$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Systems and methods for processing data flows 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06E-001/00
출원번호 US-0926292 (2007-10-29)
등록번호 US8010469 (2011-08-15)
발명자 / 주소
  • Kapoor, Harsh
  • Akerman, Moisey
  • Justus, Stephen D.
  • Ferguson, JC
  • Korsunsky, Yevgeny
  • Gallo, Paul S.
  • Lee, Charles Ching
  • Martin, Timothy M.
  • Fu, Chunsheng
  • Xu, Weidong
출원인 / 주소
  • Crossbeam Systems, Inc.
대리인 / 주소
    Strategic Patents, P.C.
인용정보 피인용 횟수 : 84  인용 특허 : 34

초록

Methods and systems for flow processing and switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security are describe

대표청구항

What is claimed is: 1. A method in a flow processing facility for securing a computer resource, comprising:receiving a data flow in a data flow processing facility comprising a plurality of network addressable data processing modules;identifying data packets associated with a subscriber profile in t

이 특허에 인용된 특허 (34)

  1. Hill Douglas W. ; Lynn James T., Adaptive system and method for responding to computer network security attacks.
  2. Wilt Michael J. ; Ballantyne Todd Andrew, Apparent network interface for and between embedded and host processors.
  3. Elms Robert T. (Monroeville Boro PA), Bidirectional communication and control network with programmable microcontroller interfacing digital ICs transmitting i.
  4. Thanh A. Diep, Computer network intrusion detection.
  5. Sumimoto Shinji (Kawasaki JPX), Computer resource distributing method and system for distributing a multiplicity of processes to a plurality of computer.
  6. Wandler Shaun ; Stevens Jeffrey C. ; Wolford Jeff W. ; Woods Robert ; Higby Danny ; Wunderlich Russ ; Deschepper Todd ; Wilson Jeffrey T., Computer system with bridge logic that includes an internal modular expansion bus and a common master interface for internal master devices.
  7. Morimoto Narishige,JPX ; Ueno Hitoshi,JPX ; Ohya Masaaki,JPX ; Arai Toshiaki,JPX ; Soejima Ken'ichi,JPX, Distributed computer system and method of generating automatic operation schedule for the same.
  8. Lermuzeaux Jean-Marc (St Michel sur Orge FRX) Emery Thierry (St Germain les Arpajon FRX) Gonthier Patrice (Antony FRX), Facility for detecting intruders and suspect callers in a computer installation and a security system including such a f.
  9. Day,Christopher W., Intrusion detection system.
  10. Jackson,Gary Manuel, Intrusion prevention system.
  11. Pham,Christopher H., Linear associative memory-based hardware architecture for fault tolerant ASIC/FPGA work-around.
  12. Brown, David R., Mechanism for optimizing transaction retries within a system utilizing a PCI bus architecture.
  13. Wilson, Brian K.; Koblas, David A.; Eikenberry, Scott D.; Wieneke, Paul R.; Uyeda, Damon K.; Nufire, Tim; Oliver, Jonathan J., Message testing based on a determinate message classification and minimized resource consumption.
  14. Cohen, Fred, Method and apparatus for network deception/emulation.
  15. Graham, Robert David, Method and apparatus for providing network and computer system security.
  16. Botros, Sherif M.; Diep, Thanh A.; Izenson, Martin D., Method and apparatus for training a neural network model for use in computer network intrusion detection.
  17. Wu Chiung-Shien,TWX ; Ma Gin-Kou,TWX, Method and system for ATM cell multiplexing under constant bit rate, variable bit rate and best-effort traffic.
  18. Smaha Stephen E. (Austin TX) Snapp Steven R. (Austin TX), Method and system for detecting intrusion into and misuse of a data processing system.
  19. Colby Steven ; Krawczyk John J. ; Nair Raj Krishnan ; Royce Katherine ; Siegel Kenneth P. ; Stevens Richard C. ; Wasson Scott, Method and system for directing a flow between a client and a server.
  20. Rouland, Christopher Jay; Becker, Patrick Morton; Klaus, Christopher W., Method and system for dynamically protecting a computer system from attack.
  21. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  22. Joyce, James B., Methods and apparatus for heuristic firewall.
  23. Porras Phillip A. ; Valdes Alfonso, Network surveillance.
  24. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance.
  25. Bradshaw ; Jr. Robert David ; Dandapani Ajit, Operating system having a mechanism for handling a group of related processes residing on separate machines.
  26. Ellis Frampton E., Personal computer microprocessor firewalls for internet distributed processing.
  27. Wu Chiung-Shien,TWX ; Ma Gin-Kou,TWX ; Yang Muh-Rong,TWX, Scalable architecture for media-on-demand servers.
  28. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  29. Liddell David C.,GBX ; Williams Emrys J.,GBX, System and method for self-referential accesses in a multiprocessor computer.
  30. Klinker,Eric; Johnson,Jeremy, System and method to provide routing control of information over networks.
  31. Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., System for on-line service in which gateway computer uses service map which includes loading condition of servers broad.
  32. Goodman,Joshua T.; Rounthwaite,Robert L.; Hulten,Geoffrey J.; Yih,Wen tau, Training filters for detecting spasm based on IP addresses and text-related features.
  33. Keith B. DuLac ; Paul M. Freeman, Video storage unit architecture.
  34. Bainbridge Andrew John,GBX ; Cocks Stephen James,GBX ; Ferguson Donald Francis ; Freund Thomas,GBX ; Leff Avraham ; Normington Glyn,GBX ; Rayfield James Thomas ; Storey Robert Anthony,GBX, Workload management in a client-server network with distributed objects.

