会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and system for securing a network utilizing IPsec and MACsec protocols
    • 使用IPsec和MACsec协议来保护网络的方法和系统
    • US07853691B2
    • 2010-12-14
    • US11934257
    • 2007-11-02
    • Uri ElzurBora AkyolZheng QiMark BuerFord TamerYongbum Kim
    • Uri ElzurBora AkyolZheng QiMark BuerFord TamerYongbum Kim
    • G06F15/173G06F15/16G06F7/04H04L9/08
    • H04L63/0464H04L63/162H04L63/164H04L69/08
    • Aspects of a method and system for securing a network utilizing IPsec and MACsec protocols are provided. In one or more network nodes, aspects of the invention may enable conversion between Ethernet packets comprising payloads secured utilizing IPsec protocols and Ethernet packets secured utilizing MACsec protocols. For example, IPsec connections may be terminated at an ingress network node and IPsec connections may be regenerated at an egress network node. Packets secured utilizing MACsec protocols may be detected based on an Ethertype. Packets comprising payloads secured utilizing IPsec protocols may be detected based on a protocol field or a next header field. The conversion may be based on a data structure stored by and/or accessible to the network nodes. Aspects of the invention may enable securing data utilizing MACsec protocols when tunneling IPsec secured data through non-IPsec enabled nodes.
    • 提供了使用IPsec和MACsec协议来保护网络的方法和系统的方面。 在一个或多个网络节点中,本发明的方面可以实现包括使用IPsec协议保护的有效载荷的以太网分组和利用MACsec协议来保护的以太网分组之间的转换。 例如,可以在入口网络节点处终止IPsec连接,并且可以在出口网络节点处重新生成IPsec连接。 使用MACsec协议保护的数据包可以基于以太网类型进行检测。 可以基于协议字段或下一个报头字段来检测包括利用IPsec协议保护的有效载荷的分组。 该转换可以基于由网络节点存储和/或可访问的数据结构。 当通过非启用IPsec的节点隧道化IPsec安全数据时,本发明的各方面可以实现利用MACsec协议来保护数据。
    • 2. 发明申请
    • METHOD AND SYSTEM FOR SECURING A NETWORK UTILIZING IPSEC and MACSEC PROTOCOLS
    • 用于保护使用IPSEC和MACSEC协议的网络的方法和系统
    • US20080126559A1
    • 2008-05-29
    • US11934257
    • 2007-11-02
    • Uri ElzurBora AkyolZheng QiMark BuerFord TamerYongbum Kim
    • Uri ElzurBora AkyolZheng QiMark BuerFord TamerYongbum Kim
    • G06F15/16
    • H04L63/0464H04L63/162H04L63/164H04L69/08
    • Aspects of a method and system for securing a network utilizing IPsec and MACsec protocols are provided. In one or more network nodes, aspects of the invention may enable conversion between Ethernet packets comprising payloads secured utilizing IPsec protocols and Ethernet packets secured utilizing MACsec protocols. For example, IPsec connections may be terminated at an ingress network node and IPsec connections may be regenerated at an egress network node. Packets secured utilizing MACsec protocols may be detected based on an Ethertype. Packets comprising payloads secured utilizing IPsec protocols may be detected based on a protocol field or a next header field. The conversion may be based on a data structure stored by and/or accessible to the network nodes. Aspects of the invention may enable securing data utilizing MACsec protocols when tunneling IPsec secured data through non-IPsec enabled nodes.
    • 提供了使用IPsec和MACsec协议来保护网络的方法和系统的方面。 在一个或多个网络节点中,本发明的方面可以实现包括使用IPsec协议保护的有效载荷的以太网分组和利用MACsec协议来保护的以太网分组之间的转换。 例如,可以在入口网络节点处终止IPsec连接,并且可以在出口网络节点处重新生成IPsec连接。 使用MACsec协议保护的数据包可以基于以太网类型进行检测。 可以基于协议字段或下一个报头字段来检测包括利用IPsec协议保护的有效载荷的分组。 该转换可以基于由网络节点存储和/或可访问的数据结构。 当通过非启用IPsec的节点隧道化IPsec安全数据时,本发明的各方面可以实现利用MACsec协议来保护数据。
    • 3. 发明授权
    • Method and system for determining and securing proximity information over a network
    • 用于确定和确保网络上的邻近信息的方法和系统
    • US08717932B2
    • 2014-05-06
    • US11756340
    • 2007-05-31
    • Zheng QiYongbum Kim
    • Zheng QiYongbum Kim
    • H04L12/28
    • H04L63/08H04L2463/101H04L2463/121
    • Aspects of a method and system for determining and securing proximity information over a network are provided. In this regard, data transmitted over a network may be time-stamped upon entering and/or exiting a network node. By taking the total time to travel between two network nodes and subtracting out any latency internal to one or more intermediate nodes, the time to traverse the physical links (the propagation time) between the two network nodes may be determined. Accordingly, if the speed at which data propagates over each link of the network is known, then a distance from the source node to the destination node may be determined. Additionally, aspects of the invention may enable one or more of authentication, validation, and encryption of timing and/or proximity information transmitted over a network.
