Patent application number | Description | Published |
20110051624 | DEFINING AN OPTIMAL TOPOLOGY FOR A GROUP OF LOGICAL SWITCHES - A Layer 2 network switch fabric is partitionable into a plurality of virtual fabrics. A network switch chassis is partitionable into a plurality of logical switches, each of which may be associated with one of the virtual fabrics, including a base switch. Logical switches in multiple network switch chassis are connected by logical connections, such as logical inter-switch links that use physical connections, such as extended inter-switch links between base switches, for data transport. A topology of logical connections is established that balances competing metrics, such as robustness and scalability, while maintaining alignment with the topology of the physical connections. A topology factor allows establishing different topologies with different balances between the competing metrics | 03-03-2011 |
20110085558 | Virtual and Logical Inter-Switch Links | 04-14-2011 |
20110085568 | MAPPING LOGICAL PORTS OF A NETWORK SWITCH TO PHYSICAL PORTS - A Layer 2 network switch is partitionable into a plurality of switch fabrics. The single-chassis switch is partitionable into a plurality of logical switches, each associated with one of the virtual fabrics. The logical switches behave as complete and self-contained switches. A logical switch fabric can span multiple single-chassis switch chassis. Logical switches are connected by inter-switch links that can be either dedicated single-chassis links or logical links. An extended inter-switch link can be used to transport traffic for one or more logical inter-switch links. Physical ports of the chassis are assigned to logical switches and are managed by the logical switch. Legacy switches that are not partitionable into logical switches can serve as transit switches between two logical switches. | 04-14-2011 |
20110085569 | CREATION AND DELETION OF LOGICAL PORTS IN A LOGICAL SWITCH | 04-14-2011 |
20110216769 | Dynamic Path Selection - A switch/router dynamically selects a path from multiple available paths between a source destination pair for a frame. A hash function generates a hash value from frame parameters such as source ID, destination ID, exchange ID, etc. The hash value is given as an input to a plurality of range comparators where each range comparator has a range of values associated with it. If the hash value falls within a range associated with a range comparator, that range comparator generates an in-range signal. A path selector module detects which range comparator has generated the in-range signal, and determines a path associated with that range comparator from previously stored information. The frame is transmitted via the selected path. The ranges associated with each range comparator can be non-overlapping and unequal in size. The number of range comparators can be equal to a number of selected multiple paths. | 09-08-2011 |
20140006871 | NETWORK MONITORING AND DIAGNOSTICS | 01-02-2014 |
20150310245 | Embedding Information in an Image for Fast Retrieval - A binary bit-string is encoded in a circular image. The circular image encodes substrings of the bit-string in sectors of the circular image and includes redundant bits, error correcting codes, and metadata pertaining to the encoding scheme. To encode the bit-strings, a circular image is generated that includes a center ring and a first ring. Outward from the first ring, additional rings represent bits in the bit-string according to the width of each ring. The exterior of the image includes an outer boundary ring. The width of the boundary rings is used to define the widths representing the value of each ring. To extract a bit-string from an image, the center of the circular image is identified and a direction is selected to evaluate the image outward, determining the boundaries of each ring. The boundaries are analyzed to determine the width of each ring and the encoded bit values. | 10-29-2015 |
20150310431 | Secure Payments Using a Mobile Wallet Application - A payment system implemented on a mobile device authenticates transactions made via the mobile device. The mobile device generates a public-private key pair and receives an authenticating input from a user of the device. The public key is sent to a secure payment system, and the authenticating input is used to generate a symmetric key that encrypts the private key. After a transaction is initiated, the mobile device receives an authenticating input from the user. The symmetric key is generated from the authenticating input and the mobile device attempts to decrypt the private key from the encrypted private key using the symmetric key generated by the user's input. The decrypted key is used to sign a transaction authorization message which is sent to the secure payment system, along with payment information, which can verify the signed message via the public key. Additional techniques related to secure payments are also disclosed. | 10-29-2015 |
20150310436 | Securely Storing and Using Sensitive Information for Making Payments Using a Wallet Application - A payment system implemented on a mobile device authorizes and processes transactions. The mobile device generates a public-private key pair and receives payment information. The private key and the payment information are split into a local and a remote fragment. The public key, a private key fragment, and a payment information fragment are sent to a secure payment system, and the other fragments are stored on the mobile device. When a transaction is received by the mobile device to authorize, the mobile device sends a payment fragment to the secure payment system and receives a private key fragment from the secure payment system. The mobile device authorizes the transaction using the private key, recovered from the private key fragments. The secure payment system verifies the transaction using the public key and processes the transaction using the recovered payment information. Additional techniques to process transactions using data splitting are disclosed. | 10-29-2015 |