会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Request routing utilizing cost information
    • 使用成本信息请求路由
    • US08732309B1
    • 2014-05-20
    • US12272655
    • 2008-11-17
    • David R. RichardsonBradley E. MarshallSwaminathan SivasubramanianTal Saraf
    • David R. RichardsonBradley E. MarshallSwaminathan SivasubramanianTal Saraf
    • G06F15/173
    • G06Q10/0631G06F17/30893H04L61/1511
    • A system, method and computer-readable medium for request routing based on cost information are provided. A client request processing a resource identifier for requested content transmits a first DNS query to a content delivery network service provider. The content delivery network service provider transmits an alternative resource identifier in response to the client computing device DNS query. The alternative resource identifier is selected as a function of cost information. The client computing device then issues a second DNS query to the same content delivery network service provider. The content delivery network service provider can then either resolve the second DNS query with an IP address of a cache component or transmit another alternative resource identifier that will resolve to the content delivery network service provider. The process can repeat with the content delivery network service provider's network until a DNS nameserver resolves a DNS query from the client computing device.
    • 提供了一种用于基于成本信息的请求路由的系统,方法和计算机可读介质。 处理所请求内容的资源标识符的客户端请求向内容传送网络服务提供商发送第一DNS查询。 内容传送网络服务提供商响应于客户端计算设备DNS查询传输替代资源标识符。 作为成本信息的函数选择替代资源标识符。 客户端计算设备然后向相同的内容传送网络服务提供商发出第二DNS查询。 然后,内容传送网络服务提供商可以用缓存组件的IP地址来解析第二DNS查询,或者传送将解析到内容传送网络服务提供商的另一备用资源标识符。 该过程可以与内容传送网络服务提供商的网络重复,直到DNS名称服务器从客户端计算设备解析DNS查询。
    • 9. 发明授权
    • Load balancing utilizing adaptive thresholding
    • 利用自适应阈值进行负载平衡
    • US08576710B2
    • 2013-11-05
    • US13438734
    • 2012-04-03
    • Vivek RaiDan Mihai DumitriuSwaminathan Sivasubramanian
    • Vivek RaiDan Mihai DumitriuSwaminathan Sivasubramanian
    • H04B1/00
    • H04L67/42H04L67/02H04L67/1002
    • Methods and systems for processing data requests in a client-server computing environment, such as the Web, are disclosed. A client device initially transmits a data request to a randomly selected first server device. The first server device may reject the data request if its request queue threshold is exceeded. The client device retransmits the data request, including the request queue threshold, to a randomly selected second server device. The second server device may reject the data request if the request queue threshold of the first server device is smaller than a request queue threshold of the second server device. The client device transmits the data request back to the first server device, including the request queue threshold of the second server device. The first server device processes the data request and adjusts its request queue threshold based on the request queue thresholds of the first and second server devices.
    • 公开了在诸如Web的客户端 - 服务器计算环境中处理数据请求的方法和系统。 客户机设备最初向随机选择的第一服务器设备发送数据请求。 如果超过了其请求队列阈值,则第一个服务器设备可以拒绝数据请求。 客户端设备向随机选择的第二服务器设备重传包括请求队列阈值的数据请求。 如果第一服务器设备的请求队列阈值小于第二服务器设备的请求队列阈值,则第二服务器设备可拒绝该数据请求。 客户端设备将数据请求发送回第一服务器设备,包括第二服务器设备的请求队列阈值。 第一服务器设备处理数据请求并根据第一和第二服务器设备的请求队列阈值调整其请求队列阈值。
    • 10. 发明授权
    • Tiered network flow analysis
    • 分层网络流分析
    • US08510821B1
    • 2013-08-13
    • US12825718
    • 2010-06-29
    • Eric Jason BrandwineSwaminathan SivasubramanianBradley E. MarshallTate Andrew Certain
    • Eric Jason BrandwineSwaminathan SivasubramanianBradley E. MarshallTate Andrew Certain
    • G06F15/16G06F11/00G06F11/30
    • G06F21/552G06F11/3006G06F11/3072H04L63/1416H04L63/1441
    • The effects on networking systems of attacks on vulnerabilities, such as vulnerable modules in a webserver, SYN flooding, etc, can be devastating to a network environment. In various embodiments, a first, quick, or inexpensive analysis is performed on incoming network flows. If an intrusion issue or other problem is suspected based on the first, rapid, or an inexpensive analysis, then the flow can be flagged for redirection to another process, virtual machine, or physical computer module that will perform a deeper, more expensive analysis on the network flow. If there are no issues detected in the second, deeper analysis, then the network flow can be forwarded to its intended recipient. If an issue is detected in the second, deeper analysis, then the network flow can be throttled, quarantined, ignored, sent to an un-trusted portion of the system, sent for more analysis, or otherwise handled or flagged.
    • 对网络系统攻击漏洞的影响,如网络服务器中的易受攻击的模块,SYN洪泛等,可能会对网络环境造成破坏。 在各种实施例中,对传入的网络流进行第一,快速或便宜的分析。 如果基于第一个,快速或便宜的分析怀疑入侵问题或其他问题,则可以标记流程以重定向到另一个进程,虚拟机或物理计算机模块,这将执行更深入,更昂贵的分析 网络流量。 如果在第二次更深入的分析中没有检测到问题,则网络流可以转发到其预期的接收者。 如果在第二次更深入的分析中检测到问题,则可以对网络流进行限制,隔离,忽略,发送到系统的不可信部分,发送以进行更多分析或以其他方式处理或标记。