会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Programmable address mapping matrix for secure networks
    • 用于安全网络的可编程地址映射矩阵
    • US5940392A
    • 1999-08-17
    • US366809
    • 1994-12-30
    • William LoIan Crayford
    • William LoIan Crayford
    • H04L12/18H04L12/44H04L12/46H04L29/06H04J3/26H04J3/36
    • H04L12/46H04L45/7453H04L63/10H04L12/18H04L12/44
    • In a repeater having multiple ports and receiving at a source port a data packet containing a received address, an address mapping system including a content addressable memory (CAM) with address registers containing stored addresses, and an address mapping matrix coupled to said CAM, for perfectly mapping any of the address registers to any of the ports. According to one aspect of the invention, it operates in a repeater having an address compare and disrupt security system. The preferred embodiment of the present invention includes a content addressable memory having address registers containing stored individual and multicast addresses associated with each repeater port, and an address mapping matrix including a disrupt enable circuit associated with each port, for enabling the disruption of the data packet at that port when the received destination address does not match the associated stored addresses, and for disabling the disruption of the data packet at that port when the received destination address matches the stored address in a particular register and that particular register is mapped to that port via an address mapping register.
    • 在具有多个端口并且在源端口处接收包含接收到的地址的数据分组的中继器中,包括具有包含存储的地址的地址寄存器的内容可寻址存储器(CAM)的地址映射系统和耦合到所述CAM的地址映射矩阵, 将任何地址寄存器完美地映射到任何端口。 根据本发明的一个方面,其操作在具有地址比较和中断安全系统的中继器中。 本发明的优选实施例包括内容可寻址存储器,其具有包含与每个中继器端口相关联的存储的单独和多播地址的地址寄存器,以及包括与每个端口相关联的中断使能电路的地址映射矩阵,以便能够中断数据分组 当接收到的目的地地址与相关联的存储地址不匹配时,在该端口处,并且当接收到的目的地地址与特定寄存器中存储的地址匹配并且该特定寄存器被映射到该端口时禁止在该端口处的数据分组的中断 通过地址映射寄存器。
    • 2. 发明授权
    • Programmable disrupt of multicast packets for secure networks
    • 可编程中断安全网络的组播数据包
    • US5539737A
    • 1996-07-23
    • US366806
    • 1994-12-30
    • William LoIan Crayford
    • William LoIan Crayford
    • H04L12/18H04L12/22H04L12/44H04L29/06H04L9/00
    • H04L63/0236H04L12/1886H04L12/22H04L12/44
    • A secure repeater implementing data packet masking includes a programmable and selective, on a per port basis, multicast response. A multicast controller receives a multicast identifier extracted from a destination address field of a data packet. A plurality of memories, one associated with each port, determines the associated port's response to the multicast identifier. Each memory stores a multicast control code. When the multicast control code for a particular port has a value indicating that the associated port is enabled to receive multicast packets, assertion of the multicast identifier to the multicast controller for the particular port results in disabling the security masking for the port and subsequent transmission of unmodified data from the particular port.
    • 实现数据包掩蔽的安全中继器包括基于每端口的可编程和选择性的多播响应。 组播控制器接收从数据包的目的地地址字段提取的多播标识符。 与每个端口相关联的多个存储器确定关联端口对多播标识符的响应。 每个存储器存储组播控制代码。 当特定端口的组播控制代码具有指示关联的端口被允许接收多播分组的值时,将特定端口的组播标识符断言给组播控制器导致禁用该端口的安全掩蔽并随后传输 来自特定端口的未修改数据。
    • 4. 发明授权
    • Multiple address security architecture
    • 多地址安全架构
    • US5640393A
    • 1997-06-17
    • US460319
    • 1995-06-02
    • William LoIan Crayford
    • William LoIan Crayford
    • H04L9/36H04L12/22H04L12/44H04L12/46H04L29/06H04L9/00
    • H04L63/02H04L12/22H04L12/44H04L12/4625
    • A secure repeater implementing data packet masking includes a programmable and selective, on a per port basis, disrupt response responsive to any of several selectable qualifying conditions. A disrupt controller receives signals indicating various characteristics of fields of a data packet, and other conditions. A register bank includes a plurality of memories, one associated with each port and some of the conditions, assists the disrupt controller to determine the associated port's disrupt response to the data packet. Each memory stores a disrupt control code. When the disrupt control code for a particular port has a value indicating that the associated port is enabled, deassertion of a condition signal associated with that control code results in disruption of a data packet. A cell array permits simple, efficient scaling and formation of integrated semiconductor structures to implement complex disrupt logic equations.
