Techniques for protection of data-communication networks
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-012/28
H04L-012/56
H04J-003/16
H04J-003/22
G06F-015/16
출원번호
US-0623881
(1999-03-11)
국제출원번호
PCT//IB99/00411
(2000-09-11)
§371/§102 date
20000911
(20000911)
국제공개번호
WO99//46882
(1999-09-16)
발명자
/ 주소
Baron, Elad
출원인 / 주소
Whale Communications Ltd.
대리인 / 주소
Ropes &
인용정보
피인용 횟수 :
38인용 특허 :
7
초록▼
Systems and methods for transmitting data between origin and destination networks are provided. Data complying with a first protocol is received at a front end of the origin network. At least one protocol layer of the first protocol is stripped from the received data such that only a portion of the
Systems and methods for transmitting data between origin and destination networks are provided. Data complying with a first protocol is received at a front end of the origin network. At least one protocol layer of the first protocol is stripped from the received data such that only a portion of the received data is selected for transmission to a front end of the destination network. The selected data is transmitted to the front end of the at least one destination network using a second protocol different from the first protocol. The selected data can be transmitted over the at least one destination network using a third protocol different from the second protocol. Techniques for electrically isolating the origin and destination networks are also provided.
대표청구항▼
1. A method for transmitting data between an origin network and at least one destination network, each network having a network front end, the method comprising:receiving data over the origin network at the front end of the origin network, wherein the received data complies with a first protocol; st
1. A method for transmitting data between an origin network and at least one destination network, each network having a network front end, the method comprising:receiving data over the origin network at the front end of the origin network, wherein the received data complies with a first protocol; stripping at least one protocol layer of the first protocol from the received data such that only a portion of the received data is selected; transmitting the selected data from the front end of the origin network to the front end of the at least one destination network over at least one primitive network using a second protocol different from the first protocol; and when an ultimate destination of the transmitted data is not the front end of the at least one destination network, transmitting the selected data over the at least one destination network to the destination using a third protocol different from the second protocol. 2. The method of claim 1, wherein the first protocol and the third protocol are the same protocol.3. The method of claim 2, wherein the first protocol and the third protocol are selected from the group consisting of TCP/IP, DECnet, Novell and SNA.4. The method of claim 1, wherein the protocol of the primitive network is selected from the group consisting of SCSI, SCSI-2, SCSI-3, SPI, Fast-20, Fast-40, LVD, parallel data port, serial data port, USB, RS-232, ethernet, token ring, FDDI and ATM.5. The method of claim 1, wherein said transmitting of the selected data from the front end of the origin network to the front end of the at least one destination network comprises:transferring data from the front end of the origin network to at least one intermediate node; and transferring the data from the at least one intermediate node to the front end of the at least one destination network. 6. The method of claim 5, further comprising:inspecting the data received by at least one front end and deciding whether to block the transfer of the data received. 7. The method of claim 5, wherein after said receiving data and before said transmitting of the selected data over the at least one destination network to the destination, the respective front end can modify the data.8. The method of claim 5, wherein prior to said transferring of data from the front end of the origin network to at least one intermediate node, the at least one intermediate node is electrically isolated from the front end of the at least one destination network, and said transferring of the data from the at least one intermediate node to the front end of the at least one destination network further comprises:electronically isolating the at least one intermediate node from the front end of the origin network, electronically connecting the at least one intermediate node to the front end of the at least one destination network, and transferring the data from the at least one intermediate node to the front end of the at least one destination network. 9. The method of claim 8, wherein the at least one intermediate node is a storage device.10. The method of claim 9, wherein after said electronically isolating of the at least one intermediate node from the front end of the origin network, the storage device is reset, except for its memory element.11. The method of claim 9, whereinthe storage device has a read/write mode and a read-only mode, and the storage device is normally in the read-only mode and is placed in the read/write mode only in response to a control signal. 12. The method of claim 8, wherein prior to said transferring of the data from the at least one intermediate node to the front end of the at least one destination network, the at least one intermediate node is placed in a read-only mode.13. The method of claim 8, further comprising the step of:inspecting the data received by at least one front end and deciding whether to block the transfer of the data received. 14. The method of claim 8, wherein after said receiving data and before said transmitting of the selected data over the at least one destination network to the destination, the respective front end can modify the data.15. The method of claim 5, wherein the front end of the origin network is always electrically isolated from the front end of the at least one destination network.16. The method of claim 15, further comprising:constantly verifying with a control unit that the front end of the origin network is always electrically isolated from the front end of the at least one destination network. 