会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明授权
    • Coupon social networking platform
    • 优惠券社交网络平台
    • US08694367B2
    • 2014-04-08
    • US13287696
    • 2011-11-02
    • Matthias EichstaedtDeepak GoelSunil Keshav Bopardikar
    • Matthias EichstaedtDeepak GoelSunil Keshav Bopardikar
    • G06Q30/00
    • G06Q50/01G06Q30/0207G06Q30/0217
    • Techniques are provided for allowing a user to access a coupon. In one approach, a social network coupon platform receives a request to display coupon data regarding a particular coupon that is provided by a coupon provider, wherein a user that is registered with a social network provider initiated the request. In response to receiving the request, sending the coupon data is sent form the social network coupon platform to be displayed to the user. Profile data that includes profile information of the user is received at the social network coupon platform from the social network provider. In response to receiving the profile data, the user is allowed access to the particular coupon.
    • 提供了允许用户访问优惠券的技术。 在一种方法中,社交网络优惠券平台接收关于由优惠券提供商提供的特定优惠券的优惠券数据的请求,其中向社交网络提供商注册的用户发起了请求。 响应于接收到请求,发送优惠券数据将从社交网络优惠券平台发送到用户显示。 在社交网络提供商的社交网络优惠券平台上接收包含用户的个人资料信息的简档数据。 响应于接收到简档数据,允许用户访问特定的优惠券。
    • 43. 发明申请
    • FLOW CACHE MECHANISM FOR PERFORMING PACKET FLOW LOOKUPS IN A NETWORK DEVICE
    • 用于在网络设备中执行分组流量查询的流速缓存机制
    • US20130212296A1
    • 2013-08-15
    • US13372014
    • 2012-02-13
    • Deepak GoelJohn KeenVenkatasubramanian Swaminathan
    • Deepak GoelJohn KeenVenkatasubramanian Swaminathan
    • G06F15/173
    • H04L45/748H04L45/742H04L45/7453
    • An example network device includes a network interface configured to receive a packet of a packet flow, wherein the packet flow is one of a plurality of packet flows processed by the network device, a flow cache configured to receive a lookup key associated with the packet flow, and a Bloom filter configured to process the lookup key. The flow cache is further configured to store information about a portion of the plurality of packet flows processed by the network device, and determine whether to store information about the packet flow by at least applying a selection criterion to processing of the lookup key by the Bloom filter. The flow cache is configured to determine whether the lookup key is stored in the flow cache, and, when the lookup key is stored in the flow cache, retrieve a stored result associated with the lookup key and output the stored result.
    • 示例性网络设备包括被配置为接收分组流的分组的网络接口,其中所述分组流是由所述网络设备处理的多个分组流之一,被配置为接收与所述分组流相关联的查找密钥的流缓存 以及布隆过滤器,其被配置为处理查找密钥。 流缓存还被配置为存储关于由网络设备处理的多个分组流的一部分的信息,并且通过至少应用选择标准来应用Bloom的处理查找密钥来确定是否存储关于分组流的信息 过滤。 流缓存被配置为确定查找密钥是否存储在流缓存中,并且当查找密钥存储在流缓存中时,检索与查找密钥相关联的存储结果并输出存储的结果。
    • 45. 发明申请
    • SYSTEMS AND METHODS FOR TRANSPARENT LAYER 2 REDIRECTION TO ANY SERVICE
    • 透明层的系统和方法2重定向到任何服务
    • US20130007239A1
    • 2013-01-03
    • US13173216
    • 2011-06-30
    • Mugdha AgarwalJosephine SuganthiSaravana AnnamalaisamiJyotheesh Rao KurmaDeepak GoelAnil Shetty
    • Mugdha AgarwalJosephine SuganthiSaravana AnnamalaisamiJyotheesh Rao KurmaDeepak GoelAnil Shetty
    • G06F15/173
    • H04L45/306H04L29/08H04L45/74H04L61/103H04L61/1511H04L63/02H04L63/0815H04L67/2814
    • The present solution is directed to providing, transparently and seamlessly to any client or server, layer 2 redirection of client requests to any services of a device deployed in parallel to an intermediary device An intermediary device deployed between the client and the server may intercept a client request and check if the request is to be processed by a service provided by one of the devices deployed in parallel with the intermediary device. The service may be any type and form of service or feature for processing, checking or modifying the request, including a firewall, a cache server, a encryption/decryption engine, a security device, an authentication device, an authorization device or any other type and form of service or device described herein. The intermediary device may select the machine to process the request and use layer 2 redirection to the machine. The intermediary device may change a Media Access Control (MAC) address of a destination of the request to a MAC address of the selected machine. Once the selected machine processes the request, the intermediary device may receive from this machine a response to processing the request. The intermediary device may then continue processing the request of the client responsive to the response from the machine or in response to identifying that the response to the request is from that particular selected machine. The forwarding to and processing by the parallel deployed machine may be performed seamlessly and transparently to the server and/or client.