이 특허를 인용한 특허 (84)

  1. Biran, Giora; Hagleitner, Christoph; Heil, Timothy H.; Hoover, Russell D.; Van Lunteren, Jan, Algorithm engine for use in a pattern matching accelerator.
  2. Nano, Olivier; Santos, Ivo Jose Garcia dos; Tarnavski, Tihomir; Peray, Sebastien; Tilly, Marcel; Krishnan, Ramkumar, Analysis stack for an event flow.
  3. Nano, Olivier; Santos, Ivo Jose Garcia dos; Tarnavski, Tihomir; Peray, Sebastien; Tilly, Marcel; Krishnan, Ramkumar, Analysis stack for an event flow.
  4. Baluda, Mauro; Castro, Paul C.; Pistoia, Marco; Ponzo, John J., Application-level anomaly detection.
  5. Baluda, Mauro; Castro, Paul C.; Pistoia, Marco; Ponzo, John J., Application-level anomaly detection.
  6. Zheng, Steed; Fang, Chao; Deng, Jan, Automatically generated and shared white list.
  7. Kamath, Harish B; Solur, Sridhar; Pitkin, David William; Iyer, Vss, Cloud printer with a common user print experience.
  8. Ionson, James Albert, Cognitive security system and method.
  9. Joram, Sharwan Kumar; Jha, Shyam Prakash; Hartley, William Matthew; Sonthalia, Madhav, Computer imposed countermeasures driven by malware lineage.
  10. Kailash, Kailash; Voit, Robert L.; Raphel, Jose, Content inspection using partial content signatures.
  11. Avanzi, Roberto; Kangaslampi, Simo Petteri; Keidar, Ron; Choi, Chang-Kuk, Countermeasures against audio/video content security domain crossing.
  12. Golshan, Ali, DNS denial of service attack protection.
  13. Friedel, Michael, Distributed denial of service cellular signaling.
  14. Ros-Giralt, Jordi, Efficient packet forwarding using cyber-security aware policies.
  15. Watters, John P.; Couch, Jonathan M.; Stover, Sam F.; Weinberger, Michael J.; Doyle, Frederick; MacManus, Gregory, Electronic crime detection and tracking.
  16. Watters, John P.; Couch, Jonathan M.; Stover, Sam F.; Weinberger, Michael J.; Doyle, Fredrick; MacManus, Gregory, Electronic crime detection and tracking.
  17. Juchem, Murilo; Azzolin, Deny Joao Correa; Caprio da Costa, Jr., Fernando Luis, Exposing network printers to WI-FI clients.
  18. Gareau, Terrence, Flagging security threats in web service requests.
  19. Thompson, Micheal; Groves, Vernon Richard, Health monitor based distributed denial of service attack mitigation.
  20. Thompson, Micheal; Groves, Vernon Richard, Health monitor based distributed denial of service attack mitigation.
  21. Scorvo, Sean Kristofer; Stull, Edward L., Identification breach detection.
  22. Smith, Robert; Marck, Shawn, Identifying a potential DDOS attack using statistical analysis.
  23. Smith, Robert; Marck, Shawn, Identifying a potential DDOS attack using statistical analysis.
  24. Jiang, Xuyang; Golshan, Ali, Implementing and optimizing secure socket layer intercept.
  25. Watters, John P.; Keane, Matthew, Information system security based on threat vectors.
  26. Watters, John P.; Keane, Matthew, Information system security based on threat vectors.
  27. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  28. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  29. Golshan, Ali; Jiang, Xuyang; Yang, Yang, Intercepting secure session upon receipt of untrusted certificate.
  30. Kamath, Harish B; Koay, Hean Koon; Atul, Pai K, Managing a printing device behind a firewall.
  31. Patruni, Satish Kumar; Saroday, Nagaraj Sathyanarayana, Mechanism that allows initiating print without being aware of the printer email address.