17. The method of claim 16, wherein verifying that the front end of the origin network is always electrically isolated from the front end of the at least one destination network includes injecting a periodic wave on signal lines coming from one front end and detecting whether the wave is present on signal lines coming from the other front end.18. The method of claim 16, wherein verifying that the front end of the origin network is always electrically isolated from the front end of the at least one destination network includes generating a DC signal shift on signal lines coming from one front end and detecting whether there is a shift of the DC signal on signal lines of a different front end.19. The method of claim 5, wherein there are a plurality of destination networks each network having a network front end, prior to said transferring of data from the front end of the origin network to at least one intermediate node, the front ends of the plurality of destination networks are electrically isolated from the at least one intermediate node, and said transferring of the data from the at least one intermediate node to the front end of the at least one destination network further comprises the steps of:electronically isolating the at least one intermediate node from the front end of the origin network, a) electronically isolating the at least one intermediate nodes from the front ends of all but one of the plurality of destination networks, b) transferring the data from the at least one intermediate node to the front end of a connected destination network, and repeating a) and b) for each of the plurality of destination networks. 20. The method of claim 5, wherein the at least one intermediate node comprises a magnetic storage device.21. The method of claim 20, wherein the data is always written to and read from a same position of the magnetic storage device.22. The method of claim 5, wherein the front end of the origin network is always physically disconnected from the front ends of all networks.23. The method of claim 5, wherein the at least one intermediate node comprises a memory device.24. The method of claim 5, wherein the at least one intermediate node comprises a member of the group consisting of a computer, server, a workstation, a personal computer or dedicated hardware.25. The method of claim 1, further comprising determining whether the data has been successfully transferred to the destination in the at least one destination network.26. The method of claim 25, whereindetermining whether the data has been successfully transferred to the destination in the at least one destination network includes determining whether the data has been transferred to the destination within a predetermined time period. 27. The method of claim 1, wherein the said primitive network is not capable of transmitting data from the front end of the at least one destination network to the front end of the origin network.28. The method of claim 1, further comprising the step of:inspecting the data received by at least one front end and deciding whether to block the transfer of the data received. 29. The method of claim 1, wherein after said receiving data and before said transmitting of the selected data over the at least one destination network to the destination, the respective front end can modify the data.30. A method for transmitting data between an origin network and at least one destination network, each network having a network front end, the method comprising:receiving data over the origin network at the front end of the origin network, wherein the received data complies with a first protocol; stripping at least one protocol layer of the first protocol from the received data such that only a portion of the received data is selected; transmitting the selected data from the front end of the origin network to an intermediate node over a first primitive network using a second protocol different from the first protocol; transmitting the selected data from the intermediate node to the front end of the at least one destination network over a second primitive network; and when the transmission destination is not the front end of the at least one destination, transmitting the selected data over the at least one destination network to the transmission destination using a third protocol different from the second protocol. 31. The method of claim 30, further comprising the step of:inspecting the data received by the intermediate mode and deciding whether to block the transfer of the data received. 32. The method of claim 30, wherein after said transmitting of the selected data from the front end of the origin network to an intermediate node over a first primitive network, the intermediate mode can modify the data.33. A computer network comprising:an origin network having an originating front end configured to receive data complying with at least a first protocol and to strip at least one protocol layer of the first protocol from the received data such that only a portion of the received data is selected; at least one destination network having a destination front end, wherein the destination network communicates using data complying with at least a second protocol; and at least one primitive network connected to said originating front end and to said destination front end and configured to transmit the selected data from the front end of the origin network to the front end of the at least one destination network using a protocol different from both the at least first protocol and the at least second protocol. 