会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 72. 发明授权
    • Method and apparatus for limiting denial of service attack by limiting traffic for hosts
    • 通过限制主机流量来限制拒绝服务攻击的方法和装置
    • US07640591B1
    • 2009-12-29
    • US11112328
    • 2005-04-22
    • Sunay TripathiNicolas G. DrouxYuzo Watanabe
    • Sunay TripathiNicolas G. DrouxYuzo Watanabe
    • G06F11/00G06F11/30
    • H04L63/1416H04L63/1458
    • A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
    • 用于控制拒绝服务攻击的方法包括从网络接收多个分组,基于来自网络的拒绝服务攻击的严重性级别识别攻击主机,其中攻击主机通过相关联的识别攻击特征来识别 与所述攻击主机相关联的所述多个分组中的一个分组,通过分类器分析所述多个分组中的每一个,以确定所述多个分组中的每一个被转发到多个临时数据结构中的哪一个,转发所述多个分组中的每个分组 与所述多个临时数据结构中的一个临时数据结构中的一个临时数据结构相关联,所述临时数据结构与由所述分类器确定的所述拒绝服务攻击的严重性级别匹配,请求从所述多个临时数据结构中的一个临时数据结构匹配严重性级别 通过虚拟序列化队列,并将数据包的数量转发到virtua l序列化队列
    • 73. 发明授权
    • Secure protocol handshake offload using TNICs
    • 使用TNIC安全协议握手卸载
    • US07631182B1
    • 2009-12-08
    • US11165990
    • 2005-06-24
    • Nicolas G. DrouxSunay TripathiHsiao-Keng Jerry Chu
    • Nicolas G. DrouxSunay TripathiHsiao-Keng Jerry Chu
    • H04L29/06
    • H04L63/06H04L63/166
    • A method for offloading a secure protocol handshake. The method includes establishing a connection between a host system and a remote peer, and determining whether the secure protocol handshake is offloaded to a network interface card (NIC). When the secure protocol handshake is offloaded to the NIC, an offload request is sent to offload the secure protocol handshake, where the offload request includes a value of at least one cryptographic key. The method further includes performing cryptographic operations associated with the secure protocol handshake using the value of at least one cryptographic key to obtain at least one secret key, and returning a status of the secure protocol handshake to the host system.
    • 一种卸载安全协议握手的方法。 该方法包括建立主机系统和远程对等体之间的连接,以及确定安全协议握手是否被卸载到网络接口卡(NIC)。 当安全协议握手被卸载到NIC时,发送卸载请求以卸载安全协议握手,其中卸载请求包括至少一个加密密钥的值。 该方法还包括使用至少一个加密密钥的值来执行与安全协议握手相关联的加密操作,以获得至少一个秘密密钥,以及将安全协议握手的状态返回给主机系统。
    • 75. 发明申请
    • METHOD AND SYSTEM FOR MEDIA-BASED DATA TRANSFER
    • 基于媒体数据传输的方法和系统
    • US20090222567A1
    • 2009-09-03
    • US12040105
    • 2008-02-29
    • Sunay TripathiNicolas G. Droux
    • Sunay TripathiNicolas G. Droux
    • G06F15/16
    • H04L29/08846H04L45/00H04L69/18
    • A method for media-based data transfer involves obtaining data, by a first virtual network interface card (VNIC) selected from multiple VNICs, where the multiple VNICs are associated with multiple virtual machines, where each of the multiple virtual machines is located in one of multiple computers communicatively coupled with each other via a chassis interconnect, and where the multiple computers share a physical network interface. The method further involves determining a media type connecting the first VNIC with a second VNIC selected from the multiple VNICs, where the first VNIC and the second VNIC are nodes of a virtual network path, where the first VNIC is located in a first computer selected from the multiple computers, and where the second VNIC is located in a second computer selected from the multiple computers. The method further involves choosing a transfer protocol based on the media type, and transferring the data from the first VNIC to the second VNIC using the transfer protocol.
