会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Methods and apparatus for automated testing and analysis of dense wavelength division multiplexing (DWDM), wavelength selective and/or optical switching devices
    • 用于自动测试和分析密集波分复用(DWDM),波长选择和/或光交换设备的方法和装置
    • US07340166B1
    • 2008-03-04
    • US10892072
    • 2004-07-15
    • James E. SylvesterGaston S. OrmazabalLily F. ChenDimitrios Kokkinos
    • James E. SylvesterGaston S. OrmazabalLily F. ChenDimitrios Kokkinos
    • H04J14/08
    • H04Q11/0005H04Q2011/0039H04Q2011/0043H04Q2011/0083
    • A system for performing testing and analysis of a DWDM optical switch in a computer controlled, automated manner for switches from multiple vendors is described. The introduction of automation of the testing configuration and the extensive use of protocol adaptation to provide a consistent user interface for the test apparatus across multiple vendor implementations through the use of programmable adapter modules facilitates systematic and efficient testing. Proper functionality of a given optical switch implementation, quantification of a system's parameters and determination of switching performance measures can be obtained. Capabilities are built into the analysis engine for the determination of Service Level Agreement (SLA) parameters that can be provided for the optical layer or as input to calculations of SLA at higher-level protocols. The automated apparatus provides an efficient tool for evaluating and comparing DWDM optical switching devices, e.g., devices from different manufactures, which use different switch control protocols.
    • 描述了一种用于以计算机控制的自动方式对来自多个供应商的交换机进行DWDM光学交换机的测试和分析的系统。 通过使用可编程适配器模块,引入测试配置的自动化和协议适配的广泛使用,为跨多个供应商实施的测试设备提供一致的用户界面,有助于系统和有效的测试。 可以获得给定光开关实现的正确功能,系统参数的量化和切换性能测量的确定。 分析引擎中内置了能力,用于确定可以为光层提供的服务水平协议(SLA)参数,或作为更高级协议SLA计算的输入。 该自动化设备提供了一种用于评估和比较DWDM光学交换设备(例如来自不同制造商的设备)的有效工具,其使用不同的开关控制协议。
    • 3. 发明申请
    • SECURITY MANAGEMENT SYSTEM FOR MONITORING FIREWALL OPERATION
    • 用于监控防火墙操作的安全管理系统
    • US20110138456A1
    • 2011-06-09
    • US13026446
    • 2011-02-14
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • G06F17/00
    • H04L63/02H04L41/0213H04L41/22H04L43/06H04L43/0852H04L43/0894H04L43/12H04L43/50H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。
    • 4. 发明授权
    • Security management system for monitoring firewall operation
    • 用于监控防火墙操作的安全管理系统
    • US07886348B2
    • 2011-02-08
    • US10679222
    • 2003-10-03
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • G06F9/00
    • H04L63/02H04L41/0213H04L41/22H04L43/06H04L43/0852H04L43/0894H04L43/12H04L43/50H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。
    • 5. 发明申请
    • SECURITY MANAGEMENT SYSTEM FOR MONITORING FIREWALL OPERATION
    • 用于监控防火墙操作的安全管理系统
    • US20090205039A1
    • 2009-08-13
    • US12428666
    • 2009-04-23
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • G06F21/00
    • H04L63/02H04L41/0213H04L41/22H04L43/06H04L43/0852H04L43/0894H04L43/12H04L43/50H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。
    • 6. 发明授权
    • Network firewall test methods and apparatus
    • 网络防火墙测试方法和设备
    • US07421734B2
    • 2008-09-02
    • US10678328
    • 2003-10-03
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • G06F17/00
    • H04L63/02H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。
    • 7. 发明授权
    • Security management system for monitoring firewall operation
    • 用于监控防火墙操作的安全管理系统
    • US08925063B2
    • 2014-12-30
    • US13026446
    • 2011-02-14
    • Gaston S. OrmazabalEdward P. Harvey, Jr.James E. Sylvester
    • Gaston S. OrmazabalEdward P. Harvey, Jr.James E. Sylvester
    • G06F21/00H04L29/06H04L12/26H04L12/24
    • H04L63/02H04L41/0213H04L41/22H04L43/06H04L43/0852H04L43/0894H04L43/12H04L43/50H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。
    • 9. 发明授权
    • Network firewall test methods and apparatus
    • 网络防火墙测试方法和设备
    • US08001589B2
    • 2011-08-16
    • US12199486
    • 2008-08-27
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • G06F15/16
    • H04L63/02H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。
    • 10. 发明申请
    • NETWORK FIREWALL TEST METHODS AND APPARATUS
    • 网络防火墙测试方法和设备
    • US20090083845A1
    • 2009-03-26
    • US12199486
    • 2008-08-27
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • Gaston S. OrmazabalEdward P. HarveyJames E. Sylvester
    • G06F17/00
    • H04L63/02H04L63/029H04L63/1433
    • A test method for Internet-Protocol packet networks that verifies the proper functioning of a dynamic pinhole filtering implementation as well as quantifying network vulnerability statistically, as pinholes are opened and closed is described. Specific potential security vulnerabilities that may be addressed through testing include: 1) excessive delay in opening pinholes, resulting in an unintentional denial of service; 2) excessive delay in closing pinholes, creating a closing delay window of vulnerability; 3) measurement of the length of various windows of vulnerability; 4) setting a threshold on a window of vulnerability such that it triggers an alert when a predetermined value is exceeded; 5) determination of incorrectly allocated pinholes, resulting in a denial of service; 6) determining the opening of extraneous pinhole/IP address combinations through a firewall which increase the network vulnerability through unrecognized backdoors; and 7) determining the inability to correlate call state information with dynamically established rules in the firewall.
    • 描述了针对针孔打开和关闭的互联网协议分组网络的测试方法,其验证动态针孔过滤实现的正常功能以及统计地定量网络脆弱性。 可能通过测试解决的特定潜在的安全漏洞包括:1)打开针孔过多的延迟,导致无意的拒绝服务; 2)关闭针孔过度延迟,造成关闭延迟窗口的脆弱性; 3)测量各种窗口的长度; 4)在漏洞窗口设置阈值,使得当超过预定值时触发警报; 5)确定分配不正确的针孔,导致拒绝服务; 6)通过防火墙确定外部针孔/ IP地址组合的打开,通过无法识别的后门增加网络脆弱性; 以及7)确定无法将呼叫状态信息与防火墙中动态建立的规则相关联。