34. The computer network according to claim 33, wherein the at least first protocol and the at least second protocol are the same protocol.35. The computer network according to claim 34, wherein at least one of the first and second protocols are selected from the group consisting of TCP/IP, DECnet and SNA.36. The computer network according to claim 33, wherein the protocol of the primitive network is selected from the list consisting of SCSI, SCSI-2, SCSI-3, SPI, Fast-20, Fast-40, LVD, parallel data port, serial data port, USB, RS-232, ethernet, token ring, FDDI and ATM.37. The computer network according to claim 33, wherein the primitive network is further configured to transfer the data from the front end of the origin network to at least one intermediate node and then transfer the data from the at least one intermediate node to the front end of the at least one destination network.38. The computer network according to claim 37, wherein the at least one primitive network has a plurality of intermediate nodes and is further configured to transfer the information between the plurality of intermediate nodes prior to being transferred to the front end of the at least one destination network.39. The computer network according to claim 37, wherein the at least one intermediate node comprises a magnetic storage device.40. The computer network according to claim 39, whereinthe magnetic storage device has a read/write mode and a read-only mode, and the magnetic storage device is normally in the read-only mode and is placed in the read/write mode only in response to a control signal. 41. The computer network according to claim 39, wherein the data is always written to a same position of the magnetic storage device.42. The computer network according to claim 37, wherein the front end of the origin network is always physically disconnected from the front end of the at least one destination network.43. The computer network according to claim 37, wherein the at least one intermediate node comprises a memory device.44. The computer network according to claim 43, wherein the electronic memory includes a memory element,a switching circuit changing connection to the memory element between the front end of the origin network and the front end of the at least one destination network, and a plurality of other circuits, and except for the memory element, the electronic memory is configured to be reset during each change of state of the switching circuit. 45. The computer network according to claim 43, wherein:the memory device has a read/write mode and a read-only mode, and the memory device is normally in the read-only mode and is placed in the read/write mode only in response to a control signal. 46. The computer network according to claim 37, wherein the at least one intermediate node comprises a computer.47. The computer network according to claim 37, wherein the front end of the origin network is always electrically isolated from the front end of the at least one destination network.48. The computer network according to claim 47, further comprising:means for constantly verifying that the front end of the origin network is always electrically isolated from the front end of the at least one destination network. 49. The computer network according to claim 48, wherein the means for constantly verifying that the front end of the origin network is always electrically isolated from the front end of the at least one destination network includesa periodic wave generator generating a periodic wave on lines connected to the front end of one of the at least one destination network and origin network, and a detector detecting presence of the periodic wave one lines connected to the front end of one of the origin network and the at least one destination network. 50. The computer network according to claim 37, whereinthe at least one intermediate node includes a circuit to prevent the front end of the at least one destination network from transferring any data to said at least one intermediate node. 51. The computer network of claim 37, further comprising means for determining whether the data has been successfully transferred to the front end of the at least one destination network from the origin network via the at least one intermediate node by determining whether the data has been transferred to the front end of the at least one destination network within a predetermined time period.52. The computer network according to claim 33, wherein the said primitive network is not capable of transmitting data from the front end of the at least one destination network to the front end of the origin network.53. The computer network according to claim 33, further comprising:means for inspecting the data received at each front end and deciding whether to block the transfer of the data received at each front end. 54. The computer network according to claim 33, wherein the front end of at least one of the origin network and the at least one destination inspects and modifies the data received via the least one primitive network.55. The method of claim 5, whereinthe intermediate node comprises at least a first and second storage device, and said transferring of data from the front end of the origin network to at least one intermediate node comprises connecting one of the first and second storage devices to the front end of the origin network while electrically isolating said one of the first and second storage devices from the front end of the at least one destination network, and connecting the other of the first and second storage devices to the front end of the at least one destination network while electrically isolating the other of the first and second storage devices from the front end of the origin network, transferring data from the front end of the origin network to said one of the first and second storage device while transferring data from the front end of the at least one destination network to the other of the first and second storage devices, connecting said one of the first and second storage devices to the front end of the at least one destination network while electrically isolating said one of the first and second storage devices from the front end of the origin network, and connecting the other of the first and second storage devices to the front end of the origin network while electrically isolating the other of the first and second storage devices from the front end of the at least one destination network, and transferring data from said one of the first and second storage devices to the front end of the at least one destination network while transferring data from the other of the first and second storage devices to front end of the origin network. 