Systems and methods for providing redundancy in communications networks
    31.
    发明授权
    Systems and methods for providing redundancy in communications networks 有权
    在通信网络中提供冗余的系统和方法

    公开(公告)号:US07808893B1

    公开(公告)日:2010-10-05

    申请号:US11037179

    申请日:2005-01-19

    CPC classification number: H04L45/00 H04L43/0817 H04L45/22 H04L45/28

    Abstract: A system includes a first network device and a second network device. The first network device includes a group of first logical portions and is configured to detect a problem with one of the first logical portions, and transmit a message identifying the one first logical portion. The second network device includes a group of second logical portions, where the group of second logical portions corresponds to the group of first logical portions. The second network device is configured to receive the message from the first network device, and activate the one second logical portion corresponding to the one first logical portion in response to receiving the message.

    Abstract translation: 系统包括第一网络设备和第二网络设备。 第一网络设备包括一组第一逻辑部分,并且被配置为检测第一逻辑部分之一的问题,并且发送标识该第一逻辑部分的消息。 第二网络设备包括一组第二逻辑部分,其中第二逻辑部分组对应于第一逻辑部分的组。 第二网络设备被配置为从第一网络设备接收消息,并响应于接收到该消息而激活对应于该第一逻辑部分的一个第二逻辑部分。

    SYSTEMS AND METHODS FOR ROUTING DATA IN A COMMUNICATIONS NETWORK
    32.
    发明申请
    SYSTEMS AND METHODS FOR ROUTING DATA IN A COMMUNICATIONS NETWORK 有权
    用于在通信网络中路由数据的系统和方法

    公开(公告)号:US20100014416A1

    公开(公告)日:2010-01-21

    申请号:US12568831

    申请日:2009-09-29

    Abstract: A network device includes a group of interfaces. Each interface is associated with at least one other interface of the group of interfaces and a group of network addresses. Each interface is configured to monitor at least one of the group of network addresses with which the each interface is associated or the at least one other interface with which the each interface is associated, and determine whether to logically shut down based on the monitoring.

    Abstract translation: 网络设备包括一组接口。 每个接口与该组接口和一组网络地址的至少一个其他接口相关联。 每个接口被配置为监视每个接口与之相关联的一组网络地址中的至少一个或与每个接口相关联的至少一个其他接口,并且基于监视来确定是否逻辑关闭。

    Secure transport of multicast traffic
    33.
    发明授权
    Secure transport of multicast traffic 有权
    安全传输组播流量

    公开(公告)号:US07587591B2

    公开(公告)日:2009-09-08

    申请号:US10976026

    申请日:2004-10-29

    CPC classification number: H04L63/065 H04L12/185 H04L12/4633 H04L63/08

    Abstract: Secure tunneled multicast transmission and reception through a network is provided. A join request may be received from a second tunnel endpoint, the join request indicating a multicast group to be joined. Group keys may be transmitted to the second tunnel endpoint, where the group keys are based at least on the multicast group. A packet received at the first tunnel endpoint may be cryptographically processed to generate an encapsulated payload. A header may be appended to the encapsulated payload to form an encapsulated packet, wherein the header includes information associated with the second tunnel endpoint. A tunnel may be established between the first tunnel endpoint and the second tunnel endpoint based on the appended header. The encapsulated packet may be transmitted through the tunnel to the second tunnel endpoint. The second tunnel endpoint may receive the encapsulated packet. Cryptographic processing of the encapsulated packet may reveal the packet having a second header. The packet may then be forwarded on an interface toward at least one multicast recipient identified in the second header.