    • 本解决方案旨在向任何客户端或服务器透明和无缝地提供客户端请求到与中间设备并行部署的设备的任何服务的重定向。部署在客户端和服务器之间的中间设备可以拦截客户端 请求并检查请求是否由与中间设备并行部署的设备之一提供的服务处理。 服务可以是用于处理,检查或修改请求的任何类型和形式的服务或特征,包括防火墙,缓存服务器,加密/解密引擎,安全设备,认证设备,授权设备或任何其他类型 以及本文描述的服务或设备的形式。 中间设备可以选择机器来处理请求,并使用第2层重定向到机器。 中间设备可以将请求的目的地的媒体访问控制(MAC)地址改变为所选择的机器的MAC地址。 一旦所选机器处理请求,中间设备可以从该机器接收对处理请求的响应。 响应于来自机器的响应或响应于识别对该请求的响应来自该特定的所选择的机器,中间设备可以继续处理客户端的请求。 并行部署的机器的转发和处理可以无缝地且透明地执行到服务器和/或客户端。
    • 48. 发明申请
    • Methods and Apparatus Related to Packet Classification Based on Range Values
    • 基于范围值的分组分类相关方法与设备
    • US20110134916A1
    • 2011-06-09
    • US12794175
    • 2010-06-04
    • Ramesh PanwarDeepak GoelSrinivasan Jagannadhan
    • Ramesh PanwarDeepak GoelSrinivasan Jagannadhan
    • H04L12/56
    • H04L45/745H04L49/1515H04L49/3009
    • In one embodiment, an apparatus comprises a range selection module, a first stage of bloom filters, a second stage of bloom filters and a hashing module. The range selection module is configured to define a set of hash key vectors based on a set of range values associated with at least a portion of an address value from a data packet received at a multi-stage switch. The first stage of bloom filters and the second stage of bloom filters are collectively configured to determine that at least a portion of a hash key vector from the set of hash key vectors has a probability of being included in a hash table. The hashing module is configured to produce a hash value based on the hash key vector such that a first policy vector is selected based on the hash value and the first policy vector is decompressed to produce a second policy vector associated with the data packet.
    • 在一个实施例中,一种装置包括范围选择模块,第一阶段的布隆过滤器,第二阶段的布隆过滤器和散列模块。 范围选择模块被配置为基于与在多级交换机处接收的数据分组的地址值的至少一部分相关联的一组范围值来定义一组散列密钥向量。 布隆过滤器的第一阶段和布隆过滤器的第二阶段共同配置为确定来自该组散列密钥向量的散列密钥向量的至少一部分具有被包括在散列表中的概率。 散列模块被配置为基于散列密钥向量产生散列值,使得基于散列值选择第一策略向量,并且解压缩第一策略向量以产生与数据分组相关联的第二策略向量。