56. The computer network according to claim 37, wherein the at least one intermediate node includes a switching circuit configured to connect the at least one intermediate node to the front end of the origin network while electrically isolating the intermediate node from the front end of the at least one destination network, and then connect the at least one intermediate node to the front end of the at least one destination network while electrically isolating the intermediate node from the front end of the origin network.57. The computer network according to claim 56, wherein the at least one intermediate node further includes a storage device for storing the data transferred from the respective front ends, and except for the storage device, all elements of the intermediate node are configured to reset during each connection change of the switching circuit.58. The method of claim 1, wherein the front end of at least one destination network, together with the protocol of the at least one primitive network, can restrict transmissions coming from and being passed to the at least one primitive net to at least one of a specific destination in the at least one destination network and a specific source in the origin network.59. A machine readable medium having stored thereon instructions executable by a machine to perform a method of transmitting data between an origin network and at least one destination network, each network having a network front end, said method comprising:receiving data over the origin network at the front end of the origin network, wherein the received data complies with a first protocol; stripping at least one protocol layer of the first protocol from the received data such that only a portion of the received data is selected; transmitting the selected data from the front end of the origin network to the front end of the at least one destination network over at least one primitive network using a second protocol different from the first protocol; and when an ultimate destination of the transmitted data is not the front end of the at least one destination network, transmitting the selected data over the at least one destination network to the destination using a third protocol different from the second protocol. 60. The machine-readable medium method of claim 59, wherein in said method the first protocol and the third protocol are the same protocol.61. The machine readable medium of claim 60, wherein in said method the first protocol and the third protocol are selected from the group consisting of TCP/IP, DECnet, Novell and SNA.62. The machine readable medium of claim 59, wherein in said method the protocol of the primitive network is selected from the group consisting of SCSI, SCSI-2, SCSI-3, SPI, Fast-20, Fast-40, LVD, parallel data port, serial data port, USB, RS-232, ethernet, token ring, FDDI and ATM.63. The machine readable medium of claim 59, wherein in said method said transmitting of the selected data from the front end of the origin network to the front end of the at least one destination network comprises:transferring data from the front end of the origin network to at least one intermediate node; transferring the data from the at least one intermediate node to the front end of the at least one destination network. 64. The machine readable medium of claim 63, wherein said method further comprises:inspecting the data received by at least one front end and deciding whether to block the transfer of the data received. 65. The machine-readable medium of claim 63, wherein in said method after said receiving data and before said transmitting of the selected data over the at least one destination network to the destination, the respective front end can modify the data.66. The machine readable medium of claim 63, wherein in said method:prior to said transferring of data from the front end of the origin network to at least one intermediate node, the at least one intermediate node is electrically isolated from the front end of the at least one destination network, and said transferring of the data from the at least one intermediate node to the front end of the at least one destination network further comprises: electronically isolating the at least one intermediate node from the front end of the origin network, electronically connecting the at least one intermediate node to the front end of the at least one destination network, and transferring the data from the at least one intermediate node to the front end of the at least one destination network. 67. The machine-readable medium of claim 66, wherein in said method the at least one intermediate node is a storage device.68. The machine readable medium of claim 67 wherein in said method after said electronically isolating the at least one intermediate node from the front end of the origin network, the storage device is reset, except for its memory element.69. The machine readable medium of claim 67, wherein in said method:the storage device has a read/write mode and a read-only mode, and the storage device is normally in the read-only mode and is placed in the read/write mode only in response to a control signal. 70. The machine-readable medium of claim 66, wherein in said method prior to said transferring of the data from the at least one intermediate node to the front end of the at least one destination network, the at least one intermediate node is placed in a read-only mode.71. The machine readable medium of claim 66, wherein said method further comprises:inspecting the data received by at least one front end and deciding whether to block the transfer of the data received. 72. The machine-readable medium of claim 66, wherein in said method after said receiving data and before said transmitting of the selected data over the at least one destination network to the destination, the respective front end can modify the data.73. The machine-readable medium of claim 63, wherein in said method the front end of the origin network is always electrically isolated from the front end of the at least one destination network.74. The machine readable medium of claim 73, wherein said method further comprises:constantly verifying with a control unit that the front end of the origin network is always electrically isolated from the front end of the at least one destination network. 