Automatic address range detection for IP networks
    1.
    发明授权
    Automatic address range detection for IP networks 有权
    IP网络的自动地址范围检测

    公开(公告)号:US08989198B2

    公开(公告)日:2015-03-24

    申请号:US13609813

    申请日:2012-09-11

    IPC分类号: H04L12/28 H04L29/12 H04L29/08

    摘要: Mechanisms are provided for automatic address range detection for an IP network. Flow data is obtained comprising the source or destination IP addresses for the flow and one of: the other of the source or destination IP addresses; or direction data identifying the flow direction across the network boundary. A tree is generated representing IP addresses in the flow data. IP addresses with initial portions in common are represented in the tree with a node in common. Weights are assigned to nodes in the tree based on occurrences of the represented IP addresses in the flow data. The IP address range of the network is detected by identifying, based on the assigned weights, the node associated with the last initial address portion common to all IP addresses in the network. A device is automatically configured with the IP address range to differentiate IP addresses inside and outside the network.

    摘要翻译: 为IP网络的自动地址范围检测提供了机制。 获得流数据,其包括用于流的源或目的地IP地址和以下之一:源或目的地IP地址中的另一个; 或方向数据标识跨越网络边界的流向。 生成表示流数据中的IP地址的树。 具有共同的初始部分的IP地址在树中被表示为具有共同的节点。 基于流数据中所表示的IP地址的出现,权重被分配给树中的节点。 通过基于分配的权重,识别与网络中所有IP地址共同的最后初始地址部分相关联的节点来检测网络的IP地址范围。 设备自动配置IP地址范围,以区分网络内外的IP地址。

    Identification of underutilized network devices
    2.
    发明授权
    Identification of underutilized network devices 有权
    识别未充分利用的网络设备

    公开(公告)号:US08797876B2

    公开(公告)日:2014-08-05

    申请号:US13387390

    申请日:2010-07-27

    IPC分类号: H04L12/26

    摘要: A method, article of manufacture, and system for indicating underutilized network devices that provide services in a data communications network. The method includes: receiving network traffic data; filtering the network traffic data to eliminate data for predefined connections; producing, from the filtered network traffic data, a graph representing a connection between a first device and a second device within the data communications network; analyzing the graph to identify a set of interconnected nodes that is outside the data communications network; and indicating an underutilized network device by producing an output dependent on traffic rate data associated with a link to the identified set of interconnected nodes that is outside the data communications network.

    摘要翻译: 一种用于指示在数据通信网络中提供服务的未充分利用的网络设备的方法,制品和系统。 该方法包括:接收网络流量数据; 过滤网络流量数据以消除预定义连接的数据; 从经滤波的网络业务数据生成表示数据通信网络内的第一设备和第二设备之间的连接的图; 分析图表以识别在数据通信网络之外的一组互连节点; 并且通过产生取决于与在所述数据通信网络之外的所识别的互连节点集合的链路相关联的业务速率数据来指示未充分利用的网络设备。

    Automatic Address Range Detection for IP Networks
    3.
    发明申请
    Automatic Address Range Detection for IP Networks 有权
    IP网络的自动地址范围检测

    公开(公告)号:US20120163196A1

    公开(公告)日:2012-06-28

    申请号:US13390037

    申请日:2010-08-03

    IPC分类号: H04L12/44 H04L12/26

    摘要: Mechanisms are provided for automatic address range detection for an IP network. Flow data is obtained comprising one of the source and destination IP addresses for the flow and one of (a) the other of the source and destination IP addresses and (b) direction data indicative of the flow direction across the network boundary. A tree data structure is generated representing the IP addresses in the flow data. IP addresses with initial portions in common are represented in the tree with at least one node in common. Weights are assigned to nodes in the tree in dependence on occurrences of the represented IP addresses in at least a subset of the flow data. The IP address range of the network is then detected by identifying, in dependence on the assigned weights, the node associated with the last initial address portion common to all IP addresses in the network. A device is automatically configured with the IP address range to permit distinction between IP addresses inside and outside the network in operation of the device, e.g. for filtering or traffic classification.

    摘要翻译: 为IP网络的自动地址范围检测提供了机制。 获得流数据,其包括用于流的源和目的地IP地址之一,(a)源和目的地IP地址中的另一个以及(b)指示跨越网络边界的流向的方向数据。 生成表示流数据中的IP地址的树数据结构。 具有公共初始部分的IP地址在树中被表示为具有至少一个共同的节点。 根据在流数据的至少一个子集中所表示的IP地址的出现,权重被分配给树中的节点。 然后,通过根据所分配的权重,通过与网络中所有IP地址共同的最后一个初始地址部分相关联的节点来识别网络的IP地址范围。 自动配置设备的IP地址范围,以允许在设备操作中区分网络内部和外部的IP地址。 用于过滤或流量分类。

