Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices
    1.
    发明申请
    Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices 有权
    将无线网络入侵检测系统部署到资源受限设备的装置和方法

    公开(公告)号:US20080291017A1

    公开(公告)日:2008-11-27

    申请号:US11900623

    申请日:2007-09-11

    Abstract: Wireless devices, such as field devices or repeater/relay nodes, detect the presence of anomalies in data packets that suggest intrusion. Upon detection of an anomaly, a wireless device sends a notification to a sentinel device, which determines if intrusion may be occurring. If so, the sentinel device downloads a spy routine to at least one of the wireless devices, which enables further investigation into and/or isolation of the intrusion. Since the spy routine is downloaded to the wireless devices, the spy routine can be used in conjunction with memory-constrained wireless devices. Memory-constrained wireless devices may lack adequate memory for storing both a main application executed during normal operation and the spy routine. The spy routine could overwrite one or more modules of the main application. Once executed, the spy routine could itself be overwritten by the one or more modules, allowing the wireless device to return to normal operation.

    Abstract translation: 无线设备,例如现场设备或中继器/中继节点,检测建议入侵的数据分组中存在异常。 在检测到异常时,无线设备向哨兵设备发送通知,该哨兵设备确定是否可能发生入侵。 如果是这样,则前哨设备将间谍程序下载到至少一个无线设备,这使得能够进一步调查和/或隔离入侵。 由于将间谍程序下载到无线设备,因此间谍程序可以与存储器受限的无线设备结合使用。 存储器受限的无线设备可能缺乏足够的存储器来存储在正常操作期间执行的主应用程序和间谍程序。 间谍程序可以覆盖主应用程序的一个或多个模块。 一旦执行,间谍程序本身可以被一个或多个模块覆盖,允许无线设备恢复正常操作。

    Constraint based material trimming controller
    2.
    发明授权
    Constraint based material trimming controller 失效
    基于约束的材料修剪控制器

    公开(公告)号:US06772037B2

    公开(公告)日:2004-08-03

    申请号:US10305837

    申请日:2002-11-26

    CPC classification number: G05B13/024 Y10S706/925

    Abstract: A pattern solution set for paper roll trimming to fulfill orders is generated using constraint programming and a heuristic. For every pattern generated, an objective function is evaluated based on the sum of waste factor and the variance of the quantity ordered for all widths in that pattern. The pattern that has the least objective function is chosen with the maximum number of sets possible. Orders are updated with the quantities left over and then the process continues, forming a solution tree, which serves as an initial solution set. The initial solution set is checked individually against the average loss of the solution set. Nodes in the solution tree having trim loss greater than the average loss are identified. Branches of the tree emanating from its parent are explored for better patterns. The process continues until all patterns are below the initial average loss.

    Abstract translation: 使用约束编程和启发式生成用于纸卷修剪以实现订单的图案解决方案。 对于生成的每个模式,基于废物因子和该模式中所有宽度的排序数量的方差的总和来评估目标函数。 具有最小目标函数的模式是可能的最大数量的集合来选择的。 订单更新的剩余数量,然后过程继续,形成一个解决方案树,作为一个初始解决方案集。 单独检查初始解集,以解决方案集的平均损失。 确定具有大于平均损耗的修整损耗的解决方案树中的节点。 探索从其父母发出的树枝,以获得更好的模式。 该过程一直持续到所有模式都低于初始平均损失。

    Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices
    3.
    发明授权
    Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices 有权
    将无线网络入侵检测系统部署到资源受限设备的装置和方法

    公开(公告)号:US07966660B2

    公开(公告)日:2011-06-21

    申请号:US11900623

    申请日:2007-09-11

    Abstract: Wireless devices, such as field devices or repeater/relay nodes, detect the presence of anomalies in data packets that suggest intrusion. Upon detection of an anomaly, a wireless device sends a notification to a sentinel device, which determines if intrusion may be occurring. If so, the sentinel device downloads a spy routine to at least one of the wireless devices, which enables further investigation into and/or isolation of the intrusion. Since the spy routine is downloaded to the wireless devices, the spy routine can be used in conjunction with memory-constrained wireless devices. Memory-constrained wireless devices may lack adequate memory for storing both a main application executed during normal operation and the spy routine. The spy routine could overwrite one or more modules of the main application. Once executed, the spy routine could itself be overwritten by the one or more modules, allowing the wireless device to return to normal operation.

