会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Network connectivity determination
    • 网络连通性确定
    • US07711800B2
    • 2010-05-04
    • US11345189
    • 2006-01-31
    • Alexandru GavrilescuTin Qian
    • Alexandru GavrilescuTin Qian
    • G06F15/16
    • H04L43/0811H04L43/12H04L69/16
    • The present invention provides a method by which the connectivity status of network connections on a PC is determined in real-time by passively reviewing packet information from the TCP/IP stack. To achieve high accuracy of the connectivity status determination, the method involves the determination of the edge of a local network. In cases where little or no network traffic is observed on the network, scalable active probing methods are designed to make accurate connectivity determination. Special considerations for network setups like networks with web proxy servers, NAT or edge firewalls are also included to improve the accuracy of the determination in those environments.
    • 本发明提供了一种通过被动地查看来自TCP / IP栈的分组信息来实时确定PC上网络连接的连接状态的方法。 为了实现连接状态确定的高精度,该方法涉及确定本地网络的边缘。 在网络上观察到很少或没有网络流量的情况下,设计可扩展的主动探测方法来进行准确的连接确定。 还包括网络设置的特殊注意事项,如网络代理服务器,NAT或边缘防火墙,以提高这些环境中确定的准确性。
    • 8. 发明申请
    • Link layer discovery and diagnostics
    • 链路层发现和诊断
    • US20070245033A1
    • 2007-10-18
    • US11405002
    • 2006-04-14
    • Alexandru GavrilescuAlvin TanAustin DonnellyChong ZhangGlen WardRichard Black
    • Alexandru GavrilescuAlvin TanAustin DonnellyChong ZhangGlen WardRichard Black
    • G06F15/16
    • H04L43/12H04L29/12801H04L29/12839H04L41/12H04L61/6004H04L61/6022
    • Described is a technology including an Ethernet layer 2 protocol by which a node of a computer network can discover information about other network computing elements, including discovering network topology information, and/or collecting diagnostic information. The protocol allows multiple responders to communicate data with a mapper node for topology discovery, with one or more enumerator nodes for quick enumeration, or with a controller node for network tests that collect diagnostic information. The responders process the received data to determine the type of service (quick discovery, topology discovery or network test) and the service type's related function, and take action based on these and possibly additional criteria in the data. Actions may include responding to the data, following received commands, collecting statistics, responding to queries, and so forth.
    • 描述了一种技术,其包括以太网层2协议,计算机网络的节点可以通过该以太网层协议发现关于其他网络计算元件的信息,包括发现网络拓扑信息和/或收集诊断信息。 该协议允许多个响应者与映射器节点进行数据传输以进行拓扑发现,具有一个或多个枚举器节点用于快速枚举,或者与用于收集诊断信息的网络测试的控制器节点进行通信。 响应者处理接收的数据以确定服务类型(快速发现,拓扑发现或网络测试)和服务类型的相关功能,并根据数据中的这些可能的附加标准采取行动。 操作可能包括响应数据,接收到的命令,收集统计信息,响应查询等。
    • 9. 发明授权
    • Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
    • 对等名称解析协议(PNRP)安全基础设施和方法
    • US07720962B2
    • 2010-05-18
    • US11375749
    • 2006-03-15
    • Rohit GuptaAlexandru GavrilescuJohn L. MillerGraham A. Wheeler
    • Rohit GuptaAlexandru GavrilescuJohn L. MillerGraham A. Wheeler
    • G06F13/00
    • H04L67/104H04L29/12009H04L29/12047H04L61/15H04L63/0823H04L63/126H04L63/1458Y10S707/99939
    • A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.
    • 提出了一种防止恶意节点中断对等网络的正常操作的能力的安全基础设施和方法。 本发明的方法允许节点通过使其自我验证来使用安全和不安全的身份。 在必要或机会主义的情况下,通过捎带现有消息的验证来验证身份所有权。 通过随机选择连接到哪个节点来减少初始连接到恶意节点的概率。 此外,来自恶意节点的信息被识别,并且可以通过维护关于将要响应的先前通信的信息而被忽略。 通过允许节点在其资源利用超过预定限制时忽略请求,禁止拒绝服务攻击。 恶意节点删除有效节点的能力通过要求撤销证书由要删除的节点进行签名来减少。