会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • LOAD BALANCING AMONG VOIP SERVER GROUPS
    • 在VOIP服务器组中的负载平衡
    • US20110271005A1
    • 2011-11-03
    • US12771618
    • 2010-04-30
    • Shaun Jaikarran BharratTolga AsverenJustin Hart
    • Shaun Jaikarran BharratTolga AsverenJustin Hart
    • G06F15/16
    • H04L67/1027H04L61/1511H04L65/1063
    • Described are computer-based methods and apparatuses, including computer program products, for load balancing among VOIP servers. An identity table includes an identity entry for a plurality of servers, each identity entry comprising a FQDN and load balancing information. A persistence table stores persistence entries indicative of a persistent connection between a client and a server. Updated load balancing information determined by the first server is received. The identity table is updated based on the updated load balancing information. A service request is received from a client. If the client is not associated with a persistence entry, a second server is selected from the plurality of servers based on load balancing information for each identity entry in the identity table. A persistence entry is stored indicative of a persistent connection between the client and the selected second server, the persistence entry comprising a FQDN and an identifier for the client.
    • 描述了基于计算机的方法和装置,包括用于VOIP服务器之间的负载平衡的计算机程序产品。 身份表包括多个服务器的身份条目,每个身份条目包括FQDN和负载平衡信息。 持久性表存储指示客户端和服务器之间持久连接的持久性条目。 收到由第一台服务器确定的更新的负载平衡信息。 基于更新的负载均衡信息更新身份表。 从客户端接收到服务请求。 如果客户端不与持久性条目相关联,则基于身份表中的每个身份条目的负载平衡信息从多个服务器中选择第二服务器。 存储指示客户端和所选择的第二服务器之间的持久连接的持久性条目,持久性条目包括FQDN和客户端的标识符。
    • 3. 发明申请
    • Loosely-Coupled Encryption Functionality for Operating Systems
    • 操作系统的松散耦合加密功能
    • US20110271097A1
    • 2011-11-03
    • US12770476
    • 2010-04-29
    • Damascene M. JoachimpillaiShaun Jaikarran BharratAby KuriakoseVivian LuXiang Yu
    • Damascene M. JoachimpillaiShaun Jaikarran BharratAby KuriakoseVivian LuXiang Yu
    • H04L29/06H04L9/08H04L9/00
    • H04L63/0485H04L69/162
    • Described are computer-based methods and apparatuses, including computer program products, for loosely-coupled encryption functionality for operating systems. A data packet is processed through one or more internet protocol stack layers to generate a processed data packet. Modified encryption information is determined that does not comprise a desired security policy for the data packet and comprises null parameter(s) and is based on encryption information that comprises the desired security policy. A message comprising data indicative of the encryption information is transmitted. An operating system is unaware of a security nature of the transmission. A null-encryption routine is executed to generate an unencrypted data packet, wherein the null-encryption routine does not encrypt the processed data packet. The unencrypted data packet is transmitted to the second computing device. The unencrypted data packet is encrypted based on the message transmitted from the first computing device to generate an encrypted data packet.
    • 描述了基于计算机的方法和装置,包括用于操作系统的松散耦合加密功能的计算机程序产品。 数据包通过一个或多个互联网协议栈层进行处理,以产生经处理的数据包。 确定不包括用于数据分组的期望的安全策略的修改的加密信息,并且包括空参数并且基于包括期望的安全策略的加密信息。 发送包括指示加密信息的数据的消息。 操作系统不知道传输的安全性质。 执行空加密例程以生成未加密的数据分组,其中空加密例程不加密经处理的数据分组。 未加密的数据分组被发送到第二计算设备。 基于从第一计算设备发送的消息来加密未加密的数据分组,以生成加密的数据分组。
    • 5. 发明申请
    • Methods and Apparatuses for Policing and Prioritizing of Data Services
    • 数据服务管理和优先级的方法和设备
    • US20110083175A1
    • 2011-04-07
    • US12574286
    • 2009-10-06
    • Shaun Jaikarran BharratJustin Scott HartJian Yang
    • Shaun Jaikarran BharratJustin Scott HartJian Yang
    • G06F21/00G06F15/16
    • H04L47/20H04L47/215H04L47/2408H04L47/2425
    • Methods and apparatuses, including computer program products, are described for policing and prioritizing of data services. Each packet in a data stream is directed to a substream policer of a plurality of substream policers. Each packet is allowed through the substream policer based on rate parameters associated with the substream policer. The packets allowed by the substream policer are directed to an aggregate policer. Each packet allowed through the substream policer is allowed through the aggregate policer based on rate parameters associated with the aggregate policer. The substream policer and the aggregate policer are charged for each packet allowed by both the substream policer and the aggregate policer. The substream policer and the aggregate policer are not charged for each packet not allowed by either the substream policer or the aggregate policer.
