会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Split termination of secure communication sessions with mutual certificate-based authentication
    • 通过基于证书的身份验证分离终止安全通信会话
    • US08707043B2
    • 2014-04-22
    • US12396904
    • 2009-03-03
    • Prashant WasonNitin GuptaRobert Adler
    • Prashant WasonNitin GuptaRobert Adler
    • H04L9/32
    • H04L9/3273H04L9/3263H04L2209/56
    • A method and apparatus are provided for split-terminating a secure client-server communication connection when the client and server perform mutual authentication by exchanging certificates, such as within a Lotus Notes environment. When the client submits a certificate to the server, an intermediary device intercepts the certificate and submits to the server a substitute client certificate generated by that intermediary. A certificate authority's private key is previously installed on the intermediary to enable it to generate public keys, private keys and digital certificates. With the private key corresponding to the substitute certificate, the intermediary extracts a temporary key from a subsequent server message. The intermediary uses the temporary key to read a session key issued later by the server. Thereafter, the intermediary shares the session key with another intermediary, and together they use the session keys to access and optimize (e.g., accelerate) messages sent by the client and the server.
    • 提供了一种方法和装置,用于当客户端和服务器通过交换证书(例如在Lotus Notes环境中)执行相互认证来分离终止安全客户端 - 服务器通信连接。 当客户端向服务器提交证书时,中间设备将截取该证书,并向该服务器提交该中间人产生的替代客户端证书。 证书颁发机构的私钥先前安装在中介上,使其能够生成公钥,私钥和数字证书。 使用对应于替代证书的私钥,中介从后续服务器消息中提取临时密钥。 中间人使用临时密钥来读取稍后由服务器发出的会话密钥。 此后,中间人与另一个中间人共享会话密钥,并且它们一起使用会话密钥来访问和优化(例如,加速)由客户端和服务器发送的消息。
    • 4. 发明授权
    • Routing validation
    • 路由验证
    • US08699493B2
    • 2014-04-15
    • US13412604
    • 2012-03-05
    • Alain J. CohenPradeep K. SinghVinod JeyachandranNitin Gupta
    • Alain J. CohenPradeep K. SinghVinod JeyachandranNitin Gupta
    • H04L12/28
    • H04L45/28H04L41/0631H04L41/08H04L41/0866H04L41/14H04L41/145H04L45/02H04L45/124
    • A simulator simulates routing system protocols to build routing tables corresponding to a modeled network, and a comparator compares the routing tables in the actual network to these simulator-created routing tables. Because the modeled system represents a fault-free version of the actual system, and assuming that the modeled routing system protocols are representative of the algorithms used in the actual routers, these simulator-produced routing tables can represent steady-state routing tables that should be present in the routers of the actual network at steady state. By querying each router in the actual network for its routing table and comparing each routing table to the corresponding simulator-produced routing table, any differences from the steady state can be identified.
    • 模拟器模拟路由系统协议以构建与建模网络相对应的路由表,并且比较器将实际网络中的路由表与这些模拟器创建的路由表进行比较。 因为建模的系统代表了实际系统的无故障版本,并且假设建模的路由系统协议代表了实际路由器中使用的算法,这些模拟器生成的路由表可以表示应该是稳态路由表 存在于稳定状态下实际网络的路由器。 通过查询实际网络中的每个路由器的路由表,并将每个路由表与相应的模拟器生成的路由表进行比较,可以识别与稳态的任何差异。
    • 5. 发明授权
    • Establishing network connections between transparent network devices
    • 建立透明网络设备之间的网络连接
    • US08688844B1
    • 2014-04-01
    • US13460392
    • 2012-04-30
    • Mark Stuart DayBrian MillerNitin GuptaAlfred LandrumBlanco Zee Leung Lam
    • Mark Stuart DayBrian MillerNitin GuptaAlfred LandrumBlanco Zee Leung Lam
    • G06F15/16G06F12/00
    • H04L67/141H04L29/08792H04L41/00H04L63/0254H04L63/029H04L63/164H04L67/2876H04L69/04H04L69/14H04L69/163H04W80/06
    • Transparent network devices intercept messages from non-transparent network devices that establish a connection. Transparent network devices modify these messages to establish an inner connection with each other. The transparent network devices mimic at least some of the outer connection messages to establish their inner connection. The mimicked messages and any optional reset messages are intercepted by the transparent network devices to prevent them from reaching the outer connections. Transparent network devices modify network traffic, using error detection data, fragmentation data, or timestamps, so that inner connection network traffic inadvertently received by outer connection devices is rejected or ignored by the outer connection network devices. Transparent network devices may use different sequence windows for inner and outer connection network traffic. To prevent overlapping sequence windows, transparent network devices monitor the locations of the inner and outer connection sequence windows and may rapidly advance the inner connection sequence window as needed.