    Abstract translation: 提供通过网络进行安全隧道传输和接收。 可以从第二隧道端点接收加入请求,该连接请求指示要加入的多播组。 组密钥可以被发送到第二隧道端点,其中组密钥至少基于多播组。 可以对在第一隧道端点处接收的分组进行密码处理以产生封装的有效载荷。 报头可以附加到封装的有效载荷以形成封装的分组,其中报头包括与第二隧道端点相关联的信息。 可以基于附加的报头在第一隧道端点和第二隧道端点之间建立隧道。 封装的分组可以通过隧道传输到第二隧道端点。 第二隧道端点可以接收封装的分组。 封装分组的加密处理可以揭示具有第二报头的分组。 然后,分组可以在接口上朝向在第二报头中标识的至少一个多播接收机转发。

    System and Method for Renting Virtual Articles
    34.
    发明申请
    System and Method for Renting Virtual Articles 审中-公开
    租用虚拟文章的系统和方法

    公开(公告)号:US20080234038A1

    公开(公告)日:2008-09-25

    申请号:US12133169

    申请日:2008-06-04

    CPC classification number: G06Q30/02

    Abstract: A system for renting virtual article includes: a renting control unit, configured to rent a virtual article according to a hiring request, and stop renting the virtual article according to a stop-renting request; a monitoring unit, configured to monitor rented condition of the virtual article, and send the stop-renting request to the renting control unit if a stop-renting criterion is met.

    Abstract translation: 租赁虚拟物品的系统包括:租赁控制单元,被配置为根据招聘请求租用虚拟物品,并根据停止租用请求停止租用虚拟物品; 监视单元,被配置为监视所述虚拟物品的租用状态,并且如果满足停止租赁标准,则将所述停止租赁请求发送到所述租赁控制单元。

    Secure transport of multicast traffic
    35.
    发明申请
    Secure transport of multicast traffic 有权
    安全传输组播流量

    公开(公告)号:US20050138369A1

    公开(公告)日:2005-06-23

    申请号:US10976026

    申请日:2004-10-29

    CPC classification number: H04L63/065 H04L12/185 H04L12/4633 H04L63/08

    Abstract: Secure tunneled multicast transmission and reception through a network is provided. A join request may be received from a second tunnel endpoint, the join request indicating a multicast group to be joined. Group keys may be transmitted to the second tunnel endpoint, where the group keys are based at least on the multicast group. A packet received at the first tunnel endpoint may be cryptographically processed to generate an encapsulated payload. A header may be appended to the encapsulated payload to form an encapsulated packet, wherein the header includes information associated with the second tunnel endpoint. A tunnel may be established between the first tunnel endpoint and the second tunnel endpoint based on the appended header. The encapsulated packet may be transmitted through the tunnel to the second tunnel endpoint. The second tunnel endpoint may receive the encapsulated packet. Cryptographic processing of the encapsulated packet may reveal the packet having a second header. The packet may then be forwarded on an interface toward at least one multicast recipient identified in the second header.

    Abstract translation: 提供通过网络进行安全隧道传输和接收。 可以从第二隧道端点接收加入请求,该连接请求指示要加入的多播组。 组密钥可以被发送到第二隧道端点,其中组密钥至少基于多播组。 可以对在第一隧道端点处接收的分组进行密码处理以产生封装的有效载荷。 报头可以附加到封装的有效载荷以形成封装的分组,其中报头包括与第二隧道端点相关联的信息。 可以基于附加的报头在第一隧道端点和第二隧道端点之间建立隧道。 封装的分组可以通过隧道传输到第二隧道端点。 第二隧道端点可以接收封装的分组。 封装分组的加密处理可以揭示具有第二报头的分组。 然后,分组可以在接口上朝向在第二报头中标识的至少一个多播接收机转发。

    Enforcing access control on multicast transmissions
    36.
    发明申请
    Enforcing access control on multicast transmissions 有权
    实施组播传输的访问控制

    公开(公告)号:US20050114656A1

    公开(公告)日:2005-05-26

    申请号:US10976311

    申请日:2004-10-29

    CPC classification number: H04L12/185 H04L45/04 H04L45/16

    Abstract: Systems, apparatus, methods, and computer program products for multicast access control are provided to analyze incoming data based on a source zone and a destination zone of the incoming data. Appropriate access control rules are applied to incoming data based on the results of the analysis. Additional implementations of a multicast access control include using a proxy rendezvous point operable to function as a rendezvous point in place of a physical rendezvous point.