    • 实现数据分组掩蔽的安全中继器包括在每个端口的基础上的可编程和选择性,响应于几种可选择的限定条件中的任一种而中断响应。 中断控制器接收指示数据包的字段的各种特性的信号和其他条件。 寄存器组包括多个存储器,一个与每个端口相关联的存储器和一些条件,帮助中断控制器确定相关端口对数据包的中断响应。 每个存储器存储中断控制代码。 当特定端口的中断控制代码具有指示相关端口被使能的值时,与该控制代码相关联的条件信号的取消取消导致数据分组的中断。 单元阵列允许简单,有效的缩放和形成集成半导体结构以实现复杂的中断逻辑方程。
    • 7. 发明授权
    • System for periodically transmitting signal to/from sleeping node
identifying its existence to a network and awakening the sleeping node
responding to received instruction
    • 用于向睡眠节点周期性地向睡眠节点发送信号以将其存在识别到网络并且响应于接收到的指令唤醒睡眠节点的系统
    • US5404544A
    • 1995-04-04
    • US894016
    • 1992-06-05
    • Ian Crayford
    • Ian Crayford
    • H04L12/28G06F1/32H04L12/10H04L12/12H04L12/26H04L12/44G06F13/38G06F1/30
    • G06F1/3215H04L12/10H04L12/12H04L12/44H04L43/0811Y02B60/32Y02B60/34Y02B60/35
    • One of the fundamental benefits of the 10BASE-T physical interface for 802.3/Ethernet is that the health of the communications link can be permanently monitored. When in the "link good" condition, the 10BASE-T transceiver is required to output a link status (LNKST) signal to this effect. Media Access Controller (MAC) 30, with an embedded 10BASE-T transceiver (37), uses the LNKST signal to provide power management to the MAC (30). By using the programmable AWAKE bit, the receive section of the 10BASE-T transceiver (37) can remain powered, even if the SLEEP input to the MAC (30) is activated. This allows the transceiver (37) to detect a link beat pulse (60) or receive packet activity. If either receive condition is encountered, the internal transceiver (37) will activate the LNKST output from the MAC (30). The system hardware and/or software can use the LNKST output to take appropriate action. For instance, if the LNKST output is active (low), then the computer is connected to an active network, and it is likely that the operating system will allow the MAC (30) to remain powered. However, if the LNKST becomes inactive (high) then the system can assume that the link is inactive, and the MAC can be powered down to save power. If at a later time the link is re-established, the MAC (30) can be powered back up to take advantage of the communications channel. In this way, the power consumption of the Ethernet connection can be managed by the operating software/hardware.
    • 802.3 / Ethernet 10BASE-T物理接口的基本优点之一是可以永久监控通信链路的运行状况。 当处于“链路良好”状态时,10BASE-T收发器需要输出链路状态(LNKST)信号。 具有嵌入式10BASE-T收发器(37)的媒体访问控制器(MAC)30使用LNKST信号向MAC(30)提供电力管理。 通过使用可编程AWAKE位,即使对MAC(30)的SLEEP输入被激活,10BASE-T收发器(37)的接收部分也可以保持供电。 这允许收发器(37)检测链路脉搏(60)或接收分组活动。 如果遇到任一接收条件,内部收发器(37)将激活MAC(30)的LNKST输出。 系统硬件和/或软件可以使用LNKST输出采取适当的措施。 例如,如果LNKST输出有效(低电平),则计算机连接到活动网络,并且操作系统很可能允许MAC(30)保持供电。 然而,如果LNKST变为不活动(高),则系统可以假定链路不活动,并且MAC可以掉电以节省功率。 如果在稍后的时间重新建立链路,则MAC(30)可以被加电以利用通信信道。 这样,以太网连接的功耗可由操作软件/硬件来管理。