75. The machine readable medium of claim 74, wherein in said method verifying that the front end of the origin network is always electrically isolated from the front end of the at least one destination network includes injecting a periodic wave on signal lines coming from one front end and detecting whether the wave is present on signal lines coming from the other front end.76. The machine readable medium of claim 74, wherein in said method verifying that the front end of the origin network is always electrically isolated from the front end of the at least one destination network includes generating a DC signal shift on signal lines coming from one front end and detecting whether there is a shift of the DC signal on signal lines of a different front end.77. The machine readable medium of claim 63, wherein in said method:there are a plurality of destination networks each network having a network front end, prior to said transferring of data from the front end of the origin network to at least one intermediate node, the front ends of the plurality of destination networks are electrically isolated from the at least one intermediate node, and said transferring of the data from the at least one intermediate node to the front end of the at least one destination network further comprises the steps of: electronically isolating the at least one intermediate node from the front end of the origin network, a) electronically isolating the at least one intermediate nodes from the front ends of all but one of the plurality of destination networks, b) transferring the data from the at least one intermediate node to the front end of a connected destination network, and repeating a) and b) for each of the plurality of destination networks. 78. The machine-readable medium of claim 63, wherein in said method the at least one intermediate node comprises a magnetic storage device.79. The machine-readable medium of claim 78, wherein in said method the data is always written to and read from a same position of the magnetic storage device.80. The machine-readable medium of claim 63, wherein in said method the front end of the origin network is always physically disconnected from the front ends of all networks.81. The machine-readable medium of claim 63 wherein in said method the at least one intermediate node comprises a memory device.82. The machine readable medium of claim 63, wherein in said method the at least one intermediate node comprises a member of the group consisting of a computer, server, a workstation, a personal computer or dedicated hardware.83. The machine-readable medium of claim 59 wherein said method further comprises determining whether the data has been successfully transferred to the destination in the at least one destination network.84. The machine readable medium of claim 83, wherein in said method:determining whether the data has been successfully transferred to the destination in the at least one destination network includes determining whether the data has been transferred to the destination within a predetermined time period. 85. The machine readable medium of claim 59, wherein in said method the primitive network is not capable of transmitting data from the front end of the at least one destination network to the front end of the origin network.86. The machine readable medium of claim 59, said method further comprises:inspecting the data received by at least one front end and deciding whether to block the transfer of the data received. 87. The machine-readable medium of claim 59, wherein in said method after said receiving data and before said transmitting of the selected data over the at least one destination network to the destination, the respective front end can modify the data.88. The machine readable medium of claim 63, wherein in said method:the intermediate node comprises at least a first and second storage device, and said transferring of data from the front end of the origin network to at least one intermediate node comprises: connecting one of the first and second storage devices to the front end of the origin network while electrically isolating said one of the first and second storage devices from the front end of the at least one destination network, and connecting the other of the first and second storage devices to the front end of the at least one destination network while electrically isolating the other of the first and second storage devices from the front end of the origin network, transferring data from the front end of the origin network to said one of the first and second storage device while transferring data from the front end of the at least one destination network to the other of the first and second storage devices, connecting said one of the first and second storage devices to the front end of the at least one destination network while electrically isolating said one of the first and second storage devices from the front end of the origin network, and connecting the other of the first and second storage devices to the front end of the origin network while electrically isolating the other of the first and second storage devices from the front end of the at least one destination network, and transferring data from said one of the first and second storage devices to the front end of the at least one destination network while transferring data from the other of the first and second storage devices to front end of the origin network. 89. The machine readable medium of claim 59, wherein in said method the front end of at least one destination network, together with the protocol of the at least one primitive network, can restrict transmissions coming from and being passed to the at least one primitive network to at least one of a specific destination in the at least one destination network and a specific source in the origin network.90. The method of claim 1, further comprising implementing the front end of the origin network, the front end of the at least one destination network and the at least one primitive network by the same organizational entity such that the organizational entity controls operation of the front end of the origin network, the front end of the at least one destination network and the at least one primitive network.91. The method of claim 90, wherein said implementing comprises implementing the front end of the origin network, the front end of the at least one destination network and the at least one primitive network at the same office of the organizational