摘要:
A method is disclosed for high-speed processing of structured application messages in a network device. According to one aspect, a network device receives a set of message classification rules that have been prepared beforehand by a system administrator or customer. The system analyzes the message classification rules to determine what part(s) of the message are necessary to classify a message according to the message classification rules. This allows the system to consider only the relevant parts of the message and ignore the rest of the message. The system extracts the portion of the message necessary for classifying the message and classifies the message using the values of the extracted information and the message classification rules. A unique sequence of operations is implied by the message classification and those operations must then be applied to the message.
摘要:
A method is disclosed for high-speed processing of structured application messages in a network device. According to one aspect, a network device receives a set of message classification rules that have been prepared beforehand by a system administrator or customer. The system analyzes the message classification rules to determine what part(s) of the message are necessary to classify a message according to the message classification rules. This allows the system to consider only the relevant parts of the message and ignore the rest of the message. The system extracts the portion of the message necessary for classifying the message and classifies the message using the values of the extracted information and the message classification rules. A unique sequence of operations is implied by the message classification and those operations must then be applied to the message.
摘要:
A network infrastructure element such as a router or switch performs transparent and optimized validation of XML schemas of XML payloads received in the network element. The network element comprises logic for receiving and storing one or more validation scope rules that define a portion of an extensible markup language (XML) schema for validation; receiving and storing the XML schema; receiving over the network an application-layer message comprising one or more of the packets; identifying a particular XML element in an XML payload of the application-layer message, wherein the particular XML element is within the portion of the XML schema defined in the one or more validation scope rules; determining whether the particular XML element conforms to the XML schema; and performing a responsive action based on whether the particular XML element conforms to the XML schema.
摘要:
A network infrastructure element such as a router or switch performs transparent and optimized validation of XML schemas of XML payloads received in the network element. The network element comprises logic for receiving and storing one or more validation scope rules that define a portion of an extensible markup language (XML) schema for validation; receiving and storing the XML schema; receiving over the network an application-layer message comprising one or more of the packets; identifying a particular XML element in an XML payload of the application-layer message, wherein the particular XML element is within the portion of the XML schema defined in the one or more validation scope rules; determining whether the particular XML element conforms to the XML schema; and performing a responsive action based on whether the particular XML element conforms to the XML schema.
摘要:
A method is disclosed for protecting a network against a denial-of-service attack by inspecting application layer messages at a network element. According to one aspect, when a network element intercepts data packets that contain an application layer message, the network element constructs the message from the payload portions of the packets. The network element determines whether the message satisfies specified criteria. The criteria may indicate characteristics of messages that are suspected to be involved in a denial-of-service attack, for example. If the message satisfies the specified criteria, then the network element prevents the data packets that contain the message from being received by the application for which the message was intended. The network element may accomplish this by dropping the packets, for example. As a result, the application's host does not waste processing resources on messages whose only purpose might be to deluge and overwhelm the application.
摘要:
A method is disclosed for protecting a network against a denial-of-service attack by inspecting application layer messages at a network element. According to one aspect, when a network element intercepts data packets that contain an application layer message, the network element constructs the message from the payload portions of the packets. The network element determines whether the message satisfies specified criteria. The criteria may indicate characteristics of messages that are suspected to be involved in a denial-of-service attack, for example. If the message satisfies the specified criteria, then the network element prevents the data packets that contain the message from being received by the application for which the message was intended. The network element may accomplish this by dropping the packets, for example. As a result, the application's host does not waste processing resources on messages whose only purpose might be to deluge and overwhelm the application.
摘要:
Methods for determination and residency of service provider of a multi-card mobile terminal are provided. A method for the residency of the multi-card mobile terminal comprises: when some or all cards belong to the same service provider, said cards will reside in the same cell. Some embodiments of the present invention acquire IMSI corresponding to each card and extract HPLMN or EHPLMN from the IMSI to identify from card storage information rapidly and accurately cards in the mobile terminal that belong to the same service provider, and make those cards reside in the same cell during starting-up stage, cell reselection, or network recovery under the circumstance of a plurality of cards belonging to the same service provider, thus reducing the realization difficulties in measurement, idle standby, synchronous maintenance, etc., stabilizing the system and optimizing the performance of mobile terminal.
摘要:
Described are methods, devices, and systems for a novel, inexpensive, easy to use therapy for treatment of depression. Described are methods and devices to treat depression that involves no medication. Methods and devices described herein use alternating magnetic fields to gently “tune” the brain and affect symptoms of depression.
摘要:
Described are methods, devices, and systems for a novel, inexpensive, easy to use therapy for a number of disorders. Described are methods and devices to treat disorders that involves no medication. Methods and devices described herein use alternating magnetic fields to gently “tune” the brain and affect mood, focus, and cognition of subjects.
摘要:
Described are methods, devices, and systems for a novel, inexpensive, easy to use therapy for treatment of coma, post-traumatic stress disorder, Parkinson's disease, cognitive performance, and/or amblyopia. Described are methods and devices to treat coma, post-traumatic stress disorder, Parkinson's disease, cognitive performance, and/or amblyopia that involves no medication. Methods and devices described herein use alternating magnetic fields to gently “tune” the brain and affect symptoms of coma, post-traumatic stress disorder, Parkinson's disease, cognitive performance, and/or amblyopia.