    Abstract translation: 提供用于组播访问控制的系统,装置,方法和计算机程序产品,用于基于输入数据的源区和目的地区来分析输入数据。 基于分析结果,对输入数据应用适当的访问控制规则。 多播访问控制的附加实现包括使用可操作以用作会合点的代理会合点来代替物理会合点。

    Bandwidth sentinel
    37.
    发明授权

    公开(公告)号:US09900251B1

    公开(公告)日:2018-02-20

    申请号:US12834017

    申请日:2010-07-12

    CPC classification number: H04L47/11 H04L47/125 H04L47/14 H04L47/30 H04W28/0284

    Abstract: Minimum guaranteed wireless network bandwidth is provided to client network devices by monitoring the performance of network connections to identify client network devices experiencing network congestion. Congested network connections are then analyzed to determine the source of the network congestion. Depending upon the source of the network congestion, an embodiment of the invention may undertake steps to either improve the quality of the network connection or to mitigate the impact of this network connection on other network connections. High quality network connections may be allocated additional bandwidth, airtime, or other resources to reduce the network congestion. Low quality network connections are not allocated additional bandwidth, airtime, or other resources. Instead, the impact of this network connection on the other network connections is mitigated. Additionally, the low quality network connection may be transferred to another wireless networking device that may be able to provide a better quality network connection.

    Exclusive preshared key authentication

    公开(公告)号:US09674892B1

    公开(公告)日:2017-06-06

    申请号:US12485041

    申请日:2009-06-16

    CPC classification number: H04W88/08 H04W12/04

    Abstract: Preshared keys are assigned to client devices, users, or user groups. The set of valid preshared keys or keys derived therefrom is distributed to network devices such as wireless access points. A client device attempts to establish a secure network connection with a network device using its assigned preshared key. A network device identifies the client device's preshared key by selecting a candidate key from its set of valid preshared keys. The network device determines a validation cryptographic checksum based on the selected candidate key. If the validation cryptographic checksum matches the client's cryptographic checksum, the network device establishes a secure network connection with the client device using this candidate key. If the validation cryptographic checksum does not match the cryptographic checksum provided by the client device, the network device repeats this comparison using different candidate keys selected from its set of valid preshared keys until a match is found.

    Predictive roaming between subnets
    39.
    发明授权

    公开(公告)号:US08582532B2

    公开(公告)日:2013-11-12

    申请号:US13452437

    申请日:2012-04-20

    Abstract: A network device of a subnet determines predictive roaming information for a wireless client. Predictive roaming information can identify the wireless client and a home network subnet of the wireless client. The network device provides predictive roaming information associated with a wireless client to neighboring subnets. Neighboring subnets store received predictive roaming information, and use the predictive roaming information if the wireless client roams to them.

    Airtime-based scheduling
    40.
    发明授权
    Airtime-based scheduling 有权
    基于时间的调度

    公开(公告)号:US08483194B1

    公开(公告)日:2013-07-09

    申请号:US12356886

    申请日:2009-01-21

    Abstract: Airtime usage may be used as a factor in controlling network traffic flow to and from client devices via a wireless network interface. Received packets or other data are assigned to a quality of service profile. Additionally, a cost value for communicating the received data is determined at least in part based on an actual or estimated airtime usage for the received packet. The cost value is used to allocate wireless network airtime to data. The allocation of wireless network airtime may be varied dynamically based on operating conditions. The cost value may be based on factors including the airtime used to communicate data; whether the data is a retransmission; and wireless network overhead. The cost value of data may also be different depending on whether the data is being sent from a client device or to a client device.

    Abstract translation: 可以使用时间使用作为通过无线网络接口控制到客户端设备和从客户端设备的网络业务流量的因素。 接收到的数据包或其他数据被分配给服务质量简档。 另外,用于传送接收到的数据的成本值至少部分地基于接收到的分组的实际或估计的通话时间使用来确定。 成本值用于将无线网络通话时间分配给数据。 无线网络通话时间的分配可以根据操作条件动态变化。 成本值可以基于包括用于传送数据的通话时间的因素; 数据是否是重传; 和无线网络开销。 数据的成本值也可以根据数据是从客户端设备还是客户端设备发送而不同。

Patent Agency Ranking