会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Resynchronization of passive monitoring of a flow based on hole detection
    • 基于空穴检测的流动被动监测重新同步
    • US09210135B2
    • 2015-12-08
    • US14500893
    • 2014-09-29
    • ExtraHop Networks, Inc.
    • Jesse Abraham RothsteinArindum MukerjiBhushan Prasad Khanal
    • H04L9/20H04L29/06H04L12/26H04L9/34
    • H04L63/0428H04L43/0823H04L43/0876H04L43/12H04L43/18H04L63/1408
    • Embodiments are directed towards resynchronizing the processing of a monitored flow based on hole detection. A network monitoring device (NMD) may be employed to passively monitor flows of packets for a session between endpoints. The NMD may receive copies of the monitored flow and perform processes on the monitored flow. In some situations, some copies of packets may not be fully processed by the NMD, creating a hole in the processing. If a hole is detected in the monitored flow and the processing of the monitored flow is desynchronized, then the NMD may suspend processing until it is resynchronized or for a remainder of the session. If the processing is desynchronized, then the NMD may resynchronize the processing by resuming the processing of the monitored flow at a downstream position of the monitored flow based on the detected hole.
    • 实施例旨在基于空穴检测重新同步所监视的流的处理。 可以采用网络监视设备(NMD)来动态地监视端点之间的会话的分组流。 NMD可以接收被监视流的副本,并对监视的流执行进程。 在某些情况下,数据包的某些副本可能未被NMD完全处理,在处理中创建一个孔。 如果在监视的流中检测到一个孔,并且所监视的流的处理被去同步,则NMD可以暂停处理,直到它被重新同步或者在剩余的会话中。 如果处理是不同步的,则NMD可以基于检测到的孔在监视流的下游位置恢复监视流程的处理来重新同步该处理。
    • 5. 发明申请
    • Traceable Method and System for Broadcasting Digital Data
    • 用于广播数字数据的可跟踪方法和系统
    • US20110116630A1
    • 2011-05-19
    • US13000305
    • 2009-06-23
    • Olivier BilletRyad Benadjila
    • Olivier BilletRyad Benadjila
    • H04L9/20
    • H04L9/0836H04L2209/606
    • A method and system for a user to obtain a derived value Kr of m bits, in which, given two pseudo-random functions g0 and g1 from m bits to m bits, said user obtains, on the basis of an input parameter consisting of a word r of n bits, a derived value Kr=grn∘ . . . gr2∘gr1 (S), where, for i=1, . . . , n, gri=g0 if ri=0, and gri=g1 if ri=1, and where S is a master value of m bits which is not disclosed to said user. This method comprises the following steps: a search is conducted, from among a set of words of m bits Uj, where j=1, . . . , p, recorded in a table TU and equal to Uj=gvl(j)(j)∘ . . . gv2(j)∘gv1(j) (S), where, for i=1, . . . , l(j), the indices vi(j) are predetermined bits, for a word Uσ equal to Uσ=grl(σ)∘ . . . gr2∘gr1 (S); said derived value Kr is thereafter obtained by calculating Kr=grn∘ . . . gr1(σ)+1 (Uσ).Application to the encryption/decryption of pay-per-use digital contents, and to authentication.
    • 一种用于获得m比特的导出值Kr的方法和系统,其中给定从m比特到m比特的两个伪随机函数g0和g1,所述用户基于由 n位的字r,派生值Kr = grn o。 。 。 gr2 ogr1(S),其中,对于i = 1, 。 。 如果ri = 0,则n,gri = g0,如果ri = 1,则gri = g1,其中S是未向所述用户公开的m位的主值。 该方法包括以下步骤:从m位Uj的一组单词中进行搜索,其中j = 1,...。 。 。 ,p,记录在表TU中并且等于Uj = gvl(j)(j)o。 。 。 gv2(j)∘gv1(j)(S),其中,对于i = 1, 。 。 ,l(j),索引vi(j)是字U&sgr的预定位; 等于U&sgr; = grl(&sgr;)o。 。 。 gr2 ogr1(S); 然后通过计算Kr = grn0获得所述导出值Kr。 。 。 gr1(&sgr;)+ 1(U&sgr;)。 应用于按使用付费数字内容的加密/解密,以及认证。
    • 7. 发明申请
    • Method and System for OCDM-Based Photonic Layer Security Robustness to Spoof Data Integrity
    • 基于OCDM的光子层安全鲁棒性与数据完整性的方法和系统
    • US20100074444A1
    • 2010-03-25
    • US12492895
    • 2009-06-26
    • Shahab Etemad
    • Shahab Etemad
    • H04L9/20H04L9/18H04K1/04
    • H04L9/0858H04B10/85
    • A system and method is provided for identifying fraudulent data in an optical data transmission. The system and method includes scrambling an encoded data signal using dynamically changing scramble code; transmitting the scrambled encoded data signal over a network; descrambling the scrambled encoded data signal using a descramble code corresponding to a compliment of the dynamically changing scramble code; analyzing the descrambled encoded data signal to search for a region of low error between descrambled data and noise; notifying of a possible spoofing attempt when a region of low error is not found; and decoding the descrambled encoded data signal using a compliment of phase codes originally used for encoding the encoded data signal in order to generate a decoded signal to retrieve a desired data signal when a region of low error is found.
    • 提供了一种用于识别光数据传输中的欺诈数据的系统和方法。 该系统和方法包括使用动态变化的扰码来对编码的数据信号进行加扰; 通过网络发送加扰的编码数据信号; 使用对应于动态变化的扰码的补码的解扰码来对加扰的编码数据信号进行解扰乱; 分析解扰编码数据信号,以搜索解扰数据与噪声之间的低误差区域; 当没有发现低错误的区域时通知可能的欺骗尝试; 并且使用最初用于编码编码数据信号的相位码的补码来解码解扰编码的数据信号,以便当发现低误差的区域时产生解码的信号以获取期望的数据信号。
    • 9. 发明申请
    • STREAM ENCRYPTION METHOD AND ENCRYPTION SYSTEM
    • 流加密方法和加密系统
    • US20100008497A1
    • 2010-01-14
    • US12492841
    • 2009-06-26
    • Motomu TAKATSU
    • Motomu TAKATSU
    • H04L9/20
    • H04L9/0656H04L9/002
    • A stream encryption method encodes plaintext of N number of 1-bit input, signal sequences into L (L is N or more) bits of encrypted text using N number of pseudo random sequences and uses only one pseudo random sequence used for the encryption to decode the single corresponding plaintext. This stream encryption method comprises using the N number of pseudo random sequences to divide a L-bit encryption symbol set, averagely into two equal parts; selecting either of the two partial sets by a corresponding 1-bit plaintext sequence; and when there are one or more elements of the selected N number of partial sets forming common parts in the sets, using one of those as an encryption symbol.
    • 流加密方法使用N个伪随机序列将N个1比特输入的信号序列的明文输入L(L是N个或更多个)加密文本的比特,并且仅使用用于加密的一个伪随机序列进行解码 单一对应的明文。 该流加密方法包括使用N个伪随机序列将L比特加密符号集平均分成两部分; 通过相应的1位明文序列选择两个部分集合中的任一个; 并且当所选择的N个部分集合中的一个或多个元素在集合中形成公共部分时,使用其中的一个作为加密符号。