Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

190results about How to "Blocking in network" patented technology

Virtual private networks and methods for their operation

In methods and apparatus for routing packets through a communications network, a respective distinct broadcast address is assigned to each of a plurality of distinct sets of virtual ports. No virtual port belongs to more than one of the distinct sets. A respective egress address is assigned to each packet entering the network via an ingress virtual port. The respective egress address corresponds to a respective destination address of the entering packet when a correspondence between the destination address and an egress address is known. When no correspondence between the destination address and an egress address is known, the respective egress address is a broadcast egress address corresponding to the set comprising the ingress virtual port. The packet is routed according to the respective egress address. The routing is restricted to virtual ports belonging to the distinct set of virtual ports that includes the ingress virtual port. The distinct sets of virtual ports and their associated broadcast addresses define isolated virtual private networks within the network. Each physical port of the network may map one-to-one onto a corresponding virtual port, or may map onto a corresponding plurality of virtual ports, in which case the each virtual port of the plurality is associated with a respective distinct combination of a physical address of the physical port and a respective virtual network identifier.
Owner:RPX CLEARINGHOUSE

Expandable microspheres for foam insulation and methods

Hollow thermoexpandable particles or microspheres are provided that contain hydrocarbon blowing agents and have a shell polymer that can be softened at the onset of the expansion temperature and solidified at a higher temperature (thermoset) in an expanded state. Preferably, the microspheres have a shell of thermally expandable and thermally crosslinkable polymer and a hollow interior that contains a hydrocarbon liquid that boils at a temperature below the heat activated crosslinking temperature of the polymer shell. The crosslinking of the shell polymer during or after expansion, which is heat activated at an elevated temperature, can solidify the shell polymer and, then, maintain the expanded volume of the microspheres. The thermoexpandable thermoset polymer particles are useful in insulation, packaging, for making foam materials such as polyurethane or polyisocyanurate rigid foams. The invented thermoset microspheres can substantially improve the close cell percentage and compressive strength of the foam materials and make the foam manufacturing less hazardous.
Owner:IP RIGHTS +1

Apparatus for sharing security information among network domains and method thereof

Provided are a security information sharing apparatus capable of sharing security information among network domains and a method thereof. The security information sharing apparatus includes a primitive security information storage unit configured to store primitive security information to be shared with other network domains, an information sharing policy storage unit configured to store an information sharing policy for information to be shared, an information masking policy storage unit configured to store an information masking policy for information not to be opened to the other network domain, a domain selector configured to select the other network domain to receive the shared security information, a shared security information generator configured to generate shared security information for the selected other network domain by applying the information sharing policy to the primitive security information, an information masking unit configured to mask information not to be opened in the generated security information according to the information masking policy, a protocol message generator configured to generate a protocol message for the shared security information subjected to the information masking, to be transmitted, and a protocol message transmitter configured to transmit the protocol message to the selected other network domain.
Owner:ELECTRONICS & TELECOMM RES INST

Security system and method using server security solution and network security solution

A security method and system using a server security solution and a network security solution is disclosed. In the security method based on the security system that has a firewall for blocking malicious access to a corresponding network, a network intrusion prevention system for blocking intrusion into the network and server systems including a mail server and a File Transfer Protocol (FTP) server, the server systems transmit information on an intruding system, which has transmitted harmful traffic, to the network intrusion prevention system at the time of detecting the harmful traffic. The network intrusion prevention system blocks the access of the harmful traffic based on the information transmitted from the server systems. According to the present invention, the server systems detect malicious intrusion attempts, and intrusion is blocked at a network level, so that the present invention is effective in that second and third malicious intrusion attempts can be fundamentally blocked and the consumption of network resources attributable to repeated intrusion attempts can be prevented.
Owner:LG CNS

Virtual local area network pruning protocol

In one embodiment, an intermediate network device has a plurality of ports, and at least some of the ports are associated with Virtual Local Area Network (VLAN) designations. A spanning tree entity executes a spanning tree protocol to transition the ports among a plurality of spanning tree states. A VLAN port logic circuit is disposed at one or more of the ports and processes control packets advertising VLAN memberships. The VLAN port logic circuit, in response to receiving a control packet broadcast by another intermediate network device, asserts bits in a VLAN wanted vector for which the spanning tree state of the selected port is in the forwarding state, signifying that network messages associated with such VLAN designations are to be forwarded from the respective port. The VLAN wanted vectors may later be transmitted in control messages from the intermediate network device.
Owner:CISCO TECH INC

Method, device, and system for self-adaptively adjusting data transmission rate

Embodiments of the present invention disclose a method, a device, and a system for self-adaptively adjusting a data transmission rate, which solve the problem of network buffer overflow. The method includes: receiving parameters sent by a client; calculating a predicted value of a data sending rate according to a maximum value of a network buffer and the received parameters; judging whether the predicted value of the data sending rate is less than an original service bit rate; and if the predicted value of the data sending rate is less than the original service bit rate, discarding data of at least one data unit in a send buffer. The method, the device, and the system are mainly applied to adjust the data transmission rate, and especially to adjust the data transmission rate in a time-varying network.
Owner:HUAWEI TECH CO LTD

Optimized interaction method of user terminal selecting access mobile network in wireless local area network

The present invention relates to an optimized interaction method of a WLAN user terminal selecting an access mobile communication network. In this method, after a wireless connection between the WLAN user terminal and a WLAN access network is established, the WLAN access network or the WLAN user terminal initiates an access authentication procedure, and the WLAN access network sends a user identity request message to the WLAN user terminal. After receiving the user identity request message, the WLAN user terminal determines network selection information to be currently carried according to a detecting result of whether the WLAN access network is changed or according to user selection information, and returning a message containing the determined network selection information to the WLAN access network. The WLAN access network then judges whether the network selection information in the received message indicates one of the mobile communication operation networks to which the WLAN access network is currently connected; if so, sends an access authentication request from the WLAN user terminal to a mobile communication operation network indicated in the network selection information, otherwise, the network sends a notification signaling to the WLAN user terminal, the WLAN user terminal completes subsequent operations according to contents in the notification signaling. With the present invention, when being accessed to a WLAN that is connected to multiple mobile communication operation networks, the WLAN user terminal is capable of selecting an optimal mobile communication operation network to access according to the requirements.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products