会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • COOPERATIVE NETWORK SECURITY INSPECTION
    • 合作网络安全检查
    • US20130291088A1
    • 2013-10-31
    • US13860408
    • 2013-04-10
    • Choung-Yaw Michael ShiehMeng XuYi SunJia-Jyi Roger Lian
    • Choung-Yaw Michael ShiehMeng XuYi SunJia-Jyi Roger Lian
    • H04L29/06
    • H04L63/0218H04L63/0227H04L63/0263
    • A network system includes a security device and a network access device. The network access device is to receive a packet from a source node destined to a destination node, and to examine a data structure maintained by the network access device to determine whether the data structure stores a data member having a predetermined value, the data member indicating whether the packet should undergo security processing. If the data member matches the predetermined value, the packet is transmitted to a security device associated with the network access device to allow the security device to perform content inspection, and in response to a response received from the security device, the packet is routed to the destination node dependent upon the response. The packet is routed to the destination node without forwarding the packet to the security device.
    • 网络系统包括安全设备和网络接入设备。 网络接入设备是从目的地节点的源节点接收分组,并检查由网络接入设备维护的数据结构,以确定数据结构是否存储具有预定值的数据成员,数据成员指示 是否应该进行安全处理。 如果数据成员与预定值相匹配,则将分组发送到与网络接入设备相关联的安全设备,以允许安全设备执行内容检查,并且响应于从安全设备接收到的响应,将分组路由到 目标节点取决于响应。 分组被路由到目的地节点,而不将分组转发到安全设备。
    • 3. 发明授权
    • Cooperative network security inspection
    • 合作网络安全检查
    • US08955093B2
    • 2015-02-10
    • US13860408
    • 2013-04-10
    • Choung-Yaw Michael ShiehMeng XuYi SunJia-Jyi Roger Lian
    • Choung-Yaw Michael ShiehMeng XuYi SunJia-Jyi Roger Lian
    • H04L29/06
    • H04L63/0218H04L63/0227H04L63/0263
    • A network system includes a security device and a network access device. The network access device is to receive a packet from a source node destined to a destination node, and to examine a data structure maintained by the network access device to determine whether the data structure stores a data member having a predetermined value, the data member indicating whether the packet should undergo security processing. If the data member matches the predetermined value, the packet is transmitted to a security device associated with the network access device to allow the security device to perform content inspection, and in response to a response received from the security device, the packet is routed to the destination node dependent upon the response. The packet is routed to the destination node without forwarding the packet to the security device.
    • 网络系统包括安全设备和网络接入设备。 网络接入设备是从目的地节点的源节点接收分组,并检查由网络接入设备维护的数据结构,以确定数据结构是否存储具有预定值的数据成员,数据成员指示 是否应该进行安全处理。 如果数据成员与预定值相匹配,则将分组发送到与网络接入设备相关联的安全设备,以允许安全设备执行内容检查,并且响应于从安全设备接收到的响应,将分组路由到 目标节点取决于响应。 分组被路由到目的地节点,而不将分组转发到安全设备。
    • 4. 发明申请
    • VIRTUAL SECURITY BOUNDARY FOR PHYSICAL OR VIRTUAL NETWORK DEVICES
    • 物理或虚拟网络设备的虚拟安全边界
    • US20130117801A1
    • 2013-05-09
    • US13288872
    • 2011-11-03
    • Choung-Yaw Michael ShiehJia-Jyi Roger Lian
    • Choung-Yaw Michael ShiehJia-Jyi Roger Lian
    • G06F17/00
    • H04L63/0209H04L63/0272H04L63/104
    • A method and apparatus is disclosed herein for using a virtual security boundary. In one embodiment, the method comprises receiving information from a virtual machine after the virtual machine has been moved from a first physical location in a network to a second physical location in the network, where the information identifies the virtual machine as one previously assigned to a security boundary; determining that access to the virtual machine at the first physical location was permitted by the security gateway; assigning the virtual machine at the second physical location to the security boundary, and applying a security policy associated with the security boundary to communications between the network and the virtual machine at the second physical location.
    • 本文公开了一种使用虚拟安全边界的方法和装置。 在一个实施例中,该方法包括在虚拟机已经从网络中的第一物理位置移动到网络中的第二物理位置之后从虚拟机接收信息,其中信息将虚拟机标识为先前分配给 安全边界; 确定在所述安全网关允许对所述第一物理位置处的所述虚拟机的访问; 将所述第二物理位置处的所述虚拟机分配到所述安全边界,以及将与所述安全边界相关联的安全策略应用于所述第二物理位置处的所述网络和所述虚拟机之间的通信。
    • 5. 发明授权
    • Virtual security boundary for physical or virtual network devices
    • 物理或虚拟网络设备的虚拟安全边界
    • US08813169B2
    • 2014-08-19
    • US13288872
    • 2011-11-03
    • Choung-Yaw Michael ShiehJia-Jyi Roger Lian
    • Choung-Yaw Michael ShiehJia-Jyi Roger Lian
    • G06F17/00H04L29/06
    • H04L63/0209H04L63/0272H04L63/104
    • A method and apparatus is disclosed herein for using a virtual security boundary. In one embodiment, the method comprises receiving information from a virtual machine after the virtual machine has been moved from a first physical location in a network to a second physical location in the network, where the information identifies the virtual machine as one previously assigned to a security boundary; determining that access to the virtual machine at the first physical location was permitted by the security gateway; assigning the virtual machine at the second physical location to the security boundary, and applying a security policy associated with the security boundary to communications between the network and the virtual machine at the second physical location.
    • 本文公开了一种使用虚拟安全边界的方法和装置。 在一个实施例中,该方法包括在虚拟机已经从网络中的第一物理位置移动到网络中的第二物理位置之后从虚拟机接收信息,其中信息将虚拟机标识为先前分配给 安全边界; 确定在所述安全网关允许对所述第一物理位置处的所述虚拟机的访问; 将所述第二物理位置处的所述虚拟机分配到所述安全边界,以及将与所述安全边界相关联的安全策略应用于所述第二物理位置处的所述网络和所述虚拟机之间的通信。