会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Data scanning network security technique
    • 数据扫描网络安全技术
    • US6119231A
    • 2000-09-12
    • US962045
    • 1997-10-31
    • Andrew L. FossRicky K. LoweJohnson Wu
    • Andrew L. FossRicky K. LoweJohnson Wu
    • G06F12/14
    • H04L63/1408H04L51/12H04L63/1441
    • A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols. This is done at the same time as the data is received by the data scanning device. It is then determined whether the data should be sent to its destination on the computer network. If necessary, the data is translated before being passed to its destination on the computer network.
    • 公开了一种系统和方法,用于通过在由网络的邮件服务器接收和发送数据之前通过扫描发送到网络的数据(特别是电子邮件消息)来提供增强的计算机网络安全性。 被配置为接收数据的计算机网络接收电子邮件消息,并且在数据被接收之后并且被发送到计算机网络上的节点之前被检查。 该方法包括确定外部源是否尝试与配置为包括识别一个或多个数据传输协议的数据扫描设备的计算机网络建立邮件连接。 一旦接收到数据,数据扫描设备就开始评估数据,首先确定数据是否根据识别的协议之一进行格式化。 数据扫描设备开始根据由识别的协议之一建立的规则集来扫描可接受的内容和格式的数据。 这与数据扫描装置接收的数据同时进行。 然后确定数据是否应该发送到计算机网络上的目的地。 如有必要,数据将在计算机网络上传递到目的地之前进行翻译。
    • 2. 发明授权
    • Data scanning network security technique
    • US07010700B1
    • 2006-03-07
    • US09929809
    • 2001-08-13
    • Andrew L. FossRicky K. LoweJohnson Wu
    • Andrew L. FossRicky K. LoweJohnson Wu
    • G06F12/14
    • H04L51/12H04L63/0245H04L63/168
    • A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols. This is done at the same time as the data is received by the data scanning device. It is then determined whether the data should be sent to its destination on the computer network. If necessary, the data is translated before being passed to its destination on the computer network.
    • 3. 发明授权
    • Data scanning network security technique
    • 数据扫描网络安全技术
    • US07251634B1
    • 2007-07-31
    • US10888117
    • 2004-07-09
    • Andrew L. FossRicky K. LoweJohnson Wu
    • Andrew L. FossRicky K. LoweJohnson Wu
    • G06Q99/00
    • G06Q10/107G06Q20/382H04L51/12H04L63/0263
    • A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols. This is done at the same time as the data is received by the data scanning device. It is then determined whether the data should be sent to its destination on the computer network. If necessary, the data is translated before being passed to its destination on the computer network.
    • 公开了一种系统和方法,用于通过在由网络的邮件服务器接收和发送数据之前通过扫描发送到网络的数据(特别是电子邮件消息)来提供增强的计算机网络安全性。 被配置为接收数据的计算机网络接收电子邮件消息,并且在数据被接收之后并且被发送到计算机网络上的节点之前被检查。 该方法包括确定外部源是否尝试与配置为包括识别一个或多个数据传输协议的数据扫描设备的计算机网络建立邮件连接。 一旦接收到数据,数据扫描设备就开始评估数据,首先确定数据是否根据识别的协议之一进行格式化。 数据扫描设备开始根据由识别的协议之一建立的规则集来扫描可接受的内容和格式的数据。 这与数据扫描装置接收的数据同时进行。 然后确定数据是否应该发送到计算机网络上的目的地。 如有必要,数据将在计算机网络上传递到目的地之前进行翻译。
    • 4. 发明授权
    • Data scanning network security
    • 数据扫描网络安全
    • US06298444B1
    • 2001-10-02
    • US09493407
    • 2000-01-28
    • Andrew L. FossRicky K. LoweJohnson Wu
    • Andrew L. FossRicky K. LoweJohnson Wu
    • G06F1214
    • H04L63/1408H04L51/12H04L63/1441
    • A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network before the data is received and transmitted by the network's mail server. An e-mail message is received by a computer network configured to receive data and is checked as the data is received and before it is transmitted to a node on the computer network. The method includes determining whether an external source is attempting to establish a mail connection with the computer network configured to include a data scanning device that recognizes one or more data transfer protocols. Once the data is received the data scanning device begins evaluating the data by first determining whether the data is formatted according to one of the recognized protocols. The data scanning device begins scanning the data for acceptable content and format according to a rule set established by one of the recognized protocols. This is done at the same time as the data is received by the data scanning device. It is then determined whether the data should be sent to its destination on the computer network. If necessary, the data is translated before being passed to its destination on the computer network.
