Patent application number | Description | Published |
20090031129 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF UNWANTED E-MAIL | 01-29-2009 |
20090031136 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF UNWANTED E-MAIL | 01-29-2009 |
20090132669 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF UNWANTED E-MAIL | 05-21-2009 |
20090158046 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF POLYMORPHIC NETWORK WORMS AND VIRUSES | 06-18-2009 |
20090158435 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING, PREVENTING, AND TRACING NETWORK WORMS AND VIRUSES | 06-18-2009 |
20090172390 | PACKET-PARALLEL HIGH PERFORMANCE CRYPTOGRAPHY SYSTEMS AND METHODS - A cryptographic system ( | 07-02-2009 |
20090182867 | METHOD AND APPARATUS FOR IDENTIFYING A PACKET - A system and method for identifying target packets in a network. The invention identifies packets by computing a hash value over at least a portion of a packet passing through a network device such as a router. The hash value is used as an address, or index, into a memory. The hash value identifies a unique memory address and a flag is set at the respective memory location. When a target packet is detected elsewhere in a network, the network device receives a query message containing a hash value of the target packet. The network device compares the target packet to the hash values in memory. A match between the hash value in memory and the hash value in the query message indicates the target packet was observed by the network device. After a match is detected, the network device makes a reply available to the network. | 07-16-2009 |
20090207838 | TERNARY CONTENT ADDRESSABLE MEMORY EMBEDDED IN A CENTRAL PROCESSING UNIT - An arithmetic logic unit ( | 08-20-2009 |
20090313339 | METHOD AND APPARATUS FOR TRACING PACKETS - A system and method for performing source path isolation in a network. The system comprises an intrusion detection system (IDS), a source path isolation server (SS | 12-17-2009 |
20100205265 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF UNWANTED E-MAIL | 08-12-2010 |
20100205670 | METHOD AND APPARATUS FOR TRACING PACKETS - A system and method for performing source path isolation in a network. The system comprises an intrusion detection system (IDS), a source path isolation server (SS | 08-12-2010 |
20100205671 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF POLYMORPHIC NETWORK WORMS AND VIRUSES | 08-12-2010 |
20100205672 | HASH-BASED SYSTEMS AND METHODS FOR DETECTING, PREVENTING, AND TRACING NETWORK WORMS AND VIRUSES | 08-12-2010 |
20110022855 | SYSTEM AND METHOD FOR THWARTING BUFFER OVERFLOW ATTACKS USING ENCRYPTED PROCESS POINTERS | 01-27-2011 |
20110072279 | DEVICE AND METHOD FOR SECURELY STORING DATA - Devices and methods for securely storing data are provided. A device for constructing an encryption key comprising a tamper-protection barrier that encloses one or more memory devices is provided. The memory stores data for constructing the encryption key. The memory may include a single memory device or a plurality of memory devices. The tamper-protection barrier also encloses a security processor configured to combine the data stored in the memory based in part on a function, such as a logical exclusive-or (XOR) function, to construct the encryption key. The stored data in the memory may include partial keys. These partial keys may be created based in part on applying the XOR function to an encryption key. | 03-24-2011 |
20110161664 | MEANS OF MITIGATING DENIAL OF SERVICE ATTACKS ON IP FRAGMENTATION IN HIGH PERFORMANCE IPSEC GATEWAYS - Embodiments of the invention reduce the probability of success of a DOS attack on a node receiving packets by decreasing the probability of random collisions of packets sent by a malicious user with those sent by honest users. The probability of random collisions may be reduced in one class of embodiments of the invention by supplementing the identification field of the IP header of each transmitted packet with at least one bit from another field of the header. The probability of random collisions may be reduced in another class of embodiments of the invention by ensuring that packets sent from a transmitting IPsec node to a receiving IPsec node are not fragmented. | 06-30-2011 |
20110173386 | TERNARY CONTENT ADDRESSABLE MEMORY EMBEDDED IN A CENTRAL PROCESSING UNIT - An arithmetic logic unit ( | 07-14-2011 |
20120176903 | NON-UNIFORM PER-PACKET PRIORITY MARKER FOR USE WITH ADAPTIVE PROTOCOLS - A method, apparatus and computer program product for non-uniform per-packet priority marking for use with adaptive protocols is presented. A packet is received at a first network device, the packet assigned to a priority band. A priority is determined for the packet between a lowest priority of the priority band and a highest priority of the priority band, the priority for the packet selected based on a target distribution of priorities within the priority band, the target distribution comprising a distribution selected to achieve a desired capacity relationship among groups of packets assigned to different priority bands. The selected priority is assigned to the packet. | 07-12-2012 |