Patent application number | Description | Published |
20090086641 | Method and Apparatus for Detecting Support for A Protocol Defining Supplemental Headers - Various methods and systems for detecting whether a network device supports a protocol, which defines a supplemental header, are disclosed. One method involves detecting a value within a preamble generated by a sending device and verifying that a header format of a header, also generated by the sending device, conforms to a header format definition of a protocol. The header format definition of the protocol defines a supplemental header. The preamble can be an Ethernet preamble. In one embodiment, the preamble is a converged data link (CDL) preamble or other type of preamble that is used to convey operation, administration and management (OAM) information. | 04-02-2009 |
20110134923 | Intelligent Adjunct Network Device - An adjunct network device includes several ports, an uplink interface, and an adjunct forwarding engine coupled to the ports and the uplink interface. A first port is configured to receive a packet, which includes a destination address. The adjunct forwarding engine is configured to send the packet to the uplink interface if the destination address is not associated with any of the ports. The packet is sent to one of the ports if the destination address is associated with the one of the ports. | 06-09-2011 |
20110200041 | Intelligent Adjunct Network Device - An adjunct network device includes several ports, an uplink interface, and an adjunct forwarding engine coupled to the ports and the uplink interface. A first port is configured to receive a packet, which includes a destination address. The adjunct forwarding engine is configured to send the packet to the uplink interface if the destination address is not associated with any of the ports. The packet is sent to one of the ports if the destination address is associated with the one of the ports. | 08-18-2011 |
20110206059 | METHODS AND DEVICES FOR TRANSMITTING DATA BETWEEN STORAGE AREA NETWORKS - Methods and devices are provided for efficient transmission of data between storage area networks. According to some aspects of the invention, novel methods are provided for processing data packets sent by, or received from, a storage area network. Some such aspects of the invention involve storing a packet (or a portion of a packet) in a single memory location during an encapsulation or de-encapsulation process. Instead of repeatedly copying the packet during processing, pointer information is passed along that indicates the single memory location. In some aspects of the invention, the segment boundaries of a packet are retained after data transmission. If data in the packet need to be re-transmitted, the packet is re-transmitted with the same segment boundaries. | 08-25-2011 |
20120144014 | DIRECTING DATA FLOWS IN DATA CENTERS WITH CLUSTERING SERVICES - Techniques are provided for implementing clustering services in a virtual data center or other virtualized infrastructure in a manner that allows packets to be directed to a particular service engine of a service engine cluster. | 06-07-2012 |
20130301413 | VIRTUAL INTERNET PROTOCOL MIGRATION AND LOAD BALANCING - A system for virtual internet protocol (VIP) address migration. The system comprises serving one or more clients connected via a switch router over a network to one or more network gateways. The switch router forwards packets to the VIP address of a first network gateway. If the first network gateway determines a VIP address migration criteria has been reached, the first network gateway may migrate any new traffic associated with a packet flow over to a second network gateway for more efficient processing by inserting a default flow code into the header of the VIP address of the packet. Older packets continue to process on the first network gateway, however new packets are forwarded and processed on the second network gateway. Once the packets being processed on the first network gateway completes, the second network gateway becomes the default network gateway for processing existing and new packets. | 11-14-2013 |
20140089486 | DIRECTING DATA FLOWS IN DATA CENTERS WITH CLUSTERING SERVICES - Techniques are provided for implementing clustering services in a virtual data center or other virtualized infrastructure in a manner that allows packets to be directed to a particular service engine of a service engine cluster. | 03-27-2014 |
Patent application number | Description | Published |
20130117848 | Systems and Methods for Virtualization and Emulation Assisted Malware Detection - Systems and methods for virtualization and emulation malware enabled detection are described. In some embodiments, a method comprises intercepting an object, instantiating and processing the object in a virtualization environment, tracing operations of the object while processing within the virtualization environment, detecting suspicious behavior associated with the object, instantiating an emulation environment in response to the detected suspicious behavior, processing, recording responses to, and tracing operations of the object within the emulation environment, detecting a divergence between the traced operations of the object within the virtualization environment to the traced operations of the object within the emulation environment, re-instantiating the virtualization environment, providing the recorded response from the emulation environment to the object in the virtualization environment, monitoring the operations of the object within the re-instantiation of the virtualization environment, identifying untrusted actions from the monitored operations, and generating a report regarding the identified untrusted actions of the object. | 05-09-2013 |
20130117849 | Systems and Methods for Virtualized Malware Detection - Systems and methods for virtualized malware enabled detection are described. In some embodiments, a method comprises intercepting an object provided from a first digital device, determining one or more resources the object requires, instantiating a virtual environment with the one or more resources, processing the object within the virtual environment, tainting operations of the object within the virtual environment, monitoring the operations of the object, identifying an additional resource of the object while processing that is not provided in the virtual environment, re-instantiating the virtual environment with the additional resource, monitoring the operations of the object while processing within the re-instantiated virtual environment, identifying untrusted actions from the monitored operations, and generating a report identifying the operations and the untrusted actions of the object. | 05-09-2013 |
20140019443 | Systems and methods for discovering content of predicted interest to a user - A system comprising a communication interface configured to receive personal information of a user; a user characterization engine configured to determine a user interest of the user based on at least some of the personal information; an infuser configured to generate a search string based on the user interest; an infused crawler configured to retrieve one or more content elements from a network based on the search string; a content characterization engine configured to identify a context for each of the one or more content elements, and to assess for each of the one or more content elements a credibility score as to the respective context identified; a content selection engine configured to determine a probability score of each of the one or more content elements, the probability score being based on the user interest and the respective credibility score of each of the one or more content elements, the probability score defining a predicted interest of the user for each of the one or more content elements; and a content delivery engine configured to provide at least one of the one or more content elements to the user based on the one or more probability scores. | 01-16-2014 |
20140164315 | System And Method For The Creation Of, Automatic Synchronization Of, And Access To Multi-Cloud Documents That Reside Across Dissimilar Clouds, Devices, And Operating Systems And That Are Accessed By Multiple Dissimilar Applications - System and services are described that permit the creation of “multi-cloud documents.” Multiple synchronized copies of a single document may be synchronized across dissimilar clouds, devices (both mobile and stationary), and operating systems. This may be implemented using software on the devices, in conjunction with an intermediate cloud. Multi-cloud documents may also be shared with other uses using dissimilar clouds, devices, or applications. Documents may be locked on a fine-structured level to minimize the possibility of edit collisions. | 06-12-2014 |