Abstract:
A message forwarding method includes: receiving a SIP registration request message carrying a contact address; obtaining the contact address carried in the SIP registration request message; and determining that the contact address is one of SIP proxy server addresses in a network stored in advance; and executing an abnormal process on the SIP registration request message. The present invention also discloses a network device. The message forwarding method and network device in the present invention can prevent a SIP loop attack.
Abstract:
This invention relates to a method for manufacturing selective area grown stacked-layer electro-absorption modulated laser structure, comprising: step 1: forming a selective growth pattern of a modulator section on a substrate; step 2: simultaneously growing a 2-stacked-layer active region structure of a modulator MQW layer and a laser MQW layer by the first epitaxy step; step 3: etching gratings, and removing the laser MQW layer in the modulator section by selective etching; and step 4: completing the growth of the entire electro-absorption modulated laser structure by a second epitaxy step.
Abstract:
A detecting method is provided, which includes extracting an Internet Protocol Identifier value from an obtained data packet. The detecting method may further include searching in a record table containing a correspondence relationship between an Internet Protocol Identifier value and a terminal serial number to determine whether the record table contains an adjacent Internet Protocol Identifier value smaller than the extracted Internet Protocol Identifier value and modifying the adjacent Internet Protocol Identifier value that is smaller than the extracted Internet Protocol Identifier value to be the extracted Internet Protocol Identifier value if the record table contains the adjacent Internet Protocol Identifier value smaller than the extracted Internet Protocol Identifier value. Otherwise, the detecting method may also include, adding a new record of the extracted Internet Protocol Identifier value and the corresponding terminal serial number into the record table. When a notification is received, the detecting method may calculate the number of terminal serial numbers in the record table and output the number of terminal serial numbers as the number of hosts. The provided detecting method may further provide a corresponding statistic and analyzing server and a detecting system.
Abstract:
This invention relates to a method for manufacturing selective area grown stacked-layer electro-absorption modulated laser structure, comprising: step 1: forming a selective growth pattern of a modulator section on a substrate; step 2: simultaneously growing a 2-stacked-layer active region structure of a modulator MQW layer and a laser MQW layer by the first epitaxy step; step 3: etching gratings, and removing the laser MQW layer in the modulator section by selective etching; and step 4: completing the growth of the entire electro-absorption modulated laser structure by a second epitaxy step.
Abstract:
A cloud-based network receives a public key of a public/private key pair and a credential for accessing secrets associated with a user network. The cloud-based network receives, from a user interface configured to facilitate remote control of the user network, a command to be executed at the user network. The cloud-based network encrypts, using the public key, the credential and the command. The cloud-based network forwards, to one or more client devices, the encrypted credential and command. The client devices are configured to decrypt the encrypted credential and command using a private key of the public/private key pair and execute the command on the user network.
Abstract:
A cloud-based network receives a public key of a public/private key pair and a credential for accessing secrets associated with a user network. The cloud-based network receives, from a user interface configured to facilitate remote control of the user network, a command to be executed at the user network. The cloud-based network encrypts, using the public key, the credential and the command. The cloud-based network forwards, to one or more client devices, the encrypted credential and command. The client devices are configured to decrypt the encrypted credential and command using a private key of the public/private key pair and execute the command on the user network.
Abstract:
A detecting method is provided, which includes extracting an Internet Protocol Identifier value from an obtained data packet. The detecting method may further include searching in a record table containing a correspondence relationship between an Internet Protocol Identifier value and a terminal serial number to determine whether the record table contains an adjacent Internet Protocol Identifier value smaller than the extracted Internet Protocol Identifier value and modifying the adjacent Internet Protocol Identifier value that is smaller than the extracted Internet Protocol Identifier value to be the extracted Internet Protocol Identifier value if the record table contains the adjacent Internet Protocol Identifier value smaller than the extracted Internet Protocol Identifier value. Otherwise, the detecting method may also include, adding a new record of the extracted Internet Protocol Identifier value and the corresponding terminal serial number into the record table. When a notification is received, the detecting method may calculate the number of terminal serial numbers in the record table and output the number of terminal serial numbers as the number of hosts. The provided detecting method may further provide a corresponding statistic and analyzing server and a detecting system.