会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明授权
    • Methods for intelligent NIC bonding and load-balancing
    • 智能NIC绑定和负载平衡的方法
    • US08948193B2
    • 2015-02-03
    • US12193821
    • 2008-08-19
    • Amnon PerlmutterBenzi Waisman
    • Amnon PerlmutterBenzi Waisman
    • H04L12/56H04L12/947H04L12/803H04L12/935
    • H04L49/25H04L47/125H04L49/3009
    • Methods, devices, and media for intelligent NIC bonding and load-balancing including the steps of: providing a packet at an incoming-packet port of a gateway; attaching an incoming-port identification, associated with the incoming-packet port, to the packet; routing the packet to a processing core; passing the packet through a gateway processing; sending the packet, by the core, to the operating system of a host system; and routing the packet to an outgoing-packet port of the gateway based on the incoming-port identification. Preferably, the gateway processing includes security processing of the packets. Preferably, the step of routing the packet to the outgoing-packet port is based solely on the incoming-port identification. Preferably, an outgoing-port identification, associated with the outgoing-packet port, has an identical bond-index to the incoming-port identification. Preferably, the gateway includes a plurality of incoming-packet ports, a plurality of respective incoming-port identifications, a plurality of processing cores, and a plurality of outgoing-packet ports.
    • 用于智能NIC绑定和负载平衡的方法,设备和介质,包括以下步骤:在网关的进入分组端口处提供分组; 将与进入分组端口相关联的入口标识附加到分组; 将数据包路由到处理核心; 通过网关处理传递数据包; 通过核心将分组发送到主机系统的操作系统; 以及基于所述入端口标识将所述分组路由到所述网关的输出分组端口。 优选地,网关处理包括分组的安全处理。 优选地,将分组路由到出站分组端口的步骤仅基于进入端口标识。 优选地,与输出分组端口相关联的出端口标识对于入口标识具有相同的绑定索引。 优选地,网关包括多个进入分组端口,多个相应的入口标识,多个处理核心和多个输出分组端口。
    • 45. 发明申请
    • METHODS FOR INSPECTING SECURITY CERTIFICATES BY NETWORK SECURITY DEVICES TO DETECT AND PREVENT THE USE OF INVALID CERTIFICATES
    • 网络安全设备检测安全证书的方法,以检测和防止使用无效证书
    • US20120167212A1
    • 2012-06-28
    • US13411567
    • 2012-03-04
    • Guy GuznerAmi HavivDanny LieblichYahav Gal
    • Guy GuznerAmi HavivDanny LieblichYahav Gal
    • G06F21/00H04L29/06G06F11/00
    • H04L63/0823H04L9/3268H04L63/1408
    • Disclosed are methods and media for inspecting security certificates. Methods include the steps of: scanning, by a network security device, messages of a security protocol between a server and a client system; detecting the messages having a security certificate; detecting suspicious security certificates from the messages; and aborting particular sessions of the security protocol associated with the suspicious certificates. Preferably, the step of scanning is performed only on messages of server certificate records. Preferably, the method further includes the step of sending an invalid-certificate notice to the server and the client system. Preferably, the step of detecting the suspicious certificates includes detecting a use of an incorrectly-generated private key for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting an unavailability of revocation information for the certificates. Preferably, the step of detecting the suspicious certificates includes detecting a use of an invalid cryptographic algorithm for the certificates.
    • 披露了检查安全证书的方法和媒体。 方法包括以下步骤:由网络安全设备扫描服务器和客户端系统之间的安全协议的消息; 检测具有安全证书的消息; 从消息中检测可疑安全证书; 并中止与可疑证书相关联的安全协议的特定会话。 优选地,仅对服务器证书记录的消息执行扫描步骤。 优选地,该方法还包括向服务器和客户端系统发送无效证书通知的步骤。 优选地,检测可疑证书的步骤包括检测证书的使用不正确生成的私钥。 优选地,检测可疑证书的步骤包括检测证书的撤销信息的不可用性。 优选地,检测可疑证书的步骤包括检测对证书的无效加密算法的使用。
    • 46. 发明申请
    • Scan detection
    • 扫描检测
    • US20050147037A1
    • 2005-07-07
    • US11025983
    • 2005-01-03
    • Uriel MaimonAlon KantorOded Dov
    • Uriel MaimonAlon KantorOded Dov
    • G06F11/30G06F15/16H04L1/00H04L29/06
    • H04L63/1425
    • A method for detecting a scan in network connections, each connection to a respective destination determined by a destination key and a destination parameter. For each of the connections, an active-connection entry is logged in a first table. The active-connection entry includes the destination key and the destination parameter. For each destination key entered in the first table, each active-connection entry is counted by: (i) entering in a second table a new-connection entry including the destination key, and (ii) assigning to the new-connection entry a use value; the use value equals a number of the active-connection entries with the destination key. A scan event is generated when the use value exceeds a previously determined new-connection-threshold. If the scan is an “address scan”, the destination key is a destination port and the destination parameter is a destination address (IP); and if the scan is a “port scan” then the destination key is a destination address and the destination parameter is a destination port.
    • 一种用于检测网络连接中的扫描的方法,每个连接到由目的地密钥和目的地参数确定的相应目的地。 对于每个连接,活动连接条目记录在第一个表中。 活动连接条目包括目的地密钥和目的地参数。 对于在第一表中输入的每个目的地密钥,每个活动连接条目通过以下方式进行计数:(i)在第二表中输入包括目的地密钥的新连接条目,以及(ii)向新连接条目分配使用 值; 使用值等于具有目的地密钥的活动连接条目的数量。 当使用值超过先前确定的新连接阈值时,生成扫描事件。 如果扫描是“地址扫描”,则目的地密钥是目的地端口,目的地参数是目的地址(IP); 并且如果扫描是“端口扫描”,则目的地密钥是目的地址,目的地参数是目的地端口。