  32. Tarraf, Osama; Ansari, Arif, Methods and apparatus for coordination in multi-mode networks.
  33. Tarraf, Osama; Sahin, Mustafa Emin; Ansari, Arif, Methods and apparatus for implementing a self optimizing-organizing network manager.
  34. Cotanis, Nicolae G.; Jeon, Hyoung Suk, Methods and apparatus for improving coverage and capacity in a wireless network.
  35. Tarraf, Osama; Ansari, Arif; Bergner, Emil, Methods and apparatus for partitioning wireless network cells into time-based clusters.
  36. Tarraf, Osama; Ansari, Arif; Bergner, Emil, Methods and apparatus for partitioning wireless network cells into time-based clusters.
  37. Li, Zhefeng; Lee, Kyounghwan; Sahin, Mustafa E.; Tarraf, Osama, Methods and apparatus for underperforming cell detection and recovery in a wireless network.
  38. Majumdar, Partha; Ganguly, Pratik; Rakshit, Sirshendu; Chitradurga, Rohan, Methods, systems, and computer readable media for adjusting load at a device under test.
  39. Majumdar, Partha; Chitradurga, Rohan; Belov, Konstantin, Methods, systems, and computer readable media for classifying application traffic received at a network traffic emulation device that emulates multiple application servers.
  40. Majumdar, Partha; Pyatkovskiy, Maksim, Methods, systems, and computer readable media for controlling Tx and Rx throughput over TCP.
  41. Majumdar, Partha; Chitradurga, Rohan, Methods, systems, and computer readable media for generating simulated network traffic using different traffic flows and maintaining a configured distribution of traffic between the different traffic flows and a device under test.
  42. Iyer, Rahul, Methods, systems, and computer readable media for heuristics-based adaptive protocol parsing.
  43. Popescu, Sorin-Cristian; Bondrescu, Adrian Lucian; Cordos, Cristian; Baisan, Adrian, Methods, systems, and computer readable media for processing multiple control and user data flows at a port processor.
  44. Jalan, Rajkumar; Kamat, Gurudeep; Szeto, Ronald Wai Lun, Mitigating TCP SYN DDoS attacks using TCP reset.
  45. Yamada, Shohei; Uemura, Katsunari; Kato, Yasuyuki; Nakashima, Daiichiro; Oh, Waho, Mobile station apparatus, base station apparatus, management method in a mobile station apparatus, processing circuitry and communication system that removes measurement identity for a removed serving cell.
  46. McNamee, Kevin; Lee, Denny Lung Sun; Gaudet, Robert; Mistry, Arvavind K.; Edwards, Paul, Network based malware detection and reporting.
  47. Bird, William A.; Couturier, Russell; Silliman, Thomas D.; Tackabury, Wayne; Agerholm, Alex Omo; Lilja, Michael Milde; Ekner, Peter Dahl; Soeberg, Philip Due, Packet capture ring: reliable, scalable packet capture for security applications.
  48. Hansen, Peter; Urwin, Ronald M., Packet routing within server device enclosure.
  49. Yang, Yang; Golshan, Ali, Perfect forward secrecy distributed denial of service attack defense.
  50. Yang, Yang; Golshan, Ali, Perfect forward secrecy distributed denial of service attack defense.
  51. Yang, Yang; Golshan, Ali, Perfect forward secrecy distributed denial of service attack detection.
  52. Korsunsky, Yevgeny; Akerman, Moisey, Processing data flows with a data flow processor.
  53. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  54. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  55. Kritt, Barry A.; Rakshit, Sarbajit K., Secure Communication Method.
  56. Kritt, Barry A.; Rakshit, Sarbajit K., Secure communication method.
