会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks
    • 用于提高内容分发网络对分布式拒绝服务攻击的弹性的方法和装置
    • US07836295B2
    • 2010-11-16
    • US10207695
    • 2002-07-29
    • Suresh N. ChariPau-Chen ChengKang-Won LeeSambit SahuAnees A. Shaikh
    • Suresh N. ChariPau-Chen ChengKang-Won LeeSambit SahuAnees A. Shaikh
    • H04L12/66
    • H04L63/1408H04L63/1458H04L67/1002
    • Several deterrence mechanisms suitable for content distribution networks (CDN) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechanism, an attacker is required to generate O(n2)amount of traffic to victimize a CDN-hosted site when the site content is served from n CDN caches. Without these modifications, the attacker must generate only O(n) traffic to bring down the site. The site allocation scheme provides sufficient isolation among CDN-hosted Web sites to prevent an attack on one Web site from making other sites unavailable. Using an allocation strategy based on binary codes, it can be guaranteed that a successful attack on any individual Web site that disables its assigned servers, does not also bring down other Web sites hosted by the CDN.
    • 提供了适用于内容分发网络(CDN)的几种威慑机制。 这些包括基于散列的请求路由方案和站点分配方案。 基于散列的请求路由方案提供了一种区分合法请求与假请求的方法。 使用这种机制,当从n个CDN缓存提供站点内容时,攻击者需要生成O(n2)个流量来伤害CDN托管站点。 没有这些修改,攻击者必须只生成O(n)流量才能关闭该站点。 站点分配方案可以在CDN托管的网站之间提供足够的隔离,以防止一个网站的攻击使其他站点不可用。 使用基于二进制代码的分配策略,可以保证对任何单个网站的成功攻击禁用其分配的服务器,也不会导致其他由CDN托管的网站。
    • 6. 发明授权
    • Connection management and optimization for services delivered over networks
    • 通过网络提供的服务的连接管理和优化
    • US08825811B2
    • 2014-09-02
    • US13421371
    • 2012-03-15
    • Cesar A. GonzalesKang-Won LeeSumedh W. SathayeDinesh VermaPeter Westerink
    • Cesar A. GonzalesKang-Won LeeSumedh W. SathayeDinesh VermaPeter Westerink
    • G06F15/16
    • H04L65/4084H04L65/80H04L67/2833
    • Content delivery by a network node is optimized. The network node is communicatively coupled between multiple end user devices and at least one content service provider. A request for a media streaming service available from the content service provider is intercepted from a first requestor device. It is determined if the media streaming service is registered for delivery optimization based on at least one service rule specific to the media streaming service. It is determined if a second requestor device is currently receiving the media streaming service from the content service provider. In response to the media streaming service being received by the second requestor device, delivery optimization of the media streaming service is performed by replicating the media streaming service for delivery to the first requestor device. The replicated media streaming service is sent to the first requestor device.
    • 网络节点的内容传送被优化。 网络节点通信地耦合在多个终端用户设备和至少一个内容服务提供商之间。 从第一请求者设备截取从内容服务提供商获得的媒体流服务的请求。 基于媒体流服务特有的至少一个服务规则,确定媒体流服务是否被注册用于传送优化。 确定第二请求者设备当前是否正在从内容服务提供商接收媒体流服务。 响应于由第二请求者设备接收到的媒体流服务,媒体流服务的传送优化通过复制媒体流服务来传送到第一请求者设备来执行。 复制的媒体流服务被发送到第一请求者设备。
    • 10. 发明申请
    • Computer-implemented method, system, and program product for deployment time optimization of a distributed application
    • 计算机实现的方法,系统和程序产品,用于分布式应用程序的部署时间优化
    • US20070198973A1
    • 2007-08-23
    • US11345748
    • 2006-02-02
    • Jong-Deok ChoiManish GuptaParviz KermaniKang-Won LeeKyung RyuDinesh VermaPeng Wu
    • Jong-Deok ChoiManish GuptaParviz KermaniKang-Won LeeKyung RyuDinesh VermaPeng Wu
    • G06F9/45
    • G06F8/61
    • A computer-implemented method, system, and program product for optimizing a distributed (software) application are provided. Specifically, a configuration of a target computing environment, in which the distributed application is deployed, is discovered upon deployment of the distributed application. Thereafter, based on a set of rules and the discovered configuration, one or more optimization techniques are applied to optimize the distributed application. In a typical embodiment, the set of rules can be embedded in the distributed application, or they can be accessed from an external source such as a repository. Regardless, the optimization techniques applied can include at least one of the following: (1) identification and replacement of an underperforming component of the distributed application with a new component; (2) generation of interface layers (to allow selection of optimal bindings) between distributed objects of the distributed application; and/or (3) execution of code transformation of the distributed application using program analysis techniques.
    • 提供了一种用于优化分布式(软件)应用程序的计算机实现的方法,系统和程序产品。 具体而言,在部署分布式应用程序时发现其中部署了分布式应用的目标计算环境的配置。 此后,基于一组规则和所发现的配置,应用一个或多个优化技术来优化分布式应用。 在典型的实施例中,该组规则可以嵌入在分布式应用中,或者可以从诸如存储库的外部源访问它们。 无论如何,应用的优化技术可以包括以下至少一个:(1)用新的组件识别和替换分布式应用程序的表现不佳的组件; (2)在分布式应用程序的分布式对象之间生成界面层(允许选择最佳绑定); 和/或(3)使用程序分析技术执行分布式应用程序的代码转换。