会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Priority resolution for access control list policies in a networking device
    • 网络设备中访问控制列表策略的优先级分辨率
    • US09571502B2
    • 2017-02-14
    • US13616256
    • 2012-09-14
    • Claude BassoNatarajan VaidhyanathanColin B. Verrilli
    • Claude BassoNatarajan VaidhyanathanColin B. Verrilli
    • G06F15/173H04L29/06H04L12/00
    • H04L63/101H04L12/00H04L29/06823
    • Access control lists (ACLs) permit network administrators to manage network traffic flowing through a networking element to optimize network security, performance, quality of service (QoS), and the like. If a networking element has multiple ACLs directed towards different types of network optimization, each ACL may return a separate action set that identifies one or more actions the networking element should perform based on a received frame. In some cases, these action sets may conflict. To resolve the conflicts, a networking element may include resolution logic that selects one of the conflicting actions based on a predefined precedence value assigned to each action in an action set. By comparing the different precedence values, the resolution logic generates a new action set based on the actions with the highest precedence value.
    • 访问控制列表(ACL)允许网络管理员管理流经网络元件的网络流量,以优化网络安全性,性能,服务质量(QoS)等。 如果网络元件具有针对不同类型的网络优化的多个ACL,则每个ACL可以返回单独的动作集合,其识别基于接收到的帧的网络元件应该执行的一个或多个动作。 在某些情况下,这些操作集可能会发生冲突。 为了解决冲突,网络元件可以包括分辨率逻辑,其基于分配给动作集中的每个动作的预定义优先级值来选择冲突动作之一。 通过比较不同的优先级值,分辨率逻辑基于具有最高优先级值的动作生成新的动作集。
    • 6. 发明申请
    • PRIORITY RESOLUTION FOR ACCESS CONTROL LIST POLICIES IN A NETWORKING DEVICE
    • 网络设备访问控制列表策略的优先解决方案
    • US20140082168A1
    • 2014-03-20
    • US13616256
    • 2012-09-14
    • Claude BassoNatarajan VaidhyanathanColin B. Verrilli
    • Claude BassoNatarajan VaidhyanathanColin B. Verrilli
    • G06F15/173
    • H04L63/101H04L12/00H04L29/06823
    • Access control lists (ACLs) permit network administrators to manage network traffic flowing through a networking element to optimize network security, performance, quality of service (QoS), and the like. If a networking element has multiple ACLs directed towards different types of network optimization, each ACL may return a separate action set that identifies one or more actions the networking element should perform based on a received frame. In some cases, these action sets may conflict. To resolve the conflicts, a networking element may include resolution logic that selects one of the conflicting actions based on a predefined precedence value assigned to each action in an action set. By comparing the different precedence values, the resolution logic generates a new action set based on the actions with the highest precedence value.
    • 访问控制列表(ACL)允许网络管理员管理流经网络元件的网络流量,以优化网络安全性,性能,服务质量(QoS)等。 如果网络元件具有针对不同类型的网络优化的多个ACL,则每个ACL可以返回单独的动作集合,其识别基于接收到的帧的网络元件应该执行的一个或多个动作。 在某些情况下,这些操作集可能会发生冲突。 为了解决冲突,网络元件可以包括分辨率逻辑,其基于分配给动作集中的每个动作的预定义优先级值来选择冲突动作之一。 通过比较不同的优先级值,分辨率逻辑基于具有最高优先级值的动作生成新的动作集。
    • 9. 发明申请
    • CHECKSUM VERIFICATION ACCELERATOR
    • 检查验证加速器
    • US20120221928A1
    • 2012-08-30
    • US13466940
    • 2012-05-08
    • Francois AbelClaude BassoJean L. CalvignacNatarajan VaidhyanathanFabrice Jean Verplanken
    • Francois AbelClaude BassoJean L. CalvignacNatarajan VaidhyanathanFabrice Jean Verplanken
    • H03M13/09G06F11/10
    • H04L1/0079H04L1/0061H04L1/0072
    • Disclosed a method for validating a data packet by a network processor supporting a first, network protocol and a second network protocol and utilizing shared hardware. The network processor receives a data packet: identities a network packet protocol for the data packet; and processes the data packet according to the network packet protocol comprising: updating a first register with a first partial packet length specific to the first network protocol; updating a second register with a second partial packet length specific to the second network protocol; and updating a third register with a first checksum computed from fields independent of the network protocol. The method produces a second checksum utilizing a function that combines values from the first register, the second register, and the third register. The method validates the data packet by comparing the data packet checksum to the second checksum.
    • 公开了一种通过支持第一网络协议和第二网络协议的网络处理器来验证数据分组并利用共享硬件的方法。 网络处理器接收数据包:识别数据包的网络包协议; 并根据网络分组协议对数据分组进行处理,包括:以第一网络协议特有的第一部分分组长度更新第一寄存器; 用第二网络协议特有的第二部分分组长度更新第二寄存器; 以及用独立于网络协议的字段计算的具有第一校验和的更新第三寄存器。 该方法利用组合来自第一寄存器,第二寄存器和第三寄存器的值的函数产生第二校验和。 该方法通过将数据包校验和与第二校验和进行比较来验证数据包。