会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • AGGRESSIVE TRANSMISSION CONTROL PROTOCOL (TCP) RETRANSMISSION
    • 缓解传输控制协议(TCP)恢复
    • WO2014183585A1
    • 2014-11-20
    • PCT/CN2014/076997
    • 2014-05-08
    • HUAWEI TECHNOLOGIES CO., LTD.
    • WACLAWSKY, JohnXIA, YufengMENG, Zechao
    • H04W80/06H04L12/801
    • H04L47/12
    • Selectively ignoring congestion conditions may allow for more efficient transmission control protocol (TCP) communication in instance where reducing the transmission rate for a flow will not meaningfully mitigate congestion in the network or is otherwise undesirable. By way of example, congestion conditions may be ignored when a specific type of traffic flow is being communicated (e.g., short flows, high priority flows, etc.), when a traffic flow is being communicated at a low transmission rate, when a traffic flow is destined for certain type of network (e.g., a wireless network, etc.), or during any other situation in which reducing the transmission rate is undesirable. In some networks, a transmission rate is maintained until a certain number of duplicate ACKs are received (e.g., three duplicate ACKs, etc.) in order to ensure that congestion is indeed present before reducing quality of service (QoS).
    • 选择性地忽略拥塞状况可能允许更有效的传输控制协议(TCP)通信,例如,降低流的传输速率将不会有意义地减轻网络中的拥塞,或者是不希望的。 作为示例,当业务流以低传输速率传送时,当业务流被传送时(例如,短流,高优先级流等)可能忽略拥塞状况,当流量 流量注定到某些类型的网络(例如,无线网络等),或者在不希望降低传输速率的任何其它情况下。 在一些网络中,保持传输速率直到接收到一定数量的重复ACK(例如,三个重复ACK等),以便在降低服务质量(QoS)之前确保拥塞确实存在。
    • 2. 发明申请
    • DYNAMIC OPTIMIZATION OF TCP CONNECTIONS
    • TCP连接的动态优化
    • WO2014139445A1
    • 2014-09-18
    • PCT/CN2014/073343
    • 2014-03-13
    • HUAWEI TECHNOLOGIES CO., LTD.
    • WACLAWSKY, JohnHE, XianjunMENG, Zechao
    • H04L12/70
    • H04L47/193H04L47/27H04L69/163
    • Transport control protocol (TCP) parameters can be dynamically selected to increase communication network performance. The TCP parameters may be selected before usage or at start-up such that a TCP connection is dynamically configured/re-configured prior to transporting the traffic flow over the network. The TCP connection parameters may be selected in accordance with a traffic characteristic, a network characteristic, a history of traffic activity, expected loads, desired throughput and latency or some other selection criteria. TCP parameters may also be selected after beginning to transport traffic flows over the network. More specifically, transportation of a traffic flow over the network may begin immediately using default TCP parameters, with the TCP parameters being updated or selected only upon the occurrence of a congestion or triggering condition. Further, multiple clients may share a set of persistent time-shared TCP connections.
    • 可以动态选择传输控制协议(TCP)参数来提高通信网络性能。 可以在使用之前或启动时选择TCP参数,使得在通过网络传输业务流之前动态地配置/重新配置TCP连接。 TCP连接参数可以根据业务特性,网络特性,业务活动历史,预期负载,期望吞吐量和等待时间或一些其他选择标准来选择。 开始传输网络上的业务流之后也可以选择TCP参数。 更具体地说,通过网络的业务流的传输可以使用默认的TCP参数立即开始,其中TCP参数仅在出现拥塞或触发条件时被更新或选择。 此外,多个客户端可以共享一组持久的时间共享TCP连接。
    • 3. 发明公开
    • TCP LINK CONFIGURATION METHOD, APPARATUS AND DEVICE
    • TCP-VERBINDUNGSKONFIGURATIONSVERFAHREN,VORRICHTUNG UND VORRICHTUNG
    • EP2930899A1
    • 2015-10-14
    • EP13898892.8
    • 2013-12-27
    • Huawei Technologies Co., Ltd.