    Abstract translation: 无线设备,例如现场设备或中继器/中继节点,检测建议入侵的数据分组中存在异常。 在检测到异常时,无线设备向哨兵设备发送通知,该哨兵设备确定是否可能发生入侵。 如果是这样,则前哨设备将间谍程序下载到至少一个无线设备,这使得能够进一步调查和/或隔离入侵。 由于将间谍程序下载到无线设备,因此间谍程序可以与存储器受限的无线设备结合使用。 存储器受限的无线设备可能缺乏足够的存储器来存储在正常操作期间执行的主应用程序和间谍程序。 间谍程序可以覆盖主应用程序的一个或多个模块。 一旦执行,间谍程序本身可以被一个或多个模块覆盖,允许无线设备恢复正常操作。

    Intrusion Detection System For Wireless Networks
    4.
    发明申请
    Intrusion Detection System For Wireless Networks 审中-公开
    无线网络入侵检测系统

    公开(公告)号:US20080295171A1

    公开(公告)日:2008-11-27

    申请号:US11752308

    申请日:2007-05-23

    Abstract: A wireless node in a wireless network examines data packets directed to itself (i.e., value in destination address field indicates that the wireless node is an intended recipient)for presence of anomalies that suggest intrusion. The data packet is examined as part of the normal course of operation of the node. Upon detection of an anomaly, the wireless node sends a message packet containing details of the anomaly to a sentinel device. The sentinel device processes the anomalies to determine if a possibility of intrusion is indicated, and activates a spy routine in the wireless node. The spy routine enables further investigation into the intrusion. As components (such as wireless nodes) in the wireless network operate normally (normal operations) until an anomalous condition/event occurs, the additional power requirements for intrusion detection are reduced. If intrusion is detected, appropriate actions, such as alerting an operator, are taken to mitigate the intrusion.

    Abstract translation: 无线网络中的无线节点检查指示其自身的数据分组(即,目的地地址字段中的值表示无线节点是预期接收者),用于存在建议入侵的异常的存在。 作为节点正常运行过程的一部分检查数据包。 在检测到异常时,无线节点将包含异常细节的消息包发送到哨兵设备。 哨兵设备处理异常以确定是否指示入侵的可能性,并激活无线节点中的间谍程序。 间谍程序可以进一步调查入侵。 由于无线网络中的组件(例如无线节点)正常运行(正常操作),直到发生异常情况/事件,因此降低了入侵检测的附加功率要求。 如果检测到入侵,则采取适当的措施,例如警告操作员,以减轻入侵。

    OPTIMIZATION AND/OR SCHEDULING FRAMEWORK FOR A PERIODIC DATA COMMUNICATION SYSTEM HAVING MULTIPLE BUSES AND HARDWARE APPLICATION MODULES
    5.
    发明申请
    OPTIMIZATION AND/OR SCHEDULING FRAMEWORK FOR A PERIODIC DATA COMMUNICATION SYSTEM HAVING MULTIPLE BUSES AND HARDWARE APPLICATION MODULES 审中-公开
    具有多个业务和硬件应用模块的定期数据通信系统的优化和/或调度框架

    公开(公告)号:US20080201717A1

    公开(公告)日:2008-08-21

    申请号:US11677121

    申请日:2007-02-21

    CPC classification number: G06F9/54 H04L49/90

    Abstract: Periodic communication of data packets between modules in time frames having a plurality of frame rates including a base frame rate through a bus is schedule by determining a first load schedule for data packets of base frame and half base frame rates using constraint logic programming techniques, by determining a second load schedule for data packets of other frame rates using mixed integer linear programming techniques, and by scheduling produce and consume loads for each of the modules based on the first and second load schedules.

    Abstract translation: 通过使用约束逻辑编程技术,通过使用约束逻辑编程技术确定基本帧和半基本帧速率的数据分组的第一加载调度,通过包括通过总线的基本帧速率的多个帧速率的时间帧中的模块之间的数据分组的周期性通信, 使用混合整数线性规划技术确定其他帧速率的数据分组的第二负载调度,并且基于第一和第二负载计划调度产生和消耗每个模块的负载。

Patent Agency Ranking