entity.92. The method of claim 30, further comprising implementing the front end of the origin network, the front end of the at least one destination network, the first primitive network, the intermediate node and the second primitive network by the same organizational entity such that the organizational entity controls operation of the front end of the origin network, the front end of the at least one destination network, the first primitive network, the intermediate node and the second primitive network.93. The method of claim 92, wherein said implementing comprises implementing the front end of the origin network, the front end of the at least one destination network, the first primitive network, the intermediate node and the second primitive network at the same office of the organizational entity.94. The computer network according to claim 33, wherein the originating front end, the destination front end and the at least one primitive network are implemented by the same organizational entity such that the organizational entity controls operation of the originating front end, the destination front end and the at least one primitive network.95. The computer network according to claim 94, wherein the originating front end, the destination front end and the at least one primitive network are implemented at the same office of the organizational entity.96. The machine readable medium of claim 59, wherein said method further comprises implementing the front end of the origin network, the front end of the at least one destination network and the at least one primitive network by the same organizational entity such that the organizational entity controls operation of the front end of the origin network, the front end of the at least one destination network and the at least one primitive network.97. The machine readable medium of claim 96, wherein in said method said implementing comprises implementing the front end of the origin network, the front end of the at least one destination-network and the at least one primitive network at the same office of the organizational entity.98. The method of claim 1, further comprising providing, by the front end of the destination network, data for encapsulating the selected data into the third protocol.99. The method of claim 30, further comprising providing, by the front end of the destination network, data for encapsulating the selected data into the third protocol.100. The computer network according to claim 33, wherein the destination front end is configured to provide data for encapsulating the selected data into the at least second protocol.101. The machine readable medium of claim 59, wherein said method further comprises providing, by the front end of the at least one destination network, data for encapsulating the selected data into the third protocol.102. The method of claim 1, wherein said stripping prevents control data in the data received over the origin network from passing through to the at least one destination network.103. The method of claim 30, wherein said stripping prevents control data in the data received over the origin network from passing through to the at least one destination network.104. The computer network according to claim 33, wherein said originating network is configured to prevent control data from the data received over the origin network from passing through to the at least one destination network.105. The machine readable medium of claim 59, wherein in said method said stripping prevents control data in the data received over the origin network from passing through to the at least one destination network.106. A method for transmitting data between an origin network and at least one destination network, each network having a network front end, the method comprising:receiving data over the origin network at the front end of the origin network, wherein the received data complies with a first protocol; stripping at least one protocol layer of the first protocol from the received data such that only a portion of the received data is selected; transmitting the selected data from the front end of the origin network to the front end of the at least one destination network over at least one network using a second protocol different from the first protocol; and when an ultimate destination of the transmitted data is not the front end of the at least one destination network, transmitting the selected data over the at least one destination network to the destination using a third protocol different from the second protocol.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (7)
Patrick Michael W. ; Picker Dennis J. ; Perreault John A., Apparatus, method, system and system method for distributed routing in a multipoint communication system.
Willems Richard A. (The Woodlands TX), Computer system for disparate windowing environments which translates requests and replies between the disparate environ.
Morten Richard M. (Gaithersburg MD) Smith Ted P. (Frederick MD), Method and apparatus for linking an SNA host to a remote SNA host over a packet switched communications network.
Jarett Keith ; Williams Roland E. ; Raffel Michael A. ; Nelson Roderick ; Lee Tony S. ; Kibria Masud, Mobile telecommunication device and method used for changing wireless communication between base stations of different.
Lambert, Timothy; Vancil, Paul W.; Waldorf, Richard, Information handling system including a local real device and a remote virtual device sharing a common channel.
Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
Ahrens, Jr., George Henry; Callaghan, Patrick J.; Feustel, Stephen V.; Overton, Robert Keith; Planutis, Richard Jeffrey; Seid, Alan David, Method and apparatus for customizable surveillance of network interfaces.
Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
Grove,Adam J.; Kharitonov,Michael; Tumarkin,Alexei, Method and system for high-performance delivery of web content using high-performance communications protocols to optimize a measure of communications performance between a source and a destination.
Ung, Kevin Y.; Murphy, Michael J.; Hartman, Brett; Kwok, Samuel C.; Donofrio, Thomas E.; Arnold, Steven L.; Balza, Richard M., Multiple level security adapter.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.