    • 描述了包括计算机程序产品在内的方法和设备,用于对数据服务进行管理和优先级排序。 数据流中的每个分组被引导到多个子流策略器的子流策略器。 基于与子流策略器相关联的速率参数,允许每个分组通过子流策略器。 子流策略器允许的数据包被引导到聚合策略器。 通过子流策略器允许的每个数据包都可以通过聚合策略器,基于与聚合策略器相关联的速率参数。 子流策略器和聚合策略器对于子流策略器和聚合策略器允许的每个数据包进行计费。 子流策略器和聚合策略器不对子流策略器或聚合策略器不允许的每个数据包进行计费。
    • 6. 发明授权
    • Adaptive rate control based on overload signals
    • 基于过载信号的自适应速率控制
    • US08699343B2
    • 2014-04-15
    • US12430708
    • 2009-04-27
    • Ahmed AbdelalWassim MatragiNui ChanShaun Jaikarran Bharrat
    • Ahmed AbdelalWassim MatragiNui ChanShaun Jaikarran Bharrat
    • H04L12/26
    • H04L65/4092H04L47/263H04L47/28H04L67/1002Y02D50/10
    • Described are methods and apparatuses, including computer program products, for limiting server overload via client control. A first set of a plurality of requests are transmitted to a server at a first transmission rate during a first period of time. The first transmission rate is limited to be less than or equal to a first transmission limit rate. An overload value is determined based on whether at least two or more requests of the first set of requests for service satisfy an overload criterion. A second transmission limit rate is determined based on the overload value and the first transmission limit rate. A second set of a plurality of requests is transmitted to the server at a second transmission rate during a second period of time. The second transmission rate is limited to be less than or equal to the second transmission limit rate.
    • 描述了通过客户端控制来限制服务器过载的方法和装置,包括计算机程序产品。 第一组多个请求在第一时间段期间以第一传输速率被发送到服务器。 第一传输速率被限制为小于或等于第一传输限制速率。 基于第一组服务请求的至少两个以上的请求是否满足过载标准来确定过载值。 基于过载值和第一传输限制速率确定第二传输限制速率。 第二组多个请求在第二时间段期间以第二传输速率被发送到服务器。 第二传输速率被限制为小于或等于第二传输限制速率。
    • 7. 发明授权
    • Transparent recovery of transport connections using packet translation techniques
    • 使用分组转换技术透明地恢复传输连接
    • US08335853B2
    • 2012-12-18
    • US12641105
    • 2009-12-17
    • Shaun Jaikarran Bharrat
    • Shaun Jaikarran Bharrat
    • G06F15/16
    • H04L43/0811G06F11/1443G06F11/1482G06F11/1497G06F11/2005G06F11/2097H04L61/2503H04L61/6063H04L69/16H04L69/161H04L69/162H04L69/163H04L69/22H04L69/40
    • Methods and apparatuses, including computer program products, are described for transparent recovery of transport connections. The method includes collecting a state associated with a first connection between a first server and a remote server via a first network socket and transmitting the state from a first networking module to a second networking module. The method includes storing the state, opening a second network socket based on failure of the first networking module, intercepting outbound packets associated with a request to initiate a second connection between the first server and the remote server via the second socket, modifying the intercepted packets based on the state, and transmitting the modified packets to the remote server to elicit an acknowledgement to maintain the first connection. The method includes receiving packets associated with the acknowledgment from the remote server, and modifying the received packets to acknowledge the request to initiate the second connection.
