会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Setting and changing queue sizes in line cards
    • 设置和更改线卡中的队列大小
    • US08571049B2
    • 2013-10-29
    • US12624656
    • 2009-11-24
    • Dante J. PacellaNorman Richard SolisHarold Jason Schiller
    • Dante J. PacellaNorman Richard SolisHarold Jason Schiller
    • H04L12/28
    • H04L49/9042H04L49/9005H04L49/9094
    • A device may include a first line card and a second line card. The first line card may include a memory including queues. In addition, the first line card may include a processor. The processor may identify, among the queues, a queue whose size is to be modified, change the size of the identified queue, receive a packet, insert a header cell associated with the packet in the identified queue, identify a second line card from which the packet is to be sent to another device in a network, remove the header cell from the identified queue, and forward the header cell to the second line card. The second line card may receive the header cell from the first line card, and send the packet to the other device in the network.
    • 设备可以包括第一线卡和第二线卡。 第一行卡可以包括包括队列的存储器。 另外,第一行卡可以包括处理器。 处理器可以在队列中识别其大小要被修改的队列,改变所识别的队列的大小,接收分组,将与分组相关联的标题单元插入识别的队列中,识别第二线卡,从其中 该分组将被发送到网络中的另一个设备,从识别的队列中移除该头部小区,并将该头部小区转发到该第二个线路卡。 第二线卡可以从第一线卡接收报头单元,并将分组发送到网络中的其他设备。
    • 9. 发明授权
    • Method and system for an intercept chain of custody protocol
    • 截取监护链协议的方法和系统
    • US08190764B2
    • 2012-05-29
    • US12965298
    • 2010-12-10
    • Norman Richard SolisDante J. PacellaHarold Jason Schiller
    • Norman Richard SolisDante J. PacellaHarold Jason Schiller
    • G01R31/08
    • H04L67/2804H04L63/306
    • Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method, comprising securely negotiating a data collection interval time and protocol support for electronic data collection between network equipment associated with a data collecting party and network equipment associated with a data receiving party, receiving a nonce at a network equipment associated with the data collecting party from network equipment associated with the data receiving party, utilizing the nonce to compute, at least in part, a hash value at network equipment associated with the data collecting party, collecting electronic data at an intercept access device at network equipment associated with the data collecting party, utilizing the nonce and the hash value to transmit the collected electronic data to network equipment associated with the data receiving party, and utilizing the hash value to establish a chain of custody between the data collecting party and the data receiving party.
    • 披露了为拦截电子信息建立监管链的技术。 在一个特定的示例性实施例中,这些技术可以被实现为一种方法,包括安全地协商数据收集间隔时间和与数据收集方相关联的网络设备与与数据接收方相关联的网络设备之间的电子数据收集的协议支持, 在与数据接收方相关联的网络设备与数据收集方相关联的网络设备处的随机数,利用该随机数至少部分地在与数据收集方相关联的网络设备处计算哈希值,收集电子数据 在与数据收集方相关联的网络设备处的拦截接入设备,利用随机数和散列值将收集的电子数据发送到与数据接收方相关联的网络设备,并利用散列值建立链路监控链 数据收集方和数据接收方。
    • 10. 发明申请
    • METHOD AND SYSTEM FOR AN INTERCEPT CHAIN OF CUSTODY PROTOCOL
    • 方法和系统的CUSTODY协议的间接链
    • US20100005188A1
    • 2010-01-07
    • US12166679
    • 2008-07-02
    • Norman Richard SolisDante J. PacellaHarold Jason Schiller
    • Norman Richard SolisDante J. PacellaHarold Jason Schiller
    • G06F15/16
    • H04L67/2804H04L63/306
    • Techniques for establishing a chain of custody for intercepted electronic information are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method, comprising securely negotiating a data collection interval time and protocol support for electronic data collection between network equipment associated with a data collecting party and network equipment associated with a data receiving party, receiving a nonce at a network equipment associated with the data collecting party from network equipment associated with the data receiving party, utilizing the nonce to compute, at least in part, a hash value at network equipment associated with the data collecting party, collecting electronic data at an intercept access device at network equipment associated with the data collecting party, utilizing the nonce and the hash value to transmit the collected electronic data to network equipment associated with the data receiving party, and utilizing the hash value to establish a chain of custody between the data collecting party and the data receiving party.
    • 披露了为拦截电子信息建立监管链的技术。 在一个特定的示例性实施例中,这些技术可以被实现为一种方法,包括安全地协商数据收集间隔时间和与数据收集方相关联的网络设备与与数据接收方相关联的网络设备之间的电子数据收集的协议支持, 在与数据接收方相关联的网络设备与数据收集方相关联的网络设备处的随机数,利用该随机数至少部分地在与数据收集方相关联的网络设备处计算哈希值,收集电子数据 在与数据收集方相关联的网络设备处的拦截接入设备,利用随机数和散列值将收集的电子数据发送到与数据接收方相关联的网络设备,并利用散列值建立链路监控链 数据收集方和数据接收方。