会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Preventing network reset denial of service attacks
    • 防止网络重置拒绝服务攻击
    • US07458097B2
    • 2008-11-25
    • US11540526
    • 2006-09-28
    • Mitesh DalalAmol KhareRandall Stewart
    • Mitesh DalalAmol KhareRandall Stewart
    • G06F11/00G06F15/16H04L1/00
    • H04L63/1458H04L1/16
    • Approaches for preventing TCP RST attacks and TCP SYN attacks in packet-switched networks are disclosed. In one approach, upon receiving a TCP RST packet, a first endpoint node challenges the second endpoint node in the then-current connection using an acknowledgement message. If the connection is genuinely closed, the second endpoint node responds with a RST packet carrying an expected next sequence value. The first endpoint node takes no action if no RST packet is received. Thus, attacks are thwarted because an attacker does not receive the acknowledgment message and therefore cannot provide the exact expected next sequence value.
    • 公开了在分组交换网络中防止TCP RST攻击和TCP SYN攻击的方法。 在一种方法中,在接收到TCP RST分组时,第一端点节点使用确认消息来挑战当前连接中的第二端点节点。 如果连接真正关闭,则第二端点节点用携带预期下一个序列值的RST分组进行响应。 如果没有接收到RST数据包,则第一个端点节点不采取任何操作。 因此,攻击被阻止,因为攻击者没有收到确认消息,因此无法提供确切的预期下一个序列值。
    • 4. 发明申请
    • Preventing network reset denial of service attacks
    • 防止网络重置拒绝服务攻击
    • US20070044150A1
    • 2007-02-22
    • US11540526
    • 2006-09-28
    • Mitesh DalalAmol KhareRandall Stewart
    • Mitesh DalalAmol KhareRandall Stewart
    • G06F12/14
    • H04L63/1458H04L1/16
    • Approaches for preventing TCP RST attacks and TCP SYN attacks in packet-switched networks are disclosed. In one approach, upon receiving a TCP RST packet, a first endpoint node challenges the second endpoint node in the then-current connection using an acknowledgement message. If the connection is genuinely closed, the second endpoint node responds with a RST packet carrying an expected next sequence value. The first endpoint node takes no action if no RST packet is received. Thus, attacks are thwarted because an attacker does not receive the acknowledgment message and therefore cannot provide the exact expected next sequence value.
    • 公开了在分组交换网络中防止TCP RST攻击和TCP SYN攻击的方法。 在一种方法中,在接收到TCP RST分组时,第一端点节点使用确认消息来挑战当前连接中的第二端点节点。 如果连接真正关闭,则第二端点节点用携带预期下一个序列值的RST分组进行响应。 如果没有接收到RST数据包,则第一个端点节点不采取任何操作。 因此,攻击被阻止,因为攻击者没有收到确认消息,因此无法提供确切的预期下一个序列值。
    • 5. 发明申请
    • Selecting paths in multi-homed transport-layer network associations
    • 选择多宿主传输层网络关联中的路径
    • US20070159977A1
    • 2007-07-12
    • US11326841
    • 2006-01-06
    • Mitesh DalalRandall Stewart
    • Mitesh DalalRandall Stewart
    • H04J1/16H04J3/14H04L12/56
    • H04L45/22H04L45/02H04L47/10H04L47/11H04L47/122H04L47/26
    • A multi-homed network node comprises an interface that is addressable using a primary network address and a secondary network address. Network packets identifying the primary network address traverse a first network path and packets identifying the second network address traverse a second network path that is routed physically separately from the first network path. A transport layer network protocol association is established in the network between a first node and the multi-homed node. One or more data messages are sent to the second node and identify the primary network address. Network feedback information indicates one or more performance characteristics of the first network path. In response, the data messages are automatically modified to identify the secondary network address.
