SANGFOR TECHNOLOGIES COMPANY LIMITED Patent applications |
Patent application number | Title | Published |
20160139957 | METHOD AND SYSTEM FOR SCHEDULING VIRTUAL MACHINES IN INTEGRATED VIRTUAL MACHINE CLUSTERS - A method for scheduling virtual machines in a virtual machine cluster includes obtaining a filename of a target virtual machine when a user requests to start the target virtual machine; inquiring, based on the filename of the target virtual machine, a storage module or a database to acquire one or more nodes where copies of the target virtual machine are located; selecting, from the acquired one or more nodes, a node with a highest score as a target node having a copy of the target virtual machine; and running the copy of the target virtual machine on the selected target node with the highest score. | 05-19-2016 |
20160119193 | METHOD AND SYSTEM FOR DETECTING PROXY INTERNET ACCESS - A method for detecting proxy internet access includes intercepting an access request from a proxied terminal of a same internet account; and sending a redirection packet to the proxied terminal sending the access request. The redirection packet carries a first timestamp indicating when the redirection packet is sent. The method also includes receiving a reported timestamp difference between the first timestamp and a second timestamp. The second timestamp is a system time of the proxied terminal acquired after the proxied terminal receives the redirection packet. Further, the method includes executing a clustering process on the reported timestamp difference to obtain a clustering result; and based on the clustering result, detecting whether the same internet account is a proxy account. | 04-28-2016 |
20160092261 | METHOD AND SYSTEM FOR PHYSICAL COMPUTER SYSTEM VIRTUALIZATION - The present disclosure provides a physical computer virtualization method. The method includes receiving a virtualization instruction inputted by a user on a physical computer; restarting the physical computer; and loading the physical computer with a virtual machine management system mirror image file after restarting the physical computer to boot the physical computer into a virtual machine management system. The method also include obtaining physical disks of the physical computer; and creating a virtual machine through the virtual machine management system and using the physical disks of the physical computer. | 03-31-2016 |
20160080401 | METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED ACCESS ATTACK - A method is provided for detecting unauthorized access attack. The detecting method includes obtaining at least one HTTP request and at least one URL address of the HTTP request by parsing the HTTP request; determining whether there exist one or more protection rules corresponding to the URL address; and, when it is determined that the protection rules corresponding to the URL address exit, obtaining access data of the HTTP request. The detecting method also includes determining whether the access data satisfies the protection rules; and, when it is determined that the access data does not satisfy the protection rules, determining the corresponding HTTP request of the URL address to be an unauthorized access attack. | 03-17-2016 |
20160080265 | METHOD AND SYSTEM FOR NETWORK CONGESTION CONTROL - A network congestion control method is provided. The method includes detecting whether a new network connection is established by a source endpoint; obtaining a destination endpoint of the new network connection when it is detected that a new network connection is established by a source endpoint; and assigning the new network connection to an established network group corresponding to the destination endpoint of the new network connection. Further, the method includes, based on a predefined network congestion control mechanism for each network group, obtaining a data transfer rate of each network group and controlling the data transfer rate of each network group to control data transfer rates of network connections in each network group including the new network connection. | 03-17-2016 |
20140189842 | METHOD FOR DEFENDING AGAINST SESSION HIJACKING ATTACKS AND FIREWALL - The present disclosure provides a method for defending against session hijacking attacks, including: receiving a first access request transmitted from a legal client side and transmitting the first access request to a server; receiving a first response comprising a first authentication token returned from the server; generating a first sequence value according to a network address of the legal client side and an identification code of the legal client side, and recombining the first authentication token and the first sequence value to form a second authentication token; and replacing the first authentication token in the first response with the second authentication token, and transmitting the first response comprising the second authentication token to the legal client side. | 07-03-2014 |
20140112129 | TRAFFIC CONTROLLING METHOD AND DEVICE BASED ON REMOTE APPLICATION - The present disclosure provides a traffic controlling method based on remote applications, comprising the following steps: evaluating a current network bandwidth; detecting a bitmap updating frequency of each area in a current screen, identifying a multimedia area, and judging whether the multimedia area is valid or not to obtain a judging result; and controlling data traffic according to the current network bandwidth and the judging result. By evaluating the current network bandwidth, detecting the updating frequency of each area in the current screen and identifying whether the multimedia area is valid, and dynamically controlling the data traffic according to the current network bandwidth and according to whether the multimedia area is valid, the present disclosure is capable of ensuring the unblocked transmission of the critical business and preventing the display quality of the multimedia area from being affected to improve the system performance and the user experience. | 04-24-2014 |
20110173339 | NETWORK SERVICE ACCESS METHOD AND ACCESS GATEWAY EQUIPMENT - The present invention includes a network service access method. In one embodiment, such a method comprises: forwarding the domain name resolution requests to a local domain name server of each Internet service provider providing services through access link corresponding with the Internet service provider; receiving Internet Protocol address on the domain name resolution requests which the local domain name server of each Internet service provider returned from the corresponding access link; selecting the Internet Protocol address according to line state of the access link of each Internet service provider providing services and returning the selected Internet Protocol address to the user equipments; and visiting network services by the access link of the Internet service provider returning the selected Internet Protocol address. | 07-14-2011 |
20110173318 | Method, Device and Gateway Server for Detecting Proxy at the Gateway - The present invention provides a method for detecting proxy at the gateway, comprising decomposing the access request from the IP need to be proxy-monitored into an access request to original address and an access request to gateway-specified address to access the original address and the gateway-specified separately; determining whether a specific cookie information is included in said access request to gateway-specified address or not to obtain a second determining result; responding to the access request to said gateway-specified address and embedding the cookie information with the time stamp into the client PC by the gateway when said second determining result is no, and reading said cookie information when said second determining result is yes; determining whether said IP is using proxy or not on the basis of said cookie information. Accordingly, the present invention also provides a device and gateway server for detecting proxy at the gateway. It can be detected accurately and secretly in the intranet whether a certain IP is using common proxy or nat proxy. | 07-14-2011 |