会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Security management system for monitoring firewall operation
    • 用于监控防火墙操作的安全管理系统
    • US07886348B2
    • 2011-02-08
    • US10679222
    • 2003-10-03
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • G06F9/00
    • H04L63/02H04L41/0213H04L41/22H04L43/06H04L43/0852H04L43/0894H04L43/12H04L43/50H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。
    • 3. 发明申请
    • SECURITY MANAGEMENT SYSTEM FOR MONITORING FIREWALL OPERATION
    • 用于监控防火墙操作的安全管理系统
    • US20090205039A1
    • 2009-08-13
    • US12428666
    • 2009-04-23
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • G06F21/00
    • H04L63/02H04L41/0213H04L41/22H04L43/06H04L43/0852H04L43/0894H04L43/12H04L43/50H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。
    • 4. 发明申请
    • SECURITY MANAGEMENT SYSTEM FOR MONITORING FIREWALL OPERATION
    • 用于监控防火墙操作的安全管理系统
    • US20110138456A1
    • 2011-06-09
    • US13026446
    • 2011-02-14
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • G06F17/00
    • H04L63/02H04L41/0213H04L41/22H04L43/06H04L43/0852H04L43/0894H04L43/12H04L43/50H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。
    • 6. 发明授权
    • Systems and methods for tracking signal strength in wireless networks
    • 用于跟踪无线网络信号强度的系统和方法
    • US07826837B1
    • 2010-11-02
    • US11198548
    • 2005-08-05
    • James E. Sylvester
    • James E. Sylvester
    • H04W24/00
    • H04W24/06H04W24/10
    • Tracking of signal strength in wireless networks is disclosed. In one of many possible embodiments, signal strength of a wireless signal received by at least one wireless device is measured, the wireless device being configured for operation in the wireless network. A parameter of the wireless device is determined, the parameter corresponding with the measurement of signal strength. The measured signal strength and the determined parameter are transmitted to a network operations center. The measured signal strength and the determined parameter are used to analyze signal coverage of the wireless network.
    • 公开了无线网络中信号强度的跟踪。 在许多可能的实施例之一中,测量由至少一个无线设备接收的无线信号的信号强度,所述无线设备被配置为在无线网络中操作。 确定无线设备的参数,该参数对应于信号强度的测量。 测量的信号强度和确定的参数被传送到网络操作中心。 测量的信号强度和确定的参数用于分析无线网络的信号覆盖。
    • 7. 发明申请
    • METHOD AND APPARATUS FOR MONITORING BIT-ERROR RATE
    • 用于监视位错误率的方法和装置
    • US20090276664A1
    • 2009-11-05
    • US12480629
    • 2009-06-18
    • James E. SylvesterAlexander LaparidisStanley Y. LeeMuzaffer Kanaan
    • James E. SylvesterAlexander LaparidisStanley Y. LeeMuzaffer Kanaan
    • G06F11/28H03M13/05G06F11/00G06F11/10
    • H04L43/50H04L43/06H04L43/0847H04L43/10
    • A test set for evaluating network performance is described, and which may include an output device, a processor, a power supply, a memory unit, and a control terminal. The test set may be configured to receive a user-entered selection of one of a plurality of different bit-error rate profiles and generate a test signal exhibiting the selected bit-error rate profile. The test set may also supply the test signal exhibiting the selected bit-error rate profile to a network under test. In addition, the test set may receive as an input, an output from the network under test. The output may include the test signal exhibiting the selected bit-error rate. The test set may evaluate the received test signal and determine the performance of the network in response to the received test signal exhibiting the bit-error rate. The test set may then output the results of the evaluation.