    • HE, XianjunWACLAWSKY, JohnMENG, Zechao
    • H04L29/06H04L12/24G06F17/30
    • Embodiments of the present invention disclose a TCP link configuration method, apparatus, and device. The method includes: acquiring data information in a data packet transmitted on a target TCP link or transmission information generated in a process of transmitting the data packet; determining, according to the data information or the transmission information, a target network type of a network on which the target TCP link is located; searching a pre-established configuration library for a target TCP configuration file corresponding to the target network type, where the configuration library includes a correspondence between a network type and a TCP configuration file, and each network type corresponds to one TCP configuration file; and configuring the target TCP link by using the searched target TCP configuration file. According to the method, the configured target TCP link is better adapted to a network on which the target TCP link is located; use of network bandwidth can be maximized; and TCP transmission efficiency can be improved.
    • 本发明的实施例公开了一种TCP链路配置方法,装置和装置。 该方法包括:获取在目标TCP链路上发送的数据分组中的数据信息或在发送数据分组的过程中生成的传输信息; 根据所述数据信息或所述传输信息,确定所述目标TCP链路所在的网络的目标网络类型; 搜索与目标网络类型对应的目标TCP配置文件的预先建立的配置库,其中配置库包括网络类型和TCP配置文件之间的对应关系,并且每个网络类型对应于一个TCP配置文件; 并通过使用搜索到的目标TCP配置文件配置目标TCP链路。 根据该方法,配置的目标TCP链路更适合于目标TCP链路所在的网络; 可以最大限度地利用网络带宽; 可以提高TCP传输效率。
    • 10. 发明公开
    • METHOD, APPARATUS AND SYSTEM FOR PROCESSING CLOUD APPLICATION ATTACK BEHAVIOURS IN CLOUD COMPUTING SYSTEM
    • 用于处理云计算系统中云应用程序攻击行为的方法,装置和系统
    • EP3214568A1
    • 2017-09-06
    • EP15862949.3
    • 2015-05-27
    • Huawei Technologies Co., Ltd.
    • MENG, ZechaoLIU, Hewei
    • G06F21/56
    • H04L63/1441G06F9/45558G06F2009/45587H04L63/1408H04L63/1416H04L63/1425H04L63/1466H04L69/329H04W12/12
    • The present invention discloses an apparatus for processing an attack behavior of a cloud application in a cloud computing system, including: a security analyzer, a security processor, and a policy manager, where the policy manager is configured to store a security determining rule and a malicious application processing rule; the security analyzer is configured to receive application behavior data sent by a security detector, determine, according to the application behavior data and the security determining rule, whether a cloud application running on a cloud host has an attack behavior, and when determining that the cloud application running on the cloud host has an attack behavior, send the application behavior data to the security processor; and the security processor is configured to invoke, according to the malicious application processing rule, an interface provided by a cloud controller in a cloud computing system, to process the cloud application having an attack behavior. In solutions of the present invention, security protection is performed based on an application level of cloud computing, which can prevent mutual attack between different applications on a same host, and reduce impact on a normal application.
    • 本发明公开了一种在云计算系统中处理云应用的攻击行为的装置,包括:安全分析器,安全处理器和策略管理器,所述策略管理器用于存储安全性判断规则和 恶意应用处理规则; 所述安全分析器用于接收安全检测器发送的应用行为数据,根据所述应用行为数据和所述安全性判断规则,确定云主机上运行的云应用是否存在攻击行为,当确定所述云 运行在云主机上的应用程序具有攻击行为,将应用程序行为数据发送给安全处理器; 所述安全处理器,用于根据所述恶意应用程序处理规则,调用云计算系统中的云控制器提供的界面,处理具有攻击行为的云应用程序。 在本发明的方案中,基于云计算的应用级进行安全防护,可以防止同一主机上不同应用之间的相互攻击,减少对正常应用的影响。