会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明申请
    • SYSTEMS AND METHODS FOR MAINTAINING PERSISTENCE BY A BACKUP VIRTUAL SERVER
    • 用于通过备份虚拟服务器维持持久性的系统和方法
    • WO2010068465A2
    • 2010-06-17
    • PCT/US2009/065794
    • 2009-11-24
    • CITRIX SYSTEMS. INC.GANDHEWAR, DineshMUTHIAH, Manikam
    • GANDHEWAR, DineshMUTHIAH, Manikam
    • H04L29/08
    • H04L67/1008H04L67/1002H04L67/1014H04L67/1025H04L67/1029H04L67/1034H04L67/28H04L67/2814H04L67/2885H04L69/40
    • The present disclosure presents systems and methods for maintaining persistence of a backup virtual server on connections currently serviced by the backup virtual server. A virtual server operating on an intermediary network device and identified as a primary virtual server for a first connection may receive a request via the first connection. The intermediary device may forward the first request to a backup virtual server of the virtual server in response to identifying that the virtual server is unavailable. The intermediary device may later identify that the virtual server is available. The virtual server may establish a new connection responsive to receiving a connection request while the intermediary device may forward a second request received via the first connection to the backup virtual server instead of the virtual server responsive to identifying that the virtual server is configured not to preempt the backup virtual server from maintaining connections currently maintained by the backup virtual server.
    • 本公开提出了用于在由备份虚拟服务器当前服务的连接上维持备份虚拟服务器的持久性的系统和方法。 在中间网络设备上运行并且被识别为用于第一连接的主虚拟服务器的虚拟服务器可以经由第一连接接收请求。 响应于识别出虚拟服务器不可用,中间设备可以将第一请求转发给虚拟服务器的备份虚拟服务器。 中间设备稍后可以识别出虚拟服务器可用。 响应于接收到连接请求,虚拟服务器可以建立新的连接,而中间设备可以响应于识别出虚拟服务器被配置为不抢先而将经由第一连接接收到的第二请求转发到备份虚拟服务器而不是虚拟服务器 备份虚拟服务器维护当前由备份虚拟服务器维护的连接。
    • 6. 发明申请
    • SYSTEM AND METHOD FOR REDUCING DENIAL OF SERVICE ATTACKS AGAINST DYNAMICALLY GENERATED NEXT SECURE RECORDS
    • 用于减少对动态生成的下一个安全记录进行服务攻击的系统和方法
    • WO2014186189A1
    • 2014-11-20
    • PCT/US2014/037125
    • 2014-05-07
    • CITRIX SYSTEMS, INC.
    • MUTHIAH, Manikam
    • H04L29/12H04L29/06H04L29/08
    • G06F21/55H04L61/1511H04L61/6009H04L61/6013H04L63/10H04L63/1458H04L67/2804H04L67/2871
    • The present disclosure is directed to the reduction of denial of service, DoS, attacks against dynamically generated next secure, NSEC, records. A domain name system, DNS, proxy (602) prevents spoofed IP addresses by forcing clients (600) to transmit DNS queries via transmission control protocol, TCP, by replying (626) to a user datagram protocol, UDP, DNS request (620) with a blank or predetermined resource record with a truncation bit set to indicate that the record is too large to fit within a single UDP packet payload. Under the DNS specification, the client must re-transmit the DNS request via TCP. Upon receipt (634) of the retransmitted request via TCP, the DNS proxy generates (640) fictitious neighbor addresses and a signed NSEC record and transmits (642) the record to the client. Accordingly, the DNS proxy need not waste resources generating and signing records for requests from spoofed IP addresses via UDP.
    • 本公开旨在减少拒绝服务,DoS攻击动态生成的下一个安全的NSEC记录。 域名系统(DNS)代理(602)通过强制客户端(600)通过传输控制协议(TCP)通过回复(626)到用户数据报协议UDP,DNS请求(620)来发送DNS查询来防止欺骗IP地址 具有空白或预定的资源记录,其中截断位被设置以指示该记录太大以至于不能容纳在单个UDP分组有效载荷内。 在DNS规范下,客户端必须通过TCP重新发送DNS请求。 通过TCP接收(634)重发请求后,DNS代理生成(640)虚拟邻居地址和签名的NSEC记录,并将记录发送(642)给客户端。 因此,DNS代理不需要通过UDP浪费来自欺骗IP地址的请求的资源生成和签名记录。