    • 提供了一种通过网络确定和保护邻近信息的方法和系统的方面。 在这方面,通过网络发送的数据可以在进入和/或退出网络节点时被时间戳。 通过将总时间在两个网络节点之间行进并减去一个或多个中间节点内部的任何延迟,可以确定穿过两个网络节点之间的物理链路(传播时间)的时间。 因此,如果数据在网络的每个链路上传播的速度是已知的,则可以确定从源节点到目的地节点的距离。 另外,本发明的各方面可以实现通过网络发送的定时和/或邻近信息的认证,验证和加密中的一个或多个。
    • 4. 发明申请
    • METHOD AND SYSTEM FOR DETERMINING AND SECURING PROXIMITY INFORMATION OVER A NETWORK
    • 用于确定和保护网络上的临近信息的方法和系统
    • US20080123555A1
    • 2008-05-29
    • US11756340
    • 2007-05-31
    • Zheng QiYongbum Kim
    • Zheng QiYongbum Kim
    • H04L12/28
    • H04L63/08H04L2463/101H04L2463/121
    • Aspects of a method and system for determining and securing proximity information over a network are provided. In this regard, data transmitted over a network may be time-stamped upon entering and/or exiting a network node. By taking the total time to travel between two network nodes and subtracting out any latency internal to one or more intermediate nodes, the time to traverse the physical links (the propagation time) between the two network nodes may be determined. Accordingly, if the speed at which data propagates over each link of the network is known, then a distance from the source node to the destination node may be determined. Additionally, aspects of the invention may enable one or more of authentication, validation, and encryption of timing and/or proximity information transmitted over a network.
    • 提供了一种通过网络确定和保护邻近信息的方法和系统的方面。 在这方面,通过网络发送的数据可以在进入和/或退出网络节点时被时间戳。 通过将总时间在两个网络节点之间行进并减去一个或多个中间节点内部的任何延迟,可以确定穿过两个网络节点之间的物理链路(传播时间)的时间。 因此,如果数据在网络的每个链路上传播的速度是已知的,则可以确定从源节点到目的地节点的距离。 另外,本发明的各方面可以实现通过网络发送的定时和/或邻近信息的认证,验证和加密中的一个或多个。
    • 6. 发明授权
    • Method and system for packetizing data for servicing traffic end-to-end
    • 分组数据的方法和系统,用于为端到端流量服务
    • US08862768B2
    • 2014-10-14
    • US12581741
    • 2009-10-19
    • Wael William DiabBruce CurrivanJeyhan KaraoguzYongbum KimKenneth MaMichael Johas Teener
    • Wael William DiabBruce CurrivanJeyhan KaraoguzYongbum KimKenneth MaMichael Johas Teener
    • G06F15/16H04L29/08H04L29/06
    • H04L69/08H04L69/32H04L69/324
    • Aspects of a method and system for packetizing data for servicing traffic end-to-end are provided. In this regard, a networking subsystem may receive, from an application, one or more values of one or more parameters associated with data generated by the application. The networking subsystem may packetize the data into one or more packets. The networking subsystem may translate the received one or more values into one or more corresponding OSI layer 2 tags. The networking subsystem may tag the one or more packets with the corresponding OSI layer 2 tags and transmit the tagged packet(s) to one or more link partners. The link partners may thus process and forward the tagged packet(s) by inspecting only OSI layer 2 information of the tagged packet(s). The one or more corresponding OSI layer 2 tags may indicate, for example, quality of service required by, and/or protocols associated with, the data.
    • 提供了一种用于打包用于为端到端流量服务的数据的方法和系统的方面。 在这方面,网络子系统可以从应用程序接收与由应用产生的数据相关联的一个或多个参数的一个或多个值。 网络子系统可以将数据分组成一个或多个分组。 网络子系统可以将所接收的一个或多个值转换成一个或多个相应的OSI层2标签。 网络子系统可以使用相应的OSI第2层标签来标记一个或多个分组,并将标记的分组发送到一个或多个链路伙伴。 因此,链路伙伴可以通过仅检查标记的分组的OSI层2信息来处理和转发带标签的分组。 一个或多个对应的OSI层2标签可以指示例如与数据相关联的和/或协议所需的服务质量。