会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明申请
    • SYSTEM AND METHOD FOR MULTICASTING IN AN INTERNET PROTOCOL VIRTUAL PRIVATE NETWORK ENVIRONMENT
    • 在互联网协议虚拟私有网络环境中进行组播的系统和方法
    • US20100054245A1
    • 2010-03-04
    • US12202454
    • 2008-09-02
    • Rajiv AsatiYiqun CaiMohamed Khalid
    • Rajiv AsatiYiqun CaiMohamed Khalid
    • H04L12/56
    • H04L45/00H04L12/18H04L45/16
    • A method is provided in one example implementation and includes sending a PIM join message to the second spoke router by the hub router. The second spoke router dynamically determines each interested remote spoke router by parsing a hub-sent PIM message and accordingly constructs the multicast routing entry such that the first and second spoke routers establish multicast communication independent of a hub router. In more specific embodiments, the PIM join/prune messaging includes a list of each downstream spoke router that sent a PIM join/prune, in a new attribute. The PIM join/prune message is sent by the hub router towards a multicast source. A new receiver-list attribute is created that the hub router populates with a non-broadcast multi-access (NBMA) address for each interested spoke router.
    • 在一个示例实现中提供了一种方法,并且包括由集线器路由器向第二分支路由器发送PIM加入消息。 第二分支路由器通过解析集中发送的PIM消息来动态地确定每个感兴趣的远程分支路由器,并因此构建多播路由条目,使得第一和第二分支路由器独立于集线器路由器建立组播通信。 在更具体的实施例中,PIM加入/剪枝消息包括在新属性中发送PIM加入/剪枝的每个下游分支路由器的列表。 PIM加入/剪枝消息由集线器路由器向组播源发送。 创建一个新的接收者列表属性,集线器路由器为每个感兴趣的辐条路由器填充非广播多址(NBMA)地址。
    • 35. 发明申请
    • TECHNIQUE FOR CHANGING GROUP MEMBER REACHABILITY INFORMATION
    • 改变集团会员可追溯性信息的技术
    • US20080298592A1
    • 2008-12-04
    • US11754780
    • 2007-05-29
    • Mohamed KhalidAamer S. AkhterRajiv AsatiBrian E. Weis
    • Mohamed KhalidAamer S. AkhterRajiv AsatiBrian E. Weis
    • H04L9/12
    • H04L9/0833H04L9/0891H04L63/0272H04L63/065
    • In one embodiment, a technique for updating an address associated with a first entity in a communications network with a second entity in the communications network wherein the address is used to forward information to the first entity from the second entity. The first entity registers a first address associated with the first entity with the second entity. The first entity determines that a second address associated with the first entity is to be used instead of the first address to communicate with the first entity. The first entity generates an update message containing the second address, the update message obviating having to register the second address with the second entity. The first entity forwards the update message to the second entity to cause the second entity to use the second address instead of the first address to forward information to the first entity.
    • 在一个实施例中,一种用于在通信网络中与第二实体更新与通信网络中的第一实体相关联的地址的技术,其中所述地址用于将信息从所述第二实体转发到所述第一实体。 第一实体将与第一实体相关联的第一地址与第二实体注册。 第一实体确定将使用与第一实体相关联的第二地址而不是与第一实体进行通信的第一地址。 第一实体生成包含第二地址的更新消息,更新消息消除了必须向第二实体注册第二地址。 第一实体将更新消息转发给第二实体以使第二实体使用第二地址而不是第一地址来将信息转发到第一实体。
    • 37. 发明授权
    • System and method for secure cloud service delivery with prioritized services in a network environment
    • 用于在网络环境中优先化服务的安全云服务传送的系统和方法
    • US08862883B2
    • 2014-10-14
    • US13473418
    • 2012-05-16
    • Sunil CherukuriMohamed KhalidBrian Cinque
    • Sunil CherukuriMohamed KhalidBrian Cinque
    • H04L9/32H04L29/06H04L9/08
    • H04L63/0272H04L9/0838H04L41/0803H04L67/1002
    • An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network (VPN) tunnel between a subscriber and a cloud, wherein the cloud capability set comprises one or more cloud capabilities, mapping the request to one or more cryptographic modules that can support the cloud capability set, and offloading the VPN tunnel to the one or more cryptographic modules. The request can be an Internet Security Association and Key Management Protocol (ISAKMP) packet listing the one or more cloud capabilities in a private payload. The method may further include splitting the VPN tunnel between the cryptographic modules if no single cryptographic module can support substantially all the cloud capabilities in the cloud capability set. In some embodiments, the request is compared with a service catalog comprising authorized cloud capabilities.
    • 示例性方法包括在与订户和云之间的虚拟专用网(VPN)隧道相关联的因特网密钥交换协商期间接收对云能力集的请求,其中所述云能力集合包括一个或多个云能力,映射请求 到一个或多个可以支持云能力集合的加密模块,以及将VPN隧道卸载到一个或多个加密模块。 该请求可以是列出私有有效载荷中的一个或多个云能力的因特网安全关联和密钥管理协议(ISAKMP)分组。 该方法还可以包括在加密模块之间分割VPN隧道,如果没有单个密码模块可以支持云能力集中的实质上所有的云能力。 在一些实施例中,该请求与包括授权云能力的服务目录进行比较。