    • 描述了包括计算机程序产品在内的方法和装置,用于传输连接的透明恢复。 该方法包括经由第一网络套接字收集与第一服务器和远程服务器之间的第一连接相关联的状态,并将该状态从第一联网模块传输到第二联网模块。 该方法包括存储状态,基于第一联网模块的故障来打开第二网络套接字,拦截与通过第二套接字发起第一服务器和远程服务器之间的第二连接的请求相关联的出站分组,修改截获的分组 并且将修改的分组发送到远程服务器以引出确认来维护第一连接。 所述方法包括从所述远程服务器接收与所述确认相关联的分组,以及修改所接收的分组以确认所述请求以启动所述第二连接。
    • 8. 发明申请
    • Loosely-Coupled Encryption Functionality for Operating Systems
    • 操作系统的松散耦合加密功能
    • US20110271096A1
    • 2011-11-03
    • US12770473
    • 2010-04-29
    • Shaun Jaikarran BharratDamascene M. Joachimpillai
    • Shaun Jaikarran BharratDamascene M. Joachimpillai
    • H04L29/06
    • H04L63/0485H04L63/164H04L69/32
    • Described are computer-based methods and apparatuses, including computer program products, for loosely-coupled encryption functionality for operating systems. A data packet is processed through one or more internet protocol stack layers to generate a processed data packet. Encryption information is determined that includes parameters for encrypting and decrypting data packets transmitted between the first computing device and the remote computer. A message comprising data indicative of the encryption information is transmitted to a second computing device, wherein an operating system being executed is unaware of a security nature of the transmission. A bypass encryption routine is executed to generate a unencrypted data packet, wherein the bypass encryption routine does not encrypt the processed data packet. The unencrypted data packet is transmitted to the second computing device. The unencrypted data packet is encrypted based on the message transmitted from the first computing device to generate an encrypted data packet.
    • 描述了基于计算机的方法和装置,包括用于操作系统的松散耦合加密功能的计算机程序产品。 数据包通过一个或多个互联网协议栈层进行处理,以产生经处理的数据包。 确定加密信息,其包括用于加密和解密在第一计算设备和远程计算机之间传输的数据分组的参数。 包括指示加密信息的数据的消息被发送到第二计算设备,其中正在执行的操作系统不知道传输的安全性质。 执行旁路加密例程以生成未加密的数据分组,其中旁路加密例程不对经处理的数据分组进行加密。 未加密的数据分组被发送到第二计算设备。 基于从第一计算设备发送的消息来加密未加密的数据分组,以生成加密的数据分组。
    • 10. 发明申请
    • Transparent Recovery of Transport Connections Using Packet Translation Techniques
    • 使用分组转换技术透明地恢复传输连接
    • US20110153834A1
    • 2011-06-23
    • US12641105
    • 2009-12-17
    • Shaun Jaikarran Bharrat
    • Shaun Jaikarran Bharrat
    • G06F11/07G06F15/16
    • H04L43/0811G06F11/1443G06F11/1482G06F11/1497G06F11/2005G06F11/2097H04L61/2503H04L61/6063H04L69/16H04L69/161H04L69/162H04L69/163H04L69/22H04L69/40
    • Methods and apparatuses, including computer program products, are described for transparent recovery of transport connections. The method includes collecting a state associated with a first connection between a first server and a remote server via a first network socket and transmitting the state from a first networking module to a second networking module. The method includes storing the state, opening a second network socket based on failure of the first networking module, intercepting outbound packets associated with a request to initiate a second connection between the first server and the remote server via the second socket, modifying the intercepted packets based on the state, and transmitting the modified packets to the remote server to elicit an acknowledgement to maintain the first connection. The method includes receiving packets associated with the acknowledgment from the remote server, and modifying the received packets to acknowledge the request to initiate the second connection.
    • 描述了包括计算机程序产品在内的方法和装置,用于传输连接的透明恢复。 该方法包括经由第一网络套接字收集与第一服务器和远程服务器之间的第一连接相关联的状态,并将该状态从第一联网模块传输到第二联网模块。 该方法包括存储状态,基于第一联网模块的故障来打开第二网络套接字,拦截与通过第二套接字发起第一服务器和远程服务器之间的第二连接的请求相关联的出站分组,修改截获的分组 并且将修改的分组发送到远程服务器以引出确认来维护第一连接。 所述方法包括从所述远程服务器接收与所述确认相关联的分组,以及修改所接收的分组以确认所述请求以启动所述第二连接。