    • 描述了用于评估网络性能的测试集,其可以包括输出设备,处理器,电源,存储器单元和控制终端。 测试集可以被配置为接收用户输入的多个不同比特误码率分布之一的选择,并且生成展现所选择的比特误码率分布的测试信号。 测试集还可以向所测试的网络提供展示所选择的误码率简档的测试信号。 此外,测试集可以作为输入接收来自被测网络的输出。 输出可以包括呈现所选位错误率的测试信号。 测试集可以评估所接收的测试信号,并且响应于接收到的出现误码率的测试信号来确定网络的性能。 然后,测试集可以输出评估结果。
    • 8. 发明授权
    • Method and apparatus for monitoring bit-error rate
    • 用于监视误码率的方法和装置
    • US07555685B2
    • 2009-06-30
    • US11602349
    • 2006-11-21
    • James E. SylvesterAlexander LaparidisStanley Y. LeeMuzaffer Kanaan
    • James E. SylvesterAlexander LaparidisStanley Y. LeeMuzaffer Kanaan
    • G06F11/00H04L12/26
    • H04L43/50H04L43/06H04L43/0847H04L43/10
    • A test set for evaluating network performance is described, and which may include an output device, a processor, a power supply, a memory unit, and a control terminal. The test set may be configured to receive a user-entered selection of one of a plurality of different bit-error rate profiles and generate a test signal exhibiting the selected bit-error rate profile. The test set may also supply the test signal exhibiting the selected bit-error rate profile to a network under test. In addition, the test set may receive as an input, an output from the network under test. The output may include the test signal exhibiting the selected bit-error rate. The test set may evaluate the received test signal and determine the performance of the network in response to the received test signal exhibiting the bit-error rate. The test set may then output the results of the evaluation.
    • 描述了用于评估网络性能的测试集,其可以包括输出设备,处理器,电源,存储器单元和控制终端。 测试集可以被配置为接收用户输入的多个不同比特误码率分布之一的选择,并且生成展现所选择的比特误码率分布的测试信号。 测试集还可以向所测试的网络提供展示所选择的误码率简档的测试信号。 此外,测试集可以作为输入接收来自被测网络的输出。 输出可以包括呈现所选位错误率的测试信号。 测试集可以评估所接收的测试信号,并且响应于接收到的出现误码率的测试信号来确定网络的性能。 然后,测试集可以输出评估结果。
    • 9. 发明授权
    • Network firewall test methods and apparatus
    • 网络防火墙测试方法和设备
    • US07421734B2
    • 2008-09-02
    • US10678328
    • 2003-10-03
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • G06F17/00
    • H04L63/02H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。
    • 10. 发明授权
    • Rate agile rate-adaptive digital subscriber line
    • 速率敏捷速率自适应数字用户线
    • US07317754B1
    • 2008-01-08
    • US10755423
    • 2004-01-12
    • Terrence E. RemyJames E. Sylvester
    • Terrence E. RemyJames E. Sylvester
    • H04B1/38
    • H04L47/2416H04L1/0002H04L1/0019H04L5/0053H04L47/25Y02D50/10
    • Methods and apparatus for maintaining the maximum achievable data rate on a DSL line, up to and including a rate to which a user subscribes is described. Performance monitoring is conducted on the DSL line on an ongoing basis to determine noise margins in each direction. Each noise margin is compared against pre-determined decreasing/increasing thresholds to determine whether the line characteristics dictate a data rate change without loss of synchronization. The invention supports dynamic provisioning changes including application driven service level change requests, e.g., new bandwidth-on demand services. In some embodiments, a combination of existing and new embedded operations channel (EOC) messages are used to implement the modem data rate changes. New EOC messages may be implemented using some of the reserved and/or vendor proprietary Opcodes currently permitted. Modem assigned data rate changes are implemented without a disruption of service, e.g., without the need for re-initialization and/or re-synchronization.
    • 描述了在DSL线路上维持最大可实现的数据速率,直到并包括用户订阅的速率的方法和装置。 在DSL线路上进行性能监控,以确定每个方向的噪声容限。 将每个噪声余量与预定的减小/递增阈值进行比较,以确定线路特性是否指示数据速率变化而不失去同步。 本发明支持动态配置改变,包括应用驱动的服务水平改变请求,例如新的带宽按需服务。 在一些实施例中,使用现有和新的嵌入式操作信道(EOC)消息的组合来实现调制解调器数据速率改变。 可以使用当前允许的一些预留和/或供应商专有Opcodes来实现新的EOC消息。 调制解调器分配的数据速率改变在不中断服务的情况下实现,例如,不需要重新初始化和/或重新同步。