    • 用于基于媒体的数据传输的方法涉及通过从多个VNIC中选择的第一虚拟网络接口卡(VNIC)获取数据,其中多个VNIC与多个虚拟机相关联,其中多个虚拟机中的每一个位于 多个计算机经由机箱互连彼此通信地耦合,并且其中多个计算机共享物理网络接口。 该方法还包括确定连接第一VNIC与从多个VNIC中选择的第二VNIC的媒体类型,其中第一VNIC和第二VNIC是虚拟网络路径的节点,其中第一VNIC位于选自 多个计算机,以及第二VNIC位于从多个计算机中选择的第二计算机中的位置。 该方法还涉及基于媒体类型选择传输协议,并使用传输协议将数据从第一VNIC传输到第二VNIC。
    • 78. 发明授权
    • Architecture-aware allocation of network buffers
    • 网络缓冲区的架构感知分配
    • US08478877B2
    • 2013-07-02
    • US12711711
    • 2010-02-24
    • Nicolas G. DrouxSunay Tripathi
    • Nicolas G. DrouxSunay Tripathi
    • G06F15/16G06F12/00
    • H04L47/10H04L49/9047H04L69/32
    • A computer readable medium comprising software instructions for: obtaining an allocation policy by a MAC layer executing on a host; receiving, a request for a transmit kernel buffer (TxKB) by a sending application executing on at least one processor of the host; obtaining a location of a plurality of available TxKBs on the host; obtaining a location of at least one available network interface on the host; obtaining a location of the sending application; allocating one of the plurality of available TxKBs to obtain an allocated TxKB, wherein the one of the plurality of available TxKBs is selected according to the allocation policy using the location of the plurality of available TxKB, the location of the at least one available network interface, and the location of the sending application, to obtain an allocated TxKB; and providing, to the sending application, the location of the allocated TxKB.
    • 一种计算机可读介质,包括用于通过在主机上执行的MAC层获得分配策略的软件指令; 通过在所述主机的至少一个处理器上执行的发送应用来接收对发送内核缓冲器(TxKB)的请求; 获得主机上多个可用TxKB的位置; 获得主机上至少一个可用网络接口的位置; 获取发送应用程序的位置; 分配多个可用TxKB之一以获得分配的TxKB,其中根据分配策略选择多个可用TxKB之一,使用多个可用TxKB的位置,至少一个可用网络接口的位置 ,以及发送应用程序的位置,以获得分配的TxKB; 并向发送应用提供所分配的TxKB的位置。
    • 79. 发明授权
    • Method and apparatus for limiting denial of service attack by limiting traffic for hosts
    • 通过限制主机流量来限制拒绝服务攻击的方法和装置
    • US08312544B2
    • 2012-11-13
    • US12611467
    • 2009-11-03
    • Sunay TripathiNicolas G. DrouxYuzo Watanabe
    • Sunay TripathiNicolas G. DrouxYuzo Watanabe
    • G06F9/00G06F11/00
    • H04L63/1416H04L63/1458
    • A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
    • 用于控制拒绝服务攻击的方法包括从网络接收多个分组,基于来自网络的拒绝服务攻击的严重性级别识别攻击主机,其中攻击主机通过相关联的识别攻击特征来识别 与所述攻击主机相关联的所述多个分组中的一个分组,通过分类器分析所述多个分组中的每一个,以确定所述多个分组中的每一个被转发到多个临时数据结构中的哪一个,转发所述多个分组中的每个分组 与所述多个临时数据结构中的一个临时数据结构中的一个临时数据结构相关联,所述临时数据结构与由所述分类器确定的所述拒绝服务攻击的严重性级别匹配,请求从所述多个临时数据结构中的一个临时数据结构匹配严重性级别 通过虚拟序列化队列,并将数据包的数量转发到virtua l序列化队列
    • 80. 发明授权
    • Virtualizing complex network topologies
    • 虚拟化复杂的网络拓扑
    • US08260588B2
    • 2012-09-04
    • US12580386
    • 2009-10-16
    • Kais BelgaiedSunay TripathiNicolas G. Droux
    • Kais BelgaiedSunay TripathiNicolas G. Droux
    • G06F17/50G06F13/00H04L12/28
    • G06F17/509G06F2009/45595G06F2217/74H04L41/12H04L41/145
    • In general, the invention relates to a creating a network model on a host. The invention includes: gathering first component properties associated with a first physical network device on a target network; creating a first container using first component properties; determining that a second physical network device is operatively connected to the first physical network device via a physical network link; gathering second component properties associated with the physical network link; creating a first VNIC associated with the first container; determining that at least one virtual network device is executing on the second physical network device; gathering third component properties associated with the at least one virtual network device; creating a second container, wherein the second container is configured using the third component properties; and creating a second VNIC associated with the second container.
    • 通常,本发明涉及在主机上创建网络模型。 本发明包括:收集与目标网络上的第一物理网络设备相关联的第一组件属性; 使用第一个组件属性创建第一个容器; 确定第二物理网络设备经由物理网络链路可操作地连接到所述第一物理网络设备; 收集与物理网络链接相关联的第二组件属性; 创建与第一容器相关联的第一VNIC; 确定至少一个虚拟网络设备正在所述第二物理网络设备上执行; 收集与所述至少一个虚拟网络设备相关联的第三组件属性; 创建第二容器,其中所述第二容器使用所述第三组分特性构造; 以及创建与所述第二容器相关联的第二VNIC。