    • 多宿主网络节点包括使用主网络地址和辅助网络地址可寻址的接口。 标识主网络地址的网络分组穿过第一网络路径,标识第二网络地址的分组穿过与第一网络路径物理分开路由的第二网络路径。 在第一节点和多归位节点之间的网络中建立传输层网络协议关联。 将一个或多个数据消息发送到第二个节点并识别主要网络地址。 网络反馈信息指示第一网络路径的一个或多个性能特征。 作为响应,数据消息被自动修改以识别辅助网络地址。
    • 8. 发明申请
    • Preventing network data injection attacks
    • 防止网络数据注入攻击
    • US20050160478A1
    • 2005-07-21
    • US10792146
    • 2004-03-02
    • Anantha RamaiahRandall StewartPeter LeiPatrick Mahan
    • Anantha RamaiahRandall StewartPeter LeiPatrick Mahan
    • G06F11/30G06F15/173H04L9/00H04L9/32H04L12/56H04L29/06
    • H04L63/1416H04L47/27H04L47/29H04L47/323H04L47/34H04L63/1458H04L69/16H04L69/163
    • Approaches for preventing TCP data injection attacks in packet-switched networks are disclosed. A first approach provides for dropping received segments that carry ACK values smaller than the next unacknowledged sequence number expected minus the maximum window size. This approach helps keep spurious injected segments out of the TCP re-assembly buffer. In a second approach, heuristics are used to examine the sequence number of a newly arrived segment, and when the sequence number is the next expected, then the newly arrived segment is used and the contents of the re-assembly buffer are not considered. Further, if the data payload of the newly arrived segment overlaps in sequential order with segments already in the re-assembly buffer, the overlapped segments in the re-assembly buffer are considered spurious and are discarded. Thus, this approach helps remove spurious data from the re-assembly buffer if the first approach somehow fails to prevent the data from entering the re-assembly buffer.
    • 公开了在分组交换网络中防止TCP数据注入攻击的方法。 第一种方法提供丢弃接收的段,其携带ACK值小于预期的下一个未确认序列号减去最大窗口大小。 这种方法有助于将伪注入的段保留在TCP重新组装缓冲区之外。 在第二种方法中,启发式用于检查新到达的段的序列号,当序列号是下一个预期序列号时,则使用新到达的段,并且不考虑重新组装缓冲区的内容。 此外,如果新到达的段的数据有效载荷与已经在重新组装缓冲区中的段按顺序重叠,则重组缓冲区中的重叠段被认为是虚假的并被丢弃。 因此,如果第一种方法无法防止数据进入重新组装缓冲区,则此方法有助于从重新组装缓冲区中清除虚假数据。
    • 9. 发明授权
    • Method for group-based multicast with non-uniform receivers
    • 使用非均匀接收机的组播组播方法
    • US09118494B2
    • 2015-08-25
    • US12985832
    • 2011-01-06
    • Weiqian DaiMing LiRenwei LiXuesong DongYang YuRandall Stewart
    • Weiqian DaiMing LiRenwei LiXuesong DongYang YuRandall Stewart
    • H04L12/18
    • H04L12/184H04L12/185H04L12/1868H04L12/1877H04L12/1881
    • An apparatus comprising a proxy configured to couple to a sender and a receiver and to receive data from the sender at a first rate and forward the data to the receiver at a second rate that is less than the first rate. A method comprising detecting a reception speed for each of a plurality of receivers in a multicast group, assigning the receivers to a first group and a second group based on the reception speed of each of the receivers, wherein the first group has a reception speed that is faster than a reception speed of the second group, and sending multicast data intended for all of the receivers to the receivers in the first group and to a proxy at a first rate, wherein the proxy buffers the multicast data and sends the multicast data to the receivers in the second group at a second rate.
    • 一种包括被配置为耦合到发送器和接收器并且以第一速率从发送器接收数据的代理的设备,并且以小于第一速率的第二速率将数据转发到接收器。 一种方法,包括检测多播组中的多个接收机中的每一个的接收速度,基于每个接收机的接收速度将接收机分配给第一组和第二组,其中第一组的接收速度为 比第二组的接收速度快,并且将针对所有接收机的组播数据发送到第一组中的接收机,并以第一速率发送给代理,其中代理缓存多播数据并将多播数据发送到 第二组中的接收机以第二速率。