement period, no traffic occurs in the data transmission period and the upper nodes maintain a sleep state. When a signal is transmitted during the event announcement period, nodes transmitting/receiving a corresponding signal operate during the data transmission period to transfer data packets.
    • 提供了一种用于传感器网络的通信方法和系统。 在报告实时传感器网络应用中的事件发生时,将周期时间分为事件通知周期和数据传输周期,以提供实时传输性能和能量效率。 每个周期再次被划分为等于网络的最大深度的时隙数。 各个节点在事件发布周期期间根据路由树中的深度顺序地操作以接收从下层节点发送的信号。 为了消除睡眠延迟,信号接收时隙旁边的时隙成为信号传输时隙。 感测事件的节点在其信号传输时隙期间发送通知事件发生的信号,并且该信号仅包括传输节点的地址。 当事件通知期间不存在信号时,在数据发送期间不发生业务,上层节点保持睡眠状态。 当在事件发布期间发送信号时,发送/接收相应信号的节点在数据传输周期期间运行以传送数据分组。
    • 8. 发明申请
    • COMMUNICATION METHOD AND APPARATUS USING VIRTUAL SINK NODE IN WIRELESS SENSOR NETWORK
    • 在无线传感器网络中使用虚拟网络节点的通信方法和设备
    • US20090207783A1
    • 2009-08-20
    • US12370709
    • 2009-02-13
    • Hyo Hyun ChoiSun Gi KimLynn ChoiJae Kyun Jung
    • Hyo Hyun ChoiSun Gi KimLynn ChoiJae Kyun Jung
    • H04W40/02
    • H04W40/20H04W40/026Y02D70/164Y02D70/22Y02D70/30Y02D70/38
    • A communication method and apparatus using a virtual sink node in a wireless sensor network, in which location information about a destination node is acquired by a source node. If the location of the destination node is out of a transmission range of the source node, data including the location information about the destination node are transmitted from the source node to one of nodes adjacent to the source node, where the one node is typically closest to the destination node. The data are transmitted from the one node to another one of nodes adjacent to the one node, where another node is closest to the destination node, until the destination node is located within a transmission range of the one node. If the destination node is located within the transmission range of the one node, the data are transmitted from the one node to the destination node.
    • 一种在无线传感器网络中使用虚拟汇聚节点的通信方法和装置,其中由源节点获取关于目的地节点的位置信息。 如果目的地节点的位置在源节点的传输范围之外,则包括关于目的地节点的位置信息的数据从源节点发送到与源节点相邻的节点之一,其中一个节点通常最接近 到目标节点。 数据从一个节点发送到与该一个节点相邻的另一个节点,另一个节点最靠近目的地节点,直到目的地节点位于该节点的传输范围内。 如果目的地节点位于一个节点的传输范围内,则从一个节点向目的地节点发送数据。
    • 9. 发明授权
    • Sensor network system and communication method thereof
    • 传感器网络系统及其通信方法
    • US08467327B2
    • 2013-06-18
    • US12874856
    • 2010-09-02
    • Seung Ki HongJong Arm JunCheol Sig PyoSang Hun LeeLynn Choi
    • Seung Ki HongJong Arm JunCheol Sig PyoSang Hun LeeLynn Choi
    • G08C17/00
    • H04W40/005H04L45/48H04W76/28H04W84/18Y02D70/00
    • Provided are a communication method and system for sensor network. In reporting event occurrence in a real-time sensor network application, a cycle time is divided into an event announcement period and a data transmission period to provide real-time transmission performance and energy efficiency. Each of the periods is again divided into the number of slots equal to the maximum depth of a network. Respective nodes sequentially operate according to their depths in a routing tree during the event announcement period to receive the signal transmitted from the lower node. To remove sleep delay, a slot next to the signal reception slot becomes a signal transmission slot. A node sensed an event transmits a signal informing event occurrence during its signal transmission slot, and this signal includes only the address of the transmission node. When a signal does not exist in the event announcement period, no traffic occurs in the data transmission period and the upper nodes maintain a sleep state. When a signal is transmitted during the event announcement period, nodes transmitting/receiving a corresponding signal operate during the data transmission period to transfer data packets.
    • 提供了一种用于传感器网络的通信方法和系统。 在报告实时传感器网络应用中的事件发生时,将周期时间分为事件通知周期和数据传输周期,以提供实时传输性能和能量效率。 每个周期再次被划分为等于网络的最大深度的时隙数。 各个节点在事件发布周期期间根据路由树中的深度依次操作以接收从下层节点发送的信号。 为了消除睡眠延迟,信号接收时隙旁边的时隙成为信号传输时隙。 感测事件的节点在其信号传输时隙期间发送通知事件发生的信号,并且该信号仅包括传输节点的地址。 当事件通知期间不存在信号时,在数据发送期间不发生业务,上层节点保持睡眠状态。 当在事件发布期间发送信号时,发送/接收相应信号的节点在数据传输周期期间运行以传送数据分组。