    Cationic starch graft copolymers and novel process for the preparation of cationic starch graft copolymers
    4.
    发明授权
    Cationic starch graft copolymers and novel process for the preparation of cationic starch graft copolymers 有权
    阳离子淀粉接枝共聚物和新型阳离子淀粉接枝共聚物的制备方法

    公开(公告)号:US07786238B2

    公开(公告)日:2010-08-31

    申请号:US10788064

    申请日:2004-02-26

    IPC分类号: C08F31/00 C08F8/30 C08L3/00

    摘要: Cationic starch graft copolymer composed of the monomers a) to d) a) 20-80% by weight of acrylamide, methacrylamide or mixtures thereof, b) 3-20% by weight of at least one basic or cationic vinyl monomer, c) 0.005-1.5% by weight of at least one bifunctional or higher-functional crosslinking agent, d) 0-10% by weight of at least one nonionic or anionic vinyl monomer which differs from the monomers mentioned under a) to c) and a grafting base e) e) 15-70% by weight of at least one starch or one starch derivative, the sum of a) to e) being 100% by weight.

    摘要翻译: 由单体组成的阳离子淀粉接枝共聚物a)至d)a)20-80重量%的丙烯酰胺,甲基丙烯酰胺或其混合物,b)3-20重量%的至少一种碱性或阳离子乙烯基单体,c)0.005 -1.5重量%的至少一种双官能或更高官能的交联剂,d)0-10重量%的至少一种非离子或阴离子乙烯基单体,其不同于a)至c)所述的单体,和接枝碱 e)e)15-70重量%的至少一种淀粉或一种淀粉衍生物,a)至e)的总和为100重量%。

    SECURE USER INTERACTION USING VIRTUALIZATION
    5.
    发明申请
    SECURE USER INTERACTION USING VIRTUALIZATION 有权
    使用虚拟化进行安全的用户交互

    公开(公告)号:US20100017866A1

    公开(公告)日:2010-01-21

    申请号:US12175503

    申请日:2008-07-18

    IPC分类号: H04L9/32

    CPC分类号: H04L9/3234

    摘要: A first virtualization layer is inserted between (i) an operating system of a computer system, and (ii) at least first and second hardware devices of the computer system. Data is communicated between the first hardware device and the second hardware device, via the first virtualization layer, without exposing the data to the operating system.

    摘要翻译: 在(i)计算机系统的操作系统和(ii)计算机系统的至少第一和第二硬件设备之间插入第一虚拟化层。 经由第一虚拟化层在第一硬件设备和第二硬件设备之间传送数据,而不将数据暴露给操作系统。

    PROTECTION AND SECURITY PROVISIONING USING ON-THE-FLY VIRTUALIZATION
    6.
    发明申请
    PROTECTION AND SECURITY PROVISIONING USING ON-THE-FLY VIRTUALIZATION 审中-公开
    使用虚拟虚拟化进行保护和安全保护

    公开(公告)号:US20090300307A1

    公开(公告)日:2009-12-03

    申请号:US12130159

    申请日:2008-05-30

    IPC分类号: G06F12/16

    摘要: A virtualization layer is inserted between (i) an operating system of a computer system, and (ii) at least one of a memory module and a storage module of the computer system. At least one of read access and write access to at least one portion of the at least one of a memory module and a storage module is controlled, with the virtualization layer. The insertion of the virtualization layer is accomplished in an on-the-fly manner (that is, without rebooting the computer system) An additional aspect includes controlling installation of a security program from the virtualization layer.

    摘要翻译: 在(i)计算机系统的操作系统和(ii)计算机系统的存储器模块和存储模块中的至少一个之间插入虚拟化层。 使用虚拟化层来控制对存储器模块和存储模块中的至少一个的至少一部分的读访问和写入访问中的至少一个。 虚拟化层的插入是以动态的方式实现的(即,不重新启动计算机系统)。另外的方面包括控制来自虚拟化层的安全程序的安装。

    INTEGRITY PROTECTION IN DATA PROCESSING SYSTEMS

    公开(公告)号:US20080235793A1

    公开(公告)日:2008-09-25

    申请号:US12020612

    申请日:2008-01-28

    IPC分类号: G06F12/14 G06F9/455 G06F12/00

    摘要: A method for protecting the integrity of a set of memory pages to be accessed by an operating system of a data processing system, includes running the operating system in a virtual machine (VM) of the data processing system; verifying the integrity of the set of memory pages on loading of pages in the set to a memory of the data processing system for access by the operating system; in response to verification of the integrity, designating the set of memory pages as trusted pages and, in a page table to be used by the operating system during the access, marking non-trusted pages as paged; and in response to a subsequent page fault interrupt for a non-trusted page, remapping the set of pages to a region of the data processing system memory which is inaccessible to the virtual machine.