  57. Hussein, Osama; Hafedh, Trigui, Self-optimizing wireless network.
  58. Tarraf, Osama; Hafedh, Trigui, Self-optimizing wireless network.
  59. Tarraf, Osama; Hafedh, Trigui, Self-optimizing wireless network.
  60. Gudov, Nikolay V.; Levashov, Dmitry A., System and method for detection of network attacks.
  61. Hill, Nate; Wolski, Stanislas; Tardo, Joseph J., System and method for efficient matching of regular expression patterns across multiple packets.
  62. Gudov, Nikolay V.; Levashov, Dmitry A., System and method for reducing false positives during detection of network attacks.
  63. Golovanov, Sergey V., System and method for restricting pathways to harmful hosts in computer networks.
  64. Golovanov, Sergey Y., System and method for restricting pathways to harmful hosts in computer networks.
  65. Watters, John P.; Doyle, Frederick; Peltokangas, Henry; Keane, Matthew, System and method of cyber threat intensity determination and application to cyber threat mitigation.
  66. Watters, John P.; Doyle, Frederick; Peltokangas, Henry; Keane, Matthew, System and method of cyber threat structure mapping and application to cyber threat mitigation.
  67. Watters, John P.; Doyle, Frederick; Peltokangas, Henry; Keane, Matthew, System and method of mitigating cyber attack risks.
  68. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  69. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  70. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  71. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  72. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  73. Kumar, Lokesh; Ramachetty, Harinath Vishwanath; Kishore, Nandi Dharma, System, method, and computer program product for preventing a modification to a domain name system setting.
  74. Kumar, Lokesh; Ramachetty, Harinath Vishwanath; Kishore, Nandi Dharma, System, method, and computer program product for preventing a modification to a domain name system setting.
  75. Yufik, Yan M., Systems and methods for a computer understanding multi modal data streams.
  76. Kumar, Srinivas; Pollutro, Dennis, Systems and methods for network flow remediation based on risk correlation.
  77. Kumar, Srinivas; Pollutro, Dennis, Systems and methods for orchestrating runtime operational integrity.
  78. Kapoor, Harsh; Akerman, Moisey; Justus, Stephen D.; Ferguson, John C.; Korsunsky, Yevgeny; Gallo, Paul S.; Lee, Charles Ching; Martin, Timothy M.; Fu, Chunsheng; Xu, Weidong, Systems and methods for processing data flows.
  79. Kapoor, Harsh; Akerman, Moisey; Justus, Stephen D.; Ferguson, John C.; Korsunsky, Yevgeny; Gallo, Paul S.; Lee, Charles Ching; Martin, Timothy M.; Fu, Chunsheng; Xu, Weidong, Systems and methods for processing data flows.
  80. Kumar, Srinivas; Pollutro, Dennis, Systems and methods for providing mobile security based on dynamic attestation.
  81. Kumar, Srinivas; Pollutro, Dennis, Systems and methods for threat identification and remediation.
  82. Kumar, Srinivas; Pollutro, Dennis, Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms.
  83. Watters, John P.; Doyle, Frederick, Targeted security implementation through security loss forecasting.
  84. Yamada, Shohei; Uemura, Katsunari; Kato, Yasuyuki; Nakashima, Daiichiro; Oh, Waho, Terminal apparatus communication with a base station apparatus by carrier aggregation and base station apparatus communication with a terminal apparatus by carrier aggregation.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로