    • 透明网络设备拦截来自建立连接的不透明网络设备的消息。 透明网络设备修改这些消息以建立彼此的内部连接。 透明网络设备模拟至少一些外部连接消息以建立其内部连接。 模拟消息和任何可选的重置消息被透明网络设备拦截,以防止它们到达外部连接。 透明网络设备修改网络流量,使用错误检测数据,碎片数据或时间戳,使外部连接设备无意中接收的内部连接网络流量被外部连接网络设备拒绝或忽略。 透明网络设备可以对内部和外部连接网络流量使用不同的序列窗口。 为了防止重叠序列窗口,透明网络设备监视内部和外部连接序列窗口的位置,并可根据需要快速推进内部连接顺序窗口。
    • 7. 发明申请
    • ENSURING WRITE OPERATION CONSISTENCY USING MULTIPLE STORAGE DEVICES
    • 使用多个存储设备确保写入操作一致
    • US20130297855A1
    • 2013-11-07
    • US13464714
    • 2012-05-04
    • Nitin GuptaKiron VijayasankarJoshua Berry
    • Nitin GuptaKiron VijayasankarJoshua Berry
    • G06F12/02
    • G06F3/0656G06F3/0619G06F3/0685G06F11/1441G06F11/1471G06F2201/82
    • Relatively small capacity solid-state storage devices (SSD) are combined with larger capacity magnetic disk storage devices for storing storage block write data to ensure data consistency. Write operations are stored in a sequential write buffer in an SSD to guarantee the storage of write data and then copied from the sequential write buffer to the destination address in a magnetic disk storage device. The sequential write buffer store write data in locations corresponding to the order of receipt of write operations. Write data from the sequential write buffer is transferred to the magnetic disk storage device in the same order and a checkpoint index is frequently updated to indicate the completion of some transfers. During system initialization, the most recent value of the checkpoint index is retrieved and used as a starting location for transferring write data from the sequential write buffer to the magnetic disk storage device.
    • 相对较小容量的固态存储设备(SSD)与更大容量的磁盘存储设备相结合,用于存储存储块写数据,以确保数据一致性。 写入操作存储在SSD中的顺序写入缓冲器中,以保证写入数据的存储,然后从顺序写入缓冲器复制到磁盘存储设备中的目标地址。 顺序写入缓冲器将写入数据写入对应于写入操作的接收顺序的位置。 从顺序写入缓冲器写入的数据以相同的顺序被传送到磁盘存储设备,并且检查点索引被频繁更新以指示某些传输的完成。 在系统初始化期间,检索点索引的最新值被检索并用作将写入数据从顺序写入缓冲器传送到磁盘存储设备的起始位置。
    • 8. 发明申请
    • ENSURING WRITE OPERATION CONSISTENCY USING RAID STORAGE DEVICES
    • 使用RAID存储设备确保写入操作一致
    • US20130297854A1
    • 2013-11-07
    • US13464713
    • 2012-05-04
    • Nitin GuptaKiron VijayasankarJoshua Berry
    • Nitin GuptaKiron VijayasankarJoshua Berry
    • G06F12/02
    • G06F11/1441G06F11/1471G06F2201/82
    • Solid-state storage devices (SSD) are combined with larger capacity magnetic disk-based RAID arrays for storing write data to ensure data consistency across multiple RAID disks. Write operations are stored in a sequential write buffer in at least one SSD to guarantee their storage and then copied from the sequential write buffer to the destination address in RAID array. The sequential write buffer stores write data in locations corresponding to the order of receipt of write operations. Write data from the sequential write buffer is transferred to the RAID array in the same order and a checkpoint index is frequently updated to indicate the completion of some transfers. During system initialization, a copy of the sequential write buffer and its associated checkpoint index are retrieved and used as a starting location for transferring write data from the sequential write buffer to the magnetic disk storage devices in the RAID array.
    • 固态存储设备(SSD)与更大容量的基于磁盘的RAID阵列相结合,用于存储写入数据,以确保多个RAID磁盘之间的数据一致性。 写入操作存储在至少一个SSD中的顺序写入缓冲器中,以保证其存储,然后从顺序写缓冲区复制到RAID阵列中的目标地址。 顺序写入缓冲器将写入数据存储在与写入操作的接收顺序相对应的位置。 将顺序写入缓冲区中的写入数据以相同的顺序传输到RAID阵列,并且检查点索引经常更新以指示某些传输的完成。 在系统初始化期间,检索顺序写入缓冲器及其关联的检查点索引的副本,并将其用作将写入数据从顺序写入缓冲区传送到RAID阵列中的磁盘存储设备的起始位置。
    • 9. 发明授权
    • Congestion management over lossy network connections
    • 有损网络连接拥塞管理
    • US08462624B2
    • 2013-06-11
    • US11494025
    • 2006-07-26
    • Steve McCanneNitin Gupta
    • Steve McCanneNitin Gupta
    • H04L12/26
    • H04L47/10H04L1/0002H04L1/004H04L1/0057H04L1/1809H04L1/187H04L1/188H04L43/0835H04L43/0847H04L47/11H04L47/25H04L47/27
    • A network stack includes a packet loss analyzer that distinguishes between packet losses due to congestion and due to lossyness of network connections. The loss analyzer observes the packet loss patterns for comparison with a packet loss model. The packet loss model may be based on a Forward Error Correction (FEC) system. The loss analyzer determines if lost packets could have been recovered by a receiving network device, if FEC had been used. If the lost packets could have been corrected by FEC, the loss analyzer assumes that no network congestion exists and that the packet loss comes from the lossy aspects of the network, such as radio interference for wireless networks. If the loss analyzer determines that some of the lost packet could not have been recovered by the receiving network device, the loss analyzer assumes that network congestion causes these packet losses and reduces the data rate.
    • 网络堆栈包括分组丢失分析器,其区分由于拥塞引起的分组丢失以及由于网络连接的有损性。 损耗分析仪观察丢包模式,以便与丢包模型进行比较。 分组丢失模型可以基于前向纠错(FEC)系统。 如果使用了FEC,丢失分析器将确定丢失的数据包是否已被接收网络设备恢复。 如果丢失的分组可能被FEC纠正,则丢失分析器假设没有网络拥塞,并且分组丢失来自网络的有损方面,例如无线网络的无线电干扰。 如果丢失分析器确定某些丢失的分组不能被接收网络设备恢复,则丢失分析器假设网络拥塞导致这些分组丢失并降低数据速率。