会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Resource scheduler within a network device
    • 网络设备内的资源调度器
    • US08150977B1
    • 2012-04-03
    • US13078688
    • 2011-04-01
    • Yonghui ChengYi Sun
    • Yonghui ChengYi Sun
    • G06F15/16G06F12/00
    • H04L63/145H04L47/193H04L47/2416H04L47/50H04L47/52H04L49/9047H04L67/325
    • A network device is described in which a dedicated resource scheduler monitors memory consumption to provide for improved processing of communication sessions. The scheduler maintains a dependency list of communication sessions, and reserves memory for communication sessions as requests for memory are received. The amount of memory reserved is determined based on the amount of memory currently reserved for the communication sessions in the dependency list. The network device may control ongoing communication sessions by way of window manipulation. Communication sessions are processed in a first mode when available memory has not reached a predetermined amount, while communication sessions are processed in a second mode when available memory reaches a predetermined amount.
    • 描述了一种网络设备,其中专用资源调度器监视存储器消耗以提供通信会话的改进处理。 调度器维护通信会话的依赖列表,并且在接收到对存储器的请求时,为通信会话保留存储器。 基于当前为依赖关系列表中的通信会话保留的存储器量来确定存储器量。 网络设备可以通过窗口操纵来控制正在进行的通信会话。 当可用存储器尚未达到预定量时,以第一模式处理通信会话,而当可用存储器达到预定量时,在第二模式中处理通信会话。
    • 3. 发明授权
    • Wireless firewall with tear down messaging
    • 无线防火墙具有拆卸消息
    • US08185946B2
    • 2012-05-22
    • US12471214
    • 2009-05-22
    • Jesse ShuYonghui Cheng
    • Jesse ShuYonghui Cheng
    • G06F9/00
    • H04L63/0236H04W12/02H04W12/12H04W76/30
    • Methods of screening incoming packets are provided. A first firewall detects a tunnel formation. A second firewall maintains a list of open firewall sessions. Each tunnel has one or more associated firewall sessions. The first firewall detects variable situations, such as when the tunnel is torn down, and notifies the second firewall so that, for example, the second firewall can act to clear an associated firewall session from the firewall session list. Incoming packets that are associated with firewall sessions that have been cleared from the firewall session list may not be passed through the second firewall.
    • 提供筛选进入包的方法。 第一个防火墙检测隧道形成。 第二个防火墙维护一个打开的防火墙会话列表。 每个隧道都有一个或多个关联的防火墙会话。 第一个防火墙检测可变情况,例如当隧道拆除时,通知第二个防火墙,以便例如第二个防火墙可以从防火墙会话列表中清除相关的防火墙会话。 与从防火墙会话列表中清除的防火墙会话关联的传入数据包可能不会通过第二个防火墙传递。
    • 5. 发明授权
    • Resource scheduler within a network device
    • 网络设备内的资源调度器
    • US07930408B1
    • 2011-04-19
    • US12476315
    • 2009-06-02
    • Yonghui ChengYi Sun
    • Yonghui ChengYi Sun
    • G06F15/16G06F12/00
    • H04L63/145H04L47/193H04L47/2416H04L47/50H04L47/52H04L49/9047H04L67/325
    • A network device is described in which a dedicated resource scheduler monitors memory consumption to provide for improved processing of communication sessions. The scheduler maintains a dependency list of communication sessions, and reserves memory for communication sessions as requests for memory are received. The amount of memory reserved is determined based on the amount of memory currently reserved for the communication sessions in the dependency list. The network device may control ongoing communication sessions by way of window manipulation. Communication sessions are processed in a first mode when available memory has not reached a predetermined amount, while communication sessions are processed in a second mode when available memory reaches a predetermined amount.
    • 描述了一种网络设备,其中专用资源调度器监视存储器消耗以提供通信会话的改进处理。 调度器维护通信会话的依赖列表,并且在接收到对存储器的请求时,为通信会话保留存储器。 基于当前为依赖关系列表中的通信会话保留的存储器量来确定存储器量。 网络设备可以通过窗口操纵来控制正在进行的通信会话。 当可用存储器尚未达到预定量时,以第一模式处理通信会话,而当可用存储器达到预定量时,在第二模式中处理通信会话。
    • 6. 发明申请
    • WIRELESS FIREWALL WITH TEAR DOWN MESSAGING
    • 无线防火墙
    • US20090235348A1
    • 2009-09-17
    • US12471214
    • 2009-05-22
    • Jesse SHUYonghui CHENG
    • Jesse SHUYonghui CHENG
    • H04L9/00
    • H04L63/0236H04W12/02H04W12/12H04W76/30
    • Methods of screening incoming packets are provided. A first firewall detects a tunnel formation. A second firewall maintains a list of open firewall sessions. Each tunnel has one or more associated firewall sessions. The first firewall detects variable situations, such as when the tunnel is torn down, and notifies the second firewall so that, for example, the second firewall call act to clear an associated firewall session from the firewall session list. Incoming packets that are associated with firewall sessions that have been cleared from the firewall session list may not be passed through the second firewall.
    • 提供筛选进入包的方法。 第一个防火墙检测隧道形成。 第二个防火墙维护一个打开的防火墙会话列表。 每个隧道都有一个或多个关联的防火墙会话。 第一个防火墙检测可变情况,例如当隧道被拆除时,通知第二个防火墙,以便例如第二个防火墙呼叫用来从防火墙会话列表中清除相关的防火墙会话。 与从防火墙会话列表中清除的防火墙会话关联的传入数据包可能不会通过第二个防火墙传递。
    • 9. 发明授权
    • Automatic connected virtual private network
    • 自动连接虚拟专网
    • US07848335B1
    • 2010-12-07
    • US11260839
    • 2005-10-27
    • Yong KangChangming LiuYonghui Cheng
    • Yong KangChangming LiuYonghui Cheng
    • H04L12/28
    • H04L63/0272H04L12/4633H04L12/4641H04L45/10H04L45/54H04L2212/00
    • A virtual private network (VPN) tunnel is established that extends from a source spoke to a destination spoke in a hub-and-spoke enterprise network. Prior to establishing the VPN tunnel, packets are sent from the source spoke to the destination spoke through the hub network. In this manner, packets are not dropped while the VPN tunnel is being set up. The VPN tunnel is established by querying a server for the network address of a destination router in the destination spoke, then setting up the VPN tunnel using a secure communication protocol. An extension to the Internet Key Exchange (IKE) protocol is used to obtain the private network address of the destination router during setup of the VPN tunnel. A forwarding table is updated after the VPN tunnel is established to reroute the packets through the new VPN tunnel.
    • 建立了一个虚拟专用网(VPN)隧道,该隧道从辐射源辐射到中心辐射企业网络中的目的地。 在建立VPN隧道之前,通过集线器网络将数据包从源辐条发送到目的地。 以这种方式,在VPN隧道建立时,数据包不会丢弃。 通过向服务器查询目的地分支中的目的地路由器的网络地址,然后使用安全通信协议设置VPN隧道来建立VPN隧道。 在VPN隧道建立过程中,使用Internet密钥交换协议(IKE)协议来扩展目的路由器的私有网络地址。 在建立VPN隧道后,通过新的VPN隧道重新路由数据包,更新转发表。