会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • ACTIVE APPLICATION RESPONSE DELAY TIME
    • 主动应用响应延迟时间
    • US20150281104A1
    • 2015-10-01
    • US14231421
    • 2014-03-31
    • Ali GolshanMartin GrimmYang Yang
    • Ali GolshanMartin GrimmYang Yang
    • H04L12/841
    • H04L47/283
    • Provided are methods and systems for load balancing client requests between sites associated with a domain name. A method comprises determining a first active response delay time between a local Domain Name System (DNS) server and a first site. The method further comprises determining a first application response delay time between the first site and one or more first servers associated with the first site. According to the method, the first active response delay time and the first application response delay time are compounded to produce a first compounded response delay time. The method further comprises determining a second active response delay time and a second application response delay for a second site to produce a second compounded response delay time. The first compounded response delay time and the second compounded response delay time are compared to perform load balancing between the first site and the second site.
    • 提供了用于在与域名相关联的站点之间负载平衡客户端请求的方法和系统。 一种方法包括确定本地域名系统(DNS)服务器和第一站点之间的第一主动响应延迟时间。 该方法还包括确定第一站点与与第一站点相关联的一个或多个第一服务器之间的第一应用响应延迟时间。 根据该方法,将第一主动响应延迟时间和第一应用响应延迟时间复合以产生第一复合响应延迟时间。 该方法还包括确定第二站点的第二主动响应延迟时间和第二应用响应延迟以产生第二复合响应延迟时间。 比较第一复合响应延迟时间和第二复合响应延迟时间以在第一站点和第二站点之间执行负载平衡。
    • 4. 发明申请
    • Reproxying an unproxied connection
    • 重新编译未经管理的连接
    • US20060047839A1
    • 2006-03-02
    • US10925396
    • 2004-08-24
    • Patrick TateAlexander WatermanMartin GrimmAnurag Kahol
    • Patrick TateAlexander WatermanMartin GrimmAnurag Kahol
    • G06F15/16
    • H04L67/2814H04L67/1002H04L67/2842H04L69/16H04L69/163H04L69/165
    • A method is disclosed for reproxying connections. According to one aspect, a first connection is established between a client and a proxy device. A second connection is established between the proxy device and a server. The first connection comprises a first endpoint at the client and a second endpoint at the proxy device. The second connection comprises a third endpoint at the proxy device and a fourth endpoint at the server. The first and second connections are unproxied by dissolving the second and third endpoints while maintaining the first and fourth endpoints. After the connections have been unproxied, a packet is received at the proxy device. In response, the first and second connections are reproxied by creating fifth and sixth endpoints at the proxy device, so that the first connection comprises the fifth endpoint and the second connection comprises the sixth endpoint.
    • 公开了用于重新连接的方法。 根据一个方面,在客户端和代理设备之间建立第一连接。 在代理设备和服务器之间建立第二个连接。 第一连接包括客户端处的第一端点和代理设备处的第二端点。 第二连接包括代理设备处的第三端点和服务器处的第四端点。 通过在保持第一和第四端点的同时溶解第二和第三端点来解决第一和第二连接。 在连接未被占用之后,在代理设备处接收到一个数据包。 作为响应,通过在代理设备处创建第五和第六端点来使第一和第二连接重新发布,使得第一连接包括第五端点,第二连接包括第六端点。
    • 7. 发明授权
    • Method and system for prevention of network denial-of-service attacks
    • 防止网络拒绝服务攻击的方法和系统
    • US07424741B1
    • 2008-09-09
    • US10152541
    • 2002-05-20
    • Martin GrimmBrad BarfieldEric FritzgesHema PrasadRobert R. Branum, Jr.
    • Martin GrimmBrad BarfieldEric FritzgesHema PrasadRobert R. Branum, Jr.
    • G06F21/00H04L9/00
    • H04L63/1458H04L63/166
    • An approach for preventing denial-of-service attacks on Secure Sockets Layer (“SSL”) protocol is described. Queues are generated for handshake state connections and data transmission connections. A connection object representing a new SSL connection is time-stamped as it enters the handshake portion of the SSL protocol. A connection pointer to the connection object is placed at the head of the handshake queue. As new SSL messages are transferred between client and SSL server, the time-stamp is updated when the entire message is received, the connection pointer is repositioned to the head of the queue. A timer event periodically surveys the queues. If connection packet transmission gaps remain below a specified maximum handshake gap time, a connection is allowed to progress to the data transmission state. If any connection exceeds the specified gap time, the SSL connection is dropped.
    • 描述了一种防止对安全套接字层(“SSL”)协议的拒绝服务攻击的方法。 为握手状态连接和数据传输连接生成队列。 表示新SSL连接的连接对象在进入SSL协议的握手部分时被时间戳。 连接对象的连接指针位于握手队列的头部。 随着新的SSL消息在客户端和SSL服务器之间传输,当收到整个消息时,更新时间戳,连接指针重新定位到队列的头部。 定时器事件定期调查队列。 如果连接分组传输间隙保持在指定的最大握手间隙时间以下,则允许连接进行到数据传输状态。 如果任何连接超过指定的间隔时间,则SSL连接将被丢弃。