    • 公开了一种系统和方法,用于通过在由网络的邮件服务器接收和发送数据之前通过扫描发送到网络的数据(特别是电子邮件消息)来提供增强的计算机网络安全性。 被配置为接收数据的计算机网络接收电子邮件消息,并且在数据被接收之后并且被发送到计算机网络上的节点之前被检查。 该方法包括确定外部源是否尝试与配置为包括识别一个或多个数据传输协议的数据扫描设备的计算机网络建立邮件连接。 一旦接收到数据,数据扫描设备就开始评估数据,首先确定数据是否根据识别的协议之一进行格式化。 数据扫描设备开始根据由识别的协议之一建立的规则集来扫描可接受的内容和格式的数据。 这与数据扫描装置接收的数据同时进行。 然后确定数据是否应该发送到计算机网络上的目的地。 如有必要,数据将在计算机网络上传递到目的地之前进行翻译。
    • 7. 发明授权
    • Method of and system for allocating resources to resource requests based on application of persistence policies
    • 基于持久性策略的应用,为资源请求分配资源的方法和系统
    • US07584262B1
    • 2009-09-01
    • US10075051
    • 2002-02-12
    • Wei WangHui ZhangErik De La IglesiaRicky K. LoweKiet TranMark Aaron Wallace
    • Wei WangHui ZhangErik De La IglesiaRicky K. LoweKiet TranMark Aaron Wallace
    • G06F15/16
    • H04L12/66H04L12/4625H04L69/40
    • A system for and method of allocating a resource to a service request based on application of a persistence policy is described. In one embodiment, upon or after allocation of a resource to a resource request, an entry representing the allocation is made in a data structure using a first index derived from information relating to the resource request if such is available. An entry representing the allocation is also made in the data structure using a second index derived from information relating to the resource request. When a resource request is received, the data structure is accessed using the first index if such is available. If an entry corresponding to the first index is available, the resource corresponding to the entry is allocated to the request. If the first index or an entry corresponding to the first index is unavailable, the data structure is accessed using the second index. If an entry corresponding to the second index is available, the resource corresponding to the entry is allocated to the request. If an entry corresponding to the second index is unavailable, a resource is allocated to the request based on application of a load balancing policy or other persistence policy. One or more entries are then made in the table corresponding to the new allocation.
    • 描述了基于持久性策略的应用将资源分配给服务请求的系统和方法。 在一个实施例中,在向资源请求分配资源之后或之后,使用从与资源请求相关的信息导出的第一索引(如果可用),在数据结构中进行表示分配的条目。 还使用从与资源请求有关的信息导出的第二索引,在数据结构中进行表示分配的条目。 当接收到资源请求时,如果可用,则使用第一索引访问数据结构。 如果与第一索引相对应的条目可用,则对应于该条目的资源被分配给该请求。 如果第一索引或对应于第一索引的条目不可用,则使用第二索引来访问数据结构。 如果与第二索引相对应的条目可用,则对应于条目的资源被分配给该请求。 如果对应于第二索引的条目不可用,则基于负载平衡策略或其他持久性策略的应用将资源分配给该请求。 然后在与新分配相对应的表中进行一个或多个条目。